[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary all.fr.html malware-apple.es.ht...
From: |
GNUN |
Subject: |
www/proprietary all.fr.html malware-apple.es.ht... |
Date: |
Tue, 3 Aug 2021 10:32:41 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 21/08/03 10:32:40
Modified files:
proprietary : all.fr.html malware-apple.es.html
malware-apple.fr.html
proprietary-insecurity.es.html
proprietary-insecurity.fr.html
proprietary.fr.html
proprietary/po : all.fr-en.html all.fr.po all.pot all.pt-br.po
all.ru.po de.po es.po fr.po it.po ja.po
malware-apple.de-diff.html malware-apple.de.po
malware-apple.es-en.html malware-apple.es.po
malware-apple.fr-en.html malware-apple.fr.po
malware-apple.it-diff.html malware-apple.it.po
malware-apple.ja-diff.html malware-apple.ja.po
malware-apple.nl-diff.html malware-apple.nl.po
malware-apple.pot malware-apple.pt-br.po
malware-apple.ru.po nl.po pl.po pot
proprietary-insecurity.de-diff.html
proprietary-insecurity.de.po
proprietary-insecurity.es-en.html
proprietary-insecurity.es.po
proprietary-insecurity.fr-en.html
proprietary-insecurity.fr.po
proprietary-insecurity.it-diff.html
proprietary-insecurity.it.po
proprietary-insecurity.ja-diff.html
proprietary-insecurity.ja.po
proprietary-insecurity.pot
proprietary-insecurity.pt-br.po
proprietary-insecurity.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr-en.html
proprietary.fr.po proprietary.it-diff.html
proprietary.it.po proprietary.ja-diff.html
proprietary.ja.po proprietary.nl-diff.html
proprietary.nl.po proprietary.pl-diff.html
proprietary.pl.po proprietary.pot
proprietary.pt-br.po proprietary.ru.po
proprietary.tr.po proprietary.zh-cn.po
proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po tr.po
zh-cn.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/all.fr.html?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.es.html?cvsroot=www&r1=1.108&r2=1.109
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.fr.html?cvsroot=www&r1=1.118&r2=1.119
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.es.html?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.fr.html?cvsroot=www&r1=1.135&r2=1.136
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.fr.html?cvsroot=www&r1=1.236&r2=1.237
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.fr-en.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.fr.po?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.pot?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.pt-br.po?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.ru.po?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.334&r2=1.335
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.478&r2=1.479
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.590&r2=1.591
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.334&r2=1.335
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.342&r2=1.343
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de-diff.html?cvsroot=www&r1=1.80&r2=1.81
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de.po?cvsroot=www&r1=1.171&r2=1.172
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.es-en.html?cvsroot=www&r1=1.98&r2=1.99
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.es.po?cvsroot=www&r1=1.225&r2=1.226
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.fr-en.html?cvsroot=www&r1=1.109&r2=1.110
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.fr.po?cvsroot=www&r1=1.226&r2=1.227
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it-diff.html?cvsroot=www&r1=1.85&r2=1.86
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it.po?cvsroot=www&r1=1.164&r2=1.165
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja-diff.html?cvsroot=www&r1=1.100&r2=1.101
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja.po?cvsroot=www&r1=1.147&r2=1.148
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl-diff.html?cvsroot=www&r1=1.103&r2=1.104
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl.po?cvsroot=www&r1=1.101&r2=1.102
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.pot?cvsroot=www&r1=1.111&r2=1.112
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.pt-br.po?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ru.po?cvsroot=www&r1=1.273&r2=1.274
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.335&r2=1.336
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.334&r2=1.335
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.333&r2=1.334
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de-diff.html?cvsroot=www&r1=1.88&r2=1.89
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.186&r2=1.187
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.es-en.html?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.es.po?cvsroot=www&r1=1.123&r2=1.124
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr-en.html?cvsroot=www&r1=1.122&r2=1.123
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.272&r2=1.273
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-diff.html?cvsroot=www&r1=1.101&r2=1.102
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.203&r2=1.204
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja-diff.html?cvsroot=www&r1=1.122&r2=1.123
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja.po?cvsroot=www&r1=1.175&r2=1.176
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pot?cvsroot=www&r1=1.141&r2=1.142
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pt-br.po?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.314&r2=1.315
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.291&r2=1.292
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.308&r2=1.309
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.500&r2=1.501
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr-en.html?cvsroot=www&r1=1.221&r2=1.222
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.524&r2=1.525
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.301&r2=1.302
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.317&r2=1.318
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.306&r2=1.307
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.300&r2=1.301
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.302&r2=1.303
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.291&r2=1.292
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.318&r2=1.319
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.283&r2=1.284
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.280&r2=1.281
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.445&r2=1.446
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.541&r2=1.542
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.191&r2=1.192
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.238&r2=1.239
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.281&r2=1.282
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.270&r2=1.271
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.416&r2=1.417
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.698&r2=1.699
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.211&r2=1.212
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.211&r2=1.212
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.334&r2=1.335
Patches:
Index: all.fr.html
===================================================================
RCS file: /web/www/www/proprietary/all.fr.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- all.fr.html 1 Aug 2021 18:31:02 -0000 1.22
+++ all.fr.html 3 Aug 2021 14:32:36 -0000 1.23
@@ -48,28 +48,6 @@
<ul class="blurbs">
<!--#set var='ADD' value='2021-07-30' -->
-<!--#set var='PUB' value='2021-07-19' -->
-<li><small class='date-tag'>Ajout : <!--#echo encoding='none' var='ADD' -->
- – Dernière référence : <!--#echo encoding='none' var='PUB' -->
-</small>
- <p><a
-href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/">Des
-crackers ont exploité une faille des iTrucs pour installer un logiciel
-espion</a> sur des appareils Apple dont beaucoup appartenaient à des
-journalistes, et ceci même quand leur système d'exploitation était
-parfaitement à jour.</p>
-
- <p>Personne ne peut rien y faire. On doit attendre qu'Apple corrige cette
-vulnérabilité, si c'est sa décision. Un système d'exploitation libre
-laisserait aux gens la possibilité d'identifier les failles de sécurité et
-de les corriger.</p>
-
- <p><small>(Notez que cet article utilise le terme « <a
-href="/philosophy/words-to-avoid.html#Hacker">hackers</a> » à mauvais
-escient.)</small></p>
- </li>
-
-<!--#set var='ADD' value='2021-07-30' -->
<!--#set var='PUB' value='2021-07-18' -->
<li><small class='date-tag'>Ajout : <!--#echo encoding='none' var='ADD' -->
– Dernière référence : <!--#echo encoding='none' var='PUB' -->
@@ -3177,7 +3155,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2021/08/01 18:31:02 $
+$Date: 2021/08/03 14:32:36 $
<!-- timestamp end -->
</p>
Index: malware-apple.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.es.html,v
retrieving revision 1.108
retrieving revision 1.109
diff -u -b -r1.108 -r1.109
--- malware-apple.es.html 2 Aug 2021 09:32:11 -0000 1.108
+++ malware-apple.es.html 3 Aug 2021 14:32:36 -0000 1.109
@@ -305,29 +305,6 @@
que el software privativo de prestigio está libre de graves fallos.</p>
<ul class="blurbs">
- <li id="M202107190">
-
- <!--#set var="DATE" value='<small class="date-tag">
-2021-07</small>'
- -->
-<!--#echo encoding="none" var="DATE" -->
-<p><a
-href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/">Delincuentes
-informáticos han aprovechado un fallo en las iCosas de Apple para instalar
-software espÃa</a> en los dispositivos de los usuarios, muchos de ellos
-periodistas, aun cuando estuvieran utilizando la última versión del programa
-privativo instalado en sus dispositivos.</p>
-
- <p>Nadie puede hacer nada frente a estas vulnerabilidades y los usuarios
tienen
-que esperar a que Apple solucione esos agujeros de seguridad, si es que
-decide hacerlo. Un sistema operativo libre permitirÃa a la gente identificar
-el agujero y solucionar el problema.</p>
-
- <p><small>Advierta que en ese artÃculo se refieren erróneamente a los
-«<cite>crackers</cite>» como <a
-href="/philosophy/words-to-avoid.es.html#Hacker">«<cite>hackers</cite>»</a>.</small></p>
- </li>
-
<li id="M202107180">
<!--#set var="DATE" value='<small class="date-tag">
@@ -1498,7 +1475,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2021/08/02 09:32:11 $
+$Date: 2021/08/03 14:32:36 $
<!-- timestamp end -->
</p>
Index: malware-apple.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.fr.html,v
retrieving revision 1.118
retrieving revision 1.119
diff -u -b -r1.118 -r1.119
--- malware-apple.fr.html 1 Aug 2021 18:31:02 -0000 1.118
+++ malware-apple.fr.html 3 Aug 2021 14:32:36 -0000 1.119
@@ -303,29 +303,6 @@
que les logiciels privateurs prestigieux n'ont pas de bogue grave.</p>
<ul class="blurbs">
- <li id="M202107190">
-
- <!--#set var="DATE" value='<small class="date-tag">
-2021-07</small>'
- -->
-<!--#echo encoding="none" var="DATE" -->
-<p><a
-href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/">Des
-crackers ont exploité une faille des iTrucs pour installer un logiciel
-espion</a> sur des appareils Apple dont beaucoup appartenaient à des
-journalistes, et ceci même quand leur système d'exploitation était
-parfaitement à jour.</p>
-
- <p>Personne ne peut rien y faire. On doit attendre qu'Apple corrige cette
-vulnérabilité, si c'est sa décision. Un système d'exploitation libre
-laisserait aux gens la possibilité d'identifier les failles de sécurité et
-de les corriger.</p>
-
- <p><small>(Notez que cet article utilise le terme « <a
-href="/philosophy/words-to-avoid.html#Hacker">hackers</a> » à mauvais
-escient.)</small></p>
- </li>
-
<li id="M202107180">
<!--#set var="DATE" value='<small class="date-tag">
@@ -1498,7 +1475,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2021/08/01 18:31:02 $
+$Date: 2021/08/03 14:32:36 $
<!-- timestamp end -->
</p>
Index: proprietary-insecurity.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.es.html,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- proprietary-insecurity.es.html 2 Aug 2021 09:32:11 -0000 1.48
+++ proprietary-insecurity.es.html 3 Aug 2021 14:32:36 -0000 1.49
@@ -87,29 +87,6 @@
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
- <li id="M202107190">
-
- <!--#set var="DATE" value='<small class="date-tag">
-2021-07</small>'
- -->
-<!--#echo encoding="none" var="DATE" -->
-<p><a
-href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/">Delincuentes
-informáticos han aprovechado un fallo en las iCosas de Apple para instalar
-software espÃa</a> en los dispositivos de los usuarios, muchos de ellos
-periodistas, aun cuando estuvieran utilizando la última versión del programa
-privativo instalado en sus dispositivos.</p>
-
- <p>Nadie puede hacer nada frente a estas vulnerabilidades y los usuarios
tienen
-que esperar a que Apple solucione esos agujeros de seguridad, si es que
-decide hacerlo. Un sistema operativo libre permitirÃa a la gente identificar
-el agujero y solucionar el problema.</p>
-
- <p><small>Advierta que en ese artÃculo se refieren erróneamente a los
-«<cite>crackers</cite>» como <a
-href="/philosophy/words-to-avoid.es.html#Hacker">«<cite>hackers</cite>»</a></small></p>
- </li>
-
<li id="M202107180">
<!--#set var="DATE" value='<small class="date-tag">
@@ -1529,7 +1506,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2021/08/02 09:32:11 $
+$Date: 2021/08/03 14:32:36 $
<!-- timestamp end -->
</p>
Index: proprietary-insecurity.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.fr.html,v
retrieving revision 1.135
retrieving revision 1.136
diff -u -b -r1.135 -r1.136
--- proprietary-insecurity.fr.html 1 Aug 2021 18:31:02 -0000 1.135
+++ proprietary-insecurity.fr.html 3 Aug 2021 14:32:36 -0000 1.136
@@ -89,29 +89,6 @@
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
- <li id="M202107190">
-
- <!--#set var="DATE" value='<small class="date-tag">
-2021-07</small>'
- -->
-<!--#echo encoding="none" var="DATE" -->
-<p><a
-href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/">Des
-crackers ont exploité une faille des iTrucs pour installer un logiciel
-espion</a> sur des appareils Apple dont beaucoup appartenaient à des
-journalistes, et ceci même quand leur système d'exploitation était
-parfaitement à jour.</p>
-
- <p>Personne ne peut rien y faire. On doit attendre qu'Apple corrige cette
-vulnérabilité, si c'est sa décision. Un système d'exploitation libre
-laisserait aux gens la possibilité d'identifier les failles de sécurité et
-de les corriger.</p>
-
- <p><small>(Notez que cet article utilise le terme « <a
-href="/philosophy/words-to-avoid.html#Hacker">hackers</a> » à mauvais
-escient.)</small></p>
- </li>
-
<li id="M202107180">
<!--#set var="DATE" value='<small class="date-tag">
@@ -1516,7 +1493,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2021/08/01 18:31:02 $
+$Date: 2021/08/03 14:32:36 $
<!-- timestamp end -->
</p>
Index: proprietary.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.fr.html,v
retrieving revision 1.236
retrieving revision 1.237
diff -u -b -r1.236 -r1.237
--- proprietary.fr.html 1 Aug 2021 18:31:02 -0000 1.236
+++ proprietary.fr.html 3 Aug 2021 14:32:36 -0000 1.237
@@ -197,29 +197,6 @@
<h3 id="latest">Ajouts récents</h3>
<ul class="blurbs">
- <li id="M202107190">
-
- <!--#set var="DATE" value='<small class="date-tag">
-2021-07</small>'
- -->
-<!--#echo encoding="none" var="DATE" -->
-<p><a
-href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/">Des
-crackers ont exploité une faille des iTrucs pour installer un logiciel
-espion</a> sur des appareils Apple dont beaucoup appartenaient à des
-journalistes, et ceci même quand leur système d'exploitation était
-parfaitement à jour.</p>
-
- <p>Personne ne peut rien y faire. On doit attendre qu'Apple corrige cette
-vulnérabilité, si c'est sa décision. Un système d'exploitation libre
-laisserait aux gens la possibilité d'identifier les failles de sécurité et
-de les corriger.</p>
-
- <p><small>(Notez que cet article utilise le terme « <a
-href="/philosophy/words-to-avoid.html#Hacker">hackers</a> » à mauvais
-escient.)</small></p>
- </li>
-
<li id="M202107180">
<!--#set var="DATE" value='<small class="date-tag">
@@ -304,6 +281,19 @@
d'entrée) au point que même les sociétés les plus puissantes n'oseront plus
la braver.</p>
</li>
+
+ <li id="M202106190">
+
+ <!--#set var="DATE" value='<small class="date-tag">
+2021-06</small>'
+ -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://arstechnica.com/gadgets/2021/06/even-creepier-covid-tracking-google-silently-pushed-app-to-users-phones/">Google
+a installé automatiquement une appli sur beaucoup de téléphones
+Android</a>. L'appli n'est peut-être pas malveillante, mais le pouvoir que
+possède Google sur les téléphones Android (privateurs) est dangereux.</p>
+ </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">Voir plus…</a></p>
@@ -383,7 +373,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2021/08/01 18:31:02 $
+$Date: 2021/08/03 14:32:36 $
<!-- timestamp end -->
</p>
Index: po/all.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/all.fr-en.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- po/all.fr-en.html 1 Aug 2021 18:31:03 -0000 1.18
+++ po/all.fr-en.html 3 Aug 2021 14:32:36 -0000 1.19
@@ -42,24 +42,6 @@
<div class="column-limit" id="all-malware"></div>
<ul class="blurbs">
-<!--#set var='ADD' value='2021-07-30' --><!--#set var='PUB' value='2021-07-19'
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small>
- <p><a
-
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/">Crackers
- used an exploit in Apple iThings to install
- spyware</a> on people's devices, many of them to be journalists, even
- if they were using the latest version of the proprietary operating
- system installed on their iDevice.</p>
-
- <p>Nobody can do anything about these vulnerabilities and people
- have to wait until Apple fixes these security holes, if it decides
- to fix it. A free operating system would let people to identify the
- hole and fix it.</p>
-
- <p><small>Please note that the article
- wrongly refers to crackers as “<a
-
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
- </li>
-
<!--#set var='ADD' value='2021-07-30' --><!--#set var='PUB' value='2021-07-18'
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small>
<p><a
href="https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones">
@@ -2350,7 +2332,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/08/01 18:31:03 $
+$Date: 2021/08/03 14:32:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/all.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.fr.po,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- po/all.fr.po 1 Aug 2021 18:01:04 -0000 1.47
+++ po/all.fr.po 3 Aug 2021 14:32:36 -0000 1.48
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
"PO-Revision-Date: 2021-08-01 19:59+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -79,39 +79,6 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Des crackers ont exploité une faille des "
-"iTrucs pour installer un logiciel espion</a> sur des appareils Apple dont "
-"beaucoup appartenaient à des journalistes, et ceci même quand leur système
"
-"d'exploitation était parfaitement à jour."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-"Personne ne peut rien y faire. On doit attendre qu'Apple corrige cette "
-"vulnérabilité, si c'est sa décision. Un système d'exploitation libre "
-"laisserait aux gens la possibilité d'identifier les failles de sécurité et
"
-"de les corriger."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-"<small>(Notez que cet article utilise le terme « <a
href=\"/philosophy/words-"
-"to-avoid.html#Hacker\">hackers</a> » à mauvais escient.)</small>"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -136,6 +103,14 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+"<small>(Notez que cet article utilise le terme « <a
href=\"/philosophy/words-"
+"to-avoid.html#Hacker\">hackers</a> » à mauvais escient.)</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
"crackers to remotely gain access to the operating system</a> and install "
@@ -4426,3 +4401,26 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~ "used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings "
+#~ "to install spyware</a> on people's devices, many of them to be "
+#~ "journalists, even if they were using the latest version of the "
+#~ "proprietary operating system installed on their iDevice."
+#~ msgstr ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~ "used-to-spy-on-journalists/\">Des crackers ont exploité une faille des "
+#~ "iTrucs pour installer un logiciel espion</a> sur des appareils Apple dont "
+#~ "beaucoup appartenaient à des journalistes, et ceci même quand leur "
+#~ "système d'exploitation était parfaitement à jour."
+
+#~ msgid ""
+#~ "Nobody can do anything about these vulnerabilities and people have to "
+#~ "wait until Apple fixes these security holes, if it decides to fix it. A "
+#~ "free operating system would let people to identify the hole and fix it."
+#~ msgstr ""
+#~ "Personne ne peut rien y faire. On doit attendre qu'Apple corrige cette "
+#~ "vulnérabilité, si c'est sa décision. Un système d'exploitation libre "
+#~ "laisserait aux gens la possibilité d'identifier les failles de sécurité
"
+#~ "et de les corriger."
Index: po/all.pot
===================================================================
RCS file: /web/www/www/proprietary/po/all.pot,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- po/all.pot 1 Aug 2021 17:32:24 -0000 1.25
+++ po/all.pot 3 Aug 2021 14:32:36 -0000 1.26
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -75,28 +75,6 @@
#. type: Content of: <div><ul><li><p>
msgid ""
"<a "
-"href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/\">Crackers
"
-"used an exploit in Apple iThings to install spyware</a> on people's devices, "
-"many of them to be journalists, even if they were using the latest version "
-"of the proprietary operating system installed on their iDevice."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a "
"href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones\">
"
"The pegasus spyware used vulnerabilities on proprietary smartphone operating "
"systems</a> to impose surveillance on people. It can record people's calls, "
@@ -112,6 +90,12 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A newly found Microsoft Windows vulnerability <a "
"href=\"https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">
"
"can allow crackers to remotely gain access to the operating system</a> and "
Index: po/all.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.pt-br.po,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- po/all.pt-br.po 1 Aug 2021 17:32:24 -0000 1.20
+++ po/all.pt-br.po 3 Aug 2021 14:32:36 -0000 1.21
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
"PO-Revision-Date: 2021-06-26 09:39-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -82,48 +82,6 @@
#. type: Content of: <div><ul><li><p>
#, fuzzy
#| msgid ""
-#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
-#| "of them to be journalists, even if they were using the latest version of "
-#| "the proprietary operating system installed on their iDevice."
-msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\"> <em>Crackers</em> usaram uma <i lang=\"en"
-"\">exploit</i> de dia zero e clique zero em iCoisas da Apple para instalar "
-"<em>spyware</em></a> nos dispositivos das pessoas, muitas delas para serem "
-"jornalistas, mesmo que estivessem usando a versão mais recente do sistema "
-"operacional privativo instalado em seu iDispositivo."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-"Ninguém pode fazer nada sobre essas vulnerabilidades e as pessoas têm que "
-"esperar até que a Apple conserte essas falhas de segurança, se decidir "
-"consertá-las. Um sistema operacional livre permitiria que as pessoas "
-"identificassem o problema e o consertassem."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-"<small>(Note que o artigo, de forma incorreta, refere-se a <em>crackers</em> "
-"como â<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>â.)</"
-"small>"
-
-#. type: Content of: <div><ul><li><p>
-#, fuzzy
-#| msgid ""
#| "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
#| "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
#| "vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -163,6 +121,15 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+"<small>(Note que o artigo, de forma incorreta, refere-se a <em>crackers</em> "
+"como â<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>â.)</"
+"small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
"crackers to remotely gain access to the operating system</a> and install "
@@ -4375,3 +4342,34 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Ãltima atualização:"
+
+#, fuzzy
+#~| msgid ""
+#~| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#~| "exploit in Apple iThings to install spyware</a> on people's devices, "
+#~| "many of them to be journalists, even if they were using the latest "
+#~| "version of the proprietary operating system installed on their iDevice."
+#~ msgid ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~ "used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings "
+#~ "to install spyware</a> on people's devices, many of them to be "
+#~ "journalists, even if they were using the latest version of the "
+#~ "proprietary operating system installed on their iDevice."
+#~ msgstr ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~ "used-to-spy-on-journalists/\"> <em>Crackers</em> usaram uma <i lang=\"en"
+#~ "\">exploit</i> de dia zero e clique zero em iCoisas da Apple para "
+#~ "instalar <em>spyware</em></a> nos dispositivos das pessoas, muitas delas "
+#~ "para serem jornalistas, mesmo que estivessem usando a versão mais recente
"
+#~ "do sistema operacional privativo instalado em seu iDispositivo."
+
+#~ msgid ""
+#~ "Nobody can do anything about these vulnerabilities and people have to "
+#~ "wait until Apple fixes these security holes, if it decides to fix it. A "
+#~ "free operating system would let people to identify the hole and fix it."
+#~ msgstr ""
+#~ "Ninguém pode fazer nada sobre essas vulnerabilidades e as pessoas têm
que "
+#~ "esperar até que a Apple conserte essas falhas de segurança, se decidir "
+#~ "consertá-las. Um sistema operacional livre permitiria que as pessoas "
+#~ "identificassem o problema e o consertassem."
Index: po/all.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.ru.po,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- po/all.ru.po 1 Aug 2021 17:32:24 -0000 1.44
+++ po/all.ru.po 3 Aug 2021 14:32:36 -0000 1.45
@@ -9,7 +9,7 @@
msgid ""
msgstr ""
"Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
"PO-Revision-Date: 2021-04-27 13:06+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -86,54 +86,6 @@
#. type: Content of: <div><ul><li><p>
# | <a
-# |
href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/\">Crackers
-# | used [-a zero-day and zero-click-] {+an+} exploit in Apple iThings to
-# | install spyware</a> on people's devices, many of them to be journalists,
-# | even if they were using the latest version of the proprietary operating
-# | system installed on their iDevice.
-#, fuzzy
-#| msgid ""
-#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
-#| "of them to be journalists, even if they were using the latest version of "
-#| "the proprietary operating system installed on their iDevice."
-msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">ÐзломÑики пÑименÑли
безÑелÑковÑÑ ÑÑзвимоÑÑÑ "
-"нÑлевого Ð´Ð½Ñ Ð² ай-ÑÑÑÑкаÑ
Apple длÑ
ÑÑÑановки ÑпионÑкиÑ
пÑогÑамм</a> на "
-"ÑÑÑÑойÑÑваÑ
лÑдей (многие из коÑоÑÑÑ
— жÑÑналиÑÑÑ), даже еÑли Ñе "
-"полÑзовалиÑÑ Ñамой поздней веÑÑией
неÑвободной опеÑаÑионной ÑиÑÑемÑ, "
-"ÑÑÑановленной на иÑ
ÑÑÑÑойÑÑве."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-"ÐикÑо ниÑего не Ð¼Ð¾Ð¶ÐµÑ Ð¿Ð¾Ð´ÐµÐ»Ð°ÑÑ Ñ ÑÑими
ÑÑзвимоÑÑÑми, и лÑди вÑнÑÐ¶Ð´ÐµÐ½Ñ Ð¶Ð´Ð°ÑÑ, "
-"пока Apple ÑÑÑÑÐ°Ð½Ð¸Ñ ÑÑи пÑоÑеÑ
и в заÑиÑе,
еÑли ÑÑа ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ ÑеÑÐ¸Ñ ÑÑÑÑаниÑÑ "
-"иÑ
. Ð¡Ð²Ð¾Ð±Ð¾Ð´Ð½Ð°Ñ Ð¾Ð¿ÐµÑаÑÐ¸Ð¾Ð½Ð½Ð°Ñ ÑиÑÑема
позволила Ð±Ñ Ð»ÑдÑм вÑÑвиÑÑ Ð¿ÑоÑеÑ
Ñ Ð¸ "
-"ÑÑÑÑаниÑÑ ÐµÐµ."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-"<small>ÐамеÑÑÑе, ÑÑо в ÑÑаÑÑе ÑеÑмин <a
href=\"/philosophy/words-to-avoid."
-"html#Hacker\">“Ñ
акеÑÑ”</a> невеÑно
иÑполÑзÑеÑÑÑ Ð´Ð»Ñ Ð¾Ð±Ð¾Ð·Ð½Ð°ÑÐµÐ½Ð¸Ñ "
-"взломÑиков.</small>"
-
-#. type: Content of: <div><ul><li><p>
-# | <a
# |
href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones\">
# | The pegasus spyware used vulnerabilities on proprietary smartphone
# | operating systems</a> to impose surveillance on people. It can record
@@ -180,6 +132,15 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+"<small>ÐамеÑÑÑе, ÑÑо в ÑÑаÑÑе ÑеÑмин <a
href=\"/philosophy/words-to-avoid."
+"html#Hacker\">“Ñ
акеÑÑ”</a> невеÑно
иÑполÑзÑеÑÑÑ Ð´Ð»Ñ Ð¾Ð±Ð¾Ð·Ð½Ð°ÑÐµÐ½Ð¸Ñ "
+"взломÑиков.</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
"crackers to remotely gain access to the operating system</a> and install "
@@ -4430,5 +4391,36 @@
msgid "Updated:"
msgstr "Ðбновлено:"
+#, fuzzy
+#~| msgid ""
+#~| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#~| "exploit in Apple iThings to install spyware</a> on people's devices, "
+#~| "many of them to be journalists, even if they were using the latest "
+#~| "version of the proprietary operating system installed on their iDevice."
+#~ msgid ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~ "used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings "
+#~ "to install spyware</a> on people's devices, many of them to be "
+#~ "journalists, even if they were using the latest version of the "
+#~ "proprietary operating system installed on their iDevice."
+#~ msgstr ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~ "used-to-spy-on-journalists/\">ÐзломÑики пÑименÑли
безÑелÑковÑÑ ÑÑзвимоÑÑÑ "
+#~ "нÑлевого Ð´Ð½Ñ Ð² ай-ÑÑÑÑкаÑ
Apple длÑ
ÑÑÑановки ÑпионÑкиÑ
пÑогÑамм</a> на "
+#~ "ÑÑÑÑойÑÑваÑ
лÑдей (многие из коÑоÑÑÑ
— жÑÑналиÑÑÑ), даже еÑли "
+#~ "Ñе полÑзовалиÑÑ Ñамой поздней веÑÑией
неÑвободной опеÑаÑионной ÑиÑÑемÑ, "
+#~ "ÑÑÑановленной на иÑ
ÑÑÑÑойÑÑве."
+
+#~ msgid ""
+#~ "Nobody can do anything about these vulnerabilities and people have to "
+#~ "wait until Apple fixes these security holes, if it decides to fix it. A "
+#~ "free operating system would let people to identify the hole and fix it."
+#~ msgstr ""
+#~ "ÐикÑо ниÑего не Ð¼Ð¾Ð¶ÐµÑ Ð¿Ð¾Ð´ÐµÐ»Ð°ÑÑ Ñ ÑÑими
ÑÑзвимоÑÑÑми, и лÑди вÑнÑÐ¶Ð´ÐµÐ½Ñ "
+#~ "ждаÑÑ, пока Apple ÑÑÑÑÐ°Ð½Ð¸Ñ ÑÑи пÑоÑеÑ
и в
заÑиÑе, еÑли ÑÑа ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ ÑеÑÐ¸Ñ "
+#~ "ÑÑÑÑаниÑÑ Ð¸Ñ
. Ð¡Ð²Ð¾Ð±Ð¾Ð´Ð½Ð°Ñ Ð¾Ð¿ÐµÑаÑионнаÑ
ÑиÑÑема позволила Ð±Ñ Ð»ÑдÑм вÑÑвиÑÑ "
+#~ "пÑоÑеÑ
Ñ Ð¸ ÑÑÑÑаниÑÑ ÐµÐµ."
+
#~ msgid "Copyright © 2018-2021, 2021 Free Software Foundation, Inc."
#~ msgstr "Copyright © 2018-2021, 2021 Free Software Foundation, Inc."
Index: po/de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.334
retrieving revision 1.335
diff -u -b -r1.334 -r1.335
--- po/de.po 1 Aug 2021 17:32:24 -0000 1.334
+++ po/de.po 3 Aug 2021 14:32:36 -0000 1.335
@@ -662,18 +662,18 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a security vulnerability."
msgstr ""
#. type: Content of: <div><ul><li><p>
msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people will be compelled to wait for corporations to fix "
+"the problems."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -696,22 +696,6 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
-"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
-"vulnerabilities on proprietary smartphone operating systems</a> to impose "
-"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a security vulnerability."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"A free operating system would've let people to fix the bugs for themselves "
-"but now infected people will be compelled to wait for corporations to fix "
-"the problems."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
"crackers to remotely gain access to the operating system</a> and install "
Index: po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.478
retrieving revision 1.479
diff -u -b -r1.478 -r1.479
--- po/es.po 1 Aug 2021 17:32:24 -0000 1.478
+++ po/es.po 3 Aug 2021 14:32:36 -0000 1.479
@@ -616,51 +616,6 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Delincuentes informáticos han aprovechado un "
-"fallo en las iCosas de Apple para instalar software espÃa</a> en los "
-"dispositivos de los usuarios, muchos de ellos periodistas, aun cuando "
-"estuvieran utilizando la última versión del programa privativo instalado en
"
-"sus dispositivos."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-"Nadie puede hacer nada frente a estas vulnerabilidades y los usuarios tienen "
-"que esperar a que Apple solucione esos agujeros de seguridad, si es que "
-"decide hacerlo. Un sistema operativo libre permitirÃa a la gente identificar
"
-"el agujero y solucionar el problema."
-
-#. type: Content of: <div><ul><li><p>
-# | <small>[-(-]Please note that the article wrongly refers to crackers as
-# | [-\"<a
-# | href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>-]
-# | {+“<a
-# | href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>
-# | +}
-#, fuzzy
-#| msgid ""
-#| "<small>(Please note that the article wrongly refers to crackers as \"<a "
-#| "href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>"
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-"<small>(Advierta que en ese artÃculo se refieren erróneamente a los "
-"«<cite>crackers</cite>» como <a href=\"/philosophy/words-to-avoid.es."
-"html#Hacker\">«<cite>hackers</cite>»</a>)</small>"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -694,6 +649,25 @@
"que las empresas solucionen esos problemas."
#. type: Content of: <div><ul><li><p>
+# | <small>[-(-]Please note that the article wrongly refers to crackers as
+# | [-\"<a
+# | href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>-]
+# | {+“<a
+# | href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>
+# | +}
+#, fuzzy
+#| msgid ""
+#| "<small>(Please note that the article wrongly refers to crackers as \"<a "
+#| "href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>"
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+"<small>(Advierta que en ese artÃculo se refieren erróneamente a los "
+"«<cite>crackers</cite>» como <a href=\"/philosophy/words-to-avoid.es."
+"html#Hacker\">«<cite>hackers</cite>»</a>)</small>"
+
+#. type: Content of: <div><ul><li><p>
msgid ""
"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
@@ -16039,6 +16013,30 @@
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
#~ msgid ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~ "used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings "
+#~ "to install spyware</a> on people's devices, many of them to be "
+#~ "journalists, even if they were using the latest version of the "
+#~ "proprietary operating system installed on their iDevice."
+#~ msgstr ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~ "used-to-spy-on-journalists/\">Delincuentes informáticos han aprovechado "
+#~ "un fallo en las iCosas de Apple para instalar software espÃa</a> en los "
+#~ "dispositivos de los usuarios, muchos de ellos periodistas, aun cuando "
+#~ "estuvieran utilizando la última versión del programa privativo instalado
"
+#~ "en sus dispositivos."
+
+#~ msgid ""
+#~ "Nobody can do anything about these vulnerabilities and people have to "
+#~ "wait until Apple fixes these security holes, if it decides to fix it. A "
+#~ "free operating system would let people to identify the hole and fix it."
+#~ msgstr ""
+#~ "Nadie puede hacer nada frente a estas vulnerabilidades y los usuarios "
+#~ "tienen que esperar a que Apple solucione esos agujeros de seguridad, si "
+#~ "es que decide hacerlo. Un sistema operativo libre permitirÃa a la gente "
+#~ "identificar el agujero y solucionar el problema."
+
+#~ msgid ""
#~ "A free operating system would've let people to fix the bugs for "
#~ "themselves but now infected people are forced to wait for corporations to "
#~ "fix the problems."
Index: po/fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.590
retrieving revision 1.591
diff -u -b -r1.590 -r1.591
--- po/fr.po 1 Aug 2021 18:01:04 -0000 1.590
+++ po/fr.po 3 Aug 2021 14:32:37 -0000 1.591
@@ -502,39 +502,6 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Des crackers ont exploité une faille des "
-"iTrucs pour installer un logiciel espion</a> sur des appareils Apple dont "
-"beaucoup appartenaient à des journalistes, et ceci même quand leur système
"
-"d'exploitation était parfaitement à jour."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-"Personne ne peut rien y faire. On doit attendre qu'Apple corrige cette "
-"vulnérabilité, si c'est sa décision. Un système d'exploitation libre "
-"laisserait aux gens la possibilité d'identifier les failles de sécurité et
"
-"de les corriger."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-"<small>(Notez que cet article utilise le terme « <a
href=\"/philosophy/words-"
-"to-avoid.html#Hacker\">hackers</a> » à mauvais escient.)</small>"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -559,6 +526,14 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+"<small>(Notez que cet article utilise le terme « <a
href=\"/philosophy/words-"
+"to-avoid.html#Hacker\">hackers</a> » à mauvais escient.)</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
"crackers to remotely gain access to the operating system</a> and install "
@@ -13563,3 +13538,26 @@
#. type: Content of: <div><div><dl><dd><ul><li>
msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
+
+#~ msgid ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~ "used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings "
+#~ "to install spyware</a> on people's devices, many of them to be "
+#~ "journalists, even if they were using the latest version of the "
+#~ "proprietary operating system installed on their iDevice."
+#~ msgstr ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~ "used-to-spy-on-journalists/\">Des crackers ont exploité une faille des "
+#~ "iTrucs pour installer un logiciel espion</a> sur des appareils Apple dont "
+#~ "beaucoup appartenaient à des journalistes, et ceci même quand leur "
+#~ "système d'exploitation était parfaitement à jour."
+
+#~ msgid ""
+#~ "Nobody can do anything about these vulnerabilities and people have to "
+#~ "wait until Apple fixes these security holes, if it decides to fix it. A "
+#~ "free operating system would let people to identify the hole and fix it."
+#~ msgstr ""
+#~ "Personne ne peut rien y faire. On doit attendre qu'Apple corrige cette "
+#~ "vulnérabilité, si c'est sa décision. Un système d'exploitation libre "
+#~ "laisserait aux gens la possibilité d'identifier les failles de sécurité
"
+#~ "et de les corriger."
Index: po/it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.334
retrieving revision 1.335
diff -u -b -r1.334 -r1.335
--- po/it.po 1 Aug 2021 17:32:24 -0000 1.334
+++ po/it.po 3 Aug 2021 14:32:37 -0000 1.335
@@ -628,28 +628,6 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -666,6 +644,12 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
"crackers to remotely gain access to the operating system</a> and install "
Index: po/ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.342
retrieving revision 1.343
diff -u -b -r1.342 -r1.343
--- po/ja.po 1 Aug 2021 17:32:24 -0000 1.342
+++ po/ja.po 3 Aug 2021 14:32:37 -0000 1.343
@@ -471,28 +471,6 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -509,6 +487,12 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
"crackers to remotely gain access to the operating system</a> and install "
Index: po/malware-apple.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de-diff.html,v
retrieving revision 1.80
retrieving revision 1.81
diff -u -b -r1.80 -r1.81
--- po/malware-apple.de-diff.html 1 Aug 2021 17:32:25 -0000 1.80
+++ po/malware-apple.de-diff.html 3 Aug 2021 14:32:37 -0000 1.81
@@ -307,26 +307,6 @@
<li></strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M202107190">
- <!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
-
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/">Crackers
- used an exploit in Apple iThings to install
- spyware</a> on people's devices, many of them to be journalists, even
- if they were using the latest version of the proprietary operating
- system installed on their iDevice.</p>
-
- <p>Nobody can do anything about these vulnerabilities and people
- have to wait until Apple fixes these security holes, if it decides
- to fix it. A free operating system would let people to identify the
- hole and fix it.</p>
-
- <p><small>Please note that the article
- wrongly refers to crackers as “<a
-
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
- </li>
-
<li id="M202107180">
<!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -486,21 +466,21 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&oldid=835861046">
iOS, the operating system of the Apple iThings, is the prototype
- of a jail</a>. It was Apple that introduced the
practice</em></ins></span> of
- <span class="inserted"><ins><em>designing general purpose computers with
censorship of application
+ of a jail</a>. It was Apple that introduced the practice of
+ designing general purpose computers with censorship of application
programs.</p>
<p>Here is an article about the <a
href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/">
- code signing</a> that the</em></ins></span> iThings <span
class="inserted"><ins><em>use to lock up the user.</p>
+ code signing</a> that the iThings use to lock up the user.</p>
<p>Curiously, Apple is beginning to allow limited passage through the
- walls of the iThing jail: users can now install apps built from
+ walls</em></ins></span> of <span class="inserted"><ins><em>the iThing
jail: users can now install apps built from
source code, provided the source code is written in Swift. Users
cannot do this freely because they are required to identify
themselves. <a href="https://developer.apple.com/xcode/">Here
are details</a>. While this is a crack in the prison walls, it is not
- big enough to mean that the iThings are no longer jails.</p>
+ big enough to mean that the</em></ins></span> iThings <span
class="inserted"><ins><em>are no longer jails.</p>
</li>
</ul>
@@ -810,22 +790,22 @@
to describe the DRM, but we prefer to use the term <a
<span
class="removed"><del><strong>href="https://gnu.org/philosophy/words-to-avoid.html#DigitalLocks"></strong></del></span>
<span
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#DigitalLocks"></em></ins></span>
digital <span
class="removed"><del><strong>handcuffs</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>handcuffs</a>.)</small></p>
+ <span
class="inserted"><ins><em>handcuffs</a>.)</small></p></em></ins></span>
</li>
- <li id="M201606080">
+
+ <span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201606080">
<!--#set var="DATE" value='<small
class="date-tag">2016-06</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Apple <a
href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/">
stops users from fixing the security bugs in Quicktime for
Windows</a>,
- while refusing to fix them itself.</p></em></ins></span>
+ while refusing to fix them itself.</p>
</li>
-
- <span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201605040">
+ <li id="M201605040">
<!--#set var="DATE" value='<small
class="date-tag">2016-05</small>'
--><!--#echo encoding="none" var="DATE" --></em></ins></span>
<p>The Apple Music client program <a <span
class="removed"><del><strong>href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans</strong></del></span>
@@ -1413,8 +1393,7 @@
fighting in the Civil War.</p>
<p>This ludicrous rigidity illustrates the point that Apple should
not
be allowed to censor apps. Even if Apple carried out this act of
- censorship with some care, it would still be wrong. Whether racism
- is bad, whether educating people about drone
attacks</strong></del></span> is <span class="removed"><del><strong>bad, are not
+ censorship with some care, it would still be wrong. Whether
racism</strong></del></span> is <span class="removed"><del><strong>bad, whether
educating people about drone attacks is bad, are not
the real issue. Apple should not have the power to impose its views
about either of these questions, or any
other.</p></strong></del></span>
<span class="inserted"><ins><em>still true in iOS
7.)</p></em></ins></span>
@@ -1561,7 +1540,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/08/01 17:32:25 $
+$Date: 2021/08/03 14:32:37 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-apple.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de.po,v
retrieving revision 1.171
retrieving revision 1.172
diff -u -b -r1.171 -r1.172
--- po/malware-apple.de.po 1 Aug 2021 17:32:25 -0000 1.171
+++ po/malware-apple.de.po 3 Aug 2021 14:32:37 -0000 1.172
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-apple.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -535,18 +535,18 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a security vulnerability."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people will be compelled to wait for corporations to fix "
+"the problems."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
@@ -569,22 +569,6 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
-"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
-"vulnerabilities on proprietary smartphone operating systems</a> to impose "
-"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a security vulnerability."
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"A free operating system would've let people to fix the bugs for themselves "
-"but now infected people will be compelled to wait for corporations to fix "
-"the problems."
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
"Commercial crackware can <a href=\"https://www.theguardian.com/"
"technology/2020/dec/20/iphones-vulnerable-to-hacking-tool-for-months-"
"researchers-say\"> get passwords out of an iMonster</a>, use the microphone "
Index: po/malware-apple.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.es-en.html,v
retrieving revision 1.98
retrieving revision 1.99
diff -u -b -r1.98 -r1.99
--- po/malware-apple.es-en.html 2 Aug 2021 09:32:13 -0000 1.98
+++ po/malware-apple.es-en.html 3 Aug 2021 14:32:37 -0000 1.99
@@ -254,26 +254,6 @@
bugs.</p>
<ul class="blurbs">
- <li id="M202107190">
- <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
-
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/">Crackers
- used an exploit in Apple iThings to install
- spyware</a> on people's devices, many of them to be journalists, even
- if they were using the latest version of the proprietary operating
- system installed on their iDevice.</p>
-
- <p>Nobody can do anything about these vulnerabilities and people
- have to wait until Apple fixes these security holes, if it decides
- to fix it. A free operating system would let people to identify the
- hole and fix it.</p>
-
- <p><small>Please note that the article
- wrongly refers to crackers as “<a
-
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
- </li>
-
<li id="M202107180">
<!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -1214,7 +1194,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/08/02 09:32:13 $
+$Date: 2021/08/03 14:32:37 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-apple.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.es.po,v
retrieving revision 1.225
retrieving revision 1.226
diff -u -b -r1.225 -r1.226
--- po/malware-apple.es.po 2 Aug 2021 09:32:14 -0000 1.225
+++ po/malware-apple.es.po 3 Aug 2021 14:32:37 -0000 1.226
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -410,41 +410,6 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Delincuentes informáticos han aprovechado un "
-"fallo en las iCosas de Apple para instalar software espÃa</a> en los "
-"dispositivos de los usuarios, muchos de ellos periodistas, aun cuando "
-"estuvieran utilizando la última versión del programa privativo instalado en
"
-"sus dispositivos."
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-"Nadie puede hacer nada frente a estas vulnerabilidades y los usuarios tienen "
-"que esperar a que Apple solucione esos agujeros de seguridad, si es que "
-"decide hacerlo. Un sistema operativo libre permitirÃa a la gente identificar
"
-"el agujero y solucionar el problema."
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-"<small>Advierta que en ese artÃculo se refieren erróneamente a los "
-"«<cite>crackers</cite>» como <a href=\"/philosophy/words-to-avoid.es."
-"html#Hacker\">«<cite>hackers</cite>»</a>.</small>"
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -471,6 +436,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+"<small>Advierta que en ese artÃculo se refieren erróneamente a los "
+"«<cite>crackers</cite>» como <a href=\"/philosophy/words-to-avoid.es."
+"html#Hacker\">«<cite>hackers</cite>»</a>.</small>"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Commercial crackware can <a href=\"https://www.theguardian.com/"
"technology/2020/dec/20/iphones-vulnerable-to-hacking-tool-for-months-"
"researchers-say\"> get passwords out of an iMonster</a>, use the microphone "
@@ -1848,3 +1822,27 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Ãltima actualización:"
+
+#~ msgid ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~ "used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings "
+#~ "to install spyware</a> on people's devices, many of them to be "
+#~ "journalists, even if they were using the latest version of the "
+#~ "proprietary operating system installed on their iDevice."
+#~ msgstr ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~ "used-to-spy-on-journalists/\">Delincuentes informáticos han aprovechado "
+#~ "un fallo en las iCosas de Apple para instalar software espÃa</a> en los "
+#~ "dispositivos de los usuarios, muchos de ellos periodistas, aun cuando "
+#~ "estuvieran utilizando la última versión del programa privativo instalado
"
+#~ "en sus dispositivos."
+
+#~ msgid ""
+#~ "Nobody can do anything about these vulnerabilities and people have to "
+#~ "wait until Apple fixes these security holes, if it decides to fix it. A "
+#~ "free operating system would let people to identify the hole and fix it."
+#~ msgstr ""
+#~ "Nadie puede hacer nada frente a estas vulnerabilidades y los usuarios "
+#~ "tienen que esperar a que Apple solucione esos agujeros de seguridad, si "
+#~ "es que decide hacerlo. Un sistema operativo libre permitirÃa a la gente "
+#~ "identificar el agujero y solucionar el problema."
Index: po/malware-apple.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.fr-en.html,v
retrieving revision 1.109
retrieving revision 1.110
diff -u -b -r1.109 -r1.110
--- po/malware-apple.fr-en.html 1 Aug 2021 18:31:03 -0000 1.109
+++ po/malware-apple.fr-en.html 3 Aug 2021 14:32:37 -0000 1.110
@@ -254,26 +254,6 @@
bugs.</p>
<ul class="blurbs">
- <li id="M202107190">
- <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
-
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/">Crackers
- used an exploit in Apple iThings to install
- spyware</a> on people's devices, many of them to be journalists, even
- if they were using the latest version of the proprietary operating
- system installed on their iDevice.</p>
-
- <p>Nobody can do anything about these vulnerabilities and people
- have to wait until Apple fixes these security holes, if it decides
- to fix it. A free operating system would let people to identify the
- hole and fix it.</p>
-
- <p><small>Please note that the article
- wrongly refers to crackers as “<a
-
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
- </li>
-
<li id="M202107180">
<!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -1214,7 +1194,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/08/01 18:31:03 $
+$Date: 2021/08/03 14:32:37 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-apple.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.fr.po,v
retrieving revision 1.226
retrieving revision 1.227
diff -u -b -r1.226 -r1.227
--- po/malware-apple.fr.po 1 Aug 2021 18:01:04 -0000 1.226
+++ po/malware-apple.fr.po 3 Aug 2021 14:32:37 -0000 1.227
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
"PO-Revision-Date: 2021-08-01 19:59+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -407,39 +407,6 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Des crackers ont exploité une faille des "
-"iTrucs pour installer un logiciel espion</a> sur des appareils Apple dont "
-"beaucoup appartenaient à des journalistes, et ceci même quand leur système
"
-"d'exploitation était parfaitement à jour."
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-"Personne ne peut rien y faire. On doit attendre qu'Apple corrige cette "
-"vulnérabilité, si c'est sa décision. Un système d'exploitation libre "
-"laisserait aux gens la possibilité d'identifier les failles de sécurité et
"
-"de les corriger."
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-"<small>(Notez que cet article utilise le terme « <a
href=\"/philosophy/words-"
-"to-avoid.html#Hacker\">hackers</a> » à mauvais escient.)</small>"
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -464,6 +431,14 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+"<small>(Notez que cet article utilise le terme « <a
href=\"/philosophy/words-"
+"to-avoid.html#Hacker\">hackers</a> » à mauvais escient.)</small>"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Commercial crackware can <a href=\"https://www.theguardian.com/"
"technology/2020/dec/20/iphones-vulnerable-to-hacking-tool-for-months-"
"researchers-say\"> get passwords out of an iMonster</a>, use the microphone "
@@ -1841,3 +1816,26 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~ "used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings "
+#~ "to install spyware</a> on people's devices, many of them to be "
+#~ "journalists, even if they were using the latest version of the "
+#~ "proprietary operating system installed on their iDevice."
+#~ msgstr ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~ "used-to-spy-on-journalists/\">Des crackers ont exploité une faille des "
+#~ "iTrucs pour installer un logiciel espion</a> sur des appareils Apple dont "
+#~ "beaucoup appartenaient à des journalistes, et ceci même quand leur "
+#~ "système d'exploitation était parfaitement à jour."
+
+#~ msgid ""
+#~ "Nobody can do anything about these vulnerabilities and people have to "
+#~ "wait until Apple fixes these security holes, if it decides to fix it. A "
+#~ "free operating system would let people to identify the hole and fix it."
+#~ msgstr ""
+#~ "Personne ne peut rien y faire. On doit attendre qu'Apple corrige cette "
+#~ "vulnérabilité, si c'est sa décision. Un système d'exploitation libre "
+#~ "laisserait aux gens la possibilité d'identifier les failles de sécurité
"
+#~ "et de les corriger."
Index: po/malware-apple.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it-diff.html,v
retrieving revision 1.85
retrieving revision 1.86
diff -u -b -r1.85 -r1.86
--- po/malware-apple.it-diff.html 1 Aug 2021 17:32:25 -0000 1.85
+++ po/malware-apple.it-diff.html 3 Aug 2021 14:32:37 -0000 1.86
@@ -116,9 +116,9 @@
<!--#set var="DATE" value='<small
class="date-tag">2019-07</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Apple appears</em></ins></span> to <span
class="removed"><del><strong>restrict what users can do with the data in their
computers.</li>
-<li><a href="#jails">Jails</a>—systems
- that impose censorship on application programs.</li>
-<li><a
href="#tyrants">Tyrants</a>—systems</strong></del></span> <span
class="inserted"><ins><em>say</em></ins></span> that <span
class="removed"><del><strong>reject any operating system</strong></del></span>
<span class="inserted"><ins><em><a
+<li><a
href="#jails">Jails</a>—systems</strong></del></span> <span
class="inserted"><ins><em>say</em></ins></span> that <span
class="removed"><del><strong>impose censorship on application
programs.</li>
+<li><a href="#tyrants">Tyrants</a>—systems
+ that reject any operating system</strong></del></span> <span
class="inserted"><ins><em><a
href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/">
there is a back door in MacOS</a> for automatically updating some
(all?) apps.</p>
@@ -199,7 +199,7 @@
<li id="M201908150.1">
<!--#set var="DATE" value='<small
class="date-tag">2019-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Apple is putting DRM on</em></ins></span> iPhone <span
class="inserted"><ins><em>batteries, and the system proprietary
+ <p>Apple is putting DRM on iPhone batteries, and the system
proprietary
software <a href="#M201908150">turns off certain features when
batteries
are replaced other than by Apple.</a></p>
</li>
@@ -207,7 +207,7 @@
<li id="M201704070.1">
<!--#set var="DATE" value='<small
class="date-tag">2017-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>DRM makes the iPhone 7 nearly <a
+ <p>DRM makes the</em></ins></span> iPhone <span
class="inserted"><ins><em>7 nearly <a
href="#iphone7-sabotage">unrepairable</a> by anyone else but
Apple.</p>
</li>
@@ -305,26 +305,6 @@
bugs.</p>
<ul class="blurbs">
- <li id="M202107190">
- <!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
-
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/">Crackers
- used an exploit in Apple iThings to install
- spyware</a> on people's devices, many of them to be journalists, even
- if they were using the latest version of the proprietary operating
- system installed on their iDevice.</p>
-
- <p>Nobody can do anything about these vulnerabilities and people
- have to wait until Apple fixes these security holes, if it decides
- to fix it. A free operating system would let people to identify the
- hole and fix it.</p>
-
- <p><small>Please note that the article
- wrongly refers to crackers as “<a
-
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
- </li>
-
<li id="M202107180">
<!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -387,16 +367,16 @@
--><!--#echo encoding="none" var="DATE" -->
<p>A vulnerability in Apple's Image I/O API allowed an attacker to
<a
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
- malicious code from any application which uses this API to
render</em></ins></span> a
- <span class="inserted"><ins><em>certain kind of image
file</a>.</p>
+ malicious code from any application which uses this API to render a
+ certain kind of image file</a>.</p>
</li>
<li id="M201604120">
<!--#set var="DATE" value='<small
class="date-tag">2016-04</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>A bug in the iThings Messages app <a
-
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/">allowed
- a malicious web site to extract all the user's messaging
+
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/">allowed</em></ins></span>
+ a <span class="inserted"><ins><em>malicious web site to extract all the
user's messaging
history</a>.</p>
</li>
@@ -1499,7 +1479,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/08/01 17:32:25 $
+$Date: 2021/08/03 14:32:37 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-apple.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it.po,v
retrieving revision 1.164
retrieving revision 1.165
diff -u -b -r1.164 -r1.165
--- po/malware-apple.it.po 1 Aug 2021 17:32:25 -0000 1.164
+++ po/malware-apple.it.po 3 Aug 2021 14:32:37 -0000 1.165
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
"PO-Revision-Date: 2017-12-31 13:01+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -485,28 +485,6 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -523,6 +501,12 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Commercial crackware can <a href=\"https://www.theguardian.com/"
"technology/2020/dec/20/iphones-vulnerable-to-hacking-tool-for-months-"
"researchers-say\"> get passwords out of an iMonster</a>, use the microphone "
Index: po/malware-apple.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja-diff.html,v
retrieving revision 1.100
retrieving revision 1.101
diff -u -b -r1.100 -r1.101
--- po/malware-apple.ja-diff.html 1 Aug 2021 17:32:25 -0000 1.100
+++ po/malware-apple.ja-diff.html 3 Aug 2021 14:32:37 -0000 1.101
@@ -333,33 +333,15 @@
<h3 id="insecurity">Insecurity</h3>
<p>These bugs are/were not intentional, so unlike</em></ins></span> the
<span class="removed"><del><strong>developers
-fixed one “problem”,</strong></del></span> <span
class="inserted"><ins><em>rest of the file
- they do not count as malware. We mention them to refute the
- supposition that prestigious proprietary software doesn't have grave
+fixed one “problem”, Apple complained about another.
+After</strong></del></span> <span class="inserted"><ins><em>rest
of</em></ins></span> the <span class="removed"><del><strong>fifth rejection,
+Apple <a
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">admitted
+it was censoring</strong></del></span> <span class="inserted"><ins><em>file
+ they do not count as malware. We mention them to refute</em></ins></span>
the <span class="removed"><del><strong>app based</strong></del></span>
+ <span class="inserted"><ins><em>supposition that prestigious proprietary
software doesn't have grave
bugs.</p>
<ul class="blurbs">
- <li id="M202107190">
- <!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
-
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/">Crackers
- used an exploit in</em></ins></span> Apple <span
class="removed"><del><strong>complained about another.
-After</strong></del></span> <span class="inserted"><ins><em>iThings to install
- spyware</a> on people's devices, many of them to be journalists, even
- if they were using</em></ins></span> the <span
class="removed"><del><strong>fifth rejection,</strong></del></span> <span
class="inserted"><ins><em>latest version of the proprietary operating
- system installed on their iDevice.</p>
-
- <p>Nobody can do anything about these vulnerabilities and people
- have to wait until</em></ins></span> Apple <span
class="removed"><del><strong><a
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">admitted</strong></del></span>
<span class="inserted"><ins><em>fixes these security holes,
if</em></ins></span> it <span class="removed"><del><strong>was
censoring</strong></del></span> <span class="inserted"><ins><em>decides
- to fix it. A free operating system would let people to
identify</em></ins></span> the <span class="removed"><del><strong>app
based</strong></del></span>
- <span class="inserted"><ins><em>hole and fix it.</p>
-
- <p><small>Please note that the article
- wrongly refers to crackers as “<a
-
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
- </li>
-
<li id="M202107180">
<!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -520,14 +502,14 @@
useful and would not be wrong. Requiring users to get
Apple's approval is tyranny. Apple says the check will
only look for malware (not counting the malware that is <a
- href="/proprietary/malware-apple.html#TOC">part</em></ins></span> of
- <span class="inserted"><ins><em>the operating system</a>), but Apple
could change that policy step
+ href="/proprietary/malware-apple.html#TOC">part of
+ the operating system</a>), but Apple could change that policy step
by step. Or perhaps Apple will define malware to include any app
that China does not like.</p>
<p>For free software, this means users will need to get Apple's
approval after compilation. This amounts to a system of surveilling
- the use of free programs.</p>
+ the use</em></ins></span> of <span class="inserted"><ins><em>free
programs.</p>
</li>
<li id="M200803070">
@@ -541,7 +523,7 @@
<p>Here is an article about the <a
href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/">
- code signing</a> that the iThings use to lock up the user.</p>
+ code signing</a> that the</em></ins></span> iThings <span
class="inserted"><ins><em>use to lock up the user.</p>
<p>Curiously, Apple is beginning to allow limited passage through the
walls of the iThing jail: users can now install apps built from
@@ -549,7 +531,7 @@
cannot do this freely because they are required to identify
themselves. <a href="https://developer.apple.com/xcode/">Here
are details</a>. While this is a crack in the prison walls, it is not
- big enough to mean that the</em></ins></span> iThings <span
class="inserted"><ins><em>are no longer jails.</p>
+ big enough to mean that the iThings are no longer jails.</p>
</li>
</ul>
@@ -731,12 +713,12 @@
time the developers fixed one “problem”, Apple
complained about another. After the fifth rejection, Apple <a
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">
- admitted it was censoring the app based on the subject
matter</a>.</p>
+ admitted it was censoring the app based on the subject
matter</a>.</p></em></ins></span>
</li>
</ul>
-<h3 id="manipulation">Manipulation</h3>
+<h3 <span class="removed"><del><strong>id="pressuring">Apple
Pressuring</h3></strong></del></span> <span
class="inserted"><ins><em>id="manipulation">Manipulation</h3>
<ul class="blurbs">
<li id="M201308290">
@@ -749,12 +731,12 @@
<p>This allows a company such as Apple to say, “We allow users
to turn this off” while ensuring that few will understand how
- to actually turn it off.</p></em></ins></span>
+ to actually turn it off.</p>
</li>
</ul>
-<h3 <span class="removed"><del><strong>id="pressuring">Apple
Pressuring</h3></strong></del></span> <span
class="inserted"><ins><em>id="pressuring">Pressuring</h3></em></ins></span>
+<h3 id="pressuring">Pressuring</h3></em></ins></span>
<p>Proprietary companies can take advantage of their customers by
imposing arbitrary limits to their use of the software. This section reports
examples of hard sell and other unjust commercial tactics by Apple.</p>
@@ -1061,8 +1043,8 @@
<li id="M201809070">
<!--#set var="DATE" value='<small
class="date-tag">2018-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Adware Doctor, an ad blocker for MacOS,</em></ins></span> <a
<span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history">reports
+ <p>Adware Doctor, an ad blocker for MacOS, <a
+
href="https://www.vice.com/en/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history">reports
the user's browsing history</a>.</p>
</li>
@@ -1079,8 +1061,8 @@
<!--#set var="DATE" value='<small
class="date-tag">2017-09</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>In the latest iThings system,
- “turning off” WiFi and Bluetooth the obvious way <a
-
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
+ “turning off” WiFi and Bluetooth the obvious
way</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
doesn't really turn them off</a>. A more advanced way really does
turn
them off—only until 5am. That's Apple for you—“We
know you want to be spied on”.</p>
@@ -1464,7 +1446,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/08/01 17:32:25 $
+$Date: 2021/08/03 14:32:37 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-apple.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja.po,v
retrieving revision 1.147
retrieving revision 1.148
diff -u -b -r1.147 -r1.148
--- po/malware-apple.ja.po 1 Aug 2021 17:32:25 -0000 1.147
+++ po/malware-apple.ja.po 3 Aug 2021 14:32:37 -0000 1.148
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
"PO-Revision-Date: 2016-12-20 14:42+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -405,28 +405,6 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -443,6 +421,12 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Commercial crackware can <a href=\"https://www.theguardian.com/"
"technology/2020/dec/20/iphones-vulnerable-to-hacking-tool-for-months-"
"researchers-say\"> get passwords out of an iMonster</a>, use the microphone "
Index: po/malware-apple.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl-diff.html,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -b -r1.103 -r1.104
--- po/malware-apple.nl-diff.html 1 Aug 2021 17:32:25 -0000 1.103
+++ po/malware-apple.nl-diff.html 3 Aug 2021 14:32:37 -0000 1.104
@@ -333,33 +333,15 @@
<h3 id="insecurity">Insecurity</h3>
<p>These bugs are/were not intentional, so unlike</em></ins></span> the
<span class="removed"><del><strong>developers
-fixed one “problem”,</strong></del></span> <span
class="inserted"><ins><em>rest of the file
- they do not count as malware. We mention them to refute the
- supposition that prestigious proprietary software doesn't have grave
+fixed one “problem”, Apple complained about another.
+After</strong></del></span> <span class="inserted"><ins><em>rest
of</em></ins></span> the <span class="removed"><del><strong>fifth rejection,
+Apple <a
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">admitted
+it was censoring</strong></del></span> <span class="inserted"><ins><em>file
+ they do not count as malware. We mention them to refute</em></ins></span>
the <span class="removed"><del><strong>app based</strong></del></span>
+ <span class="inserted"><ins><em>supposition that prestigious proprietary
software doesn't have grave
bugs.</p>
<ul class="blurbs">
- <li id="M202107190">
- <!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
-
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/">Crackers
- used an exploit in</em></ins></span> Apple <span
class="removed"><del><strong>complained about another.
-After</strong></del></span> <span class="inserted"><ins><em>iThings to install
- spyware</a> on people's devices, many of them to be journalists, even
- if they were using</em></ins></span> the <span
class="removed"><del><strong>fifth rejection,</strong></del></span> <span
class="inserted"><ins><em>latest version of the proprietary operating
- system installed on their iDevice.</p>
-
- <p>Nobody can do anything about these vulnerabilities and people
- have to wait until</em></ins></span> Apple <span
class="removed"><del><strong><a
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">admitted</strong></del></span>
<span class="inserted"><ins><em>fixes these security holes,
if</em></ins></span> it <span class="removed"><del><strong>was
censoring</strong></del></span> <span class="inserted"><ins><em>decides
- to fix it. A free operating system would let people to
identify</em></ins></span> the <span class="removed"><del><strong>app
based</strong></del></span>
- <span class="inserted"><ins><em>hole and fix it.</p>
-
- <p><small>Please note that the article
- wrongly refers to crackers as “<a
-
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
- </li>
-
<li id="M202107180">
<!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -520,14 +502,14 @@
useful and would not be wrong. Requiring users to get
Apple's approval is tyranny. Apple says the check will
only look for malware (not counting the malware that is <a
- href="/proprietary/malware-apple.html#TOC">part</em></ins></span> of
- <span class="inserted"><ins><em>the operating system</a>), but Apple
could change that policy step
+ href="/proprietary/malware-apple.html#TOC">part of
+ the operating system</a>), but Apple could change that policy step
by step. Or perhaps Apple will define malware to include any app
that China does not like.</p>
<p>For free software, this means users will need to get Apple's
approval after compilation. This amounts to a system of surveilling
- the use of free programs.</p>
+ the use</em></ins></span> of <span class="inserted"><ins><em>free
programs.</p>
</li>
<li id="M200803070">
@@ -541,7 +523,7 @@
<p>Here is an article about the <a
href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/">
- code signing</a> that the iThings use to lock up the user.</p>
+ code signing</a> that the</em></ins></span> iThings <span
class="inserted"><ins><em>use to lock up the user.</p>
<p>Curiously, Apple is beginning to allow limited passage through the
walls of the iThing jail: users can now install apps built from
@@ -549,7 +531,7 @@
cannot do this freely because they are required to identify
themselves. <a href="https://developer.apple.com/xcode/">Here
are details</a>. While this is a crack in the prison walls, it is not
- big enough to mean that the</em></ins></span> iThings <span
class="inserted"><ins><em>are no longer jails.</p>
+ big enough to mean that the iThings are no longer jails.</p>
</li>
</ul>
@@ -731,12 +713,12 @@
time the developers fixed one “problem”, Apple
complained about another. After the fifth rejection, Apple <a
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">
- admitted it was censoring the app based on the subject
matter</a>.</p>
+ admitted it was censoring the app based on the subject
matter</a>.</p></em></ins></span>
</li>
</ul>
-<h3 id="manipulation">Manipulation</h3>
+<h3 <span class="removed"><del><strong>id="pressuring">Apple
Pressuring</h3></strong></del></span> <span
class="inserted"><ins><em>id="manipulation">Manipulation</h3>
<ul class="blurbs">
<li id="M201308290">
@@ -749,12 +731,12 @@
<p>This allows a company such as Apple to say, “We allow users
to turn this off” while ensuring that few will understand how
- to actually turn it off.</p></em></ins></span>
+ to actually turn it off.</p>
</li>
</ul>
-<h3 <span class="removed"><del><strong>id="pressuring">Apple
Pressuring</h3></strong></del></span> <span
class="inserted"><ins><em>id="pressuring">Pressuring</h3></em></ins></span>
+<h3 id="pressuring">Pressuring</h3></em></ins></span>
<p>Proprietary companies can take advantage of their customers by
imposing arbitrary limits to their use of the software. This section reports
examples of hard sell and other unjust commercial tactics by Apple.</p>
@@ -1061,8 +1043,8 @@
<li id="M201809070">
<!--#set var="DATE" value='<small
class="date-tag">2018-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Adware Doctor, an ad blocker for MacOS,</em></ins></span> <a
<span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history">reports
+ <p>Adware Doctor, an ad blocker for MacOS, <a
+
href="https://www.vice.com/en/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history">reports
the user's browsing history</a>.</p>
</li>
@@ -1079,8 +1061,8 @@
<!--#set var="DATE" value='<small
class="date-tag">2017-09</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>In the latest iThings system,
- “turning off” WiFi and Bluetooth the obvious way <a
-
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
+ “turning off” WiFi and Bluetooth the obvious
way</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
doesn't really turn them off</a>. A more advanced way really does
turn
them off—only until 5am. That's Apple for you—“We
know you want to be spied on”.</p>
@@ -1464,7 +1446,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/08/01 17:32:25 $
+$Date: 2021/08/03 14:32:37 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-apple.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl.po,v
retrieving revision 1.101
retrieving revision 1.102
diff -u -b -r1.101 -r1.102
--- po/malware-apple.nl.po 1 Aug 2021 17:32:25 -0000 1.101
+++ po/malware-apple.nl.po 3 Aug 2021 14:32:37 -0000 1.102
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
"PO-Revision-Date: 2017-01-10 22:15+0100\n"
"Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
"Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -423,28 +423,6 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -461,6 +439,12 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Commercial crackware can <a href=\"https://www.theguardian.com/"
"technology/2020/dec/20/iphones-vulnerable-to-hacking-tool-for-months-"
"researchers-say\"> get passwords out of an iMonster</a>, use the microphone "
Index: po/malware-apple.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.pot,v
retrieving revision 1.111
retrieving revision 1.112
diff -u -b -r1.111 -r1.112
--- po/malware-apple.pot 1 Aug 2021 17:32:25 -0000 1.111
+++ po/malware-apple.pot 3 Aug 2021 14:32:37 -0000 1.112
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -315,28 +315,6 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
"<a "
-"href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/\">Crackers
"
-"used an exploit in Apple iThings to install spyware</a> on people's devices, "
-"many of them to be journalists, even if they were using the latest version "
-"of the proprietary operating system installed on their iDevice."
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"<a "
"href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones\">
"
"The pegasus spyware used vulnerabilities on proprietary smartphone operating "
"systems</a> to impose surveillance on people. It can record people's calls, "
@@ -352,6 +330,12 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Commercial crackware can <a "
"href=\"https://www.theguardian.com/technology/2020/dec/20/iphones-vulnerable-to-hacking-tool-for-months-researchers-say\">
"
"get passwords out of an iMonster</a>, use the microphone and camera, and "
Index: po/malware-apple.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.pt-br.po,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- po/malware-apple.pt-br.po 1 Aug 2021 17:32:25 -0000 1.7
+++ po/malware-apple.pt-br.po 3 Aug 2021 14:32:37 -0000 1.8
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
"PO-Revision-Date: 2021-06-26 09:40-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -404,48 +404,6 @@
#. type: Content of: <div><div><ul><li><p>
#, fuzzy
#| msgid ""
-#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
-#| "of them to be journalists, even if they were using the latest version of "
-#| "the proprietary operating system installed on their iDevice."
-msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\"> <em>Crackers</em> usaram uma <i lang=\"en"
-"\">exploit</i> de dia zero e clique zero em iCoisas da Apple para instalar "
-"<em>spyware</em></a> nos dispositivos das pessoas, muitas delas para serem "
-"jornalistas, mesmo que estivessem usando a versão mais recente do sistema "
-"operacional privativo instalado em seu iDispositivo."
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-"Ninguém pode fazer nada sobre essas vulnerabilidades e as pessoas têm que "
-"esperar até que a Apple conserte essas falhas de segurança, se decidir "
-"consertá-las. Um sistema operacional livre permitiria que as pessoas "
-"identificassem o problema e o consertassem."
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-"<small>(Note que o artigo, de forma incorreta, refere-se a <em>crackers</em> "
-"como â<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>â.)</"
-"small>"
-
-#. type: Content of: <div><div><ul><li><p>
-#, fuzzy
-#| msgid ""
#| "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
#| "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
#| "vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -485,6 +443,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+"<small>(Note que o artigo, de forma incorreta, refere-se a <em>crackers</em> "
+"como â<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>â.)</"
+"small>"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Commercial crackware can <a href=\"https://www.theguardian.com/"
"technology/2020/dec/20/iphones-vulnerable-to-hacking-tool-for-months-"
"researchers-say\"> get passwords out of an iMonster</a>, use the microphone "
@@ -1843,3 +1810,34 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Ãltima atualização:"
+
+#, fuzzy
+#~| msgid ""
+#~| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#~| "exploit in Apple iThings to install spyware</a> on people's devices, "
+#~| "many of them to be journalists, even if they were using the latest "
+#~| "version of the proprietary operating system installed on their iDevice."
+#~ msgid ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~ "used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings "
+#~ "to install spyware</a> on people's devices, many of them to be "
+#~ "journalists, even if they were using the latest version of the "
+#~ "proprietary operating system installed on their iDevice."
+#~ msgstr ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~ "used-to-spy-on-journalists/\"> <em>Crackers</em> usaram uma <i lang=\"en"
+#~ "\">exploit</i> de dia zero e clique zero em iCoisas da Apple para "
+#~ "instalar <em>spyware</em></a> nos dispositivos das pessoas, muitas delas "
+#~ "para serem jornalistas, mesmo que estivessem usando a versão mais recente
"
+#~ "do sistema operacional privativo instalado em seu iDispositivo."
+
+#~ msgid ""
+#~ "Nobody can do anything about these vulnerabilities and people have to "
+#~ "wait until Apple fixes these security holes, if it decides to fix it. A "
+#~ "free operating system would let people to identify the hole and fix it."
+#~ msgstr ""
+#~ "Ninguém pode fazer nada sobre essas vulnerabilidades e as pessoas têm
que "
+#~ "esperar até que a Apple conserte essas falhas de segurança, se decidir "
+#~ "consertá-las. Um sistema operacional livre permitiria que as pessoas "
+#~ "identificassem o problema e o consertassem."
Index: po/malware-apple.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ru.po,v
retrieving revision 1.273
retrieving revision 1.274
diff -u -b -r1.273 -r1.274
--- po/malware-apple.ru.po 1 Aug 2021 17:32:25 -0000 1.273
+++ po/malware-apple.ru.po 3 Aug 2021 14:32:37 -0000 1.274
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -406,54 +406,6 @@
#. type: Content of: <div><div><ul><li><p>
# | <a
-# |
href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/\">Crackers
-# | used [-a zero-day and zero-click-] {+an+} exploit in Apple iThings to
-# | install spyware</a> on people's devices, many of them to be journalists,
-# | even if they were using the latest version of the proprietary operating
-# | system installed on their iDevice.
-#, fuzzy
-#| msgid ""
-#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
-#| "of them to be journalists, even if they were using the latest version of "
-#| "the proprietary operating system installed on their iDevice."
-msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">ÐзломÑики пÑименÑли
безÑелÑковÑÑ ÑÑзвимоÑÑÑ "
-"нÑлевого Ð´Ð½Ñ Ð² ай-ÑÑÑÑкаÑ
Apple длÑ
ÑÑÑановки ÑпионÑкиÑ
пÑогÑамм</a> на "
-"ÑÑÑÑойÑÑваÑ
лÑдей (многие из коÑоÑÑÑ
— жÑÑналиÑÑÑ), даже еÑли Ñе "
-"полÑзовалиÑÑ Ñамой поздней веÑÑией
неÑвободной опеÑаÑионной ÑиÑÑемÑ, "
-"ÑÑÑановленной на иÑ
ÑÑÑÑойÑÑве."
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-"ÐикÑо ниÑего не Ð¼Ð¾Ð¶ÐµÑ Ð¿Ð¾Ð´ÐµÐ»Ð°ÑÑ Ñ ÑÑими
ÑÑзвимоÑÑÑми, и лÑди вÑнÑÐ¶Ð´ÐµÐ½Ñ Ð¶Ð´Ð°ÑÑ, "
-"пока Apple ÑÑÑÑÐ°Ð½Ð¸Ñ ÑÑи пÑоÑеÑ
и в заÑиÑе,
еÑли ÑÑа ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ ÑеÑÐ¸Ñ ÑÑÑÑаниÑÑ "
-"иÑ
. Ð¡Ð²Ð¾Ð±Ð¾Ð´Ð½Ð°Ñ Ð¾Ð¿ÐµÑаÑÐ¸Ð¾Ð½Ð½Ð°Ñ ÑиÑÑема
позволила Ð±Ñ Ð»ÑдÑм вÑÑвиÑÑ Ð¿ÑоÑеÑ
Ñ Ð¸ "
-"ÑÑÑÑаниÑÑ ÐµÐµ."
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-"<small>ÐамеÑÑÑе, ÑÑо в ÑÑаÑÑе ÑеÑмин <a
href=\"/philosophy/words-to-avoid."
-"html#Hacker\">“Ñ
акеÑÑ”</a> невеÑно
иÑполÑзÑеÑÑÑ Ð´Ð»Ñ Ð¾Ð±Ð¾Ð·Ð½Ð°ÑÐµÐ½Ð¸Ñ "
-"взломÑиков.</small>"
-
-#. type: Content of: <div><div><ul><li><p>
-# | <a
# |
href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones\">
# | The pegasus spyware used vulnerabilities on proprietary smartphone
# | operating systems</a> to impose surveillance on people. It can record
@@ -500,6 +452,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+"<small>ÐамеÑÑÑе, ÑÑо в ÑÑаÑÑе ÑеÑмин <a
href=\"/philosophy/words-to-avoid."
+"html#Hacker\">“Ñ
акеÑÑ”</a> невеÑно
иÑполÑзÑеÑÑÑ Ð´Ð»Ñ Ð¾Ð±Ð¾Ð·Ð½Ð°ÑÐµÐ½Ð¸Ñ "
+"взломÑиков.</small>"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Commercial crackware can <a href=\"https://www.theguardian.com/"
"technology/2020/dec/20/iphones-vulnerable-to-hacking-tool-for-months-"
"researchers-say\"> get passwords out of an iMonster</a>, use the microphone "
@@ -1868,3 +1829,34 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Ðбновлено:"
+
+#, fuzzy
+#~| msgid ""
+#~| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#~| "exploit in Apple iThings to install spyware</a> on people's devices, "
+#~| "many of them to be journalists, even if they were using the latest "
+#~| "version of the proprietary operating system installed on their iDevice."
+#~ msgid ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~ "used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings "
+#~ "to install spyware</a> on people's devices, many of them to be "
+#~ "journalists, even if they were using the latest version of the "
+#~ "proprietary operating system installed on their iDevice."
+#~ msgstr ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~ "used-to-spy-on-journalists/\">ÐзломÑики пÑименÑли
безÑелÑковÑÑ ÑÑзвимоÑÑÑ "
+#~ "нÑлевого Ð´Ð½Ñ Ð² ай-ÑÑÑÑкаÑ
Apple длÑ
ÑÑÑановки ÑпионÑкиÑ
пÑогÑамм</a> на "
+#~ "ÑÑÑÑойÑÑваÑ
лÑдей (многие из коÑоÑÑÑ
— жÑÑналиÑÑÑ), даже еÑли "
+#~ "Ñе полÑзовалиÑÑ Ñамой поздней веÑÑией
неÑвободной опеÑаÑионной ÑиÑÑемÑ, "
+#~ "ÑÑÑановленной на иÑ
ÑÑÑÑойÑÑве."
+
+#~ msgid ""
+#~ "Nobody can do anything about these vulnerabilities and people have to "
+#~ "wait until Apple fixes these security holes, if it decides to fix it. A "
+#~ "free operating system would let people to identify the hole and fix it."
+#~ msgstr ""
+#~ "ÐикÑо ниÑего не Ð¼Ð¾Ð¶ÐµÑ Ð¿Ð¾Ð´ÐµÐ»Ð°ÑÑ Ñ ÑÑими
ÑÑзвимоÑÑÑми, и лÑди вÑнÑÐ¶Ð´ÐµÐ½Ñ "
+#~ "ждаÑÑ, пока Apple ÑÑÑÑÐ°Ð½Ð¸Ñ ÑÑи пÑоÑеÑ
и в
заÑиÑе, еÑли ÑÑа ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ ÑеÑÐ¸Ñ "
+#~ "ÑÑÑÑаниÑÑ Ð¸Ñ
. Ð¡Ð²Ð¾Ð±Ð¾Ð´Ð½Ð°Ñ Ð¾Ð¿ÐµÑаÑионнаÑ
ÑиÑÑема позволила Ð±Ñ Ð»ÑдÑм вÑÑвиÑÑ "
+#~ "пÑоÑеÑ
Ñ Ð¸ ÑÑÑÑаниÑÑ ÐµÐµ."
Index: po/nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.335
retrieving revision 1.336
diff -u -b -r1.335 -r1.336
--- po/nl.po 1 Aug 2021 17:32:25 -0000 1.335
+++ po/nl.po 3 Aug 2021 14:32:37 -0000 1.336
@@ -449,28 +449,6 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -487,6 +465,12 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
"crackers to remotely gain access to the operating system</a> and install "
Index: po/pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.334
retrieving revision 1.335
diff -u -b -r1.334 -r1.335
--- po/pl.po 1 Aug 2021 17:32:25 -0000 1.334
+++ po/pl.po 3 Aug 2021 14:32:38 -0000 1.335
@@ -438,28 +438,6 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -476,6 +454,12 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
"crackers to remotely gain access to the operating system</a> and install "
Index: po/pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.333
retrieving revision 1.334
diff -u -b -r1.333 -r1.334
--- po/pot 1 Aug 2021 17:32:26 -0000 1.333
+++ po/pot 3 Aug 2021 14:32:38 -0000 1.334
@@ -368,28 +368,6 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -406,6 +384,12 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
"crackers to remotely gain access to the operating system</a> and install "
Index: po/proprietary-insecurity.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de-diff.html,v
retrieving revision 1.88
retrieving revision 1.89
diff -u -b -r1.88 -r1.89
--- po/proprietary-insecurity.de-diff.html 1 Aug 2021 17:32:26 -0000
1.88
+++ po/proprietary-insecurity.de-diff.html 3 Aug 2021 14:32:38 -0000
1.89
@@ -66,57 +66,46 @@
software that has grave consequences or is otherwise
<span class="removed"><del><strong>noteworthy.</p>
-<p>It</strong></del></span> <span class="inserted"><ins><em>noteworthy.
Even
-though most of these security flaws are unintentional, thus are not
-malicious functionalities in a strict sense, we report them to show that
-proprietary software is not as secure as mainstream media may say.</p>
-
-<p>This doesn't imply that free software</em></ins></span> is <span
class="removed"><del><strong>incorrect</strong></del></span> <span
class="inserted"><ins><em>immune</em></ins></span> to <span
class="removed"><del><strong>compare</strong></del></span> <span
class="inserted"><ins><em>bugs or insecurities.
-The difference between</em></ins></span> free <span
class="inserted"><ins><em>and proprietary</em></ins></span> software <span
class="removed"><del><strong>with a fictitious idea</strong></del></span> <span
class="inserted"><ins><em>in this respect is
-the handling</em></ins></span> of
-<span class="removed"><del><strong>proprietary</strong></del></span> <span
class="inserted"><ins><em>the bugs: free</em></ins></span> software <span
class="inserted"><ins><em>users are able to study the
-program and/or fix the bugs they find, often in communities</em></ins></span>
as <span class="removed"><del><strong>perfect, but</strong></del></span> <span
class="inserted"><ins><em>they are
-able to share the program, while proprietary program users are forced to
+<p>It is incorrect to compare free software with a fictitious
idea</strong></del></span> <span class="inserted"><ins><em>noteworthy. Even
+though most</em></ins></span> of
+<span class="removed"><del><strong>proprietary software as perfect, but the
press often implicitly does
+that whenever a</strong></del></span> <span
class="inserted"><ins><em>these</em></ins></span> security <span
class="removed"><del><strong>hole</strong></del></span> <span
class="inserted"><ins><em>flaws are unintentional, thus are not
+malicious functionalities</em></ins></span> in a <span
class="removed"><del><strong>free program is discovered. The
+examples below</strong></del></span> <span class="inserted"><ins><em>strict
sense, we report them to</em></ins></span> show that
+proprietary software <span class="removed"><del><strong>isn't perfect,
and</strong></del></span> is <span class="removed"><del><strong>often quite
sloppy.</p>
+
+<p>It would be equally incorrect</strong></del></span> <span
class="inserted"><ins><em>not as secure as mainstream media may say.</p>
+
+<p>This doesn't imply that free software is immune</em></ins></span> to
<span class="removed"><del><strong>compare</strong></del></span> <span
class="inserted"><ins><em>bugs or insecurities.
+The difference between free and</em></ins></span> proprietary software <span
class="removed"><del><strong>with
+a fictitious idea</strong></del></span> <span class="inserted"><ins><em>in
this respect is
+the handling</em></ins></span> of <span class="inserted"><ins><em>the
bugs:</em></ins></span> free software <span class="removed"><del><strong>as
perfect. Every nontrivial</strong></del></span> <span
class="inserted"><ins><em>users are able to study the</em></ins></span>
+program <span class="removed"><del><strong>has bugs, and any system, free or
proprietary, may have
+security errors. To err is human, and not culpable. But proprietary
+software developers frequently disregard gaping holes, or even
+introduce them deliberately. In any case,</strong></del></span> <span
class="inserted"><ins><em>and/or fix the bugs they find, often in communities
as</em></ins></span> they <span
class="removed"><del><strong>keep</strong></del></span> <span
class="inserted"><ins><em>are
+able to share the program, while proprietary program</em></ins></span> users
+<span class="removed"><del><strong><em>helpless</strong></del></span>
<span class="inserted"><ins><em>are forced to
rely on the program's developer for fixes.</p>
-<p>If</em></ins></span> the <span
class="removed"><del><strong>press</strong></del></span> <span
class="inserted"><ins><em>developer does not care to fix the problem
—</em></ins></span> often <span
class="removed"><del><strong>implicitly</strong></del></span> <span
class="inserted"><ins><em>the case for
-embedded software and old releases — the users are sunk. But if the
-developer</em></ins></span> does <span class="inserted"><ins><em>send a
corrected version, it may contain new malicious
+<p>If the developer does not care</em></ins></span> to fix <span
class="removed"><del><strong>any security problems that arise</em>.
Keeping</strong></del></span> <span class="inserted"><ins><em>the problem
— often the case for
+embedded software and old releases —</em></ins></span> the users <span
class="removed"><del><strong>helpless is what's culpable about proprietary
software.</p></strong></del></span> <span class="inserted"><ins><em>are
sunk. But if the
+developer does send a corrected version, it may contain new malicious
functionalities as well as bug fixes.</p>
-<div class="important">
-<p>If you know of an example</em></ins></span> that <span
class="removed"><del><strong>whenever</strong></del></span> <span
class="inserted"><ins><em>ought to be in this page but isn't
+<div class="important"></em></ins></span>
+<p>If you know of an example that ought to be in this page but isn't
here, please write
to <a
href="mailto:webmasters@gnu.org"><webmasters@gnu.org></a>
-to inform us. Please include the URL of</em></ins></span> a <span
class="inserted"><ins><em>trustworthy reference or two
-to serve as specific substantiation.</p>
+to inform us. Please include the URL of a trustworthy reference or two
+to <span class="removed"><del><strong>present</strong></del></span> <span
class="inserted"><ins><em>serve as specific substantiation.</p>
</div>
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
- <li id="M202107190">
- <!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
-
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/">Crackers
- used an exploit in Apple iThings to install
- spyware</a> on people's devices, many of them to be journalists, even
- if they were using the latest version of the proprietary operating
- system installed on their iDevice.</p>
-
- <p>Nobody can do anything about these vulnerabilities and people
- have to wait until Apple fixes these</em></ins></span> security <span
class="inserted"><ins><em>holes, if it decides
- to fix it. A free operating system would let people to identify
the</em></ins></span>
- hole <span class="removed"><del><strong>in</strong></del></span> <span
class="inserted"><ins><em>and fix it.</p>
-
- <p><small>Please note that the article
- wrongly refers to crackers as “<a
-
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
- </li>
-
<li id="M202107180">
<!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -124,10 +113,10 @@
href="https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones">
The pegasus spyware used vulnerabilities on proprietary smartphone
operating systems</a> to impose surveillance on people. It can record
- people's calls, copy their messages, and secretly film them,
using</em></ins></span> a
- <span class="inserted"><ins><em>security vulnerability.</p>
+ people's calls, copy their messages, and secretly film them, using a
+ security vulnerability.</p>
- <p>A</em></ins></span> free <span
class="removed"><del><strong>program</strong></del></span> <span
class="inserted"><ins><em>operating system would've let people to fix the bugs
for
+ <p>A free operating system would've let people to fix the bugs for
themselves but now infected people will be compelled to wait for
corporations to
fix the problems.</p>
@@ -170,7 +159,7 @@
<p><a
href="https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-to-chinese-government-conflicts-with-apples-privacy-first-focus/">Apple
is moving its Chinese customers' iCloud data to a datacenter controlled
- by the Chinese government</a>. Apple</em></ins></span> is <span
class="removed"><del><strong>discovered.</strong></del></span> <span
class="inserted"><ins><em>already storing the encryption
+ by the Chinese government</a>. Apple is already storing the
encryption
keys on these servers, obeying Chinese authority, making all Chinese
user data available to the government.</p>
</li>
@@ -208,9 +197,8 @@
<p>A zero-day vulnerability in Zoom which <a
href="https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-code-execution-without-user-input/">can
be used to launch remote code execution (RCE) attacks</a> has been
- disclosed by researchers.</em></ins></span> The
-<span class="removed"><del><strong>examples below show</strong></del></span>
<span class="inserted"><ins><em>researchers demonstrated a three-bug
- attack chain</em></ins></span> that <span class="inserted"><ins><em>caused
an RCE on a target machine, all this without
+ disclosed by researchers. The researchers demonstrated a three-bug
+ attack chain that caused an RCE on a target machine, all this without
any form of user interaction.</p>
</li>
@@ -218,16 +206,14 @@
<!--#set var="DATE" value='<small
class="date-tag">2021-03</small>'
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach-of-150-000-security-cams">Over
150 thousand security cameras that used Verkada
- company's</em></ins></span> proprietary software <span
class="removed"><del><strong>isn't perfect,</strong></del></span> <span
class="inserted"><ins><em>are cracked</a> by a major security
+ company's proprietary software are cracked</a> by a major security
breach. Crackers have had access to security archives of various
- gyms, hospitals, jails, schools,</em></ins></span> and <span
class="inserted"><ins><em>police stations that have used
+ gyms, hospitals, jails, schools, and police stations that have used
Verkada's cameras.</p>
- <p><a
href="/philosophy/surveillance-vs-democracy.html">It</em></ins></span> is
<span class="removed"><del><strong>often quite sloppy.</p>
-
-<p>It would be equally incorrect</strong></del></span> <span
class="inserted"><ins><em>injustice
+ <p><a href="/philosophy/surveillance-vs-democracy.html">It is
injustice
to the public</a> for gyms, stores, hospitals, jails, and schools to
- hand “security” footage</em></ins></span> to <span
class="removed"><del><strong>compare</strong></del></span> <span
class="inserted"><ins><em>a company from which the government can
+ hand “security” footage to a company from which the government
can
collect it at any time, without even telling them.</p>
<p><small>Please note that the article
@@ -242,19 +228,19 @@
in the United States are newly “<a
href="/philosophy/words-to-avoid.html#Hacker">cracked</a>”
via <a
href="https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-newly-hacked-via-holes-in-microsofts-email-software/">holes
- in Microsoft's</em></ins></span> proprietary <span
class="removed"><del><strong>software</strong></del></span> <span
class="inserted"><ins><em>email software, named Microsoft 365</a>. It
+ in Microsoft's proprietary email software, named Microsoft 365</a>.
It
is unclear whether there are other holes and vulnerabilities in the
program or not but history and experience tells us it wouldn't be
- the last disaster</em></ins></span> with <span
class="inserted"><ins><em>proprietary programs.</p>
+ the last disaster with proprietary programs.</p>
</li>
<li id="M202102110">
<!--#set var="DATE" value='<small
class="date-tag">2021-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Researchers at the security firm SentinelOne
discovered</em></ins></span> a <span class="removed"><del><strong>fictitious
idea of</strong></del></span> <span class="inserted"><ins><em><a
+ <p>Researchers at the security firm SentinelOne discovered a <a
href="https://www.wired.com/story/windows-defender-vulnerability-twelve-years/">security
flaw in proprietary program Microsoft Windows Defender that lurked
- undetected for 12 years</a>. If the program was</em></ins></span>
free <span class="inserted"><ins><em>(as in freedom),
+ undetected for 12 years</a>. If the program was free (as in freedom),
more people would have had a chance to notice the problem, therefore,
it could've been fixed a lot sooner.</p>
</li>
@@ -304,12 +290,11 @@
href="https://www.theguardian.com/technology/2020/dec/15/orion-hack-solar-winds-explained-us-treasury-commerce-department">malicious
code was sneaked into SolarWinds' proprietary software named
Orion</a>. Crackers got access to networks when users downloaded
- a tainted</em></ins></span> software <span
class="inserted"><ins><em>update. Crackers were able to monitor internal
+ a tainted software update. Crackers were able to monitor internal
emails at some of the top agencies in the US.</p>
<p><small>(Please note that the article
- wrongly refers to crackers</em></ins></span> as <span
class="removed"><del><strong>perfect. Every nontrivial
-program has bugs,</strong></del></span> <span class="inserted"><ins><em>"<a
+ wrongly refers to crackers as "<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>".)</small></p>
</li>
@@ -319,10 +304,10 @@
<p>Baidu apps were <a
href="https://www.zdnet.com/article/baidus-android-apps-caught-collecting-sensitive-user-details/">
caught collecting sensitive personal data</a> that can be used for
- lifetime tracking of users,</em></ins></span> and <span
class="removed"><del><strong>any system, free or
proprietary,</strong></del></span> <span class="inserted"><ins><em>putting them
in danger. More than 1.4
+ lifetime tracking of users, and putting them in danger. More than 1.4
billion people worldwide are affected by these proprietary apps, and
users' privacy is jeopardized by this surveillance tool. Data collected
- by Baidu</em></ins></span> may <span
class="removed"><del><strong>have</strong></del></span> <span
class="inserted"><ins><em>be handed over to the Chinese government, possibly
+ by Baidu may be handed over to the Chinese government, possibly
putting Chinese people in danger.</p>
</li>
@@ -363,7 +348,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C">
- A disasterous</em></ins></span> security <span
class="removed"><del><strong>errors. To err</strong></del></span> <span
class="inserted"><ins><em>bug</a> touches millions of products in the
+ A disasterous security bug</a> touches millions of products in the
Internet of Stings.</p>
<p>As a result, anyone can sting the user, not only the
@@ -383,7 +368,7 @@
<li id="M202004150">
<!--#set var="DATE" value='<small
class="date-tag">2020-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Riot Games' new anti-cheat</em></ins></span> is <span
class="removed"><del><strong>human,</strong></del></span> <span
class="inserted"><ins><em>malware; <a
+ <p>Riot Games' new anti-cheat is malware; <a
href="https://www.extremetech.com/gaming/309320-riot-games-new-anti-cheat-system-runs-at-system-boot-uses-kernel-driver">runs
on system boot at kernel level</a> on Windows. It is insecure
software
that increases the attack surface of the operating system.</p>
@@ -405,14 +390,13 @@
<p>Internet-tethered Amazon Ring had
a security vulnerability that enabled attackers to <a
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
- access the user's wifi password</a>,</em></ins></span> and <span
class="inserted"><ins><em>snoop on the household
+ access the user's wifi password</a>, and snoop on the household
through connected surveillance devices.</p>
- <p>Knowledge of the wifi password would</em></ins></span> not <span
class="removed"><del><strong>culpable.</strong></del></span> <span
class="inserted"><ins><em>be sufficient to carry
+ <p>Knowledge of the wifi password would not be sufficient to carry
out any significant surveillance if the devices implemented proper
- security, including encryption.</em></ins></span> But <span
class="inserted"><ins><em>many devices with</em></ins></span> proprietary
- software <span class="removed"><del><strong>developers frequently
disregard gaping holes, or even
-introduce them deliberately. In any case,</strong></del></span> <span
class="inserted"><ins><em>lack this. Of course,</em></ins></span> they <span
class="removed"><del><strong>keep</strong></del></span> <span
class="inserted"><ins><em>are also used by their
+ security, including encryption. But many devices with proprietary
+ software lack this. Of course, they are also used by their
manufacturers for snooping.</p>
</li>
@@ -426,26 +410,22 @@
the user's iMonster</a>.</p>
<p>The deep insecurity of iMonsters is even more pertinent given that
- Apple's proprietary software makes</em></ins></span> users
-<span class="removed"><del><strong><em>helpless</strong></del></span>
<span class="inserted"><ins><em>totally dependent on Apple
+ Apple's proprietary software makes users totally dependent on Apple
for even a modicum of security. It also means that the devices do
- not even try</em></ins></span> to <span class="removed"><del><strong>fix
any</strong></del></span> <span
class="inserted"><ins><em>offer</em></ins></span> security <span
class="removed"><del><strong>problems</strong></del></span> <span
class="inserted"><ins><em>against Apple itself.</p>
+ not even try to offer security against Apple itself.</p>
</li>
<li id="M201908020">
<!--#set var="DATE" value='<small
class="date-tag">2019-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Out of 21 gratis Android antivirus apps</em></ins></span>
- that <span class="removed"><del><strong>arise</em>.
Keeping</strong></del></span> <span class="inserted"><ins><em>were tested by
security researchers, eight <a
+ <p>Out of 21 gratis Android antivirus apps
+ that were tested by security researchers, eight <a
href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/">
failed to detect a test virus</a>. All of them asked for dangerous
permissions or contained advertising trackers, with seven being more
- risky than</em></ins></span> the
-<span class="removed"><del><strong>users helpless is what's culpable
about</strong></del></span> <span class="inserted"><ins><em>average of the 100
most popular Android apps.</p>
-
- <p><small>(Note that the article refers to
these</em></ins></span> proprietary <span
class="removed"><del><strong>software.</p>
+ risky than the average of the 100 most popular Android apps.</p>
-<p>If you know</strong></del></span> <span
class="inserted"><ins><em>apps as
+ <p><small>(Note that the article refers to these proprietary
apps as
“free”. It should have said “gratis”
instead.)</small></p>
</li>
@@ -465,7 +445,7 @@
<li id="M201905150">
<!--#set var="DATE" value='<small
class="date-tag">2019-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Users caught in the jail</em></ins></span> of an <span
class="removed"><del><strong>example</strong></del></span> <span
class="inserted"><ins><em>iMonster are <a
+ <p>Users caught in the jail of an iMonster are <a
href="https://boingboing.net/2019/05/15/brittle-security.html"> sitting
ducks for other attackers</a>, and the app censorship prevents
security
companies from figuring out how those attacks work.</p>
@@ -479,15 +459,14 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The Medtronics Conexus Telemetry Protocol has <a
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/">
- two vulnerabilities</em></ins></span> that <span
class="removed"><del><strong>ought</strong></del></span> <span
class="inserted"><ins><em>affect several models of implantable
+ two vulnerabilities that affect several models of implantable
defibrillators</a> and the devices they connect to.</p>
<p>This protocol has been around since 2006, and similar
vulnerabilities were discovered in an earlier Medtronics communication
- protocol in 2008. Apparently, nothing was done by the
company</em></ins></span> to <span
class="removed"><del><strong>be</strong></del></span>
- <span class="inserted"><ins><em>correct them. This means you can't rely on
proprietary software
- developers to fix bugs</em></ins></span> in <span
class="removed"><del><strong>this page but isn't
-here, please write</strong></del></span> <span class="inserted"><ins><em>their
products.</p>
+ protocol in 2008. Apparently, nothing was done by the company to
+ correct them. This means you can't rely on proprietary software
+ developers to fix bugs in their products.</p>
</li>
<li id="M201902270">
@@ -501,9 +480,9 @@
<p>The third party vulnerability is presumably
unintentional and Amazon will probably fix it. However, we
- do not expect Amazon</em></ins></span> to <span
class="inserted"><ins><em>change the design that</em></ins></span> <a <span
class="removed"><del><strong>href="mailto:webmasters@gnu.org"><webmasters@gnu.org></a></strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201901100">allows
- Amazon</em></ins></span> to <span class="removed"><del><strong>inform us.
Please include</strong></del></span> <span
class="inserted"><ins><em>watch</a>.</p>
+ do not expect Amazon to change the design that <a
+ href="/proprietary/proprietary-surveillance.html#M201901100">allows
+ Amazon to watch</a>.</p>
</li>
<li id="M201809240">
@@ -518,9 +497,9 @@
<li id="M201808130">
<!--#set var="DATE" value='<small
class="date-tag">2018-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Since</em></ins></span> the <span
class="removed"><del><strong>URL</strong></del></span> <span
class="inserted"><ins><em>beginning of 2017, <a
+ <p>Since the beginning of 2017, <a
href="https://qz.com/1131515/google-collects-android-users-locations-even-when-location-services-are-disabled/">Android
- phones have been collecting the addresses</em></ins></span> of <span
class="inserted"><ins><em>nearby cellular
+ phones have been collecting the addresses of nearby cellular
towers</a>, even when location services are disabled, and sending
that data back to Google.</p>
</li>
@@ -528,16 +507,13 @@
<li id="M201808120">
<!--#set var="DATE" value='<small
class="date-tag">2018-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Crackers found</em></ins></span> a <span
class="removed"><del><strong>trustworthy reference</strong></del></span> <span
class="inserted"><ins><em>way to break the security of an Amazon device,
+ <p>Crackers found a way to break the security of an Amazon device,
and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
turn it into a listening device</a> for them.</p>
<p>It was very difficult for them to do this. The job would be much
- easier for Amazon. And if some government such as China</em></ins></span>
or <span class="removed"><del><strong>two</strong></del></span> <span
class="inserted"><ins><em>the US
- told Amazon</em></ins></span> to <span
class="removed"><del><strong>present</strong></del></span> <span
class="inserted"><ins><em>do this, or cease to sell</em></ins></span> the <span
class="removed"><del><strong>specifics.</p>
-
-<ul>
-<li></strong></del></span> <span class="inserted"><ins><em>product in
that country,
+ easier for Amazon. And if some government such as China or the US
+ told Amazon to do this, or cease to sell the product in that country,
do you think Amazon would have the moral fiber to say no?</p>
<p><small>(These crackers are probably hackers too, but please
<a
@@ -548,7 +524,10 @@
<li id="M201807100">
<!--#set var="DATE" value='<small
class="date-tag">2018-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Siri, Alexa, and all the other voice-control systems can be <a
+ <p>Siri, Alexa, and all</em></ins></span> the <span
class="removed"><del><strong>specifics.</p>
+
+<ul>
+<li></strong></del></span> <span class="inserted"><ins><em>other
voice-control systems can be <a
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">
hijacked by programs that play commands in ultrasound that humans
can't hear</a>.</p>
@@ -711,16 +690,16 @@
enables malware authors to capture keystrokes without taking the risk
of being classified as malicious task by AV
<span class="removed"><del><strong>heuristics”.
- </p></strong></del></span> <span
class="inserted"><ins><em>heuristics”.</p></em></ins></span>
- </li>
-<span class="removed"><del><strong><li>
+ </p>
+</li>
+<li>
<p>The proprietary code that runs pacemakers, insulin pumps, and other
medical devices is <a
href="http://www.bbc.co.uk/news/technology-40042584">
-full of gross security faults</a>.</p>
-</li>
+full of gross security faults</a>.</p></strong></del></span> <span
class="inserted"><ins><em>heuristics”.</p></em></ins></span>
+ </li>
-<li></strong></del></span>
+<span class="removed"><del><strong><li></strong></del></span>
<span class="inserted"><ins><em><li id="M201705120">
<!--#set var="DATE" value='<small
class="date-tag">2017-05</small>'
@@ -1125,19 +1104,19 @@
can't trust it. Western Digital's “My Passport” drives <a
<span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">have</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.vice.com/en/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">
have</em></ins></span> a back <span
class="removed"><del><strong>door</a>.
-</p></strong></del></span> <span
class="inserted"><ins><em>door</a>.</p></em></ins></span>
- </li>
+</p>
+</li>
-<span class="removed"><del><strong><li>
+<li>
<p>
Mac OS X had an
<a
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
intentional local back door for 4 years</a>, which could be
exploited by attackers to gain root privileges.
-</p>
-</li>
+</p></strong></del></span> <span
class="inserted"><ins><em>door</a>.</p></em></ins></span>
+ </li>
-<li></strong></del></span>
+<span class="removed"><del><strong><li></strong></del></span>
<span class="inserted"><ins><em><li id="M201508120">
<!--#set var="DATE" value='<small
class="date-tag">2015-08</small>'
@@ -1215,17 +1194,17 @@
<p>Depending</em></ins></span> on what drug is being infused, the
insecurity could open
the door to <span class="removed"><del><strong>murder.
-</p></strong></del></span> <span
class="inserted"><ins><em>murder.</p></em></ins></span>
- </li>
+</p>
+</li>
-<span class="removed"><del><strong><li>
+<li>
<p>
Due to bad security in a drug pump, crackers could use it to
<a
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/">kill
patients</a>.
-</p>
-</li>
+</p></strong></del></span> <span
class="inserted"><ins><em>murder.</p></em></ins></span>
+ </li>
-<li>
+<span class="removed"><del><strong><li>
<p></strong></del></span>
<span class="inserted"><ins><em><li id="M201504090">
@@ -1258,8 +1237,8 @@
<li>
<p><a
href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html">
-The FTC punished a company</strong></del></span> for <span
class="removed"><del><strong>making webcams with bad security so
-that it was easy for anyone to watch them</a>.
+The FTC punished a company for making webcams with bad security so
+that it was easy</strong></del></span> for <span
class="removed"><del><strong>anyone to watch them</a>.
</p>
</li>
@@ -1522,7 +1501,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/08/01 17:32:26 $
+$Date: 2021/08/03 14:32:38 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.186
retrieving revision 1.187
diff -u -b -r1.186 -r1.187
--- po/proprietary-insecurity.de.po 1 Aug 2021 17:32:26 -0000 1.186
+++ po/proprietary-insecurity.de.po 3 Aug 2021 14:32:38 -0000 1.187
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
"PO-Revision-Date: 2018-08-29 02:41+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -175,18 +175,18 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a security vulnerability."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people will be compelled to wait for corporations to fix "
+"the problems."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
@@ -209,22 +209,6 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
-"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
-"vulnerabilities on proprietary smartphone operating systems</a> to impose "
-"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a security vulnerability."
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"A free operating system would've let people to fix the bugs for themselves "
-"but now infected people will be compelled to wait for corporations to fix "
-"the problems."
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
"crackers to remotely gain access to the operating system</a> and install "
Index: po/proprietary-insecurity.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.es-en.html,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- po/proprietary-insecurity.es-en.html 2 Aug 2021 09:32:14 -0000
1.43
+++ po/proprietary-insecurity.es-en.html 3 Aug 2021 14:32:38 -0000
1.44
@@ -79,26 +79,6 @@
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
- <li id="M202107190">
- <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
-
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/">Crackers
- used an exploit in Apple iThings to install
- spyware</a> on people's devices, many of them to be journalists, even
- if they were using the latest version of the proprietary operating
- system installed on their iDevice.</p>
-
- <p>Nobody can do anything about these vulnerabilities and people
- have to wait until Apple fixes these security holes, if it decides
- to fix it. A free operating system would let people to identify the
- hole and fix it.</p>
-
- <p><small>Please note that the article
- wrongly refers to crackers as “<a
-
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
- </li>
-
<li id="M202107180">
<!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -1205,7 +1185,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/08/02 09:32:14 $
+$Date: 2021/08/03 14:32:38 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-insecurity.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.es.po,v
retrieving revision 1.123
retrieving revision 1.124
diff -u -b -r1.123 -r1.124
--- po/proprietary-insecurity.es.po 2 Aug 2021 09:32:14 -0000 1.123
+++ po/proprietary-insecurity.es.po 3 Aug 2021 14:32:38 -0000 1.124
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: \n"
@@ -141,41 +141,6 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Delincuentes informáticos han aprovechado un "
-"fallo en las iCosas de Apple para instalar software espÃa</a> en los "
-"dispositivos de los usuarios, muchos de ellos periodistas, aun cuando "
-"estuvieran utilizando la última versión del programa privativo instalado en
"
-"sus dispositivos."
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-"Nadie puede hacer nada frente a estas vulnerabilidades y los usuarios tienen "
-"que esperar a que Apple solucione esos agujeros de seguridad, si es que "
-"decide hacerlo. Un sistema operativo libre permitirÃa a la gente identificar
"
-"el agujero y solucionar el problema."
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-"<small>Advierta que en ese artÃculo se refieren erróneamente a los "
-"«<cite>crackers</cite>» como <a href=\"/philosophy/words-to-avoid.es."
-"html#Hacker\">«<cite>hackers</cite>»</a></small>"
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -202,6 +167,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+"<small>Advierta que en ese artÃculo se refieren erróneamente a los "
+"«<cite>crackers</cite>» como <a href=\"/philosophy/words-to-avoid.es."
+"html#Hacker\">«<cite>hackers</cite>»</a></small>"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
"crackers to remotely gain access to the operating system</a> and install "
@@ -1830,3 +1804,27 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Ãltima actualización:"
+
+#~ msgid ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~ "used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings "
+#~ "to install spyware</a> on people's devices, many of them to be "
+#~ "journalists, even if they were using the latest version of the "
+#~ "proprietary operating system installed on their iDevice."
+#~ msgstr ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~ "used-to-spy-on-journalists/\">Delincuentes informáticos han aprovechado "
+#~ "un fallo en las iCosas de Apple para instalar software espÃa</a> en los "
+#~ "dispositivos de los usuarios, muchos de ellos periodistas, aun cuando "
+#~ "estuvieran utilizando la última versión del programa privativo instalado
"
+#~ "en sus dispositivos."
+
+#~ msgid ""
+#~ "Nobody can do anything about these vulnerabilities and people have to "
+#~ "wait until Apple fixes these security holes, if it decides to fix it. A "
+#~ "free operating system would let people to identify the hole and fix it."
+#~ msgstr ""
+#~ "Nadie puede hacer nada frente a estas vulnerabilidades y los usuarios "
+#~ "tienen que esperar a que Apple solucione esos agujeros de seguridad, si "
+#~ "es que decide hacerlo. Un sistema operativo libre permitirÃa a la gente "
+#~ "identificar el agujero y solucionar el problema."
Index: po/proprietary-insecurity.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr-en.html,v
retrieving revision 1.122
retrieving revision 1.123
diff -u -b -r1.122 -r1.123
--- po/proprietary-insecurity.fr-en.html 1 Aug 2021 18:31:03 -0000
1.122
+++ po/proprietary-insecurity.fr-en.html 3 Aug 2021 14:32:38 -0000
1.123
@@ -79,26 +79,6 @@
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
- <li id="M202107190">
- <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
-
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/">Crackers
- used an exploit in Apple iThings to install
- spyware</a> on people's devices, many of them to be journalists, even
- if they were using the latest version of the proprietary operating
- system installed on their iDevice.</p>
-
- <p>Nobody can do anything about these vulnerabilities and people
- have to wait until Apple fixes these security holes, if it decides
- to fix it. A free operating system would let people to identify the
- hole and fix it.</p>
-
- <p><small>Please note that the article
- wrongly refers to crackers as “<a
-
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
- </li>
-
<li id="M202107180">
<!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -1205,7 +1185,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/08/01 18:31:03 $
+$Date: 2021/08/03 14:32:38 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.272
retrieving revision 1.273
diff -u -b -r1.272 -r1.273
--- po/proprietary-insecurity.fr.po 1 Aug 2021 20:04:32 -0000 1.272
+++ po/proprietary-insecurity.fr.po 3 Aug 2021 14:32:38 -0000 1.273
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
"PO-Revision-Date: 2021-08-01 19:59+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -141,39 +141,6 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Des crackers ont exploité une faille des "
-"iTrucs pour installer un logiciel espion</a> sur des appareils Apple dont "
-"beaucoup appartenaient à des journalistes, et ceci même quand leur système
"
-"d'exploitation était parfaitement à jour."
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-"Personne ne peut rien y faire. On doit attendre qu'Apple corrige cette "
-"vulnérabilité, si c'est sa décision. Un système d'exploitation libre "
-"laisserait aux gens la possibilité d'identifier les failles de sécurité et
"
-"de les corriger."
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-"<small>(Notez que cet article utilise le terme « <a
href=\"/philosophy/words-"
-"to-avoid.html#Hacker\">hackers</a> » à mauvais escient.)</small>"
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -198,6 +165,14 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+"<small>(Notez que cet article utilise le terme « <a
href=\"/philosophy/words-"
+"to-avoid.html#Hacker\">hackers</a> » à mauvais escient.)</small>"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
"crackers to remotely gain access to the operating system</a> and install "
@@ -1823,3 +1798,26 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~ "used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings "
+#~ "to install spyware</a> on people's devices, many of them to be "
+#~ "journalists, even if they were using the latest version of the "
+#~ "proprietary operating system installed on their iDevice."
+#~ msgstr ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~ "used-to-spy-on-journalists/\">Des crackers ont exploité une faille des "
+#~ "iTrucs pour installer un logiciel espion</a> sur des appareils Apple dont "
+#~ "beaucoup appartenaient à des journalistes, et ceci même quand leur "
+#~ "système d'exploitation était parfaitement à jour."
+
+#~ msgid ""
+#~ "Nobody can do anything about these vulnerabilities and people have to "
+#~ "wait until Apple fixes these security holes, if it decides to fix it. A "
+#~ "free operating system would let people to identify the hole and fix it."
+#~ msgstr ""
+#~ "Personne ne peut rien y faire. On doit attendre qu'Apple corrige cette "
+#~ "vulnérabilité, si c'est sa décision. Un système d'exploitation libre "
+#~ "laisserait aux gens la possibilité d'identifier les failles de sécurité
"
+#~ "et de les corriger."
Index: po/proprietary-insecurity.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it-diff.html,v
retrieving revision 1.101
retrieving revision 1.102
diff -u -b -r1.101 -r1.102
--- po/proprietary-insecurity.it-diff.html 1 Aug 2021 17:32:26 -0000
1.101
+++ po/proprietary-insecurity.it-diff.html 3 Aug 2021 14:32:38 -0000
1.102
@@ -76,47 +76,28 @@
the handling</em></ins></span> of
<span class="removed"><del><strong>proprietary</strong></del></span> <span
class="inserted"><ins><em>the bugs: free</em></ins></span> software <span
class="inserted"><ins><em>users are able to study the
program and/or fix the bugs they find, often in communities</em></ins></span>
as <span class="removed"><del><strong>perfect, but</strong></del></span> <span
class="inserted"><ins><em>they are
-able to share</em></ins></span> the <span
class="removed"><del><strong>press</strong></del></span> <span
class="inserted"><ins><em>program, while proprietary program users are forced to
+able to share the program, while proprietary program users are forced to
rely on the program's developer for fixes.</p>
-<p>If the developer does not care to fix the problem
—</em></ins></span> often <span
class="removed"><del><strong>implicitly</strong></del></span> <span
class="inserted"><ins><em>the case for
+<p>If</em></ins></span> the <span
class="removed"><del><strong>press</strong></del></span> <span
class="inserted"><ins><em>developer does not care to fix the problem
—</em></ins></span> often <span
class="removed"><del><strong>implicitly</strong></del></span> <span
class="inserted"><ins><em>the case for
embedded software and old releases — the users are sunk. But if the
-developer</em></ins></span> does <span class="inserted"><ins><em>send a
corrected version, it may contain new malicious
+developer</em></ins></span> does
+<span class="removed"><del><strong>that whenever</strong></del></span> <span
class="inserted"><ins><em>send</em></ins></span> a <span
class="removed"><del><strong>security hole</strong></del></span> <span
class="inserted"><ins><em>corrected version, it may contain new malicious
functionalities as well as bug fixes.</p>
<div class="important">
-<p>If you know of an example</em></ins></span> that <span
class="removed"><del><strong>whenever</strong></del></span> <span
class="inserted"><ins><em>ought to be in this page but isn't
+<p>If you know of an example that ought to be</em></ins></span> in <span
class="inserted"><ins><em>this page but isn't
here, please write
to <a
href="mailto:webmasters@gnu.org"><webmasters@gnu.org></a>
-to inform us. Please include the URL of</em></ins></span> a <span
class="inserted"><ins><em>trustworthy reference or two
+to inform us. Please include the URL of a trustworthy reference or two
to serve as specific substantiation.</p>
</div>
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
- <li id="M202107190">
- <!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
-
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/">Crackers
- used an exploit in Apple iThings to install
- spyware</a> on people's devices, many of them to be journalists, even
- if they were using the latest version of the proprietary operating
- system installed on their iDevice.</p>
-
- <p>Nobody can do anything about these vulnerabilities and people
- have to wait until Apple fixes these</em></ins></span> security <span
class="inserted"><ins><em>holes, if it decides
- to fix it. A free operating system would let people to identify
the</em></ins></span>
- hole <span class="removed"><del><strong>in</strong></del></span> <span
class="inserted"><ins><em>and fix it.</p>
-
- <p><small>Please note that the article
- wrongly refers to crackers as “<a
-
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
- </li>
-
<li id="M202107180">
<!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -178,7 +159,7 @@
<li id="M202105040">
<!--#set var="DATE" value='<small
class="date-tag">2021-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A motorcycle company named Klim is selling airbag
+ <p>A motorcycle company named Klim</em></ins></span> is <span
class="removed"><del><strong>discovered.</strong></del></span> <span
class="inserted"><ins><em>selling airbag
vests with different payment methods, one of them is through a <a
href="https://www.vice.com/en/article/93yyyd/this-motorcycle-airbag-vest-will-stop-working-if-you-miss-a-payment">proprietary
subscription-based option that will block the vest from inflating if
@@ -196,7 +177,7 @@
up with private companies to monitor American citizens' private online
activity and digital communications</a>.</p>
- <p>What creates the opportunity to try this</em></ins></span> is
<span class="removed"><del><strong>discovered.</strong></del></span> <span
class="inserted"><ins><em>the fact that these
+ <p>What creates the opportunity to try this is the fact that these
companies are already snooping on users' private activities. That
in turn is due to people's use of nonfree software which snoops,
and online dis-services which snoop.</p>
@@ -210,14 +191,14 @@
be used to launch remote code execution (RCE) attacks</a> has been
disclosed by researchers.</em></ins></span> The
<span class="removed"><del><strong>examples below show</strong></del></span>
<span class="inserted"><ins><em>researchers demonstrated a three-bug
- attack chain</em></ins></span> that <span class="inserted"><ins><em>caused
an RCE on a target machine, all this without
+ attack chain that caused an RCE on a target machine, all this without
any form of user interaction.</p>
</li>
<li id="M202103090">
<!--#set var="DATE" value='<small
class="date-tag">2021-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p><a
href="https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach-of-150-000-security-cams">Over
150 thousand security cameras that used Verkada
+ <p><a
href="https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach-of-150-000-security-cams">Over
150 thousand security cameras</em></ins></span> that <span
class="inserted"><ins><em>used Verkada
company's</em></ins></span> proprietary software <span
class="removed"><del><strong>isn't perfect,</strong></del></span> <span
class="inserted"><ins><em>are cracked</a> by a major security
breach. Crackers have had access to security archives of various
gyms, hospitals, jails, schools,</em></ins></span> and <span
class="inserted"><ins><em>police stations that have used
@@ -225,9 +206,9 @@
<p><a
href="/philosophy/surveillance-vs-democracy.html">It</em></ins></span> is
<span class="removed"><del><strong>often quite sloppy.</p>
-<p>It would be equally incorrect</strong></del></span> <span
class="inserted"><ins><em>injustice
- to the public</a> for gyms, stores, hospitals, jails, and
schools</em></ins></span> to <span
class="removed"><del><strong>compare</strong></del></span>
- <span class="inserted"><ins><em>hand “security” footage to a
company from which the government can
+<p>It would be equally incorrect</strong></del></span> <span
class="inserted"><ins><em>injustice</em></ins></span>
+ to <span class="removed"><del><strong>compare</strong></del></span> <span
class="inserted"><ins><em>the public</a> for gyms, stores, hospitals,
jails, and schools to
+ hand “security” footage to a company from which the government
can
collect it at any time, without even telling them.</p>
<p><small>Please note that the article
@@ -394,7 +375,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Some security breakers (wrongly referred in this article as <a
href="/philosophy/words-to-avoid.html#Hacker">“hackers”</a>)
- managed to interfere the Amazon Ring proprietary system, and <a
+ managed to interfere the Amazon Ring proprietary system,</em></ins></span>
and <span class="inserted"><ins><em><a
href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras">access
its camera, speakers and microphones</a>.</p>
</li>
@@ -405,7 +386,7 @@
<p>Internet-tethered Amazon Ring had
a security vulnerability that enabled attackers to <a
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
- access the user's wifi password</a>,</em></ins></span> and <span
class="inserted"><ins><em>snoop on the household
+ access the user's wifi password</a>, and snoop on the household
through connected surveillance devices.</p>
<p>Knowledge of the wifi password would</em></ins></span> not <span
class="removed"><del><strong>culpable.</strong></del></span> <span
class="inserted"><ins><em>be sufficient to carry
@@ -684,16 +665,16 @@
enables malware authors to capture keystrokes without taking the risk
of being classified as malicious task by AV
<span class="removed"><del><strong>heuristics”.
- </p></strong></del></span> <span
class="inserted"><ins><em>heuristics”.</p></em></ins></span>
- </li>
-<span class="removed"><del><strong><li>
+ </p>
+</li>
+<li>
<p>The proprietary code that runs pacemakers, insulin pumps, and other
medical devices is <a
href="http://www.bbc.co.uk/news/technology-40042584">
-full of gross security faults</a>.</p>
-</li>
+full of gross security faults</a>.</p></strong></del></span> <span
class="inserted"><ins><em>heuristics”.</p></em></ins></span>
+ </li>
-<li></strong></del></span>
+<span class="removed"><del><strong><li></strong></del></span>
<span class="inserted"><ins><em><li id="M201705120">
<!--#set var="DATE" value='<small
class="date-tag">2017-05</small>'
@@ -1098,19 +1079,19 @@
can't trust it. Western Digital's “My Passport” drives <a
<span
class="removed"><del><strong>href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">have</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.vice.com/en/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">
have</em></ins></span> a back <span
class="removed"><del><strong>door</a>.
-</p></strong></del></span> <span
class="inserted"><ins><em>door</a>.</p></em></ins></span>
- </li>
+</p>
+</li>
-<span class="removed"><del><strong><li>
+<li>
<p>
Mac OS X had an
<a
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
intentional local back door for 4 years</a>, which could be
exploited by attackers to gain root privileges.
-</p>
-</li>
+</p></strong></del></span> <span
class="inserted"><ins><em>door</a>.</p></em></ins></span>
+ </li>
-<li></strong></del></span>
+<span class="removed"><del><strong><li></strong></del></span>
<span class="inserted"><ins><em><li id="M201508120">
<!--#set var="DATE" value='<small
class="date-tag">2015-08</small>'
@@ -1289,12 +1270,10 @@
from the state. Quite the contrary: confiding your data to someone
else's server, if not first encrypted by you with free software,
undermines your <span class="removed"><del><strong>rights.
-</p></strong></del></span> <span
class="inserted"><ins><em>rights.</p></em></ins></span>
+</p></strong></del></span> <span
class="inserted"><ins><em>rights.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201404250">
+ <li id="M201404250">
<!--#set var="DATE" value='<small
class="date-tag">2014-04</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Lots of <a
@@ -1307,10 +1286,12 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The <a
href="http://arstechnica.com/security/2014/02/crypto-weaknesses-in-whatsapp-the-kind-of-stuff-the-nsa-would-love/">insecurity
- of WhatsApp</a> makes eavesdropping a snap.</p>
+ of WhatsApp</a> makes eavesdropping a
snap.</p></em></ins></span>
</li>
- <li id="M201312290">
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201312290">
<!--#set var="DATE" value='<small
class="date-tag">2013-12</small>'
--><!--#echo encoding="none" var="DATE" --></em></ins></span>
<p><a href="http://www.bunniestudios.com/blog/?p=3554"> Some
flash
@@ -1495,7 +1476,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/08/01 17:32:26 $
+$Date: 2021/08/03 14:32:38 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.203
retrieving revision 1.204
diff -u -b -r1.203 -r1.204
--- po/proprietary-insecurity.it.po 1 Aug 2021 17:32:26 -0000 1.203
+++ po/proprietary-insecurity.it.po 3 Aug 2021 14:32:38 -0000 1.204
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
"PO-Revision-Date: 2017-12-31 13:13+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -165,28 +165,6 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -203,6 +181,12 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
"crackers to remotely gain access to the operating system</a> and install "
Index: po/proprietary-insecurity.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja-diff.html,v
retrieving revision 1.122
retrieving revision 1.123
diff -u -b -r1.122 -r1.123
--- po/proprietary-insecurity.ja-diff.html 1 Aug 2021 17:32:26 -0000
1.122
+++ po/proprietary-insecurity.ja-diff.html 3 Aug 2021 14:32:38 -0000
1.123
@@ -97,26 +97,6 @@
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
- <li id="M202107190">
- <!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
-
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/">Crackers
- used an exploit in Apple iThings to install
- spyware</a> on people's devices, many of them to be journalists, even
- if they were using the latest version of the proprietary operating
- system installed on their iDevice.</p>
-
- <p>Nobody can do anything about these vulnerabilities and people
- have to wait until Apple fixes these security holes, if it decides
- to fix it. A free operating system would let people to identify the
- hole and fix it.</p>
-
- <p><small>Please note that the article
- wrongly refers to crackers as “<a
-
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
- </li>
-
<li id="M202107180">
<!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -447,9 +427,10 @@
<!--#set var="DATE" value='<small
class="date-tag">2019-07</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Many Android apps can track
- users' movements even when the user says <a
+ users' movements</em></ins></span> even <span
class="removed"><del><strong>introduce</strong></del></span> <span
class="inserted"><ins><em>when the user says <a
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
- not to allow them access to locations</a>.</p>
+ not to allow</em></ins></span> them
+<span class="removed"><del><strong>deliberately,</strong></del></span> <span
class="inserted"><ins><em>access to locations</a>.</p>
<p>This involves an apparently unintentional weakness in Android,
exploited intentionally by malicious apps.</p>
@@ -464,7 +445,7 @@
companies from figuring out how those attacks work.</p>
<p>Apple's censorship of apps is fundamentally unjust, and would be
- inexcusable</em></ins></span> even <span
class="removed"><del><strong>introduce</strong></del></span> <span
class="inserted"><ins><em>if it didn't lead to security threats as
well.</p>
+ inexcusable even if it didn't lead to security threats as well.</p>
</li>
<li id="M201903210">
@@ -624,8 +605,7 @@
<p>That is a malicious functionality, but in addition it
is a gross insecurity since anyone, including malicious crackers, <a
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">can
- find those accounts and use</em></ins></span> them
-<span class="removed"><del><strong>deliberately,</strong></del></span> <span
class="inserted"><ins><em>to get into users' cameras</a>.</p>
+ find those accounts and use them to get into users'
cameras</a>.</p>
</li>
<li id="M201706050">
@@ -1115,17 +1095,17 @@
<p>Depending</em></ins></span> on what drug is being infused, the
insecurity could open
the door to <span class="removed"><del><strong>murder.
-</p></strong></del></span> <span
class="inserted"><ins><em>murder.</p></em></ins></span>
- </li>
+</p>
+</li>
-<span class="removed"><del><strong><li>
+<li>
<p>
Due to bad security in a drug pump, crackers could use it to
<a
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/">kill
patients</a>.
-</p>
-</li>
+</p></strong></del></span> <span
class="inserted"><ins><em>murder.</p></em></ins></span>
+ </li>
-<li>
+<span class="removed"><del><strong><li>
<p></strong></del></span>
<span class="inserted"><ins><em><li id="M201504090">
@@ -1216,12 +1196,10 @@
from the state. Quite the contrary: confiding your data to someone
else's server, if not first encrypted by you with free software,
undermines your <span class="removed"><del><strong>rights.
-</p></strong></del></span> <span
class="inserted"><ins><em>rights.</p></em></ins></span>
+</p></strong></del></span> <span
class="inserted"><ins><em>rights.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201404250">
+ <li id="M201404250">
<!--#set var="DATE" value='<small
class="date-tag">2014-04</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Lots of <a
@@ -1234,10 +1212,12 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The <a
href="http://arstechnica.com/security/2014/02/crypto-weaknesses-in-whatsapp-the-kind-of-stuff-the-nsa-would-love/">insecurity
- of WhatsApp</a> makes eavesdropping a snap.</p>
+ of WhatsApp</a> makes eavesdropping a
snap.</p></em></ins></span>
</li>
- <li id="M201312290">
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201312290">
<!--#set var="DATE" value='<small
class="date-tag">2013-12</small>'
--><!--#echo encoding="none" var="DATE" --></em></ins></span>
<p><a href="http://www.bunniestudios.com/blog/?p=3554"> Some
flash
@@ -1422,7 +1402,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/08/01 17:32:26 $
+$Date: 2021/08/03 14:32:38 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-insecurity.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja.po,v
retrieving revision 1.175
retrieving revision 1.176
diff -u -b -r1.175 -r1.176
--- po/proprietary-insecurity.ja.po 1 Aug 2021 17:32:26 -0000 1.175
+++ po/proprietary-insecurity.ja.po 3 Aug 2021 14:32:38 -0000 1.176
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
"PO-Revision-Date: 2016-10-31 12:56+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -141,28 +141,6 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -179,6 +157,12 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
"crackers to remotely gain access to the operating system</a> and install "
Index: po/proprietary-insecurity.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pot,v
retrieving revision 1.141
retrieving revision 1.142
diff -u -b -r1.141 -r1.142
--- po/proprietary-insecurity.pot 1 Aug 2021 17:32:26 -0000 1.141
+++ po/proprietary-insecurity.pot 3 Aug 2021 14:32:38 -0000 1.142
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -107,28 +107,6 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
"<a "
-"href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/\">Crackers
"
-"used an exploit in Apple iThings to install spyware</a> on people's devices, "
-"many of them to be journalists, even if they were using the latest version "
-"of the proprietary operating system installed on their iDevice."
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"<a "
"href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones\">
"
"The pegasus spyware used vulnerabilities on proprietary smartphone operating "
"systems</a> to impose surveillance on people. It can record people's calls, "
@@ -144,6 +122,12 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"A newly found Microsoft Windows vulnerability <a "
"href=\"https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">
"
"can allow crackers to remotely gain access to the operating system</a> and "
Index: po/proprietary-insecurity.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pt-br.po,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- po/proprietary-insecurity.pt-br.po 1 Aug 2021 17:32:26 -0000 1.12
+++ po/proprietary-insecurity.pt-br.po 3 Aug 2021 14:32:38 -0000 1.13
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
"PO-Revision-Date: 2021-06-26 09:40-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -132,48 +132,6 @@
#. type: Content of: <div><div><ul><li><p>
#, fuzzy
#| msgid ""
-#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
-#| "of them to be journalists, even if they were using the latest version of "
-#| "the proprietary operating system installed on their iDevice."
-msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\"> <em>Crackers</em> usaram uma <i lang=\"en"
-"\">exploit</i> de dia zero e clique zero em iCoisas da Apple para instalar "
-"<em>spyware</em></a> nos dispositivos das pessoas, muitas delas para serem "
-"jornalistas, mesmo que estivessem usando a versão mais recente do sistema "
-"operacional privativo instalado em seu iDispositivo."
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-"Ninguém pode fazer nada sobre essas vulnerabilidades e as pessoas têm que "
-"esperar até que a Apple conserte essas falhas de segurança, se decidir "
-"consertá-las. Um sistema operacional livre permitiria que as pessoas "
-"identificassem o problema e o consertassem."
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-"<small>(Note que o artigo, de forma incorreta, refere-se a <em>crackers</em> "
-"como â<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>â.)</"
-"small>"
-
-#. type: Content of: <div><div><ul><li><p>
-#, fuzzy
-#| msgid ""
#| "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
#| "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
#| "vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -213,6 +171,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+"<small>(Note que o artigo, de forma incorreta, refere-se a <em>crackers</em> "
+"como â<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>â.)</"
+"small>"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
"crackers to remotely gain access to the operating system</a> and install "
@@ -1818,6 +1785,37 @@
#, fuzzy
#~| msgid ""
+#~| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#~| "exploit in Apple iThings to install spyware</a> on people's devices, "
+#~| "many of them to be journalists, even if they were using the latest "
+#~| "version of the proprietary operating system installed on their iDevice."
+#~ msgid ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~ "used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings "
+#~ "to install spyware</a> on people's devices, many of them to be "
+#~ "journalists, even if they were using the latest version of the "
+#~ "proprietary operating system installed on their iDevice."
+#~ msgstr ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~ "used-to-spy-on-journalists/\"> <em>Crackers</em> usaram uma <i lang=\"en"
+#~ "\">exploit</i> de dia zero e clique zero em iCoisas da Apple para "
+#~ "instalar <em>spyware</em></a> nos dispositivos das pessoas, muitas delas "
+#~ "para serem jornalistas, mesmo que estivessem usando a versão mais recente
"
+#~ "do sistema operacional privativo instalado em seu iDispositivo."
+
+#~ msgid ""
+#~ "Nobody can do anything about these vulnerabilities and people have to "
+#~ "wait until Apple fixes these security holes, if it decides to fix it. A "
+#~ "free operating system would let people to identify the hole and fix it."
+#~ msgstr ""
+#~ "Ninguém pode fazer nada sobre essas vulnerabilidades e as pessoas têm
que "
+#~ "esperar até que a Apple conserte essas falhas de segurança, se decidir "
+#~ "consertá-las. Um sistema operacional livre permitiria que as pessoas "
+#~ "identificassem o problema e o consertassem."
+
+#, fuzzy
+#~| msgid ""
#~| "All complex programs, whether free or proprietary, contain bugs. What "
#~| "makes bugs more dangerous in proprietary software is that users are "
#~| "<em>helpless to fix any security problems that arise</em>. Keeping the "
Index: po/proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.314
retrieving revision 1.315
diff -u -b -r1.314 -r1.315
--- po/proprietary-insecurity.ru.po 1 Aug 2021 17:32:26 -0000 1.314
+++ po/proprietary-insecurity.ru.po 3 Aug 2021 14:32:38 -0000 1.315
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -171,54 +171,6 @@
#. type: Content of: <div><div><ul><li><p>
# | <a
-# |
href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/\">Crackers
-# | used [-a zero-day and zero-click-] {+an+} exploit in Apple iThings to
-# | install spyware</a> on people's devices, many of them to be journalists,
-# | even if they were using the latest version of the proprietary operating
-# | system installed on their iDevice.
-#, fuzzy
-#| msgid ""
-#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
-#| "of them to be journalists, even if they were using the latest version of "
-#| "the proprietary operating system installed on their iDevice."
-msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">ÐзломÑики пÑименÑли
безÑелÑковÑÑ ÑÑзвимоÑÑÑ "
-"нÑлевого Ð´Ð½Ñ Ð² ай-ÑÑÑÑкаÑ
Apple длÑ
ÑÑÑановки ÑпионÑкиÑ
пÑогÑамм</a> на "
-"ÑÑÑÑойÑÑваÑ
лÑдей (многие из коÑоÑÑÑ
— жÑÑналиÑÑÑ), даже еÑли Ñе "
-"полÑзовалиÑÑ Ñамой поздней веÑÑией
неÑвободной опеÑаÑионной ÑиÑÑемÑ, "
-"ÑÑÑановленной на иÑ
ÑÑÑÑойÑÑве."
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-"ÐикÑо ниÑего не Ð¼Ð¾Ð¶ÐµÑ Ð¿Ð¾Ð´ÐµÐ»Ð°ÑÑ Ñ ÑÑими
ÑÑзвимоÑÑÑми, и лÑди вÑнÑÐ¶Ð´ÐµÐ½Ñ Ð¶Ð´Ð°ÑÑ, "
-"пока Apple ÑÑÑÑÐ°Ð½Ð¸Ñ ÑÑи пÑоÑеÑ
и в заÑиÑе,
еÑли ÑÑа ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ ÑеÑÐ¸Ñ ÑÑÑÑаниÑÑ "
-"иÑ
. Ð¡Ð²Ð¾Ð±Ð¾Ð´Ð½Ð°Ñ Ð¾Ð¿ÐµÑаÑÐ¸Ð¾Ð½Ð½Ð°Ñ ÑиÑÑема
позволила Ð±Ñ Ð»ÑдÑм вÑÑвиÑÑ Ð¿ÑоÑеÑ
Ñ Ð¸ "
-"ÑÑÑÑаниÑÑ ÐµÐµ."
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-"<small>ÐамеÑÑÑе, ÑÑо в ÑÑаÑÑе ÑеÑмин <a
href=\"/philosophy/words-to-avoid."
-"html#Hacker\">“Ñ
акеÑÑ”</a> невеÑно
иÑполÑзÑеÑÑÑ Ð´Ð»Ñ Ð¾Ð±Ð¾Ð·Ð½Ð°ÑÐµÐ½Ð¸Ñ "
-"взломÑиков.</small>"
-
-#. type: Content of: <div><div><ul><li><p>
-# | <a
# |
href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones\">
# | The pegasus spyware used vulnerabilities on proprietary smartphone
# | operating systems</a> to impose surveillance on people. It can record
@@ -265,6 +217,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+"<small>ÐамеÑÑÑе, ÑÑо в ÑÑаÑÑе ÑеÑмин <a
href=\"/philosophy/words-to-avoid."
+"html#Hacker\">“Ñ
акеÑÑ”</a> невеÑно
иÑполÑзÑеÑÑÑ Ð´Ð»Ñ Ð¾Ð±Ð¾Ð·Ð½Ð°ÑÐµÐ½Ð¸Ñ "
+"взломÑиков.</small>"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
"crackers to remotely gain access to the operating system</a> and install "
@@ -1874,6 +1835,37 @@
msgid "Updated:"
msgstr "Ðбновлено:"
+#, fuzzy
+#~| msgid ""
+#~| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#~| "exploit in Apple iThings to install spyware</a> on people's devices, "
+#~| "many of them to be journalists, even if they were using the latest "
+#~| "version of the proprietary operating system installed on their iDevice."
+#~ msgid ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~ "used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings "
+#~ "to install spyware</a> on people's devices, many of them to be "
+#~ "journalists, even if they were using the latest version of the "
+#~ "proprietary operating system installed on their iDevice."
+#~ msgstr ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~ "used-to-spy-on-journalists/\">ÐзломÑики пÑименÑли
безÑелÑковÑÑ ÑÑзвимоÑÑÑ "
+#~ "нÑлевого Ð´Ð½Ñ Ð² ай-ÑÑÑÑкаÑ
Apple длÑ
ÑÑÑановки ÑпионÑкиÑ
пÑогÑамм</a> на "
+#~ "ÑÑÑÑойÑÑваÑ
лÑдей (многие из коÑоÑÑÑ
— жÑÑналиÑÑÑ), даже еÑли "
+#~ "Ñе полÑзовалиÑÑ Ñамой поздней веÑÑией
неÑвободной опеÑаÑионной ÑиÑÑемÑ, "
+#~ "ÑÑÑановленной на иÑ
ÑÑÑÑойÑÑве."
+
+#~ msgid ""
+#~ "Nobody can do anything about these vulnerabilities and people have to "
+#~ "wait until Apple fixes these security holes, if it decides to fix it. A "
+#~ "free operating system would let people to identify the hole and fix it."
+#~ msgstr ""
+#~ "ÐикÑо ниÑего не Ð¼Ð¾Ð¶ÐµÑ Ð¿Ð¾Ð´ÐµÐ»Ð°ÑÑ Ñ ÑÑими
ÑÑзвимоÑÑÑми, и лÑди вÑнÑÐ¶Ð´ÐµÐ½Ñ "
+#~ "ждаÑÑ, пока Apple ÑÑÑÑÐ°Ð½Ð¸Ñ ÑÑи пÑоÑеÑ
и в
заÑиÑе, еÑли ÑÑа ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ ÑеÑÐ¸Ñ "
+#~ "ÑÑÑÑаниÑÑ Ð¸Ñ
. Ð¡Ð²Ð¾Ð±Ð¾Ð´Ð½Ð°Ñ Ð¾Ð¿ÐµÑаÑионнаÑ
ÑиÑÑема позволила Ð±Ñ Ð»ÑдÑм вÑÑвиÑÑ "
+#~ "пÑоÑеÑ
Ñ Ð¸ ÑÑÑÑаниÑÑ ÐµÐµ."
+
#~ msgid ""
#~ "The point of this page is not to imply that free software is immune to "
#~ "bugs or insecurities; it's to show that <em>proprietary software has bugs "
Index: po/proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.291
retrieving revision 1.292
diff -u -b -r1.291 -r1.292
--- po/proprietary.de-diff.html 1 Aug 2021 17:32:26 -0000 1.291
+++ po/proprietary.de-diff.html 3 Aug 2021 14:32:38 -0000 1.292
@@ -28,8 +28,8 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+#about-section { font-size: 1.1em; font-style: italic; }
table#TOC {
display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%; width: max-content;
@@ -66,13 +66,13 @@
text-decoration: none;
}
#TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>-->
+#TOC a:hover { text-decoration: underline; }
+-->
</style>
<style type="text/css" media="print,screen">
- .reduced-width { width: 55em; }
-</style></em></ins></span>
+ .reduced-width</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>width: 55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<span class="inserted"><ins><em><div
class="reduced-width"></em></ins></span>
@@ -200,10 +200,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -224,26 +224,6 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
- <li id="M202107190">
- <!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
-
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/">Crackers
- used an exploit in Apple iThings to install
- spyware</a> on people's devices, many of them to be journalists, even
- if they were using the latest version of the proprietary operating
- system installed on their iDevice.</p>
-
- <p>Nobody can do anything about these vulnerabilities and people
- have to wait until Apple fixes these security holes, if it decides
- to fix it. A free operating system would let people to identify the
- hole and fix it.</p>
-
- <p><small>Please note that the article
- wrongly refers to crackers as “<a
-
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
- </li>
-
<li id="M202107180">
<!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -316,6 +296,16 @@
features (and the proprietary software that is their entry path)
to the point that even the most powerful companies don't dare.</p>
</li>
+
+ <li id="M202106190">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-06</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://arstechnica.com/gadgets/2021/06/even-creepier-covid-tracking-google-silently-pushed-app-to-users-phones/">Google
+ automatically installed an app on many proprietary Android
phones</a>. The app
+ might or might not do malicious things but the power Google has over
proprietary
+ Android phones is dangerous.</p>
+ </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -379,7 +369,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/08/01 17:32:26 $
+$Date: 2021/08/03 14:32:38 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.308
retrieving revision 1.309
diff -u -b -r1.308 -r1.309
--- po/proprietary.de.po 1 Aug 2021 17:32:26 -0000 1.308
+++ po/proprietary.de.po 3 Aug 2021 14:32:38 -0000 1.309
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -480,18 +480,18 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a security vulnerability."
msgstr ""
#. type: Content of: <div><ul><li><p>
msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people will be compelled to wait for corporations to fix "
+"the problems."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -514,22 +514,6 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
-"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
-"vulnerabilities on proprietary smartphone operating systems</a> to impose "
-"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a security vulnerability."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"A free operating system would've let people to fix the bugs for themselves "
-"but now infected people will be compelled to wait for corporations to fix "
-"the problems."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
"crackers to remotely gain access to the operating system</a> and install "
@@ -584,6 +568,15 @@
"the most powerful companies don't dare."
msgstr ""
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-"
+"tracking-google-silently-pushed-app-to-users-phones/\">Google automatically "
+"installed an app on many proprietary Android phones</a>. The app might or "
+"might not do malicious things but the power Google has over proprietary "
+"Android phones is dangerous."
+msgstr ""
+
#. type: Content of: <div><p>
# | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
# | devices</a>-] {+href=\"/proprietary/all.html\">More items…</a>+}
Index: po/proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.500
retrieving revision 1.501
diff -u -b -r1.500 -r1.501
--- po/proprietary.es.po 2 Aug 2021 09:32:14 -0000 1.500
+++ po/proprietary.es.po 3 Aug 2021 14:32:38 -0000 1.501
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-08-03 14:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -341,41 +342,6 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Delincuentes informáticos han aprovechado un "
-"fallo en las iCosas de Apple para instalar software espÃa</a> en los "
-"dispositivos de los usuarios, muchos de ellos periodistas, aun cuando "
-"estuvieran utilizando la última versión del programa privativo instalado en
"
-"sus dispositivos."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-"Nadie puede hacer nada frente a estas vulnerabilidades y los usuarios tienen "
-"que esperar a que Apple solucione esos agujeros de seguridad, si es que "
-"decide hacerlo. Un sistema operativo libre permitirÃa a la gente identificar
"
-"el agujero y solucionar el problema."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-"<small>(Advierta que en ese artÃculo se refieren erróneamente a los "
-"«<cite>crackers</cite>» como <a href=\"/philosophy/words-to-avoid.es."
-"html#Hacker\">«<cite>hackers</cite>»</a>).</small>"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -402,6 +368,15 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+"<small>(Advierta que en ese artÃculo se refieren erróneamente a los "
+"«<cite>crackers</cite>» como <a href=\"/philosophy/words-to-avoid.es."
+"html#Hacker\">«<cite>hackers</cite>»</a>).</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
"crackers to remotely gain access to the operating system</a> and install "
@@ -487,6 +462,32 @@
"privativo, que es su puerta de entrada) hasta el punto de que ni siquiera "
"las compañÃas más poderosas se atrevan a introducirlas."
+#. type: Content of: <div><ul><li><p>
+# | <a
+# |
href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-tracking-google-silently-pushed-app-to-users-phones/\">Google
+# | automatically installed an app on many {+proprietary+} Android phones</a>.
+# | The app {+might or+} might not do malicious things but the power Google
+# | has over proprietary Android phones is dangerous.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-"
+#| "tracking-google-silently-pushed-app-to-users-phones/\">Google "
+#| "automatically installed an app on many Android phones</a>. The app might "
+#| "not do malicious things but the power Google has over proprietary Android "
+#| "phones is dangerous."
+msgid ""
+"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-"
+"tracking-google-silently-pushed-app-to-users-phones/\">Google automatically "
+"installed an app on many proprietary Android phones</a>. The app might or "
+"might not do malicious things but the power Google has over proprietary "
+"Android phones is dangerous."
+msgstr ""
+"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-"
+"tracking-google-silently-pushed-app-to-users-phones/\">Google ha instalado "
+"automáticamente una aplicación en muchos teléfonos Android</a>. La "
+"aplicación podrÃa no hacer nada malicioso, pero el poder que tiene Google "
+"sobre los teléfonos privativos Android es peligroso."
+
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr "<a href=\"/proprietary/all.html\">Ver más…</a>"
@@ -565,3 +566,27 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Ãltima actualización:"
+
+#~ msgid ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~ "used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings "
+#~ "to install spyware</a> on people's devices, many of them to be "
+#~ "journalists, even if they were using the latest version of the "
+#~ "proprietary operating system installed on their iDevice."
+#~ msgstr ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~ "used-to-spy-on-journalists/\">Delincuentes informáticos han aprovechado "
+#~ "un fallo en las iCosas de Apple para instalar software espÃa</a> en los "
+#~ "dispositivos de los usuarios, muchos de ellos periodistas, aun cuando "
+#~ "estuvieran utilizando la última versión del programa privativo instalado
"
+#~ "en sus dispositivos."
+
+#~ msgid ""
+#~ "Nobody can do anything about these vulnerabilities and people have to "
+#~ "wait until Apple fixes these security holes, if it decides to fix it. A "
+#~ "free operating system would let people to identify the hole and fix it."
+#~ msgstr ""
+#~ "Nadie puede hacer nada frente a estas vulnerabilidades y los usuarios "
+#~ "tienen que esperar a que Apple solucione esos agujeros de seguridad, si "
+#~ "es que decide hacerlo. Un sistema operativo libre permitirÃa a la gente "
+#~ "identificar el agujero y solucionar el problema."
Index: po/proprietary.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr-en.html,v
retrieving revision 1.221
retrieving revision 1.222
diff -u -b -r1.221 -r1.222
--- po/proprietary.fr-en.html 1 Aug 2021 18:31:03 -0000 1.221
+++ po/proprietary.fr-en.html 3 Aug 2021 14:32:38 -0000 1.222
@@ -186,26 +186,6 @@
<h3 id="latest">Latest additions</h3>
<ul class="blurbs">
- <li id="M202107190">
- <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
-
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/">Crackers
- used an exploit in Apple iThings to install
- spyware</a> on people's devices, many of them to be journalists, even
- if they were using the latest version of the proprietary operating
- system installed on their iDevice.</p>
-
- <p>Nobody can do anything about these vulnerabilities and people
- have to wait until Apple fixes these security holes, if it decides
- to fix it. A free operating system would let people to identify the
- hole and fix it.</p>
-
- <p><small>Please note that the article
- wrongly refers to crackers as “<a
-
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
- </li>
-
<li id="M202107180">
<!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -278,6 +258,16 @@
features (and the proprietary software that is their entry path)
to the point that even the most powerful companies don't dare.</p>
</li>
+
+ <li id="M202106190">
+ <!--#set var="DATE" value='<small class="date-tag">2021-06</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://arstechnica.com/gadgets/2021/06/even-creepier-covid-tracking-google-silently-pushed-app-to-users-phones/">Google
+ automatically installed an app on many proprietary Android phones</a>. The
app
+ might or might not do malicious things but the power Google has over
proprietary
+ Android phones is dangerous.</p>
+ </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -340,7 +330,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/08/01 18:31:03 $
+$Date: 2021/08/03 14:32:38 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.524
retrieving revision 1.525
diff -u -b -r1.524 -r1.525
--- po/proprietary.fr.po 1 Aug 2021 18:01:04 -0000 1.524
+++ po/proprietary.fr.po 3 Aug 2021 14:32:38 -0000 1.525
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
"PO-Revision-Date: 2021-08-01 19:59+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -338,39 +338,6 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Des crackers ont exploité une faille des "
-"iTrucs pour installer un logiciel espion</a> sur des appareils Apple dont "
-"beaucoup appartenaient à des journalistes, et ceci même quand leur système
"
-"d'exploitation était parfaitement à jour."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-"Personne ne peut rien y faire. On doit attendre qu'Apple corrige cette "
-"vulnérabilité, si c'est sa décision. Un système d'exploitation libre "
-"laisserait aux gens la possibilité d'identifier les failles de sécurité et
"
-"de les corriger."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-"<small>(Notez que cet article utilise le terme « <a
href=\"/philosophy/words-"
-"to-avoid.html#Hacker\">hackers</a> » à mauvais escient.)</small>"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -395,6 +362,14 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+"<small>(Notez que cet article utilise le terme « <a
href=\"/philosophy/words-"
+"to-avoid.html#Hacker\">hackers</a> » à mauvais escient.)</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
"crackers to remotely gain access to the operating system</a> and install "
@@ -480,6 +455,20 @@
"d'entrée) au point que même les sociétés les plus puissantes n'oseront
plus "
"la braver."
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-"
+"tracking-google-silently-pushed-app-to-users-phones/\">Google automatically "
+"installed an app on many proprietary Android phones</a>. The app might or "
+"might not do malicious things but the power Google has over proprietary "
+"Android phones is dangerous."
+msgstr ""
+"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-"
+"tracking-google-silently-pushed-app-to-users-phones/\">Google a installé "
+"automatiquement une appli sur beaucoup de téléphones Android</a>. L'appli "
+"n'est peut-être pas malveillante, mais le pouvoir que possède Google sur
les "
+"téléphones Android (privateurs) est dangereux."
+
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr "<a href=\"/proprietary/all.html\">Voir plus…</a>"
@@ -552,3 +541,26 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~ "used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings "
+#~ "to install spyware</a> on people's devices, many of them to be "
+#~ "journalists, even if they were using the latest version of the "
+#~ "proprietary operating system installed on their iDevice."
+#~ msgstr ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~ "used-to-spy-on-journalists/\">Des crackers ont exploité une faille des "
+#~ "iTrucs pour installer un logiciel espion</a> sur des appareils Apple dont "
+#~ "beaucoup appartenaient à des journalistes, et ceci même quand leur "
+#~ "système d'exploitation était parfaitement à jour."
+
+#~ msgid ""
+#~ "Nobody can do anything about these vulnerabilities and people have to "
+#~ "wait until Apple fixes these security holes, if it decides to fix it. A "
+#~ "free operating system would let people to identify the hole and fix it."
+#~ msgstr ""
+#~ "Personne ne peut rien y faire. On doit attendre qu'Apple corrige cette "
+#~ "vulnérabilité, si c'est sa décision. Un système d'exploitation libre "
+#~ "laisserait aux gens la possibilité d'identifier les failles de sécurité
"
+#~ "et de les corriger."
Index: po/proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.301
retrieving revision 1.302
diff -u -b -r1.301 -r1.302
--- po/proprietary.it-diff.html 1 Aug 2021 17:32:26 -0000 1.301
+++ po/proprietary.it-diff.html 3 Aug 2021 14:32:38 -0000 1.302
@@ -28,8 +28,8 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+#about-section { font-size: 1.1em; font-style: italic; }
table#TOC {
display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%; width: max-content;
@@ -66,13 +66,13 @@
text-decoration: none;
}
#TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>-->
+#TOC a:hover { text-decoration: underline; }
+-->
</style>
<style type="text/css" media="print,screen">
- .reduced-width { width: 55em; }
-</style></em></ins></span>
+ .reduced-width</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>width: 55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<span class="inserted"><ins><em><div
class="reduced-width"></em></ins></span>
@@ -223,26 +223,6 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
- <li id="M202107190">
- <!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
-
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/">Crackers
- used an exploit in Apple iThings to install
- spyware</a> on people's devices, many of them to be journalists, even
- if they were using the latest version of the proprietary operating
- system installed on their iDevice.</p>
-
- <p>Nobody can do anything about these vulnerabilities and people
- have to wait until Apple fixes these security holes, if it decides
- to fix it. A free operating system would let people to identify the
- hole and fix it.</p>
-
- <p><small>Please note that the article
- wrongly refers to crackers as “<a
-
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
- </li>
-
<li id="M202107180">
<!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -315,6 +295,16 @@
features (and the proprietary software that is their entry path)
to the point that even the most powerful companies don't dare.</p>
</li>
+
+ <li id="M202106190">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-06</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://arstechnica.com/gadgets/2021/06/even-creepier-covid-tracking-google-silently-pushed-app-to-users-phones/">Google
+ automatically installed an app on many proprietary Android
phones</a>. The app
+ might or might not do malicious things but the power Google has over
proprietary
+ Android phones is dangerous.</p>
+ </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -378,7 +368,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/08/01 17:32:26 $
+$Date: 2021/08/03 14:32:38 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.317
retrieving revision 1.318
diff -u -b -r1.317 -r1.318
--- po/proprietary.it.po 1 Aug 2021 17:32:26 -0000 1.317
+++ po/proprietary.it.po 3 Aug 2021 14:32:38 -0000 1.318
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -485,28 +485,6 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -523,6 +501,12 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
"crackers to remotely gain access to the operating system</a> and install "
@@ -577,6 +561,15 @@
"the most powerful companies don't dare."
msgstr ""
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-"
+"tracking-google-silently-pushed-app-to-users-phones/\">Google automatically "
+"installed an app on many proprietary Android phones</a>. The app might or "
+"might not do malicious things but the power Google has over proprietary "
+"Android phones is dangerous."
+msgstr ""
+
#. type: Content of: <div><p>
# | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
# | devices</a>-] {+href=\"/proprietary/all.html\">More items…</a>+}
Index: po/proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.306
retrieving revision 1.307
diff -u -b -r1.306 -r1.307
--- po/proprietary.ja-diff.html 1 Aug 2021 17:32:26 -0000 1.306
+++ po/proprietary.ja-diff.html 3 Aug 2021 14:32:39 -0000 1.307
@@ -29,9 +29,9 @@
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%; width: max-content;
overflow: auto;
border: .2em solid #e0dfda;
@@ -57,13 +57,13 @@
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom:
.5em; margin: 0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
}
-#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration:
none; }
+#TOC a { text-decoration: none; }
#TOC a:hover { text-decoration: underline;</em></ins></span> }
-->
</style>
@@ -166,8 +166,8 @@
<li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary-tethers.html">Tethers</a> (<a
href="#f4">4</a>)</li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html">Tethers</a>
to
-servers</li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-tyrants.html">Tyrants</a> (<a
href="#f5">5</a>)</li>
- <li><a href="/proprietary/potential-malware.html">In the
pipe</a></li>
+servers</li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-tyrants.html">Tyrants</a> (<a
href="#f5">5</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/potential-malware.html">In the
pipe</a></li>
</ul>
</td>
<td>
@@ -179,8 +179,8 @@
<li><a
href="/proprietary/malware-webpages.html">Webpages</a></li>
<li><a
href="/proprietary/malware-in-online-conferencing.html">Conferencing</a></li>
</ul>
- <ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li>
+ <ul>
+ <li><a
href="/proprietary/malware-adobe.html">Adobe</a></li>
<li><a
href="/proprietary/malware-amazon.html">Amazon</a></li>
<li><a
href="/proprietary/malware-apple.html">Apple</a></li>
<li><a
href="/proprietary/malware-google.html">Google</a></li>
@@ -205,10 +205,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -228,26 +228,6 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
- <li id="M202107190">
- <!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
-
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/">Crackers
- used an exploit in Apple iThings to install
- spyware</a> on people's devices, many of them to be journalists, even
- if they were using the latest version of the proprietary operating
- system installed on their iDevice.</p>
-
- <p>Nobody can do anything about these vulnerabilities and people
- have to wait until Apple fixes these security holes, if it decides
- to fix it. A free operating system would let people to identify the
- hole and fix it.</p>
-
- <p><small>Please note that the article
- wrongly refers to crackers as “<a
-
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
- </li>
-
<li id="M202107180">
<!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -320,6 +300,16 @@
features (and the proprietary software that is their entry path)
to the point that even the most powerful companies don't dare.</p>
</li>
+
+ <li id="M202106190">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-06</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://arstechnica.com/gadgets/2021/06/even-creepier-covid-tracking-google-silently-pushed-app-to-users-phones/">Google
+ automatically installed an app on many proprietary Android
phones</a>. The app
+ might or might not do malicious things but the power Google has over
proprietary
+ Android phones is dangerous.</p>
+ </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -383,7 +373,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/08/01 17:32:26 $
+$Date: 2021/08/03 14:32:39 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.300
retrieving revision 1.301
diff -u -b -r1.300 -r1.301
--- po/proprietary.ja.po 1 Aug 2021 17:32:26 -0000 1.300
+++ po/proprietary.ja.po 3 Aug 2021 14:32:39 -0000 1.301
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -343,28 +343,6 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -381,6 +359,12 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
"crackers to remotely gain access to the operating system</a> and install "
@@ -435,6 +419,15 @@
"the most powerful companies don't dare."
msgstr ""
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-"
+"tracking-google-silently-pushed-app-to-users-phones/\">Google automatically "
+"installed an app on many proprietary Android phones</a>. The app might or "
+"might not do malicious things but the power Google has over proprietary "
+"Android phones is dangerous."
+msgstr ""
+
#. type: Content of: <div><p>
#, fuzzy
#| msgid "<a href=\"/proprietary/malware-mobiles.html\">Mobiles</a>"
Index: po/proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.302
retrieving revision 1.303
diff -u -b -r1.302 -r1.303
--- po/proprietary.nl-diff.html 1 Aug 2021 17:32:26 -0000 1.302
+++ po/proprietary.nl-diff.html 3 Aug 2021 14:32:39 -0000 1.303
@@ -28,8 +28,8 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+#about-section { font-size: 1.1em; font-style: italic; }
table#TOC {
display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%; width: max-content;
@@ -66,13 +66,13 @@
text-decoration: none;
}
#TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>-->
+#TOC a:hover { text-decoration: underline; }
+-->
</style>
<style type="text/css" media="print,screen">
- .reduced-width { width: 55em; }
-</style></em></ins></span>
+ .reduced-width</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>width: 55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<span class="inserted"><ins><em><div
class="reduced-width"></em></ins></span>
@@ -223,26 +223,6 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
- <li id="M202107190">
- <!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
-
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/">Crackers
- used an exploit in Apple iThings to install
- spyware</a> on people's devices, many of them to be journalists, even
- if they were using the latest version of the proprietary operating
- system installed on their iDevice.</p>
-
- <p>Nobody can do anything about these vulnerabilities and people
- have to wait until Apple fixes these security holes, if it decides
- to fix it. A free operating system would let people to identify the
- hole and fix it.</p>
-
- <p><small>Please note that the article
- wrongly refers to crackers as “<a
-
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
- </li>
-
<li id="M202107180">
<!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -315,6 +295,16 @@
features (and the proprietary software that is their entry path)
to the point that even the most powerful companies don't dare.</p>
</li>
+
+ <li id="M202106190">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-06</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://arstechnica.com/gadgets/2021/06/even-creepier-covid-tracking-google-silently-pushed-app-to-users-phones/">Google
+ automatically installed an app on many proprietary Android
phones</a>. The app
+ might or might not do malicious things but the power Google has over
proprietary
+ Android phones is dangerous.</p>
+ </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -378,7 +368,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/08/01 17:32:26 $
+$Date: 2021/08/03 14:32:39 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.291
retrieving revision 1.292
diff -u -b -r1.291 -r1.292
--- po/proprietary.nl.po 1 Aug 2021 17:32:26 -0000 1.291
+++ po/proprietary.nl.po 3 Aug 2021 14:32:39 -0000 1.292
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
"Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -388,28 +388,6 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -426,6 +404,12 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
"crackers to remotely gain access to the operating system</a> and install "
@@ -480,6 +464,15 @@
"the most powerful companies don't dare."
msgstr ""
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-"
+"tracking-google-silently-pushed-app-to-users-phones/\">Google automatically "
+"installed an app on many proprietary Android phones</a>. The app might or "
+"might not do malicious things but the power Google has over proprietary "
+"Android phones is dangerous."
+msgstr ""
+
#. type: Content of: <div><p>
# | <a [-href=\"/proprietary/malware-mobiles.html\">Mobiles</a>-]
# | {+href=\"/proprietary/all.html\">More items…</a>+}
Index: po/proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.318
retrieving revision 1.319
diff -u -b -r1.318 -r1.319
--- po/proprietary.pl-diff.html 1 Aug 2021 17:32:26 -0000 1.318
+++ po/proprietary.pl-diff.html 3 Aug 2021 14:32:39 -0000 1.319
@@ -63,8 +63,8 @@
color: #004caa;
text-decoration: none;
}
-#TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
+#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration:
none; }
+#TOC a:hover { text-decoration: underline;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -121,8 +121,8 @@
<hr class="thin" />
</div>
-<p>As of July, 2021, the pages in this directory list around 500
-instances</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>malicious functionalities (with more than 610
references to
+<p>As</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>July, 2021, the pages in this directory list
around 500
+instances of malicious functionalities (with more than 610 references to
back them up), but there are surely thousands more we don't know
about.</p>
<p>If you want to be notified when we add new items or make other
changes,
@@ -166,17 +166,17 @@
<td></em></ins></span>
<ul>
<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
- <li><a
href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html">Conferencing</a></li>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a
href="/proprietary/malware-in-online-conferencing.html">Conferencing</a></li>
</ul>
- <ul>
- <li><a
href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li>
+ <ul></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li>
+ <li><a
href="/proprietary/malware-apple.html">Apple</a></li>
<li><a
href="/proprietary/malware-google.html">Google</a></li>
<li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
@@ -222,26 +222,6 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
- <li id="M202107190">
- <!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
-
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/">Crackers
- used an exploit in Apple iThings to install
- spyware</a> on people's devices, many of them to be journalists, even
- if they were using the latest version of the proprietary operating
- system installed on their iDevice.</p>
-
- <p>Nobody can do anything about these vulnerabilities and people
- have to wait until Apple fixes these security holes, if it decides
- to fix it. A free operating system would let people to identify the
- hole and fix it.</p>
-
- <p><small>Please note that the article
- wrongly refers to crackers as “<a
-
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
- </li>
-
<li id="M202107180">
<!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -314,6 +294,16 @@
features (and the proprietary software that is their entry path)
to the point that even the most powerful companies don't dare.</p>
</li>
+
+ <li id="M202106190">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-06</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://arstechnica.com/gadgets/2021/06/even-creepier-covid-tracking-google-silently-pushed-app-to-users-phones/">Google
+ automatically installed an app on many proprietary Android
phones</a>. The app
+ might or might not do malicious things but the power Google has over
proprietary
+ Android phones is dangerous.</p>
+ </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -377,7 +367,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/08/01 17:32:26 $
+$Date: 2021/08/03 14:32:39 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.283
retrieving revision 1.284
diff -u -b -r1.283 -r1.284
--- po/proprietary.pl.po 1 Aug 2021 17:32:26 -0000 1.283
+++ po/proprietary.pl.po 3 Aug 2021 14:32:39 -0000 1.284
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -569,28 +569,6 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -607,6 +585,12 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
"crackers to remotely gain access to the operating system</a> and install "
@@ -661,6 +645,15 @@
"the most powerful companies don't dare."
msgstr ""
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-"
+"tracking-google-silently-pushed-app-to-users-phones/\">Google automatically "
+"installed an app on many proprietary Android phones</a>. The app might or "
+"might not do malicious things but the power Google has over proprietary "
+"Android phones is dangerous."
+msgstr ""
+
#. type: Content of: <div><p>
# | <a [-href=\"/philosophy/malware-mobiles.html\">Malware in mobile
# | devices</a>-] {+href=\"/proprietary/all.html\">More items…</a>+}
Index: po/proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.280
retrieving revision 1.281
diff -u -b -r1.280 -r1.281
--- po/proprietary.pot 1 Aug 2021 17:32:27 -0000 1.280
+++ po/proprietary.pot 3 Aug 2021 14:32:39 -0000 1.281
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -281,28 +281,6 @@
#. type: Content of: <div><ul><li><p>
msgid ""
"<a "
-"href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/\">Crackers
"
-"used an exploit in Apple iThings to install spyware</a> on people's devices, "
-"many of them to be journalists, even if they were using the latest version "
-"of the proprietary operating system installed on their iDevice."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a "
"href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones\">
"
"The pegasus spyware used vulnerabilities on proprietary smartphone operating "
"systems</a> to impose surveillance on people. It can record people's calls, "
@@ -318,6 +296,12 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A newly found Microsoft Windows vulnerability <a "
"href=\"https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">
"
"can allow crackers to remotely gain access to the operating system</a> and "
@@ -373,6 +357,15 @@
"the most powerful companies don't dare."
msgstr ""
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a "
+"href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-tracking-google-silently-pushed-app-to-users-phones/\">Google
"
+"automatically installed an app on many proprietary Android phones</a>. The "
+"app might or might not do malicious things but the power Google has over "
+"proprietary Android phones is dangerous."
+msgstr ""
+
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr ""
Index: po/proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.445
retrieving revision 1.446
diff -u -b -r1.445 -r1.446
--- po/proprietary.pt-br.po 1 Aug 2021 17:32:27 -0000 1.445
+++ po/proprietary.pt-br.po 3 Aug 2021 14:32:39 -0000 1.446
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
"PO-Revision-Date: 2021-06-13 12:11-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -337,48 +337,6 @@
#. type: Content of: <div><ul><li><p>
#, fuzzy
#| msgid ""
-#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
-#| "of them to be journalists, even if they were using the latest version of "
-#| "the proprietary operating system installed on their iDevice."
-msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\"> <em>Crackers</em> usaram uma <i lang=\"en"
-"\">exploit</i> de dia zero e clique zero em iCoisas da Apple para instalar "
-"<em>spyware</em></a> nos dispositivos das pessoas, muitas delas para serem "
-"jornalistas, mesmo que estivessem usando a versão mais recente do sistema "
-"operacional privativo instalado em seu iDispositivo."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-"Ninguém pode fazer nada sobre essas vulnerabilidades e as pessoas têm que "
-"esperar até que a Apple conserte essas falhas de segurança, se decidir "
-"consertá-las. Um sistema operacional livre permitiria que as pessoas "
-"identificassem o problema e o consertassem."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-"<small>(Note que o artigo, de forma incorreta, refere-se a <em>crackers</em> "
-"como â<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>â.)</"
-"small>"
-
-#. type: Content of: <div><ul><li><p>
-#, fuzzy
-#| msgid ""
#| "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
#| "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
#| "vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -418,6 +376,15 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+"<small>(Note que o artigo, de forma incorreta, refere-se a <em>crackers</em> "
+"como â<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>â.)</"
+"small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
"crackers to remotely gain access to the operating system</a> and install "
@@ -501,6 +468,20 @@
"(e o software privativo que é seu caminho de entrada) a tal ponto que mesmo "
"as empresas mais poderosas não ousem."
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-"
+"tracking-google-silently-pushed-app-to-users-phones/\">Google automatically "
+"installed an app on many proprietary Android phones</a>. The app might or "
+"might not do malicious things but the power Google has over proprietary "
+"Android phones is dangerous."
+msgstr ""
+"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-"
+"tracking-google-silently-pushed-app-to-users-phones/\">Google instalou "
+"automaticamente um aplicativo em muitos telefones privativos com Android</"
+"a>. O aplicativo pode não fazer coisas maliciosas, mas o poder que Google "
+"tem sobre os telefones privativos com Android é perigoso."
+
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr "<a href=\"/proprietary/all.html\">Mais itensâ¦</a>"
@@ -575,18 +556,36 @@
msgid "Updated:"
msgstr "Ãltima atualização:"
-#~ msgid ""
-#~ "<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-"
-#~ "tracking-google-silently-pushed-app-to-users-phones/\">Google "
-#~ "automatically installed an app on many proprietary Android phones</a>. "
-#~ "The app might or might not do malicious things but the power Google has "
-#~ "over proprietary Android phones is dangerous."
-#~ msgstr ""
-#~ "<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-"
-#~ "tracking-google-silently-pushed-app-to-users-phones/\">Google instalou "
-#~ "automaticamente um aplicativo em muitos telefones privativos com Android</"
-#~ "a>. O aplicativo pode não fazer coisas maliciosas, mas o poder que Google
"
-#~ "tem sobre os telefones privativos com Android é perigoso."
+#, fuzzy
+#~| msgid ""
+#~| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#~| "exploit in Apple iThings to install spyware</a> on people's devices, "
+#~| "many of them to be journalists, even if they were using the latest "
+#~| "version of the proprietary operating system installed on their iDevice."
+#~ msgid ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~ "used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings "
+#~ "to install spyware</a> on people's devices, many of them to be "
+#~ "journalists, even if they were using the latest version of the "
+#~ "proprietary operating system installed on their iDevice."
+#~ msgstr ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~ "used-to-spy-on-journalists/\"> <em>Crackers</em> usaram uma <i lang=\"en"
+#~ "\">exploit</i> de dia zero e clique zero em iCoisas da Apple para "
+#~ "instalar <em>spyware</em></a> nos dispositivos das pessoas, muitas delas "
+#~ "para serem jornalistas, mesmo que estivessem usando a versão mais recente
"
+#~ "do sistema operacional privativo instalado em seu iDispositivo."
+
+#~ msgid ""
+#~ "Nobody can do anything about these vulnerabilities and people have to "
+#~ "wait until Apple fixes these security holes, if it decides to fix it. A "
+#~ "free operating system would let people to identify the hole and fix it."
+#~ msgstr ""
+#~ "Ninguém pode fazer nada sobre essas vulnerabilidades e as pessoas têm
que "
+#~ "esperar até que a Apple conserte essas falhas de segurança, se decidir "
+#~ "consertá-las. Um sistema operacional livre permitiria que as pessoas "
+#~ "identificassem o problema e o consertassem."
#~ msgid ""
#~ "<a href=\"https://www.theguardian.com/technology/2021/jun/17/nine-out-"
Index: po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.541
retrieving revision 1.542
diff -u -b -r1.541 -r1.542
--- po/proprietary.ru.po 1 Aug 2021 17:32:27 -0000 1.541
+++ po/proprietary.ru.po 3 Aug 2021 14:32:39 -0000 1.542
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -341,54 +341,6 @@
#. type: Content of: <div><ul><li><p>
# | <a
-# |
href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/\">Crackers
-# | used [-a zero-day and zero-click-] {+an+} exploit in Apple iThings to
-# | install spyware</a> on people's devices, many of them to be journalists,
-# | even if they were using the latest version of the proprietary operating
-# | system installed on their iDevice.
-#, fuzzy
-#| msgid ""
-#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
-#| "of them to be journalists, even if they were using the latest version of "
-#| "the proprietary operating system installed on their iDevice."
-msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">ÐзломÑики пÑименÑли
безÑелÑковÑÑ ÑÑзвимоÑÑÑ "
-"нÑлевого Ð´Ð½Ñ Ð² ай-ÑÑÑÑкаÑ
Apple длÑ
ÑÑÑановки ÑпионÑкиÑ
пÑогÑамм</a> на "
-"ÑÑÑÑойÑÑваÑ
лÑдей (многие из коÑоÑÑÑ
— жÑÑналиÑÑÑ), даже еÑли Ñе "
-"полÑзовалиÑÑ Ñамой поздней веÑÑией
неÑвободной опеÑаÑионной ÑиÑÑемÑ, "
-"ÑÑÑановленной на иÑ
ÑÑÑÑойÑÑве."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-"ÐикÑо ниÑего не Ð¼Ð¾Ð¶ÐµÑ Ð¿Ð¾Ð´ÐµÐ»Ð°ÑÑ Ñ ÑÑими
ÑÑзвимоÑÑÑми, и лÑди вÑнÑÐ¶Ð´ÐµÐ½Ñ Ð¶Ð´Ð°ÑÑ, "
-"пока Apple ÑÑÑÑÐ°Ð½Ð¸Ñ ÑÑи пÑоÑеÑ
и в заÑиÑе,
еÑли ÑÑа ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ ÑеÑÐ¸Ñ ÑÑÑÑаниÑÑ "
-"иÑ
. Ð¡Ð²Ð¾Ð±Ð¾Ð´Ð½Ð°Ñ Ð¾Ð¿ÐµÑаÑÐ¸Ð¾Ð½Ð½Ð°Ñ ÑиÑÑема
позволила Ð±Ñ Ð»ÑдÑм вÑÑвиÑÑ Ð¿ÑоÑеÑ
Ñ Ð¸ "
-"ÑÑÑÑаниÑÑ ÐµÐµ."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-"<small>ÐамеÑÑÑе, ÑÑо в ÑÑаÑÑе ÑеÑмин <a
href=\"/philosophy/words-to-avoid."
-"html#Hacker\">“Ñ
акеÑÑ”</a> невеÑно
иÑполÑзÑеÑÑÑ Ð´Ð»Ñ Ð¾Ð±Ð¾Ð·Ð½Ð°ÑÐµÐ½Ð¸Ñ "
-"взломÑиков.</small>"
-
-#. type: Content of: <div><ul><li><p>
-# | <a
# |
href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones\">
# | The pegasus spyware used vulnerabilities on proprietary smartphone
# | operating systems</a> to impose surveillance on people. It can record
@@ -435,6 +387,15 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+"<small>ÐамеÑÑÑе, ÑÑо в ÑÑаÑÑе ÑеÑмин <a
href=\"/philosophy/words-to-avoid."
+"html#Hacker\">“Ñ
акеÑÑ”</a> невеÑно
иÑполÑзÑеÑÑÑ Ð´Ð»Ñ Ð¾Ð±Ð¾Ð·Ð½Ð°ÑÐµÐ½Ð¸Ñ "
+"взломÑиков.</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
"crackers to remotely gain access to the operating system</a> and install "
@@ -519,6 +480,20 @@
"вÑедоноÑнÑÑ
ÑÑнкÑий (и неÑвободнÑÑ
пÑогÑамм, коÑоÑÑе вводÑÑ Ð¸Ñ
) до Ñакой "
"ÑÑепени, ÑÑÐ¾Ð±Ñ Ð´Ð°Ð¶Ðµ ÑамÑе могÑÑеÑÑвеннÑе
компании не Ñмели ÑÑого делаÑÑ."
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-"
+"tracking-google-silently-pushed-app-to-users-phones/\">Google automatically "
+"installed an app on many proprietary Android phones</a>. The app might or "
+"might not do malicious things but the power Google has over proprietary "
+"Android phones is dangerous."
+msgstr ""
+"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-"
+"tracking-google-silently-pushed-app-to-users-phones/\">ÐомпаниÑ
Google "
+"авÑомаÑиÑеÑки ÑÑÑановила пÑиложение на
многие ÑелеÑÐ¾Ð½Ñ Android</a>. ÐÑо "
+"пÑиложение могло Ð±Ñ Ð½Ð°Ð½Ð¾ÑÐ¸Ñ Ð²Ñед, а могло
Ð±Ñ Ð½Ðµ наноÑиÑÑ, но влаÑÑÑ Google "
+"над ÑелеÑонами Ñ Ð½ÐµÑвободной ÑиÑÑемой
Android опаÑна."
+
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr "<a href=\"/proprietary/all.html\">Ðалее...</a>"
@@ -595,18 +570,36 @@
msgid "Updated:"
msgstr "Ðбновлено:"
-#~ msgid ""
-#~ "<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-"
-#~ "tracking-google-silently-pushed-app-to-users-phones/\">Google "
-#~ "automatically installed an app on many proprietary Android phones</a>. "
-#~ "The app might or might not do malicious things but the power Google has "
-#~ "over proprietary Android phones is dangerous."
-#~ msgstr ""
-#~ "<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-"
-#~ "tracking-google-silently-pushed-app-to-users-phones/\">ÐомпаниÑ
Google "
-#~ "авÑомаÑиÑеÑки ÑÑÑановила пÑиложение на
многие ÑелеÑÐ¾Ð½Ñ Android</a>. ÐÑо "
-#~ "пÑиложение могло Ð±Ñ Ð½Ð°Ð½Ð¾ÑÐ¸Ñ Ð²Ñед, а
могло Ð±Ñ Ð½Ðµ наноÑиÑÑ, но влаÑÑÑ "
-#~ "Google над ÑелеÑонами Ñ Ð½ÐµÑвободной
ÑиÑÑемой Android опаÑна."
+#, fuzzy
+#~| msgid ""
+#~| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#~| "exploit in Apple iThings to install spyware</a> on people's devices, "
+#~| "many of them to be journalists, even if they were using the latest "
+#~| "version of the proprietary operating system installed on their iDevice."
+#~ msgid ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~ "used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings "
+#~ "to install spyware</a> on people's devices, many of them to be "
+#~ "journalists, even if they were using the latest version of the "
+#~ "proprietary operating system installed on their iDevice."
+#~ msgstr ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~ "used-to-spy-on-journalists/\">ÐзломÑики пÑименÑли
безÑелÑковÑÑ ÑÑзвимоÑÑÑ "
+#~ "нÑлевого Ð´Ð½Ñ Ð² ай-ÑÑÑÑкаÑ
Apple длÑ
ÑÑÑановки ÑпионÑкиÑ
пÑогÑамм</a> на "
+#~ "ÑÑÑÑойÑÑваÑ
лÑдей (многие из коÑоÑÑÑ
— жÑÑналиÑÑÑ), даже еÑли "
+#~ "Ñе полÑзовалиÑÑ Ñамой поздней веÑÑией
неÑвободной опеÑаÑионной ÑиÑÑемÑ, "
+#~ "ÑÑÑановленной на иÑ
ÑÑÑÑойÑÑве."
+
+#~ msgid ""
+#~ "Nobody can do anything about these vulnerabilities and people have to "
+#~ "wait until Apple fixes these security holes, if it decides to fix it. A "
+#~ "free operating system would let people to identify the hole and fix it."
+#~ msgstr ""
+#~ "ÐикÑо ниÑего не Ð¼Ð¾Ð¶ÐµÑ Ð¿Ð¾Ð´ÐµÐ»Ð°ÑÑ Ñ ÑÑими
ÑÑзвимоÑÑÑми, и лÑди вÑнÑÐ¶Ð´ÐµÐ½Ñ "
+#~ "ждаÑÑ, пока Apple ÑÑÑÑÐ°Ð½Ð¸Ñ ÑÑи пÑоÑеÑ
и в
заÑиÑе, еÑли ÑÑа ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ ÑеÑÐ¸Ñ "
+#~ "ÑÑÑÑаниÑÑ Ð¸Ñ
. Ð¡Ð²Ð¾Ð±Ð¾Ð´Ð½Ð°Ñ Ð¾Ð¿ÐµÑаÑионнаÑ
ÑиÑÑема позволила Ð±Ñ Ð»ÑдÑм вÑÑвиÑÑ "
+#~ "пÑоÑеÑ
Ñ Ð¸ ÑÑÑÑаниÑÑ ÐµÐµ."
#~ msgid ""
#~ "<a href=\"https://www.theguardian.com/technology/2021/jun/17/nine-out-"
Index: po/proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.191
retrieving revision 1.192
diff -u -b -r1.191 -r1.192
--- po/proprietary.tr.po 1 Aug 2021 17:32:27 -0000 1.191
+++ po/proprietary.tr.po 3 Aug 2021 14:32:39 -0000 1.192
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
"PO-Revision-Date: 2021-08-01 08:38+0200\n"
"Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
"Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -337,40 +337,6 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-"Güvenlik kırıcıları, çoÄu gazeteci olan insanların aygıtlarına <a
href="
-"\"https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-"
-"on-journalists/\">casus yazılım kurmak için Apple iÅeyler'deki bir
açıÄı "
-"kullandılar</a>, iAygıtlarında en son sürüm özel mülk iÅletim sistemi
"
-"kullanıyor olsalar bile bu bir iÅe yaramadı."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-"Hiç kimse bu açıklar konusunda bir Åey yapamıyor, insanlar Apple'nin bu "
-"güvenlik açıklarını düzeltmesini beklemek zorunda, üstelik düzeltmeye
karar "
-"verirse. Ãzgür bir iÅletim sistemi insanların açıkları tespit etmesine
ve "
-"düzeltmesine olanak saÄlar."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-"<small>Bu yazı güvenlik kırıcılarını hatalı bir Åekilde \"<a
href=\"/"
-"philosophy/words-to-avoid.html#Hacker\">üstât (hacker)</a>\" olarak "
-"adlandırmaktır.</small>"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -401,6 +367,15 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+"<small>Bu yazı güvenlik kırıcılarını hatalı bir Åekilde \"<a
href=\"/"
+"philosophy/words-to-avoid.html#Hacker\">üstât (hacker)</a>\" olarak "
+"adlandırmaktır.</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
"crackers to remotely gain access to the operating system</a> and install "
@@ -484,6 +459,20 @@
"yazılımlara) karÅı öfkemizi, en güçlü Åirketlerin bile böyle bir
Åeye "
"cesaret edemeyeceÄi bir düzeye yükseltmemiz gerekiyor."
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-"
+"tracking-google-silently-pushed-app-to-users-phones/\">Google automatically "
+"installed an app on many proprietary Android phones</a>. The app might or "
+"might not do malicious things but the power Google has over proprietary "
+"Android phones is dangerous."
+msgstr ""
+"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-"
+"tracking-google-silently-pushed-app-to-users-phones/\">Google, birçok özel "
+"mülk Android telefona otomatik olarak bir uygulama kurdu</a>. Uygulama "
+"kötücül Åeyler yapıyor olabilir veya olmayabilir ancak Google'nin
Android "
+"telefonlar üzerinde sahip olduÄu iktidar tehlikeli."
+
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr "<a href=\"/proprietary/all.html\">Daha fazlası…</a>"
@@ -565,17 +554,27 @@
msgstr "Son Güncelleme:"
#~ msgid ""
-#~ "<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-"
-#~ "tracking-google-silently-pushed-app-to-users-phones/\">Google "
-#~ "automatically installed an app on many proprietary Android phones</a>. "
-#~ "The app might or might not do malicious things but the power Google has "
-#~ "over proprietary Android phones is dangerous."
-#~ msgstr ""
-#~ "<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-"
-#~ "tracking-google-silently-pushed-app-to-users-phones/\">Google, birçok "
-#~ "özel mülk Android telefona otomatik olarak bir uygulama kurdu</a>. "
-#~ "Uygulama kötücül Åeyler yapıyor olabilir veya olmayabilir ancak "
-#~ "Google'nin Android telefonlar üzerinde sahip olduÄu iktidar tehlikeli."
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~ "used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings "
+#~ "to install spyware</a> on people's devices, many of them to be "
+#~ "journalists, even if they were using the latest version of the "
+#~ "proprietary operating system installed on their iDevice."
+#~ msgstr ""
+#~ "Güvenlik kırıcıları, çoÄu gazeteci olan insanların aygıtlarına
<a href="
+#~ "\"https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-"
+#~ "spy-on-journalists/\">casus yazılım kurmak için Apple iÅeyler'deki bir
"
+#~ "açıÄı kullandılar</a>, iAygıtlarında en son sürüm özel mülk
iÅletim "
+#~ "sistemi kullanıyor olsalar bile bu bir iÅe yaramadı."
+
+#~ msgid ""
+#~ "Nobody can do anything about these vulnerabilities and people have to "
+#~ "wait until Apple fixes these security holes, if it decides to fix it. A "
+#~ "free operating system would let people to identify the hole and fix it."
+#~ msgstr ""
+#~ "Hiç kimse bu açıklar konusunda bir Åey yapamıyor, insanlar Apple'nin
bu "
+#~ "güvenlik açıklarını düzeltmesini beklemek zorunda, üstelik
düzeltmeye "
+#~ "karar verirse. Ãzgür bir iÅletim sistemi insanların açıkları tespit
"
+#~ "etmesine ve düzeltmesine olanak saÄlar."
#~ msgid ""
#~ "<a href=\"https://www.theguardian.com/technology/2021/jun/17/nine-out-"
Index: po/proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.238
retrieving revision 1.239
diff -u -b -r1.238 -r1.239
--- po/proprietary.zh-cn.po 1 Aug 2021 17:32:27 -0000 1.238
+++ po/proprietary.zh-cn.po 3 Aug 2021 14:32:39 -0000 1.239
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
"PO-Revision-Date: 2021-07-16 16:36+0800\n"
"Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
"Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -316,30 +316,6 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-"<small>请注æï¼æ¬æé误å°å°“<a
href=\"/philosophy/words-to-avoid."
-"html#Hacker\">é»å®¢</a>”ä¸è¯å½æéªå®¢æ¥ç¨ã</small>"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -356,6 +332,14 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+"<small>请注æï¼æ¬æé误å°å°“<a
href=\"/philosophy/words-to-avoid."
+"html#Hacker\">é»å®¢</a>”ä¸è¯å½æéªå®¢æ¥ç¨ã</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
"crackers to remotely gain access to the operating system</a> and install "
@@ -428,6 +412,19 @@
"æ¾ç¶ï¼å
¬ä¼çæ¤æ使该å
¬å¸ååºäºè®©æ¥ãå¦ææ们è¦ç¡®ä¿å®å
¨ï¼é£ä¹æ们è¿éè¦å¯¹æ¶æ"
"åè½ï¼å
æ¬ä¸æ软件æ´ä½ï¼è¡¨ç¤ºæ¤æï¼è¿ç§æ¤æè¦ä½¿æææå¿çå
¬å¸ä¹å¿åçæ§ã"
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-"
+"tracking-google-silently-pushed-app-to-users-phones/\">Google automatically "
+"installed an app on many proprietary Android phones</a>. The app might or "
+"might not do malicious things but the power Google has over proprietary "
+"Android phones is dangerous."
+msgstr ""
+"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-"
+"tracking-google-silently-pushed-app-to-users-phones/\">è°·æå¨è®¸å¤
Android çµ"
+"è¯ä¸èªå¨å®è£
ä¸ä¸ªåºç¨</a>ã该åºç¨æ许没åæ¶ï¼ä½æ¯è°·æ对 Android
çµè¯çææ§æå"
+"é常å±é©ã"
+
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr "<a href=\"/proprietary/all.html\">æ´å¤å
容…</a>"
@@ -503,18 +500,6 @@
msgstr "æåæ´æ°ï¼"
#~ msgid ""
-#~ "<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-"
-#~ "tracking-google-silently-pushed-app-to-users-phones/\">Google "
-#~ "automatically installed an app on many proprietary Android phones</a>. "
-#~ "The app might or might not do malicious things but the power Google has "
-#~ "over proprietary Android phones is dangerous."
-#~ msgstr ""
-#~ "<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-"
-#~ "tracking-google-silently-pushed-app-to-users-phones/\">è°·æå¨è®¸å¤
Android "
-#~ "çµè¯ä¸èªå¨å®è£
ä¸ä¸ªåºç¨</a>ã该åºç¨æ许没åæ¶ï¼ä½æ¯è°·æ对 Android
çµè¯çæ"
-#~ "æ§æåé常å±é©ã"
-
-#~ msgid ""
#~ "<a href=\"https://www.theguardian.com/technology/2021/jun/17/nine-out-"
#~ "of-10-health-apps-harvest-user-data-global-study-shows\">Almost all "
#~ "proprietary health apps harvest users' data</a>, including sensitive "
Index: po/proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.281
retrieving revision 1.282
diff -u -b -r1.281 -r1.282
--- po/proprietary.zh-tw-diff.html 1 Aug 2021 17:32:27 -0000 1.281
+++ po/proprietary.zh-tw-diff.html 3 Aug 2021 14:32:40 -0000 1.282
@@ -28,8 +28,8 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+#about-section { font-size: 1.1em; font-style: italic; }
table#TOC {
display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%; width: max-content;
@@ -66,13 +66,13 @@
text-decoration: none;
}
#TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>-->
+#TOC a:hover { text-decoration: underline; }
+-->
</style>
<style type="text/css" media="print,screen">
- .reduced-width { width: 55em; }
-</style></em></ins></span>
+ .reduced-width</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>width: 55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<span class="inserted"><ins><em><div
class="reduced-width"></em></ins></span>
@@ -200,10 +200,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -224,26 +224,6 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
- <li id="M202107190">
- <!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
-
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/">Crackers
- used an exploit in Apple iThings to install
- spyware</a> on people's devices, many of them to be journalists, even
- if they were using the latest version of the proprietary operating
- system installed on their iDevice.</p>
-
- <p>Nobody can do anything about these vulnerabilities and people
- have to wait until Apple fixes these security holes, if it decides
- to fix it. A free operating system would let people to identify the
- hole and fix it.</p>
-
- <p><small>Please note that the article
- wrongly refers to crackers as “<a
-
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
- </li>
-
<li id="M202107180">
<!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -316,6 +296,16 @@
features (and the proprietary software that is their entry path)
to the point that even the most powerful companies don't dare.</p>
</li>
+
+ <li id="M202106190">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-06</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://arstechnica.com/gadgets/2021/06/even-creepier-covid-tracking-google-silently-pushed-app-to-users-phones/">Google
+ automatically installed an app on many proprietary Android
phones</a>. The app
+ might or might not do malicious things but the power Google has over
proprietary
+ Android phones is dangerous.</p>
+ </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -379,7 +369,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/08/01 17:32:27 $
+$Date: 2021/08/03 14:32:40 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.270
retrieving revision 1.271
diff -u -b -r1.270 -r1.271
--- po/proprietary.zh-tw.po 1 Aug 2021 17:32:27 -0000 1.270
+++ po/proprietary.zh-tw.po 3 Aug 2021 14:32:40 -0000 1.271
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
"PO-Revision-Date: 2020-02-08 17:12+0800\n"
"Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
"Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -458,28 +458,6 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -496,6 +474,12 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
"crackers to remotely gain access to the operating system</a> and install "
@@ -550,6 +534,15 @@
"the most powerful companies don't dare."
msgstr ""
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-"
+"tracking-google-silently-pushed-app-to-users-phones/\">Google automatically "
+"installed an app on many proprietary Android phones</a>. The app might or "
+"might not do malicious things but the power Google has over proprietary "
+"Android phones is dangerous."
+msgstr ""
+
#. type: Content of: <div><p>
# | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
# | devices</a>-] {+href=\"/proprietary/all.html\">More items…</a>+}
Index: po/pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.416
retrieving revision 1.417
diff -u -b -r1.416 -r1.417
--- po/pt-br.po 1 Aug 2021 17:32:27 -0000 1.416
+++ po/pt-br.po 3 Aug 2021 14:32:40 -0000 1.417
@@ -509,48 +509,6 @@
#. type: Content of: <div><ul><li><p>
#, fuzzy
#| msgid ""
-#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
-#| "of them to be journalists, even if they were using the latest version of "
-#| "the proprietary operating system installed on their iDevice."
-msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\"> <em>Crackers</em> usaram uma <i lang=\"en"
-"\">exploit</i> de dia zero e clique zero em iCoisas da Apple para instalar "
-"<em>spyware</em></a> nos dispositivos das pessoas, muitas delas para serem "
-"jornalistas, mesmo que estivessem usando a versão mais recente do sistema "
-"operacional privativo instalado em seu iDispositivo."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-"Ninguém pode fazer nada sobre essas vulnerabilidades e as pessoas têm que "
-"esperar até que a Apple conserte essas falhas de segurança, se decidir "
-"consertá-las. Um sistema operacional livre permitiria que as pessoas "
-"identificassem o problema e o consertassem."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-"<small>(Note que o artigo, de forma incorreta, refere-se a <em>crackers</em> "
-"como â<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>â.)</"
-"small>"
-
-#. type: Content of: <div><ul><li><p>
-#, fuzzy
-#| msgid ""
#| "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
#| "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
#| "vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -590,6 +548,15 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+"<small>(Note que o artigo, de forma incorreta, refere-se a <em>crackers</em> "
+"como â<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>â.)</"
+"small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
"crackers to remotely gain access to the operating system</a> and install "
@@ -13342,6 +13309,37 @@
#, fuzzy
#~| msgid ""
+#~| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#~| "exploit in Apple iThings to install spyware</a> on people's devices, "
+#~| "many of them to be journalists, even if they were using the latest "
+#~| "version of the proprietary operating system installed on their iDevice."
+#~ msgid ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~ "used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings "
+#~ "to install spyware</a> on people's devices, many of them to be "
+#~ "journalists, even if they were using the latest version of the "
+#~ "proprietary operating system installed on their iDevice."
+#~ msgstr ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~ "used-to-spy-on-journalists/\"> <em>Crackers</em> usaram uma <i lang=\"en"
+#~ "\">exploit</i> de dia zero e clique zero em iCoisas da Apple para "
+#~ "instalar <em>spyware</em></a> nos dispositivos das pessoas, muitas delas "
+#~ "para serem jornalistas, mesmo que estivessem usando a versão mais recente
"
+#~ "do sistema operacional privativo instalado em seu iDispositivo."
+
+#~ msgid ""
+#~ "Nobody can do anything about these vulnerabilities and people have to "
+#~ "wait until Apple fixes these security holes, if it decides to fix it. A "
+#~ "free operating system would let people to identify the hole and fix it."
+#~ msgstr ""
+#~ "Ninguém pode fazer nada sobre essas vulnerabilidades e as pessoas têm
que "
+#~ "esperar até que a Apple conserte essas falhas de segurança, se decidir "
+#~ "consertá-las. Um sistema operacional livre permitiria que as pessoas "
+#~ "identificassem o problema e o consertassem."
+
+#, fuzzy
+#~| msgid ""
#~| "A free operating system would've let people to fix the bugs for "
#~| "themselves but now infected people should wait for corporations to fix "
#~| "the problems."
Index: po/ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.698
retrieving revision 1.699
diff -u -b -r1.698 -r1.699
--- po/ru.po 1 Aug 2021 17:32:27 -0000 1.698
+++ po/ru.po 3 Aug 2021 14:32:40 -0000 1.699
@@ -509,54 +509,6 @@
#. type: Content of: <div><ul><li><p>
# | <a
-# |
href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/\">Crackers
-# | used [-a zero-day and zero-click-] {+an+} exploit in Apple iThings to
-# | install spyware</a> on people's devices, many of them to be journalists,
-# | even if they were using the latest version of the proprietary operating
-# | system installed on their iDevice.
-#, fuzzy
-#| msgid ""
-#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
-#| "of them to be journalists, even if they were using the latest version of "
-#| "the proprietary operating system installed on their iDevice."
-msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">ÐзломÑики пÑименÑли
безÑелÑковÑÑ ÑÑзвимоÑÑÑ "
-"нÑлевого Ð´Ð½Ñ Ð² ай-ÑÑÑÑкаÑ
Apple длÑ
ÑÑÑановки ÑпионÑкиÑ
пÑогÑамм</a> на "
-"ÑÑÑÑойÑÑваÑ
лÑдей (многие из коÑоÑÑÑ
— жÑÑналиÑÑÑ), даже еÑли Ñе "
-"полÑзовалиÑÑ Ñамой поздней веÑÑией
неÑвободной опеÑаÑионной ÑиÑÑемÑ, "
-"ÑÑÑановленной на иÑ
ÑÑÑÑойÑÑве."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-"ÐикÑо ниÑего не Ð¼Ð¾Ð¶ÐµÑ Ð¿Ð¾Ð´ÐµÐ»Ð°ÑÑ Ñ ÑÑими
ÑÑзвимоÑÑÑми, и лÑди вÑнÑÐ¶Ð´ÐµÐ½Ñ Ð¶Ð´Ð°ÑÑ, "
-"пока Apple ÑÑÑÑÐ°Ð½Ð¸Ñ ÑÑи пÑоÑеÑ
и в заÑиÑе,
еÑли ÑÑа ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ ÑеÑÐ¸Ñ ÑÑÑÑаниÑÑ "
-"иÑ
. Ð¡Ð²Ð¾Ð±Ð¾Ð´Ð½Ð°Ñ Ð¾Ð¿ÐµÑаÑÐ¸Ð¾Ð½Ð½Ð°Ñ ÑиÑÑема
позволила Ð±Ñ Ð»ÑдÑм вÑÑвиÑÑ Ð¿ÑоÑеÑ
Ñ Ð¸ "
-"ÑÑÑÑаниÑÑ ÐµÐµ."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-"<small>ÐамеÑÑÑе, ÑÑо в ÑÑаÑÑе ÑеÑмин <a
href=\"/philosophy/words-to-avoid."
-"html#Hacker\">“Ñ
акеÑÑ”</a> невеÑно
иÑполÑзÑеÑÑÑ Ð´Ð»Ñ Ð¾Ð±Ð¾Ð·Ð½Ð°ÑÐµÐ½Ð¸Ñ "
-"взломÑиков.</small>"
-
-#. type: Content of: <div><ul><li><p>
-# | <a
# |
href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones\">
# | The pegasus spyware used vulnerabilities on proprietary smartphone
# | operating systems</a> to impose surveillance on people. It can record
@@ -603,6 +555,15 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+"<small>ÐамеÑÑÑе, ÑÑо в ÑÑаÑÑе ÑеÑмин <a
href=\"/philosophy/words-to-avoid."
+"html#Hacker\">“Ñ
акеÑÑ”</a> невеÑно
иÑполÑзÑеÑÑÑ Ð´Ð»Ñ Ð¾Ð±Ð¾Ð·Ð½Ð°ÑÐµÐ½Ð¸Ñ "
+"взломÑиков.</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
"crackers to remotely gain access to the operating system</a> and install "
@@ -13560,6 +13521,37 @@
msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
+#, fuzzy
+#~| msgid ""
+#~| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#~| "exploit in Apple iThings to install spyware</a> on people's devices, "
+#~| "many of them to be journalists, even if they were using the latest "
+#~| "version of the proprietary operating system installed on their iDevice."
+#~ msgid ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~ "used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings "
+#~ "to install spyware</a> on people's devices, many of them to be "
+#~ "journalists, even if they were using the latest version of the "
+#~ "proprietary operating system installed on their iDevice."
+#~ msgstr ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~ "used-to-spy-on-journalists/\">ÐзломÑики пÑименÑли
безÑелÑковÑÑ ÑÑзвимоÑÑÑ "
+#~ "нÑлевого Ð´Ð½Ñ Ð² ай-ÑÑÑÑкаÑ
Apple длÑ
ÑÑÑановки ÑпионÑкиÑ
пÑогÑамм</a> на "
+#~ "ÑÑÑÑойÑÑваÑ
лÑдей (многие из коÑоÑÑÑ
— жÑÑналиÑÑÑ), даже еÑли "
+#~ "Ñе полÑзовалиÑÑ Ñамой поздней веÑÑией
неÑвободной опеÑаÑионной ÑиÑÑемÑ, "
+#~ "ÑÑÑановленной на иÑ
ÑÑÑÑойÑÑве."
+
+#~ msgid ""
+#~ "Nobody can do anything about these vulnerabilities and people have to "
+#~ "wait until Apple fixes these security holes, if it decides to fix it. A "
+#~ "free operating system would let people to identify the hole and fix it."
+#~ msgstr ""
+#~ "ÐикÑо ниÑего не Ð¼Ð¾Ð¶ÐµÑ Ð¿Ð¾Ð´ÐµÐ»Ð°ÑÑ Ñ ÑÑими
ÑÑзвимоÑÑÑми, и лÑди вÑнÑÐ¶Ð´ÐµÐ½Ñ "
+#~ "ждаÑÑ, пока Apple ÑÑÑÑÐ°Ð½Ð¸Ñ ÑÑи пÑоÑеÑ
и в
заÑиÑе, еÑли ÑÑа ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ ÑеÑÐ¸Ñ "
+#~ "ÑÑÑÑаниÑÑ Ð¸Ñ
. Ð¡Ð²Ð¾Ð±Ð¾Ð´Ð½Ð°Ñ Ð¾Ð¿ÐµÑаÑионнаÑ
ÑиÑÑема позволила Ð±Ñ Ð»ÑдÑм вÑÑвиÑÑ "
+#~ "пÑоÑеÑ
Ñ Ð¸ ÑÑÑÑаниÑÑ ÐµÐµ."
+
#~ msgid ""
#~ "A free operating system would've let people to fix the bugs for "
#~ "themselves but now infected people are forced to wait for corporations to "
Index: po/tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.211
retrieving revision 1.212
diff -u -b -r1.211 -r1.212
--- po/tr.po 1 Aug 2021 17:32:27 -0000 1.211
+++ po/tr.po 3 Aug 2021 14:32:40 -0000 1.212
@@ -415,51 +415,6 @@
#. type: Content of: <div><ul><li><p>
#, fuzzy
#| msgid ""
-#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
-#| "of them to be journalists, even if they were using the latest version of "
-#| "the proprietary operating system installed on their iDevice."
-msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-"Kırıcılar, iAygıtlarında en son sürüm özel mülk iÅletim sistemi
kurulu bile "
-"olsa, çoÄu gazeteci olan insanların aygıtlarına <a
href=\"https://www.xda-"
-"developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/"
-"\">casus yazılım kurmak için, Apple iÅeyler'deki bir sıfır gün
açıÄını "
-"kullandılar</a>."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-"Hiç kimse bu açıklar konusunda bir Åey yapamıyor, insanlar Apple'nin bu "
-"güvenlik açıklarını düzeltmesini beklemek zorunda, üstelik düzeltmeye
karar "
-"verirse. Ãzgür bir iÅletim sistemi insanların açıkları tespit etmesine
ve "
-"düzeltmesine olanak saÄlar."
-
-#. type: Content of: <div><ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "<small>(Please note that the article wrongly refers to crackers as \"<a "
-#| "href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>"
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-"<small>(Bu yazının güvenlik kırıcılarını yanlıŠbir Åekilde \"<a
href=\"/"
-"philosophy/words-to-avoid.html#Hacker\">üstât (hacker)</a>\" olarak "
-"adlandırdıÄını belirtmek isteriz)</small>"
-
-#. type: Content of: <div><ul><li><p>
-#, fuzzy
-#| msgid ""
#| "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
#| "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
#| "vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -496,6 +451,19 @@
"çözmesini beklemek zorunda."
#. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<small>(Please note that the article wrongly refers to crackers as \"<a "
+#| "href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>"
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+"<small>(Bu yazının güvenlik kırıcılarını yanlıŠbir Åekilde \"<a
href=\"/"
+"philosophy/words-to-avoid.html#Hacker\">üstât (hacker)</a>\" olarak "
+"adlandırdıÄını belirtmek isteriz)</small>"
+
+#. type: Content of: <div><ul><li><p>
msgid ""
"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
@@ -10488,6 +10456,36 @@
#, fuzzy
#~| msgid ""
+#~| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#~| "exploit in Apple iThings to install spyware</a> on people's devices, "
+#~| "many of them to be journalists, even if they were using the latest "
+#~| "version of the proprietary operating system installed on their iDevice."
+#~ msgid ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
+#~ "used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings "
+#~ "to install spyware</a> on people's devices, many of them to be "
+#~ "journalists, even if they were using the latest version of the "
+#~ "proprietary operating system installed on their iDevice."
+#~ msgstr ""
+#~ "Kırıcılar, iAygıtlarında en son sürüm özel mülk iÅletim sistemi
kurulu "
+#~ "bile olsa, çoÄu gazeteci olan insanların aygıtlarına <a
href=\"https://"
+#~ "www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-"
+#~ "journalists/\">casus yazılım kurmak için, Apple iÅeyler'deki bir
sıfır "
+#~ "gün açıÄını kullandılar</a>."
+
+#~ msgid ""
+#~ "Nobody can do anything about these vulnerabilities and people have to "
+#~ "wait until Apple fixes these security holes, if it decides to fix it. A "
+#~ "free operating system would let people to identify the hole and fix it."
+#~ msgstr ""
+#~ "Hiç kimse bu açıklar konusunda bir Åey yapamıyor, insanlar Apple'nin
bu "
+#~ "güvenlik açıklarını düzeltmesini beklemek zorunda, üstelik
düzeltmeye "
+#~ "karar verirse. Ãzgür bir iÅletim sistemi insanların açıkları tespit
"
+#~ "etmesine ve düzeltmesine olanak saÄlar."
+
+#, fuzzy
+#~| msgid ""
#~| "A free operating system would've let people to fix the bugs for "
#~| "themselves but now infected people should wait for corporations to fix "
#~| "the problems."
Index: po/zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.211
retrieving revision 1.212
diff -u -b -r1.211 -r1.212
--- po/zh-cn.po 1 Aug 2021 17:32:27 -0000 1.211
+++ po/zh-cn.po 3 Aug 2021 14:32:40 -0000 1.212
@@ -414,18 +414,18 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a security vulnerability."
msgstr ""
#. type: Content of: <div><ul><li><p>
msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people will be compelled to wait for corporations to fix "
+"the problems."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -442,22 +442,6 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
-"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
-"vulnerabilities on proprietary smartphone operating systems</a> to impose "
-"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a security vulnerability."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"A free operating system would've let people to fix the bugs for themselves "
-"but now infected people will be compelled to wait for corporations to fix "
-"the problems."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
"crackers to remotely gain access to the operating system</a> and install "
Index: po/zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.334
retrieving revision 1.335
diff -u -b -r1.334 -r1.335
--- po/zh-tw.po 1 Aug 2021 17:32:27 -0000 1.334
+++ po/zh-tw.po 3 Aug 2021 14:32:40 -0000 1.335
@@ -439,28 +439,6 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-"
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -477,6 +455,12 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<small>Please note that the article wrongly refers to crackers as “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
"crackers to remotely gain access to the operating system</a> and install "
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary all.fr.html malware-apple.es.ht...,
GNUN <=