[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www proprietary/po/all.fr.po proprietary/po/all...
From: |
GNUN |
Subject: |
www proprietary/po/all.fr.po proprietary/po/all... |
Date: |
Wed, 15 Sep 2021 02:03:54 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 21/09/15 02:03:53
Modified files:
proprietary/po : all.fr.po all.pot all.pt-br.po all.ru.po de.po
es.po fr.po it.po ja.po nl.po pl.po pot
proprietary-insecurity.de-diff.html
proprietary-insecurity.de.po
proprietary-insecurity.es.po
proprietary-insecurity.fr.po
proprietary-insecurity.it-diff.html
proprietary-insecurity.it.po
proprietary-insecurity.ja-diff.html
proprietary-insecurity.ja.po
proprietary-insecurity.pot
proprietary-insecurity.pt-br.po
proprietary-insecurity.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.tr.po
proprietary.zh-cn.po
proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po tr.po
zh-cn.po zh-tw.po
thankgnus/po : 2021supporters.pot 2021supporters.pt-br.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.fr.po?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.pot?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.pt-br.po?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.ru.po?cvsroot=www&r1=1.51&r2=1.52
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.338&r2=1.339
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.483&r2=1.484
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.598&r2=1.599
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.338&r2=1.339
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.346&r2=1.347
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.339&r2=1.340
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.338&r2=1.339
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.337&r2=1.338
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de-diff.html?cvsroot=www&r1=1.90&r2=1.91
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.188&r2=1.189
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.es.po?cvsroot=www&r1=1.127&r2=1.128
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.276&r2=1.277
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-diff.html?cvsroot=www&r1=1.103&r2=1.104
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.205&r2=1.206
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja-diff.html?cvsroot=www&r1=1.124&r2=1.125
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja.po?cvsroot=www&r1=1.177&r2=1.178
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pot?cvsroot=www&r1=1.143&r2=1.144
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pt-br.po?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.317&r2=1.318
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.295&r2=1.296
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.312&r2=1.313
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.512&r2=1.513
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.532&r2=1.533
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.305&r2=1.306
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.321&r2=1.322
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.310&r2=1.311
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.304&r2=1.305
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.306&r2=1.307
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.295&r2=1.296
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.322&r2=1.323
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.287&r2=1.288
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.284&r2=1.285
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.452&r2=1.453
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.548&r2=1.549
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.198&r2=1.199
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.248&r2=1.249
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.285&r2=1.286
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.274&r2=1.275
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.422&r2=1.423
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.708&r2=1.709
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.216&r2=1.217
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.217&r2=1.218
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.338&r2=1.339
http://web.cvs.savannah.gnu.org/viewcvs/www/thankgnus/po/2021supporters.pot?cvsroot=www&r1=1.88&r2=1.89
http://web.cvs.savannah.gnu.org/viewcvs/www/thankgnus/po/2021supporters.pt-br.po?cvsroot=www&r1=1.140&r2=1.141
Patches:
Index: proprietary/po/all.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.fr.po,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- proprietary/po/all.fr.po 4 Sep 2021 10:22:06 -0000 1.55
+++ proprietary/po/all.fr.po 15 Sep 2021 06:03:39 -0000 1.56
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
"PO-Revision-Date: 2021-09-04 12:15+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-15 05:55+0000\n"
#. type: Content of: <title>
msgid ""
@@ -79,6 +80,14 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://"
"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
"brick them remotely</a>."
Index: proprietary/po/all.pot
===================================================================
RCS file: /web/www/www/proprietary/po/all.pot,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- proprietary/po/all.pot 4 Sep 2021 08:37:13 -0000 1.29
+++ proprietary/po/all.pot 15 Sep 2021 06:03:44 -0000 1.30
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -74,6 +74,15 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a "
+"href=\"https://www.wired.com/story/kalay-iot-bug-video-feeds/\">are "
+"exploited by a security vulnerability that could give attackers access to "
+"live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent Samsung TVs have a back door with which Samsung can <a "
"href=\"https://www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\">
"
"brick them remotely</a>."
Index: proprietary/po/all.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.pt-br.po,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- proprietary/po/all.pt-br.po 6 Sep 2021 01:03:48 -0000 1.27
+++ proprietary/po/all.pt-br.po 15 Sep 2021 06:03:44 -0000 1.28
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
"PO-Revision-Date: 2021-06-26 09:39-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -13,6 +13,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-15 05:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
#. type: Content of: <title>
@@ -80,6 +81,14 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://"
"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
"brick them remotely</a>."
Index: proprietary/po/all.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.ru.po,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -b -r1.51 -r1.52
--- proprietary/po/all.ru.po 6 Sep 2021 10:03:46 -0000 1.51
+++ proprietary/po/all.ru.po 15 Sep 2021 06:03:44 -0000 1.52
@@ -9,7 +9,7 @@
msgid ""
msgstr ""
"Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
"PO-Revision-Date: 2021-04-27 13:06+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -17,6 +17,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-15 05:55+0000\n"
#. type: Content of: <title>
msgid ""
@@ -85,6 +86,14 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://"
"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
"brick them remotely</a>."
Index: proprietary/po/de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.338
retrieving revision 1.339
diff -u -b -r1.338 -r1.339
--- proprietary/po/de.po 4 Sep 2021 08:37:13 -0000 1.338
+++ proprietary/po/de.po 15 Sep 2021 06:03:44 -0000 1.339
@@ -662,6 +662,14 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://"
"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
"brick them remotely</a>."
Index: proprietary/po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.483
retrieving revision 1.484
diff -u -b -r1.483 -r1.484
--- proprietary/po/es.po 4 Sep 2021 08:37:13 -0000 1.483
+++ proprietary/po/es.po 15 Sep 2021 06:03:45 -0000 1.484
@@ -616,6 +616,14 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://"
"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
"brick them remotely</a>."
Index: proprietary/po/fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.598
retrieving revision 1.599
diff -u -b -r1.598 -r1.599
--- proprietary/po/fr.po 4 Sep 2021 10:22:06 -0000 1.598
+++ proprietary/po/fr.po 15 Sep 2021 06:03:45 -0000 1.599
@@ -502,6 +502,14 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://"
"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
"brick them remotely</a>."
Index: proprietary/po/it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.338
retrieving revision 1.339
diff -u -b -r1.338 -r1.339
--- proprietary/po/it.po 4 Sep 2021 08:37:13 -0000 1.338
+++ proprietary/po/it.po 15 Sep 2021 06:03:45 -0000 1.339
@@ -628,6 +628,14 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://"
"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
"brick them remotely</a>."
Index: proprietary/po/ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.346
retrieving revision 1.347
diff -u -b -r1.346 -r1.347
--- proprietary/po/ja.po 4 Sep 2021 08:37:13 -0000 1.346
+++ proprietary/po/ja.po 15 Sep 2021 06:03:45 -0000 1.347
@@ -471,6 +471,14 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://"
"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
"brick them remotely</a>."
Index: proprietary/po/nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.339
retrieving revision 1.340
diff -u -b -r1.339 -r1.340
--- proprietary/po/nl.po 4 Sep 2021 08:37:14 -0000 1.339
+++ proprietary/po/nl.po 15 Sep 2021 06:03:45 -0000 1.340
@@ -449,6 +449,14 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://"
"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
"brick them remotely</a>."
Index: proprietary/po/pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.338
retrieving revision 1.339
diff -u -b -r1.338 -r1.339
--- proprietary/po/pl.po 4 Sep 2021 08:37:14 -0000 1.338
+++ proprietary/po/pl.po 15 Sep 2021 06:03:45 -0000 1.339
@@ -438,6 +438,14 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://"
"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
"brick them remotely</a>."
Index: proprietary/po/pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.337
retrieving revision 1.338
diff -u -b -r1.337 -r1.338
--- proprietary/po/pot 4 Sep 2021 08:37:14 -0000 1.337
+++ proprietary/po/pot 15 Sep 2021 06:03:45 -0000 1.338
@@ -368,6 +368,14 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://"
"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
"brick them remotely</a>."
Index: proprietary/po/proprietary-insecurity.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de-diff.html,v
retrieving revision 1.90
retrieving revision 1.91
diff -u -b -r1.90 -r1.91
--- proprietary/po/proprietary-insecurity.de-diff.html 11 Aug 2021 02:03:49
-0000 1.90
+++ proprietary/po/proprietary-insecurity.de-diff.html 15 Sep 2021 06:03:45
-0000 1.91
@@ -90,13 +90,23 @@
<p>If you know of an example</em></ins></span> that <span
class="removed"><del><strong>whenever</strong></del></span> <span
class="inserted"><ins><em>ought to be in this page but isn't
here, please write
to <a
href="mailto:webmasters@gnu.org"><webmasters@gnu.org></a>
-to inform us. Please include the URL of a trustworthy reference or two
+to inform us. Please include the URL of</em></ins></span> a <span
class="inserted"><ins><em>trustworthy reference or two
to serve as specific substantiation.</p>
</div>
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
+ <li id="M202108170">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-08</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Various models of</em></ins></span> security <span
class="removed"><del><strong>hole in</strong></del></span> <span
class="inserted"><ins><em>cameras, DVRs,
+ and baby monitors that run proprietary software <a
+ href="https://www.wired.com/story/kalay-iot-bug-video-feeds/">are
+ exploited by</em></ins></span> a <span class="inserted"><ins><em>security
vulnerability that could give attackers access
+ to live feeds</a>.</p>
+ </li>
+
<li id="M202107180">
<!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -104,10 +114,10 @@
href="https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones">
The pegasus spyware used vulnerabilities on proprietary smartphone
operating systems</a> to impose surveillance on people. It can record
- people's calls, copy their messages, and secretly film them,
using</em></ins></span> a
- security <span class="removed"><del><strong>hole in</strong></del></span>
<span class="inserted"><ins><em>vulnerability. There's also <a
-
href="https://info.lookout.com/rs/051-ESQ-475/images/lookout-pegasus-technical-analysis.pdf"></em></ins></span>
- a <span class="inserted"><ins><em>technical analysis of this
spyware</a> available in PDF format.</p>
+ people's calls, copy their messages, and secretly film them, using a
+ security vulnerability. There's also <a
+
href="https://info.lookout.com/rs/051-ESQ-475/images/lookout-pegasus-technical-analysis.pdf">
+ a technical analysis of this spyware</a> available in PDF
format.</p>
<p>A</em></ins></span> free <span
class="removed"><del><strong>program</strong></del></span> <span
class="inserted"><ins><em>operating system would've let people to fix the bugs
for
themselves but now infected people will be compelled to wait for
corporations to
@@ -160,13 +170,13 @@
<li id="M202105040">
<!--#set var="DATE" value='<small
class="date-tag">2021-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A motorcycle company named Klim is selling airbag
+ <p>A motorcycle company named Klim</em></ins></span> is <span
class="removed"><del><strong>discovered.</strong></del></span> <span
class="inserted"><ins><em>selling airbag
vests with different payment methods, one of them is through a <a
href="https://www.vice.com/en/article/93yyyd/this-motorcycle-airbag-vest-will-stop-working-if-you-miss-a-payment">proprietary
subscription-based option that will block the vest from inflating if
the payments don't go through</a>.</p>
- <p>They say there</em></ins></span> is <span
class="removed"><del><strong>discovered.</strong></del></span> <span
class="inserted"><ins><em>a 30-days grace period if you miss a payment
+ <p>They say there is a 30-days grace period if you miss a payment
but the grace period is no excuse to the insecurity.</p>
</li>
@@ -207,13 +217,13 @@
<p><a
href="/philosophy/surveillance-vs-democracy.html">It</em></ins></span> is
<span class="removed"><del><strong>often quite sloppy.</p>
-<p>It would be equally incorrect</strong></del></span> <span
class="inserted"><ins><em>injustice
- to the public</a> for gyms, stores, hospitals, jails, and schools to
+<p>It would be equally incorrect</strong></del></span> <span
class="inserted"><ins><em>injustice</em></ins></span>
+ to <span class="removed"><del><strong>compare</strong></del></span> <span
class="inserted"><ins><em>the public</a> for gyms, stores, hospitals,
jails, and schools to
hand “security” footage to a company from which the government
can
collect it at any time, without even telling them.</p>
<p><small>Please note that the article
- wrongly refers</em></ins></span> to <span
class="removed"><del><strong>compare</strong></del></span> <span
class="inserted"><ins><em>crackers as “<a
+ wrongly refers to crackers as “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
</li>
@@ -411,21 +421,21 @@
Apple's proprietary software makes</em></ins></span> users
<span class="removed"><del><strong><em>helpless</strong></del></span>
<span class="inserted"><ins><em>totally dependent on Apple
for even a modicum of security. It also means that the devices do
- not even try</em></ins></span> to <span class="removed"><del><strong>fix
any</strong></del></span> <span class="inserted"><ins><em>offer security
against Apple itself.</p>
+ not even try</em></ins></span> to <span class="removed"><del><strong>fix
any</strong></del></span> <span
class="inserted"><ins><em>offer</em></ins></span> security <span
class="removed"><del><strong>problems</strong></del></span> <span
class="inserted"><ins><em>against Apple itself.</p>
</li>
<li id="M201908020">
<!--#set var="DATE" value='<small
class="date-tag">2019-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Out of 21 gratis Android antivirus apps
- that were tested by</em></ins></span> security <span
class="removed"><del><strong>problems</strong></del></span> <span
class="inserted"><ins><em>researchers, eight <a
+ <p>Out of 21 gratis Android antivirus apps</em></ins></span>
+ that <span class="removed"><del><strong>arise</em>.
Keeping</strong></del></span> <span class="inserted"><ins><em>were tested by
security researchers, eight <a
href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/">
failed to detect a test virus</a>. All of them asked for dangerous
permissions or contained advertising trackers, with seven being more
- risky than the average of the 100 most popular Android apps.</p>
+ risky than</em></ins></span> the
+<span class="removed"><del><strong>users helpless is what's culpable
about</strong></del></span> <span class="inserted"><ins><em>average of the 100
most popular Android apps.</p>
- <p><small>(Note</em></ins></span> that <span
class="removed"><del><strong>arise</em>. Keeping</strong></del></span>
the
-<span class="removed"><del><strong>users helpless is what's culpable
about</strong></del></span> <span class="inserted"><ins><em>article refers to
these</em></ins></span> proprietary <span
class="removed"><del><strong>software.</p>
+ <p><small>(Note that the article refers to
these</em></ins></span> proprietary <span
class="removed"><del><strong>software.</p>
<p>If you know</strong></del></span> <span
class="inserted"><ins><em>apps as
“free”. It should have said “gratis”
@@ -500,7 +510,7 @@
<li id="M201808130">
<!--#set var="DATE" value='<small
class="date-tag">2018-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Since</em></ins></span> the <span
class="removed"><del><strong>URL</strong></del></span> <span
class="inserted"><ins><em>beginning of 2017, <a
+ <p>Since</em></ins></span> the <span
class="removed"><del><strong>URL</strong></del></span> <span
class="inserted"><ins><em>beginning</em></ins></span> of <span
class="inserted"><ins><em>2017, <a
href="https://qz.com/1131515/google-collects-android-users-locations-even-when-location-services-are-disabled/">Android
phones have been collecting the addresses of nearby cellular
towers</a>, even when location services are disabled, and sending
@@ -510,27 +520,27 @@
<li id="M201808120">
<!--#set var="DATE" value='<small
class="date-tag">2018-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Crackers found a way to break the security</em></ins></span> of
<span class="inserted"><ins><em>an Amazon device,
+ <p>Crackers found</em></ins></span> a <span
class="removed"><del><strong>trustworthy reference</strong></del></span> <span
class="inserted"><ins><em>way to break the security of an Amazon device,
and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
- turn it into</em></ins></span> a <span
class="removed"><del><strong>trustworthy reference</strong></del></span> <span
class="inserted"><ins><em>listening device</a> for them.</p>
+ turn it into a listening device</a> for them.</p>
<p>It was very difficult for them to do this. The job would be much
easier for Amazon. And if some government such as China</em></ins></span>
or <span class="removed"><del><strong>two</strong></del></span> <span
class="inserted"><ins><em>the US
- told Amazon to do this, or cease to sell the product in that country,
+ told Amazon to do this, or cease</em></ins></span> to <span
class="removed"><del><strong>present</strong></del></span> <span
class="inserted"><ins><em>sell</em></ins></span> the <span
class="removed"><del><strong>specifics.</p>
+
+<ul>
+<li></strong></del></span> <span class="inserted"><ins><em>product in
that country,
do you think Amazon would have the moral fiber to say no?</p>
<p><small>(These crackers are probably hackers too, but please
<a
href="https://stallman.org/articles/on-hacking.html"> don't use
- “hacking”</em></ins></span> to <span
class="removed"><del><strong>present</strong></del></span> <span
class="inserted"><ins><em>mean “breaking
security”</a>.)</small></p>
+ “hacking” to mean “breaking
security”</a>.)</small></p>
</li>
<li id="M201807100">
<!--#set var="DATE" value='<small
class="date-tag">2018-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Siri, Alexa, and all</em></ins></span> the <span
class="removed"><del><strong>specifics.</p>
-
-<ul>
-<li></strong></del></span> <span class="inserted"><ins><em>other
voice-control systems can be <a
+ <p>Siri, Alexa, and all the other voice-control systems can be <a
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">
hijacked by programs that play commands in ultrasound that humans
can't hear</a>.</p>
@@ -1240,8 +1250,8 @@
<li>
<p><a
href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html">
-The FTC punished a company for making webcams with bad security so
-that it was easy</strong></del></span> for <span
class="removed"><del><strong>anyone to watch them</a>.
+The FTC punished a company</strong></del></span> for <span
class="removed"><del><strong>making webcams with bad security so
+that it was easy for anyone to watch them</a>.
</p>
</li>
@@ -1299,10 +1309,12 @@
from the state. Quite the contrary: confiding your data to someone
else's server, if not first encrypted by you with free software,
undermines your <span class="removed"><del><strong>rights.
-</p></strong></del></span> <span
class="inserted"><ins><em>rights.</p>
+</p></strong></del></span> <span
class="inserted"><ins><em>rights.</p></em></ins></span>
</li>
- <li id="M201404250">
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201404250">
<!--#set var="DATE" value='<small
class="date-tag">2014-04</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Lots of <a
@@ -1315,12 +1327,10 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The <a
href="http://arstechnica.com/security/2014/02/crypto-weaknesses-in-whatsapp-the-kind-of-stuff-the-nsa-would-love/">insecurity
- of WhatsApp</a> makes eavesdropping a
snap.</p></em></ins></span>
+ of WhatsApp</a> makes eavesdropping a snap.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201312290">
+ <li id="M201312290">
<!--#set var="DATE" value='<small
class="date-tag">2013-12</small>'
--><!--#echo encoding="none" var="DATE" --></em></ins></span>
<p><a href="http://www.bunniestudios.com/blog/?p=3554"> Some
flash
@@ -1504,7 +1514,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/08/11 02:03:49 $
+$Date: 2021/09/15 06:03:45 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.188
retrieving revision 1.189
diff -u -b -r1.188 -r1.189
--- proprietary/po/proprietary-insecurity.de.po 11 Aug 2021 02:03:49 -0000
1.188
+++ proprietary/po/proprietary-insecurity.de.po 15 Sep 2021 06:03:45 -0000
1.189
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-08-11 01:55+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
"PO-Revision-Date: 2018-08-29 02:41+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -175,6 +175,14 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
Index: proprietary/po/proprietary-insecurity.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.es.po,v
retrieving revision 1.127
retrieving revision 1.128
diff -u -b -r1.127 -r1.128
--- proprietary/po/proprietary-insecurity.es.po 11 Aug 2021 09:02:53 -0000
1.127
+++ proprietary/po/proprietary-insecurity.es.po 15 Sep 2021 06:03:45 -0000
1.128
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-08-11 01:55+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: \n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-15 05:55+0000\n"
"X-Generator: Poedit 2.2.1\n"
#. type: Content of: <title>
@@ -141,6 +142,14 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
Index: proprietary/po/proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.276
retrieving revision 1.277
diff -u -b -r1.276 -r1.277
--- proprietary/po/proprietary-insecurity.fr.po 11 Aug 2021 06:28:36 -0000
1.276
+++ proprietary/po/proprietary-insecurity.fr.po 15 Sep 2021 06:03:45 -0000
1.277
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-08-11 01:55+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
"PO-Revision-Date: 2021-08-11 08:26+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-15 05:55+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -141,6 +142,14 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
Index: proprietary/po/proprietary-insecurity.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it-diff.html,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -b -r1.103 -r1.104
--- proprietary/po/proprietary-insecurity.it-diff.html 11 Aug 2021 02:03:49
-0000 1.103
+++ proprietary/po/proprietary-insecurity.it-diff.html 15 Sep 2021 06:03:45
-0000 1.104
@@ -76,11 +76,11 @@
the handling</em></ins></span> of
<span class="removed"><del><strong>proprietary</strong></del></span> <span
class="inserted"><ins><em>the bugs: free</em></ins></span> software <span
class="inserted"><ins><em>users are able to study the
program and/or fix the bugs they find, often in communities</em></ins></span>
as <span class="removed"><del><strong>perfect, but</strong></del></span> <span
class="inserted"><ins><em>they are
-able to share the program, while proprietary program users are forced to
+able to share</em></ins></span> the <span
class="removed"><del><strong>press</strong></del></span> <span
class="inserted"><ins><em>program, while proprietary program users are forced to
rely on the program's developer for fixes.</p>
-<p>If</em></ins></span> the <span
class="removed"><del><strong>press</strong></del></span> <span
class="inserted"><ins><em>developer does not care to fix the problem
—</em></ins></span> often <span
class="removed"><del><strong>implicitly</strong></del></span> <span
class="inserted"><ins><em>the case for
+<p>If the developer does not care to fix the problem
—</em></ins></span> often <span
class="removed"><del><strong>implicitly</strong></del></span> <span
class="inserted"><ins><em>the case for
embedded software and old releases — the users are sunk. But if the
developer</em></ins></span> does <span class="inserted"><ins><em>send a
corrected version, it may contain new malicious
functionalities as well as bug fixes.</p>
@@ -90,13 +90,23 @@
<p>If you know of an example</em></ins></span> that <span
class="removed"><del><strong>whenever</strong></del></span> <span
class="inserted"><ins><em>ought to be in this page but isn't
here, please write
to <a
href="mailto:webmasters@gnu.org"><webmasters@gnu.org></a>
-to inform us. Please include the URL of a trustworthy reference or two
+to inform us. Please include the URL of</em></ins></span> a <span
class="inserted"><ins><em>trustworthy reference or two
to serve as specific substantiation.</p>
</div>
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
+ <li id="M202108170">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-08</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Various models of</em></ins></span> security <span
class="removed"><del><strong>hole in</strong></del></span> <span
class="inserted"><ins><em>cameras, DVRs,
+ and baby monitors that run proprietary software <a
+ href="https://www.wired.com/story/kalay-iot-bug-video-feeds/">are
+ exploited by</em></ins></span> a <span class="inserted"><ins><em>security
vulnerability that could give attackers access
+ to live feeds</a>.</p>
+ </li>
+
<li id="M202107180">
<!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -104,10 +114,10 @@
href="https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones">
The pegasus spyware used vulnerabilities on proprietary smartphone
operating systems</a> to impose surveillance on people. It can record
- people's calls, copy their messages, and secretly film them,
using</em></ins></span> a
- security <span class="removed"><del><strong>hole in</strong></del></span>
<span class="inserted"><ins><em>vulnerability. There's also <a
-
href="https://info.lookout.com/rs/051-ESQ-475/images/lookout-pegasus-technical-analysis.pdf"></em></ins></span>
- a <span class="inserted"><ins><em>technical analysis of this
spyware</a> available in PDF format.</p>
+ people's calls, copy their messages, and secretly film them, using a
+ security vulnerability. There's also <a
+
href="https://info.lookout.com/rs/051-ESQ-475/images/lookout-pegasus-technical-analysis.pdf">
+ a technical analysis of this spyware</a> available in PDF
format.</p>
<p>A</em></ins></span> free <span
class="removed"><del><strong>program</strong></del></span> <span
class="inserted"><ins><em>operating system would've let people to fix the bugs
for
themselves but now infected people will be compelled to wait for
corporations to
@@ -152,7 +162,7 @@
<p><a
href="https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-to-chinese-government-conflicts-with-apples-privacy-first-focus/">Apple
is moving its Chinese customers' iCloud data to a datacenter controlled
- by the Chinese government</a>. Apple</em></ins></span> is <span
class="removed"><del><strong>discovered.</strong></del></span> <span
class="inserted"><ins><em>already storing the encryption
+ by the Chinese government</a>. Apple is already storing the
encryption
keys on these servers, obeying Chinese authority, making all Chinese
user data available to the government.</p>
</li>
@@ -167,7 +177,7 @@
the payments don't go through</a>.</p>
<p>They say there is a 30-days grace period if you miss a payment
- but the grace period is no excuse to the insecurity.</p>
+ but the grace period</em></ins></span> is <span
class="removed"><del><strong>discovered.</strong></del></span> <span
class="inserted"><ins><em>no excuse to the insecurity.</p>
</li>
<li id="M202105030">
@@ -192,14 +202,14 @@
be used to launch remote code execution (RCE) attacks</a> has been
disclosed by researchers.</em></ins></span> The
<span class="removed"><del><strong>examples below show</strong></del></span>
<span class="inserted"><ins><em>researchers demonstrated a three-bug
- attack chain</em></ins></span> that <span class="inserted"><ins><em>caused
an RCE on a target machine, all this without
+ attack chain that caused an RCE on a target machine, all this without
any form of user interaction.</p>
</li>
<li id="M202103090">
<!--#set var="DATE" value='<small
class="date-tag">2021-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p><a
href="https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach-of-150-000-security-cams">Over
150 thousand security cameras that used Verkada
+ <p><a
href="https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach-of-150-000-security-cams">Over
150 thousand security cameras</em></ins></span> that <span
class="inserted"><ins><em>used Verkada
company's</em></ins></span> proprietary software <span
class="removed"><del><strong>isn't perfect,</strong></del></span> <span
class="inserted"><ins><em>are cracked</a> by a major security
breach. Crackers have had access to security archives of various
gyms, hospitals, jails, schools,</em></ins></span> and <span
class="inserted"><ins><em>police stations that have used
@@ -208,12 +218,12 @@
<p><a
href="/philosophy/surveillance-vs-democracy.html">It</em></ins></span> is
<span class="removed"><del><strong>often quite sloppy.</p>
<p>It would be equally incorrect</strong></del></span> <span
class="inserted"><ins><em>injustice
- to the public</a> for gyms, stores, hospitals, jails, and
schools</em></ins></span> to <span
class="removed"><del><strong>compare</strong></del></span>
- <span class="inserted"><ins><em>hand “security” footage to a
company from which the government can
+ to the public</a> for gyms, stores, hospitals, jails, and schools to
+ hand “security” footage to a company from which the government
can
collect it at any time, without even telling them.</p>
<p><small>Please note that the article
- wrongly refers to crackers as “<a
+ wrongly refers</em></ins></span> to <span
class="removed"><del><strong>compare</strong></del></span> <span
class="inserted"><ins><em>crackers as “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
</li>
@@ -378,7 +388,7 @@
href="/philosophy/words-to-avoid.html#Hacker">“hackers”</a>)
managed to interfere the Amazon Ring proprietary system, and <a
href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras">access
- its camera, speakers</em></ins></span> and <span
class="inserted"><ins><em>microphones</a>.</p>
+ its camera, speakers and microphones</a>.</p>
</li>
<li id="M201911190">
@@ -387,7 +397,7 @@
<p>Internet-tethered Amazon Ring had
a security vulnerability that enabled attackers to <a
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
- access the user's wifi password</a>, and snoop on the household
+ access the user's wifi password</a>,</em></ins></span> and <span
class="inserted"><ins><em>snoop on the household
through connected surveillance devices.</p>
<p>Knowledge of the wifi password would</em></ins></span> not <span
class="removed"><del><strong>culpable.</strong></del></span> <span
class="inserted"><ins><em>be sufficient to carry
@@ -666,16 +676,16 @@
enables malware authors to capture keystrokes without taking the risk
of being classified as malicious task by AV
<span class="removed"><del><strong>heuristics”.
- </p>
-</li>
-<li>
+ </p></strong></del></span> <span
class="inserted"><ins><em>heuristics”.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong><li>
<p>The proprietary code that runs pacemakers, insulin pumps, and other
medical devices is <a
href="http://www.bbc.co.uk/news/technology-40042584">
-full of gross security faults</a>.</p></strong></del></span> <span
class="inserted"><ins><em>heuristics”.</p></em></ins></span>
- </li>
+full of gross security faults</a>.</p>
+</li>
-<span class="removed"><del><strong><li></strong></del></span>
+<li></strong></del></span>
<span class="inserted"><ins><em><li id="M201705120">
<!--#set var="DATE" value='<small
class="date-tag">2017-05</small>'
@@ -1080,19 +1090,19 @@
can't trust it. Western Digital's “My Passport” drives <a
<span
class="removed"><del><strong>href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">have</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.vice.com/en/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">
have</em></ins></span> a back <span
class="removed"><del><strong>door</a>.
-</p>
-</li>
+</p></strong></del></span> <span
class="inserted"><ins><em>door</a>.</p></em></ins></span>
+ </li>
-<li>
+<span class="removed"><del><strong><li>
<p>
Mac OS X had an
<a
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
intentional local back door for 4 years</a>, which could be
exploited by attackers to gain root privileges.
-</p></strong></del></span> <span
class="inserted"><ins><em>door</a>.</p></em></ins></span>
- </li>
+</p>
+</li>
-<span class="removed"><del><strong><li></strong></del></span>
+<li></strong></del></span>
<span class="inserted"><ins><em><li id="M201508120">
<!--#set var="DATE" value='<small
class="date-tag">2015-08</small>'
@@ -1477,7 +1487,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/08/11 02:03:49 $
+$Date: 2021/09/15 06:03:45 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.205
retrieving revision 1.206
diff -u -b -r1.205 -r1.206
--- proprietary/po/proprietary-insecurity.it.po 11 Aug 2021 02:03:49 -0000
1.205
+++ proprietary/po/proprietary-insecurity.it.po 15 Sep 2021 06:03:45 -0000
1.206
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-08-11 01:55+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
"PO-Revision-Date: 2017-12-31 13:13+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -165,6 +165,14 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
Index: proprietary/po/proprietary-insecurity.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja-diff.html,v
retrieving revision 1.124
retrieving revision 1.125
diff -u -b -r1.124 -r1.125
--- proprietary/po/proprietary-insecurity.ja-diff.html 11 Aug 2021 02:03:49
-0000 1.124
+++ proprietary/po/proprietary-insecurity.ja-diff.html 15 Sep 2021 06:03:45
-0000 1.125
@@ -97,6 +97,16 @@
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
+ <li id="M202108170">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-08</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Various models of security cameras, DVRs,
+ and baby monitors that run proprietary software <a
+ href="https://www.wired.com/story/kalay-iot-bug-video-feeds/">are
+ exploited by a security vulnerability that could give attackers access
+ to live feeds</a>.</p>
+ </li>
+
<li id="M202107180">
<!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -429,10 +439,9 @@
<!--#set var="DATE" value='<small
class="date-tag">2019-07</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Many Android apps can track
- users' movements</em></ins></span> even <span
class="removed"><del><strong>introduce</strong></del></span> <span
class="inserted"><ins><em>when the user says <a
+ users' movements even when the user says <a
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
- not to allow</em></ins></span> them
-<span class="removed"><del><strong>deliberately,</strong></del></span> <span
class="inserted"><ins><em>access to locations</a>.</p>
+ not to allow them access to locations</a>.</p>
<p>This involves an apparently unintentional weakness in Android,
exploited intentionally by malicious apps.</p>
@@ -443,11 +452,11 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Users caught in the jail of an iMonster are <a
href="https://boingboing.net/2019/05/15/brittle-security.html"> sitting
- ducks for other attackers</a>,</em></ins></span> and <span
class="removed"><del><strong><em>the</strong></del></span> <span
class="inserted"><ins><em>the app censorship prevents security
+ ducks for other attackers</a>, and the app censorship prevents
security
companies from figuring out how those attacks work.</p>
<p>Apple's censorship of apps is fundamentally unjust, and would be
- inexcusable even if it didn't lead to security threats as well.</p>
+ inexcusable</em></ins></span> even <span
class="removed"><del><strong>introduce</strong></del></span> <span
class="inserted"><ins><em>if it didn't lead to security threats as
well.</p>
</li>
<li id="M201903210">
@@ -607,7 +616,8 @@
<p>That is a malicious functionality, but in addition it
is a gross insecurity since anyone, including malicious crackers, <a
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">can
- find those accounts and use them to get into users'
cameras</a>.</p>
+ find those accounts and use</em></ins></span> them
+<span class="removed"><del><strong>deliberately,</strong></del></span> <span
class="inserted"><ins><em>to get into users' cameras</a>.</p>
</li>
<li id="M201706050">
@@ -621,7 +631,7 @@
<p>The vulnerability allowed a cracker to access
the computer's Intel Active Management Technology (AMT) <a
href="https://arstechnica.com/security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-anyone-thought/">
- web interface with an empty password and gave administrative
+ web interface with an empty password</em></ins></span> and <span
class="removed"><del><strong><em>the</strong></del></span> <span
class="inserted"><ins><em>gave administrative
access</a> to access the computer's keyboard, mouse, monitor among
other privileges.</p>
@@ -1007,19 +1017,19 @@
can't trust it. Western Digital's “My Passport” drives <a
<span
class="removed"><del><strong>href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">have</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.vice.com/en/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">
have</em></ins></span> a back <span
class="removed"><del><strong>door</a>.
-</p></strong></del></span> <span
class="inserted"><ins><em>door</a>.</p></em></ins></span>
- </li>
+</p>
+</li>
-<span class="removed"><del><strong><li>
+<li>
<p>
Mac OS X had an
<a
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
intentional local back door for 4 years</a>, which could be
exploited by attackers to gain root privileges.
-</p>
-</li>
+</p></strong></del></span> <span
class="inserted"><ins><em>door</a>.</p></em></ins></span>
+ </li>
-<li></strong></del></span>
+<span class="removed"><del><strong><li></strong></del></span>
<span class="inserted"><ins><em><li id="M201508120">
<!--#set var="DATE" value='<small
class="date-tag">2015-08</small>'
@@ -1198,10 +1208,12 @@
from the state. Quite the contrary: confiding your data to someone
else's server, if not first encrypted by you with free software,
undermines your <span class="removed"><del><strong>rights.
-</p></strong></del></span> <span
class="inserted"><ins><em>rights.</p>
+</p></strong></del></span> <span
class="inserted"><ins><em>rights.</p></em></ins></span>
</li>
- <li id="M201404250">
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201404250">
<!--#set var="DATE" value='<small
class="date-tag">2014-04</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Lots of <a
@@ -1214,12 +1226,10 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The <a
href="http://arstechnica.com/security/2014/02/crypto-weaknesses-in-whatsapp-the-kind-of-stuff-the-nsa-would-love/">insecurity
- of WhatsApp</a> makes eavesdropping a
snap.</p></em></ins></span>
+ of WhatsApp</a> makes eavesdropping a snap.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201312290">
+ <li id="M201312290">
<!--#set var="DATE" value='<small
class="date-tag">2013-12</small>'
--><!--#echo encoding="none" var="DATE" --></em></ins></span>
<p><a href="http://www.bunniestudios.com/blog/?p=3554"> Some
flash
@@ -1404,7 +1414,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/08/11 02:03:49 $
+$Date: 2021/09/15 06:03:45 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-insecurity.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja.po,v
retrieving revision 1.177
retrieving revision 1.178
diff -u -b -r1.177 -r1.178
--- proprietary/po/proprietary-insecurity.ja.po 11 Aug 2021 02:03:49 -0000
1.177
+++ proprietary/po/proprietary-insecurity.ja.po 15 Sep 2021 06:03:46 -0000
1.178
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-08-11 01:55+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
"PO-Revision-Date: 2016-10-31 12:56+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -141,6 +141,14 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
Index: proprietary/po/proprietary-insecurity.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pot,v
retrieving revision 1.143
retrieving revision 1.144
diff -u -b -r1.143 -r1.144
--- proprietary/po/proprietary-insecurity.pot 11 Aug 2021 02:03:49 -0000
1.143
+++ proprietary/po/proprietary-insecurity.pot 15 Sep 2021 06:03:46 -0000
1.144
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-08-11 01:55+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -106,6 +106,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a "
+"href=\"https://www.wired.com/story/kalay-iot-bug-video-feeds/\">are "
+"exploited by a security vulnerability that could give attackers access to "
+"live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a "
"href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones\">
"
"The pegasus spyware used vulnerabilities on proprietary smartphone operating "
Index: proprietary/po/proprietary-insecurity.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pt-br.po,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary/po/proprietary-insecurity.pt-br.po 6 Sep 2021 01:03:49
-0000 1.17
+++ proprietary/po/proprietary-insecurity.pt-br.po 15 Sep 2021 06:03:46
-0000 1.18
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-08-11 01:55+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
"PO-Revision-Date: 2021-06-26 09:40-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -13,6 +13,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-15 05:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
#. type: Content of: <title>
@@ -134,6 +135,14 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
Index: proprietary/po/proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.317
retrieving revision 1.318
diff -u -b -r1.317 -r1.318
--- proprietary/po/proprietary-insecurity.ru.po 11 Aug 2021 02:03:49 -0000
1.317
+++ proprietary/po/proprietary-insecurity.ru.po 15 Sep 2021 06:03:46 -0000
1.318
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-08-11 01:55+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-15 05:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -138,6 +139,14 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-"
"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
"vulnerabilities on proprietary smartphone operating systems</a> to impose "
Index: proprietary/po/proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.295
retrieving revision 1.296
diff -u -b -r1.295 -r1.296
--- proprietary/po/proprietary.de-diff.html 4 Sep 2021 08:37:15 -0000
1.295
+++ proprietary/po/proprietary.de-diff.html 15 Sep 2021 06:03:46 -0000
1.296
@@ -29,9 +29,9 @@
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%; width: max-content;
overflow: auto;
border: .2em solid #e0dfda;
@@ -58,16 +58,16 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
+#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
}
-#TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
+#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration:
none;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC a:hover { text-decoration: underline; }
-->
</style>
<style type="text/css" media="print,screen">
@@ -137,19 +137,19 @@
</tr>
<tr>
<td>
- <ul class="columns"></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li>
- <li><a
href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
- <li><a
href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
+ <ul class="columns">
+ <li><a
href="/proprietary/proprietary-addictions.html">Addictions</a></li>
+ <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
<li><a
href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
<li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
<li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
@@ -224,6 +224,16 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202108170">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-08</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Various models of security cameras, DVRs,
+ and baby monitors that run proprietary software <a
+ href="https://www.wired.com/story/kalay-iot-bug-video-feeds/">are
+ exploited by a security vulnerability that could give attackers access
+ to live feeds</a>.</p>
+ </li>
+
<li id="M202108240">
<!--#set var="DATE" value='<small
class="date-tag">2021-08</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -283,18 +293,6 @@
wrongly refers to crackers as “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
</li>
-
- <li id="M202107050">
- <!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
-
href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation">
- Advertising companies are experimenting to manipulate people's
- minds</a>, and impose a new way of advertising by altering their
- dreams. This “targeted dream incubation” would trigger
- “refreshing dreams” of the product, according to the
- companies.</p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -358,7 +356,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/09/04 08:37:15 $
+$Date: 2021/09/15 06:03:46 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.312
retrieving revision 1.313
diff -u -b -r1.312 -r1.313
--- proprietary/po/proprietary.de.po 4 Sep 2021 08:37:15 -0000 1.312
+++ proprietary/po/proprietary.de.po 15 Sep 2021 06:03:46 -0000 1.313
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -480,6 +480,14 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://"
"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
"brick them remotely</a>."
@@ -553,15 +561,6 @@
"the flaw, if they fix it."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
-"dream-incubation\"> Advertising companies are experimenting to manipulate "
-"people's minds</a>, and impose a new way of advertising by altering their "
-"dreams. This “targeted dream incubation” would trigger “"
-"refreshing dreams” of the product, according to the companies."
-msgstr ""
-
#. type: Content of: <div><p>
# | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
# | devices</a>-] {+href=\"/proprietary/all.html\">More items…</a>+}
Index: proprietary/po/proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.512
retrieving revision 1.513
diff -u -b -r1.512 -r1.513
--- proprietary/po/proprietary.es.po 6 Sep 2021 08:36:45 -0000 1.512
+++ proprietary/po/proprietary.es.po 15 Sep 2021 06:03:46 -0000 1.513
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-15 05:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -341,6 +342,14 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://"
"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
"brick them remotely</a>."
@@ -436,20 +445,6 @@
"instrucciones para aprovechar ese fallo, pero los usuarios de de Windows "
"tendrán que esperar a que Microsoft lo arregle, si es que lo hace."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
-"dream-incubation\"> Advertising companies are experimenting to manipulate "
-"people's minds</a>, and impose a new way of advertising by altering their "
-"dreams. This “targeted dream incubation” would trigger “"
-"refreshing dreams” of the product, according to the companies."
-msgstr ""
-"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
-"dream-incubation\">Hay empresas de publicidad que están experimentando con "
-"la manipulación de la mente</a>, y buscan una nueva forma de publicidad "
-"alterando los sueños de la gente. Según esas empresas, esta «incubación "
-"selectiva de sueños» activarÃa «sueños estimulantes» del producto."
-
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr "<a href=\"/proprietary/all.html\">Ver más…</a>"
@@ -528,3 +523,18 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Ãltima actualización:"
+
+#~ msgid ""
+#~ "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-"
+#~ "targeted-dream-incubation\"> Advertising companies are experimenting to "
+#~ "manipulate people's minds</a>, and impose a new way of advertising by "
+#~ "altering their dreams. This “targeted dream incubation” would "
+#~ "trigger “refreshing dreams” of the product, according to the "
+#~ "companies."
+#~ msgstr ""
+#~ "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-"
+#~ "targeted-dream-incubation\">Hay empresas de publicidad que están "
+#~ "experimentando con la manipulación de la mente</a>, y buscan una nueva "
+#~ "forma de publicidad alterando los sueños de la gente. Según esas "
+#~ "empresas, esta «incubación selectiva de sueños» activarÃa «sueños "
+#~ "estimulantes» del producto."
Index: proprietary/po/proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.532
retrieving revision 1.533
diff -u -b -r1.532 -r1.533
--- proprietary/po/proprietary.fr.po 4 Sep 2021 10:22:07 -0000 1.532
+++ proprietary/po/proprietary.fr.po 15 Sep 2021 06:03:46 -0000 1.533
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
"PO-Revision-Date: 2021-09-04 12:15+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-15 05:55+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -338,6 +339,14 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://"
"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
"brick them remotely</a>."
@@ -430,20 +439,6 @@
"de Windows attendent toujours que Microsoft la corrige â si cela arrive un "
"jour."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
-"dream-incubation\"> Advertising companies are experimenting to manipulate "
-"people's minds</a>, and impose a new way of advertising by altering their "
-"dreams. This “targeted dream incubation” would trigger “"
-"refreshing dreams” of the product, according to the companies."
-msgstr ""
-"Des publicitaires sont en train d'expérimenter une technique de manipulation
"
-"mentale consistant à <a
href=\"https://www.theguardian.com/media/2021/jul/05/"
-"advertisers-targeted-dream-incubation\">altérer les rêves</a> pour "
-"promouvoir un produit. D'après eux, cette « incubation ciblée des rêvesÂ
» "
-"est censée provoquer chez le sujet des « rêves de réactivation »."
-
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr "<a href=\"/proprietary/all.html\">Voir plus…</a>"
@@ -516,3 +511,18 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-"
+#~ "targeted-dream-incubation\"> Advertising companies are experimenting to "
+#~ "manipulate people's minds</a>, and impose a new way of advertising by "
+#~ "altering their dreams. This “targeted dream incubation” would "
+#~ "trigger “refreshing dreams” of the product, according to the "
+#~ "companies."
+#~ msgstr ""
+#~ "Des publicitaires sont en train d'expérimenter une technique de "
+#~ "manipulation mentale consistant à <a href=\"https://www.theguardian.com/"
+#~ "media/2021/jul/05/advertisers-targeted-dream-incubation\">altérer les "
+#~ "rêves</a> pour promouvoir un produit. D'après eux, cette « incubation "
+#~ "ciblée des rêves » est censée provoquer chez le sujet des « rêves
de "
+#~ "réactivation »."
Index: proprietary/po/proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.305
retrieving revision 1.306
diff -u -b -r1.305 -r1.306
--- proprietary/po/proprietary.it-diff.html 4 Sep 2021 08:37:15 -0000
1.305
+++ proprietary/po/proprietary.it-diff.html 15 Sep 2021 06:03:46 -0000
1.306
@@ -29,9 +29,9 @@
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%; width: max-content;
overflow: auto;
border: .2em solid #e0dfda;
@@ -58,16 +58,16 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
+#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
}
-#TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
+#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration:
none;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC a:hover { text-decoration: underline; }
-->
</style>
<style type="text/css" media="print,screen">
@@ -137,19 +137,19 @@
</tr>
<tr>
<td>
- <ul class="columns">
- <li><a
href="/proprietary/proprietary-addictions.html">Addictions</a></li>
- <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
+ <ul class="columns"></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li>
+ <li><a
href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
+ <li><a
href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
<li><a
href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
<li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
<li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
@@ -223,6 +223,16 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202108170">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-08</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Various models of security cameras, DVRs,
+ and baby monitors that run proprietary software <a
+ href="https://www.wired.com/story/kalay-iot-bug-video-feeds/">are
+ exploited by a security vulnerability that could give attackers access
+ to live feeds</a>.</p>
+ </li>
+
<li id="M202108240">
<!--#set var="DATE" value='<small
class="date-tag">2021-08</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -282,18 +292,6 @@
wrongly refers to crackers as “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
</li>
-
- <li id="M202107050">
- <!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
-
href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation">
- Advertising companies are experimenting to manipulate people's
- minds</a>, and impose a new way of advertising by altering their
- dreams. This “targeted dream incubation” would trigger
- “refreshing dreams” of the product, according to the
- companies.</p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -357,7 +355,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/09/04 08:37:15 $
+$Date: 2021/09/15 06:03:46 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.321
retrieving revision 1.322
diff -u -b -r1.321 -r1.322
--- proprietary/po/proprietary.it.po 4 Sep 2021 08:37:15 -0000 1.321
+++ proprietary/po/proprietary.it.po 15 Sep 2021 06:03:46 -0000 1.322
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -485,6 +485,14 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://"
"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
"brick them remotely</a>."
@@ -546,15 +554,6 @@
"the flaw, if they fix it."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
-"dream-incubation\"> Advertising companies are experimenting to manipulate "
-"people's minds</a>, and impose a new way of advertising by altering their "
-"dreams. This “targeted dream incubation” would trigger “"
-"refreshing dreams” of the product, according to the companies."
-msgstr ""
-
#. type: Content of: <div><p>
# | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
# | devices</a>-] {+href=\"/proprietary/all.html\">More items…</a>+}
Index: proprietary/po/proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.310
retrieving revision 1.311
diff -u -b -r1.310 -r1.311
--- proprietary/po/proprietary.ja-diff.html 4 Sep 2021 08:37:15 -0000
1.310
+++ proprietary/po/proprietary.ja-diff.html 15 Sep 2021 06:03:46 -0000
1.311
@@ -57,14 +57,14 @@
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom:
.5em; margin: 0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
}
#TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
+#TOC a:hover { text-decoration: underline;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -129,8 +129,7 @@
<li><a href="/proprietary/malware-mobiles.html">Malware in
mobile devices</a></li>
<li><a href="/proprietary/malware-kindle-swindle.html">Malware
in</strong></del></span> <span class="inserted"><ins><em>make other changes,
subscribe to</em></ins></span> the <span class="removed"><del><strong>Amazon
- Swindle</a></li>
- <li><a href="/proprietary/malware-games.html">Malware in
games</a></li></strong></del></span> <span
class="inserted"><ins><em><a
+ Swindle</a></li></strong></del></span> <span
class="inserted"><ins><em><a
href="https://lists.gnu.org/mailman/listinfo/www-malware-commits">mailing
list
<www-malware-commits@gnu.org></a>.</p>
@@ -142,7 +141,8 @@
<tr>
<td>
<ul class="columns"></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li>
+ <li><a href="/proprietary/malware-appliances.html">Malware in
appliances</a></li>
</ul>
</div>
@@ -166,8 +166,8 @@
<li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary-tethers.html">Tethers</a> (<a
href="#f4">4</a>)</li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html">Tethers</a>
to
-servers</li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-tyrants.html">Tyrants</a> (<a
href="#f5">5</a>)</li>
- <li><a href="/proprietary/potential-malware.html">In the
pipe</a></li>
+servers</li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-tyrants.html">Tyrants</a> (<a
href="#f5">5</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/potential-malware.html">In the
pipe</a></li>
</ul>
</td>
<td>
@@ -179,8 +179,8 @@
<li><a
href="/proprietary/malware-webpages.html">Webpages</a></li>
<li><a
href="/proprietary/malware-in-online-conferencing.html">Conferencing</a></li>
</ul>
- <ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li>
+ <ul>
+ <li><a
href="/proprietary/malware-adobe.html">Adobe</a></li>
<li><a
href="/proprietary/malware-amazon.html">Amazon</a></li>
<li><a
href="/proprietary/malware-apple.html">Apple</a></li>
<li><a
href="/proprietary/malware-google.html">Google</a></li>
@@ -205,10 +205,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -228,6 +228,16 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202108170">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-08</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Various models of security cameras, DVRs,
+ and baby monitors that run proprietary software <a
+ href="https://www.wired.com/story/kalay-iot-bug-video-feeds/">are
+ exploited by a security vulnerability that could give attackers access
+ to live feeds</a>.</p>
+ </li>
+
<li id="M202108240">
<!--#set var="DATE" value='<small
class="date-tag">2021-08</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -287,18 +297,6 @@
wrongly refers to crackers as “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
</li>
-
- <li id="M202107050">
- <!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
-
href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation">
- Advertising companies are experimenting to manipulate people's
- minds</a>, and impose a new way of advertising by altering their
- dreams. This “targeted dream incubation” would trigger
- “refreshing dreams” of the product, according to the
- companies.</p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -362,7 +360,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/09/04 08:37:15 $
+$Date: 2021/09/15 06:03:46 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.304
retrieving revision 1.305
diff -u -b -r1.304 -r1.305
--- proprietary/po/proprietary.ja.po 4 Sep 2021 08:37:15 -0000 1.304
+++ proprietary/po/proprietary.ja.po 15 Sep 2021 06:03:46 -0000 1.305
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -343,6 +343,14 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://"
"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
"brick them remotely</a>."
@@ -404,15 +412,6 @@
"the flaw, if they fix it."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
-"dream-incubation\"> Advertising companies are experimenting to manipulate "
-"people's minds</a>, and impose a new way of advertising by altering their "
-"dreams. This “targeted dream incubation” would trigger “"
-"refreshing dreams” of the product, according to the companies."
-msgstr ""
-
#. type: Content of: <div><p>
#, fuzzy
#| msgid "<a href=\"/proprietary/malware-mobiles.html\">Mobiles</a>"
Index: proprietary/po/proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.306
retrieving revision 1.307
diff -u -b -r1.306 -r1.307
--- proprietary/po/proprietary.nl-diff.html 4 Sep 2021 08:37:15 -0000
1.306
+++ proprietary/po/proprietary.nl-diff.html 15 Sep 2021 06:03:46 -0000
1.307
@@ -29,9 +29,9 @@
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%; width: max-content;
overflow: auto;
border: .2em solid #e0dfda;
@@ -58,16 +58,16 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
+#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
}
-#TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
+#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration:
none;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC a:hover { text-decoration: underline; }
-->
</style>
<style type="text/css" media="print,screen">
@@ -137,20 +137,20 @@
</tr>
<tr>
<td>
- <ul class="columns">
- <li><a
href="/proprietary/proprietary-addictions.html">Addictions</a></li>
- <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-phones.html">Malware
in phones</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html">Manipulation</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
+ <ul class="columns"></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-phones.html">Malware
in phones</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
+ <li><a
href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
+ <li><a
href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
<li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
<li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
<li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
@@ -223,6 +223,16 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202108170">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-08</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Various models of security cameras, DVRs,
+ and baby monitors that run proprietary software <a
+ href="https://www.wired.com/story/kalay-iot-bug-video-feeds/">are
+ exploited by a security vulnerability that could give attackers access
+ to live feeds</a>.</p>
+ </li>
+
<li id="M202108240">
<!--#set var="DATE" value='<small
class="date-tag">2021-08</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -282,18 +292,6 @@
wrongly refers to crackers as “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
</li>
-
- <li id="M202107050">
- <!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
-
href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation">
- Advertising companies are experimenting to manipulate people's
- minds</a>, and impose a new way of advertising by altering their
- dreams. This “targeted dream incubation” would trigger
- “refreshing dreams” of the product, according to the
- companies.</p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -357,7 +355,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/09/04 08:37:15 $
+$Date: 2021/09/15 06:03:46 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.295
retrieving revision 1.296
diff -u -b -r1.295 -r1.296
--- proprietary/po/proprietary.nl.po 4 Sep 2021 08:37:15 -0000 1.295
+++ proprietary/po/proprietary.nl.po 15 Sep 2021 06:03:46 -0000 1.296
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
"Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -388,6 +388,14 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://"
"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
"brick them remotely</a>."
@@ -449,15 +457,6 @@
"the flaw, if they fix it."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
-"dream-incubation\"> Advertising companies are experimenting to manipulate "
-"people's minds</a>, and impose a new way of advertising by altering their "
-"dreams. This “targeted dream incubation” would trigger “"
-"refreshing dreams” of the product, according to the companies."
-msgstr ""
-
#. type: Content of: <div><p>
# | <a [-href=\"/proprietary/malware-mobiles.html\">Mobiles</a>-]
# | {+href=\"/proprietary/all.html\">More items…</a>+}
Index: proprietary/po/proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.322
retrieving revision 1.323
diff -u -b -r1.322 -r1.323
--- proprietary/po/proprietary.pl-diff.html 4 Sep 2021 08:37:15 -0000
1.322
+++ proprietary/po/proprietary.pl-diff.html 15 Sep 2021 06:03:46 -0000
1.323
@@ -56,7 +56,7 @@
#TOC ul { padding-top: .5em; margin: 0; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom:
.5em; margin: 0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
@@ -64,7 +64,7 @@
text-decoration: none;
}
#TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
+#TOC a:hover { text-decoration: underline;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -121,8 +121,8 @@
<hr class="thin" />
</div>
-<p>As of July, 2021, the pages in this directory list around 500
-instances</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>malicious functionalities (with more than 610
references to
+<p>As</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>July, 2021, the pages in this directory list
around 500
+instances of malicious functionalities (with more than 610 references to
back them up), but there are surely thousands more we don't know
about.</p>
<p>If you want to be notified when we add new items or make other
changes,
@@ -167,11 +167,11 @@
<ul>
<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
- <li><a
href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li>
+ <li><a
href="/proprietary/malware-cars.html">Cars</a></li>
+ <li><a
href="/proprietary/malware-games.html">Games</a></li>
<li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li>
- <li><a
href="/proprietary/malware-webpages.html">Webpages</a></li>
- <li><a
href="/proprietary/malware-in-online-conferencing.html">Conferencing</a></li>
+ <li><a
href="/proprietary/malware-webpages.html">Webpages</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html">Conferencing</a></li>
</ul>
<ul></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
@@ -222,6 +222,16 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202108170">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-08</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Various models of security cameras, DVRs,
+ and baby monitors that run proprietary software <a
+ href="https://www.wired.com/story/kalay-iot-bug-video-feeds/">are
+ exploited by a security vulnerability that could give attackers access
+ to live feeds</a>.</p>
+ </li>
+
<li id="M202108240">
<!--#set var="DATE" value='<small
class="date-tag">2021-08</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -281,18 +291,6 @@
wrongly refers to crackers as “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
</li>
-
- <li id="M202107050">
- <!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
-
href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation">
- Advertising companies are experimenting to manipulate people's
- minds</a>, and impose a new way of advertising by altering their
- dreams. This “targeted dream incubation” would trigger
- “refreshing dreams” of the product, according to the
- companies.</p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -356,7 +354,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/09/04 08:37:15 $
+$Date: 2021/09/15 06:03:46 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.287
retrieving revision 1.288
diff -u -b -r1.287 -r1.288
--- proprietary/po/proprietary.pl.po 4 Sep 2021 08:37:15 -0000 1.287
+++ proprietary/po/proprietary.pl.po 15 Sep 2021 06:03:46 -0000 1.288
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -569,6 +569,14 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://"
"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
"brick them remotely</a>."
@@ -630,15 +638,6 @@
"the flaw, if they fix it."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
-"dream-incubation\"> Advertising companies are experimenting to manipulate "
-"people's minds</a>, and impose a new way of advertising by altering their "
-"dreams. This “targeted dream incubation” would trigger “"
-"refreshing dreams” of the product, according to the companies."
-msgstr ""
-
#. type: Content of: <div><p>
# | <a [-href=\"/philosophy/malware-mobiles.html\">Malware in mobile
# | devices</a>-] {+href=\"/proprietary/all.html\">More items…</a>+}
Index: proprietary/po/proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.284
retrieving revision 1.285
diff -u -b -r1.284 -r1.285
--- proprietary/po/proprietary.pot 4 Sep 2021 08:37:15 -0000 1.284
+++ proprietary/po/proprietary.pot 15 Sep 2021 06:03:46 -0000 1.285
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -280,6 +280,15 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a "
+"href=\"https://www.wired.com/story/kalay-iot-bug-video-feeds/\">are "
+"exploited by a security vulnerability that could give attackers access to "
+"live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent Samsung TVs have a back door with which Samsung can <a "
"href=\"https://www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\">
"
"brick them remotely</a>."
@@ -340,16 +349,6 @@
"the flaw, if they fix it."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a "
-"href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation\">
"
-"Advertising companies are experimenting to manipulate people's minds</a>, "
-"and impose a new way of advertising by altering their dreams. This "
-"“targeted dream incubation” would trigger “refreshing "
-"dreams” of the product, according to the companies."
-msgstr ""
-
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr ""
Index: proprietary/po/proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.452
retrieving revision 1.453
diff -u -b -r1.452 -r1.453
--- proprietary/po/proprietary.pt-br.po 6 Sep 2021 01:03:49 -0000 1.452
+++ proprietary/po/proprietary.pt-br.po 15 Sep 2021 06:03:46 -0000 1.453
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
"PO-Revision-Date: 2021-06-13 12:11-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-15 05:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1)\n"
"X-Generator: Gtranslator 40.0\n"
@@ -335,6 +336,14 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://"
"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
"brick them remotely</a>."
@@ -428,20 +437,6 @@
"como a falha poderia ser explorada, mas os usuários do Windows ainda devem "
"esperar que a Microsoft conserte a falha, se ela consertar."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
-"dream-incubation\"> Advertising companies are experimenting to manipulate "
-"people's minds</a>, and impose a new way of advertising by altering their "
-"dreams. This “targeted dream incubation” would trigger “"
-"refreshing dreams” of the product, according to the companies."
-msgstr ""
-"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
-"dream-incubation\"> As empresas de publicidade estão experimentando "
-"manipular a mente das pessoas</a> e impor uma nova forma de publicidade "
-"alterando seus sonhos. Esta âincubação de sonhos direcionadosâ
desencadearia "
-"âsonhos revigorantesâ do produto, segundo as empresas."
-
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr "<a href=\"/proprietary/all.html\">Mais itensâ¦</a>"
@@ -517,6 +512,21 @@
msgstr "Ãltima atualização:"
#~ msgid ""
+#~ "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-"
+#~ "targeted-dream-incubation\"> Advertising companies are experimenting to "
+#~ "manipulate people's minds</a>, and impose a new way of advertising by "
+#~ "altering their dreams. This “targeted dream incubation” would "
+#~ "trigger “refreshing dreams” of the product, according to the "
+#~ "companies."
+#~ msgstr ""
+#~ "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-"
+#~ "targeted-dream-incubation\"> As empresas de publicidade estão "
+#~ "experimentando manipular a mente das pessoas</a> e impor uma nova forma "
+#~ "de publicidade alterando seus sonhos. Esta âincubação de sonhos "
+#~ "direcionadosâ desencadearia âsonhos revigorantesâ do produto,
segundo as "
+#~ "empresas."
+
+#~ msgid ""
#~ "Peloton company which produces treadmills recently <a href=\"https://www."
#~ "bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-"
#~ "monthly-subscription-after-recall/\">locked people out of basic features "
Index: proprietary/po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.548
retrieving revision 1.549
diff -u -b -r1.548 -r1.549
--- proprietary/po/proprietary.ru.po 6 Sep 2021 10:03:53 -0000 1.548
+++ proprietary/po/proprietary.ru.po 15 Sep 2021 06:03:46 -0000 1.549
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-15 05:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -340,6 +341,14 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://"
"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
"brick them remotely</a>."
@@ -434,20 +443,6 @@
"Windows вÑе Ñавно Ð´Ð¾Ð»Ð¶Ð½Ñ Ð¶Ð´Ð°ÑÑ, пока Microsoft ее
ÑÑÑÑаниÑ, еÑли они вообÑе "
"ÑÑо ÑделаÑÑ."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
-"dream-incubation\"> Advertising companies are experimenting to manipulate "
-"people's minds</a>, and impose a new way of advertising by altering their "
-"dreams. This “targeted dream incubation” would trigger “"
-"refreshing dreams” of the product, according to the companies."
-msgstr ""
-"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
-"dream-incubation\"> РекламнÑе компании пÑоводÑÑ
опÑÑÑ Ð¿Ð¾ манипÑлÑÑиÑм "
-"Ñознанием лÑдей</a>, ÑÑÐ¾Ð±Ñ Ð½Ð°Ð²ÑзÑваÑÑ Ð½Ð¾Ð²Ñй
ÑпоÑоб ÑекламÑ, изменÑÑ Ð¸Ñ
"
-"меÑÑÑ. ÐÑа “инкÑбаÑÐ¸Ñ Ñелевой меÑÑÑ”
пÑивела Ð±Ñ Ðº “"
-"оÑвежаÑÑей меÑÑе” о пÑодÑкÑе, по
заÑвлениÑм компании."
-
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr "<a href=\"/proprietary/all.html\">Ðалее...</a>"
@@ -525,6 +520,20 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-"
+#~ "targeted-dream-incubation\"> Advertising companies are experimenting to "
+#~ "manipulate people's minds</a>, and impose a new way of advertising by "
+#~ "altering their dreams. This “targeted dream incubation” would "
+#~ "trigger “refreshing dreams” of the product, according to the "
+#~ "companies."
+#~ msgstr ""
+#~ "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-"
+#~ "targeted-dream-incubation\"> РекламнÑе компании
пÑоводÑÑ Ð¾Ð¿ÑÑÑ Ð¿Ð¾ "
+#~ "манипÑлÑÑиÑм Ñознанием лÑдей</a>, ÑÑобÑ
навÑзÑваÑÑ Ð½Ð¾Ð²Ñй ÑпоÑоб ÑекламÑ, "
+#~ "изменÑÑ Ð¸Ñ
меÑÑÑ. ÐÑа “инкÑбаÑиÑ
Ñелевой меÑÑÑ” пÑивела Ð±Ñ Ðº "
+#~ "“оÑвежаÑÑей меÑÑе” о пÑодÑкÑе, по
заÑвлениÑм компании."
+
+#~ msgid ""
#~ "Peloton company which produces treadmills recently <a href=\"https://www."
#~ "bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-"
#~ "monthly-subscription-after-recall/\">locked people out of basic features "
Index: proprietary/po/proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.198
retrieving revision 1.199
diff -u -b -r1.198 -r1.199
--- proprietary/po/proprietary.tr.po 12 Sep 2021 06:55:45 -0000 1.198
+++ proprietary/po/proprietary.tr.po 15 Sep 2021 06:03:46 -0000 1.199
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
"PO-Revision-Date: 2021-09-12 08:53+0200\n"
"Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
"Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-15 05:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"X-Generator: Poedit 2.4.2\n"
@@ -336,6 +337,14 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://"
"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
"brick them remotely</a>."
@@ -429,20 +438,6 @@
"sızdırdı ancak Windows kullanıcıları yine de Microsoft'un (elbette
eÄer "
"onaracaksa) açıÄı onarmasını beklemek zorunda."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
-"dream-incubation\"> Advertising companies are experimenting to manipulate "
-"people's minds</a>, and impose a new way of advertising by altering their "
-"dreams. This “targeted dream incubation” would trigger “"
-"refreshing dreams” of the product, according to the companies."
-msgstr ""
-"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
-"dream-incubation\">Reklamveren Åirketler insanların zihnine müdahaleye "
-"yönelik deneyler yapıyorlar</a> ve insanların rüyasını deÄiÅtirerek
yeni bir "
-"reklam yolu dayatmaya çalıÅıyorlar. Åirketlere göre bu “hedefli
rüya "
-"tasarlama”, ürünün “ferahlatıcı rüyalarını”
tetikleyecek."
-
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr "<a href=\"/proprietary/all.html\">Daha fazlası…</a>"
@@ -524,6 +519,21 @@
msgstr "Son Güncelleme:"
#~ msgid ""
+#~ "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-"
+#~ "targeted-dream-incubation\"> Advertising companies are experimenting to "
+#~ "manipulate people's minds</a>, and impose a new way of advertising by "
+#~ "altering their dreams. This “targeted dream incubation” would "
+#~ "trigger “refreshing dreams” of the product, according to the "
+#~ "companies."
+#~ msgstr ""
+#~ "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-"
+#~ "targeted-dream-incubation\">Reklamveren Åirketler insanların zihnine "
+#~ "müdahaleye yönelik deneyler yapıyorlar</a> ve insanların rüyasını "
+#~ "deÄiÅtirerek yeni bir reklam yolu dayatmaya çalıÅıyorlar.
Åirketlere göre "
+#~ "bu “hedefli rüya tasarlama”, ürünün “ferahlatıcı "
+#~ "rüyalarını” tetikleyecek."
+
+#~ msgid ""
#~ "Peloton company which produces treadmills recently <a href=\"https://www."
#~ "bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-"
#~ "monthly-subscription-after-recall/\">locked people out of basic features "
Index: proprietary/po/proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.248
retrieving revision 1.249
diff -u -b -r1.248 -r1.249
--- proprietary/po/proprietary.zh-cn.po 9 Sep 2021 03:32:22 -0000 1.248
+++ proprietary/po/proprietary.zh-cn.po 15 Sep 2021 06:03:46 -0000 1.249
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
"PO-Revision-Date: 2021-09-09 10:52+0800\n"
"Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
"Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-15 05:55+0000\n"
"X-Generator: Poedit 2.3\n"
#. type: Content of: <title>
@@ -315,6 +316,14 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://"
"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
"brick them remotely</a>."
@@ -398,19 +407,6 @@
"å®å
¨ç
究æºææå¤æ³æ¼äºå¦ä½å©ç¨è¯¥æ¼æ´çæä½æ¥éª¤ï¼ä½æ¯ Windows
ç¨æ·è¿å¨çå¾
微软"
"对æ¤çä¿®å¤ï¼æè
æ¯å¦ä¿®å¤ã"
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
-"dream-incubation\"> Advertising companies are experimenting to manipulate "
-"people's minds</a>, and impose a new way of advertising by altering their "
-"dreams. This “targeted dream incubation” would trigger “"
-"refreshing dreams” of the product, according to the companies."
-msgstr ""
-"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
-"dream-incubation\">广åå
¬å¸æ£å¨è¯éªæç»´ææ§</a>ï¼ä¸ç§éè¿æ¹å梦å¢æ¥æ¤å
¥å¹¿åç"
-"æ°æ¹å¼ãè¿äºå
¬å¸å£°ç§°ï¼è¿ç§ “é对æ§æ¢¦å¢åµå”
ä¼æ¿å产åç “"
-"梦å¢å·æ°”ã"
-
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr "<a href=\"/proprietary/all.html\">æ´å¤å
容…</a>"
@@ -486,6 +482,19 @@
msgstr "æåæ´æ°ï¼"
#~ msgid ""
+#~ "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-"
+#~ "targeted-dream-incubation\"> Advertising companies are experimenting to "
+#~ "manipulate people's minds</a>, and impose a new way of advertising by "
+#~ "altering their dreams. This “targeted dream incubation” would "
+#~ "trigger “refreshing dreams” of the product, according to the "
+#~ "companies."
+#~ msgstr ""
+#~ "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-"
+#~ "targeted-dream-incubation\">广åå
¬å¸æ£å¨è¯éªæç»´ææ§</a>ï¼ä¸ç§éè¿æ¹å梦å¢"
+#~ "æ¥æ¤å
¥å¹¿åçæ°æ¹å¼ãè¿äºå
¬å¸å£°ç§°ï¼è¿ç§
“é对æ§æ¢¦å¢åµå” ä¼æ¿å"
+#~ "产åç “æ¢¦å¢å·æ°”ã"
+
+#~ msgid ""
#~ "Peloton company which produces treadmills recently <a href=\"https://www."
#~ "bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-"
#~ "monthly-subscription-after-recall/\">locked people out of basic features "
Index: proprietary/po/proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.285
retrieving revision 1.286
diff -u -b -r1.285 -r1.286
--- proprietary/po/proprietary.zh-tw-diff.html 4 Sep 2021 08:37:16 -0000
1.285
+++ proprietary/po/proprietary.zh-tw-diff.html 15 Sep 2021 06:03:46 -0000
1.286
@@ -29,9 +29,9 @@
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%; width: max-content;
overflow: auto;
border: .2em solid #e0dfda;
@@ -58,16 +58,16 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
+#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
}
-#TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
+#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration:
none;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC a:hover { text-decoration: underline; }
-->
</style>
<style type="text/css" media="print,screen">
@@ -137,19 +137,19 @@
</tr>
<tr>
<td>
- <ul class="columns"></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li>
- <li><a
href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
- <li><a
href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
+ <ul class="columns">
+ <li><a
href="/proprietary/proprietary-addictions.html">Addictions</a></li>
+ <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
<li><a
href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
<li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
<li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
@@ -224,6 +224,16 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202108170">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-08</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Various models of security cameras, DVRs,
+ and baby monitors that run proprietary software <a
+ href="https://www.wired.com/story/kalay-iot-bug-video-feeds/">are
+ exploited by a security vulnerability that could give attackers access
+ to live feeds</a>.</p>
+ </li>
+
<li id="M202108240">
<!--#set var="DATE" value='<small
class="date-tag">2021-08</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -283,18 +293,6 @@
wrongly refers to crackers as “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
</li>
-
- <li id="M202107050">
- <!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
-
href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation">
- Advertising companies are experimenting to manipulate people's
- minds</a>, and impose a new way of advertising by altering their
- dreams. This “targeted dream incubation” would trigger
- “refreshing dreams” of the product, according to the
- companies.</p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -358,7 +356,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/09/04 08:37:16 $
+$Date: 2021/09/15 06:03:46 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.274
retrieving revision 1.275
diff -u -b -r1.274 -r1.275
--- proprietary/po/proprietary.zh-tw.po 4 Sep 2021 08:37:16 -0000 1.274
+++ proprietary/po/proprietary.zh-tw.po 15 Sep 2021 06:03:46 -0000 1.275
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
"PO-Revision-Date: 2020-02-08 17:12+0800\n"
"Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
"Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -458,6 +458,14 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://"
"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
"brick them remotely</a>."
@@ -519,15 +527,6 @@
"the flaw, if they fix it."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-"
-"dream-incubation\"> Advertising companies are experimenting to manipulate "
-"people's minds</a>, and impose a new way of advertising by altering their "
-"dreams. This “targeted dream incubation” would trigger “"
-"refreshing dreams” of the product, according to the companies."
-msgstr ""
-
#. type: Content of: <div><p>
# | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
# | devices</a>-] {+href=\"/proprietary/all.html\">More items…</a>+}
Index: proprietary/po/pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.422
retrieving revision 1.423
diff -u -b -r1.422 -r1.423
--- proprietary/po/pt-br.po 5 Sep 2021 15:54:37 -0000 1.422
+++ proprietary/po/pt-br.po 15 Sep 2021 06:03:47 -0000 1.423
@@ -176,8 +176,8 @@
msgid ""
"<small>(Note that the article refers to the infected software as “"
"content management system”. A better term would be “<a href=\"/"
-"philosophy/words-to-avoid.html#Content\">website revision system</"
-"a>”.)</small>"
+"philosophy/words-to-avoid.html#Content\">website revision system</a>”.)"
+"</small>"
msgstr ""
"<small>(Note que o artigo se refere ao software infectado como âsistema de "
"gestão de conteúdoâ. Um termo melhor seria â<a
href=\"/philosophy/words-to-"
@@ -508,6 +508,14 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://"
"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
"brick them remotely</a>."
@@ -5619,8 +5627,8 @@
"windows-diagnostic-data-in-your-organization#full-level\"> “"
"Full” telemetry mode</a> allows Microsoft Windows engineers to access, "
"among other things, registry keys <a href=\"https://docs.microsoft.com/en-us/"
-"previous-versions/windows/it-pro/windows-2000-server/"
-"cc939702(v=technet.10)\"> which can contain sensitive information like "
+"previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\"> which can contain sensitive information like "
"administrator's login password</a>."
msgstr ""
"O <a href=\"https://docs.microsoft.com/pt-br/windows/privacy/configure-"
@@ -7816,8 +7824,8 @@
#. type: Content of: <div><div><p>
msgid ""
"<small>(Unfortunately, the last two articles use “free” to mean "
-"“zero price.” We recommend saying “gratis” "
-"instead.)</small>"
+"“zero price.” We recommend saying “gratis” instead.)"
+"</small>"
msgstr ""
"<small>(Infelizmente, os últimos dois artigos usam <i
lang=\"en\">âfreeâ</i> "
"no sentido de âpreço zeroâ. Nós recomendamos dizer
âgrátisâ.)</small>"
@@ -9268,8 +9276,8 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
"<small>(Note that this article misuses the words “<a href=\"/"
-"philosophy/free-sw.html\">free software</a>” referring to zero "
-"price.)</small>"
+"philosophy/free-sw.html\">free software</a>” referring to zero price.)"
+"</small>"
msgstr ""
"<small>(Note que este artigo usa indevidamente as palavras â<a href=\"/"
"philosophy/free-sw.html\"><i lang=\"en\">free software</i></a>â
referindo-se "
Index: proprietary/po/ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.708
retrieving revision 1.709
diff -u -b -r1.708 -r1.709
--- proprietary/po/ru.po 6 Sep 2021 10:33:28 -0000 1.708
+++ proprietary/po/ru.po 15 Sep 2021 06:03:47 -0000 1.709
@@ -509,6 +509,14 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://"
"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
"brick them remotely</a>."
Index: proprietary/po/tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.216
retrieving revision 1.217
diff -u -b -r1.216 -r1.217
--- proprietary/po/tr.po 12 Sep 2021 07:34:26 -0000 1.216
+++ proprietary/po/tr.po 15 Sep 2021 06:03:47 -0000 1.217
@@ -414,6 +414,14 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://"
"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
"brick them remotely</a>."
Index: proprietary/po/zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.217
retrieving revision 1.218
diff -u -b -r1.217 -r1.218
--- proprietary/po/zh-cn.po 9 Sep 2021 03:32:22 -0000 1.217
+++ proprietary/po/zh-cn.po 15 Sep 2021 06:03:47 -0000 1.218
@@ -414,6 +414,14 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://"
"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
"brick them remotely</a>."
Index: proprietary/po/zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.338
retrieving revision 1.339
diff -u -b -r1.338 -r1.339
--- proprietary/po/zh-tw.po 4 Sep 2021 08:37:16 -0000 1.338
+++ proprietary/po/zh-tw.po 15 Sep 2021 06:03:47 -0000 1.339
@@ -439,6 +439,14 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://"
"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
"brick them remotely</a>."
Index: thankgnus/po/2021supporters.pot
===================================================================
RCS file: /web/www/www/thankgnus/po/2021supporters.pot,v
retrieving revision 1.88
retrieving revision 1.89
diff -u -b -r1.88 -r1.89
--- thankgnus/po/2021supporters.pot 1 Sep 2021 14:37:25 -0000 1.88
+++ thankgnus/po/2021supporters.pot 15 Sep 2021 06:03:49 -0000 1.89
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: 2021supporters.html\n"
-"POT-Creation-Date: 2021-09-01 14:26+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -255,6 +255,10 @@
msgstr ""
#. type: Content of: <ul><li>
+msgid "Adam Van Ymeren"
+msgstr ""
+
+#. type: Content of: <ul><li>
msgid "Alan Stein"
msgstr ""
Index: thankgnus/po/2021supporters.pt-br.po
===================================================================
RCS file: /web/www/www/thankgnus/po/2021supporters.pt-br.po,v
retrieving revision 1.140
retrieving revision 1.141
diff -u -b -r1.140 -r1.141
--- thankgnus/po/2021supporters.pt-br.po 6 Sep 2021 01:03:51 -0000
1.140
+++ thankgnus/po/2021supporters.pt-br.po 15 Sep 2021 06:03:52 -0000
1.141
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: 2021supporters.html\n"
-"POT-Creation-Date: 2021-09-01 14:26+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
"PO-Revision-Date: 2021-09-05 12:46-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-15 05:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1)\n"
"X-Generator: Gtranslator 40.0\n"
@@ -273,6 +274,10 @@
msgstr "Acorn Pooley"
#. type: Content of: <ul><li>
+msgid "Adam Van Ymeren"
+msgstr ""
+
+#. type: Content of: <ul><li>
msgid "Alan Stein"
msgstr "Alan Stein"
- www proprietary/po/all.fr.po proprietary/po/all...,
GNUN <=