www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www proprietary/po/all.fr.po proprietary/po/all...


From: GNUN
Subject: www proprietary/po/all.fr.po proprietary/po/all...
Date: Wed, 15 Sep 2021 02:03:54 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     21/09/15 02:03:53

Modified files:
        proprietary/po : all.fr.po all.pot all.pt-br.po all.ru.po de.po 
                         es.po fr.po it.po ja.po nl.po pl.po pot 
                         proprietary-insecurity.de-diff.html 
                         proprietary-insecurity.de.po 
                         proprietary-insecurity.es.po 
                         proprietary-insecurity.fr.po 
                         proprietary-insecurity.it-diff.html 
                         proprietary-insecurity.it.po 
                         proprietary-insecurity.ja-diff.html 
                         proprietary-insecurity.ja.po 
                         proprietary-insecurity.pot 
                         proprietary-insecurity.pt-br.po 
                         proprietary-insecurity.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.tr.po 
                         proprietary.zh-cn.po 
                         proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po tr.po 
                         zh-cn.po zh-tw.po 
        thankgnus/po   : 2021supporters.pot 2021supporters.pt-br.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.fr.po?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.pot?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.pt-br.po?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.ru.po?cvsroot=www&r1=1.51&r2=1.52
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.338&r2=1.339
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.483&r2=1.484
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.598&r2=1.599
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.338&r2=1.339
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.346&r2=1.347
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.339&r2=1.340
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.338&r2=1.339
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.337&r2=1.338
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de-diff.html?cvsroot=www&r1=1.90&r2=1.91
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.188&r2=1.189
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.es.po?cvsroot=www&r1=1.127&r2=1.128
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.276&r2=1.277
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-diff.html?cvsroot=www&r1=1.103&r2=1.104
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.205&r2=1.206
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja-diff.html?cvsroot=www&r1=1.124&r2=1.125
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja.po?cvsroot=www&r1=1.177&r2=1.178
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pot?cvsroot=www&r1=1.143&r2=1.144
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pt-br.po?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.317&r2=1.318
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.295&r2=1.296
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.312&r2=1.313
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.512&r2=1.513
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.532&r2=1.533
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.305&r2=1.306
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.321&r2=1.322
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.310&r2=1.311
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.304&r2=1.305
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.306&r2=1.307
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.295&r2=1.296
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.322&r2=1.323
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.287&r2=1.288
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.284&r2=1.285
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.452&r2=1.453
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.548&r2=1.549
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.198&r2=1.199
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.248&r2=1.249
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.285&r2=1.286
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.274&r2=1.275
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.422&r2=1.423
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.708&r2=1.709
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.216&r2=1.217
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.217&r2=1.218
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.338&r2=1.339
http://web.cvs.savannah.gnu.org/viewcvs/www/thankgnus/po/2021supporters.pot?cvsroot=www&r1=1.88&r2=1.89
http://web.cvs.savannah.gnu.org/viewcvs/www/thankgnus/po/2021supporters.pt-br.po?cvsroot=www&r1=1.140&r2=1.141

Patches:
Index: proprietary/po/all.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.fr.po,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- proprietary/po/all.fr.po    4 Sep 2021 10:22:06 -0000       1.55
+++ proprietary/po/all.fr.po    15 Sep 2021 06:03:39 -0000      1.56
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
 "PO-Revision-Date: 2021-09-04 12:15+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-15 05:55+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -79,6 +80,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Recent Samsung TVs have a back door with which Samsung can <a href=\"https://";
 "www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
 "brick them remotely</a>."

Index: proprietary/po/all.pot
===================================================================
RCS file: /web/www/www/proprietary/po/all.pot,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- proprietary/po/all.pot      4 Sep 2021 08:37:13 -0000       1.29
+++ proprietary/po/all.pot      15 Sep 2021 06:03:44 -0000      1.30
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -74,6 +74,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a "
+"href=\"https://www.wired.com/story/kalay-iot-bug-video-feeds/\";>are "
+"exploited by a security vulnerability that could give attackers access to "
+"live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Recent Samsung TVs have a back door with which Samsung can <a "
 
"href=\"https://www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\";>
 "
 "brick them remotely</a>."

Index: proprietary/po/all.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.pt-br.po,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- proprietary/po/all.pt-br.po 6 Sep 2021 01:03:48 -0000       1.27
+++ proprietary/po/all.pt-br.po 15 Sep 2021 06:03:44 -0000      1.28
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
 "PO-Revision-Date: 2021-06-26 09:39-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -13,6 +13,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-15 05:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 
 #. type: Content of: <title>
@@ -80,6 +81,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Recent Samsung TVs have a back door with which Samsung can <a href=\"https://";
 "www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
 "brick them remotely</a>."

Index: proprietary/po/all.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.ru.po,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -b -r1.51 -r1.52
--- proprietary/po/all.ru.po    6 Sep 2021 10:03:46 -0000       1.51
+++ proprietary/po/all.ru.po    15 Sep 2021 06:03:44 -0000      1.52
@@ -9,7 +9,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
 "PO-Revision-Date: 2021-04-27 13:06+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -17,6 +17,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-15 05:55+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -85,6 +86,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Recent Samsung TVs have a back door with which Samsung can <a href=\"https://";
 "www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
 "brick them remotely</a>."

Index: proprietary/po/de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.338
retrieving revision 1.339
diff -u -b -r1.338 -r1.339
--- proprietary/po/de.po        4 Sep 2021 08:37:13 -0000       1.338
+++ proprietary/po/de.po        15 Sep 2021 06:03:44 -0000      1.339
@@ -662,6 +662,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Recent Samsung TVs have a back door with which Samsung can <a href=\"https://";
 "www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
 "brick them remotely</a>."

Index: proprietary/po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.483
retrieving revision 1.484
diff -u -b -r1.483 -r1.484
--- proprietary/po/es.po        4 Sep 2021 08:37:13 -0000       1.483
+++ proprietary/po/es.po        15 Sep 2021 06:03:45 -0000      1.484
@@ -616,6 +616,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Recent Samsung TVs have a back door with which Samsung can <a href=\"https://";
 "www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
 "brick them remotely</a>."

Index: proprietary/po/fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.598
retrieving revision 1.599
diff -u -b -r1.598 -r1.599
--- proprietary/po/fr.po        4 Sep 2021 10:22:06 -0000       1.598
+++ proprietary/po/fr.po        15 Sep 2021 06:03:45 -0000      1.599
@@ -502,6 +502,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Recent Samsung TVs have a back door with which Samsung can <a href=\"https://";
 "www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
 "brick them remotely</a>."

Index: proprietary/po/it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.338
retrieving revision 1.339
diff -u -b -r1.338 -r1.339
--- proprietary/po/it.po        4 Sep 2021 08:37:13 -0000       1.338
+++ proprietary/po/it.po        15 Sep 2021 06:03:45 -0000      1.339
@@ -628,6 +628,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Recent Samsung TVs have a back door with which Samsung can <a href=\"https://";
 "www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
 "brick them remotely</a>."

Index: proprietary/po/ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.346
retrieving revision 1.347
diff -u -b -r1.346 -r1.347
--- proprietary/po/ja.po        4 Sep 2021 08:37:13 -0000       1.346
+++ proprietary/po/ja.po        15 Sep 2021 06:03:45 -0000      1.347
@@ -471,6 +471,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Recent Samsung TVs have a back door with which Samsung can <a href=\"https://";
 "www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
 "brick them remotely</a>."

Index: proprietary/po/nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.339
retrieving revision 1.340
diff -u -b -r1.339 -r1.340
--- proprietary/po/nl.po        4 Sep 2021 08:37:14 -0000       1.339
+++ proprietary/po/nl.po        15 Sep 2021 06:03:45 -0000      1.340
@@ -449,6 +449,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Recent Samsung TVs have a back door with which Samsung can <a href=\"https://";
 "www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
 "brick them remotely</a>."

Index: proprietary/po/pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.338
retrieving revision 1.339
diff -u -b -r1.338 -r1.339
--- proprietary/po/pl.po        4 Sep 2021 08:37:14 -0000       1.338
+++ proprietary/po/pl.po        15 Sep 2021 06:03:45 -0000      1.339
@@ -438,6 +438,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Recent Samsung TVs have a back door with which Samsung can <a href=\"https://";
 "www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
 "brick them remotely</a>."

Index: proprietary/po/pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.337
retrieving revision 1.338
diff -u -b -r1.337 -r1.338
--- proprietary/po/pot  4 Sep 2021 08:37:14 -0000       1.337
+++ proprietary/po/pot  15 Sep 2021 06:03:45 -0000      1.338
@@ -368,6 +368,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Recent Samsung TVs have a back door with which Samsung can <a href=\"https://";
 "www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
 "brick them remotely</a>."

Index: proprietary/po/proprietary-insecurity.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de-diff.html,v
retrieving revision 1.90
retrieving revision 1.91
diff -u -b -r1.90 -r1.91
--- proprietary/po/proprietary-insecurity.de-diff.html  11 Aug 2021 02:03:49 
-0000      1.90
+++ proprietary/po/proprietary-insecurity.de-diff.html  15 Sep 2021 06:03:45 
-0000      1.91
@@ -90,13 +90,23 @@
 &lt;p&gt;If you know of an example</em></ins></span> that <span 
class="removed"><del><strong>whenever</strong></del></span> <span 
class="inserted"><ins><em>ought to be in this page but isn't
 here, please write
 to &lt;a 
href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;
-to inform us. Please include the URL of a trustworthy reference or two
+to inform us. Please include the URL of</em></ins></span> a <span 
class="inserted"><ins><em>trustworthy reference or two
 to serve as specific substantiation.&lt;/p&gt;
 &lt;/div&gt;
 
 &lt;div class="column-limit" id="proprietary-insecurity"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202108170"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Various models of</em></ins></span> security <span 
class="removed"><del><strong>hole in</strong></del></span> <span 
class="inserted"><ins><em>cameras, DVRs,
+    and baby monitors that run proprietary software &lt;a
+    href="https://www.wired.com/story/kalay-iot-bug-video-feeds/"&gt;are
+    exploited by</em></ins></span> a <span class="inserted"><ins><em>security 
vulnerability that could give attackers access
+    to live feeds&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202107180"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -104,10 +114,10 @@
     
href="https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones"&gt;
     The pegasus spyware used vulnerabilities on proprietary smartphone
     operating systems&lt;/a&gt; to impose surveillance on people. It can record
-    people's calls, copy their messages, and secretly film them, 
using</em></ins></span> a
-    security <span class="removed"><del><strong>hole in</strong></del></span> 
<span class="inserted"><ins><em>vulnerability. There's also &lt;a
-    
href="https://info.lookout.com/rs/051-ESQ-475/images/lookout-pegasus-technical-analysis.pdf"&gt;</em></ins></span>
-       a <span class="inserted"><ins><em>technical analysis of this 
spyware&lt;/a&gt; available in PDF format.&lt;/p&gt;
+    people's calls, copy their messages, and secretly film them, using a
+    security vulnerability. There's also &lt;a
+    
href="https://info.lookout.com/rs/051-ESQ-475/images/lookout-pegasus-technical-analysis.pdf"&gt;
+       a technical analysis of this spyware&lt;/a&gt; available in PDF 
format.&lt;/p&gt;
 
     &lt;p&gt;A</em></ins></span> free <span 
class="removed"><del><strong>program</strong></del></span> <span 
class="inserted"><ins><em>operating system would've let people to fix the bugs 
for
     themselves but now infected people will be compelled to wait for 
corporations to
@@ -160,13 +170,13 @@
   &lt;li id="M202105040"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A motorcycle company named Klim is selling airbag
+    &lt;p&gt;A motorcycle company named Klim</em></ins></span> is <span 
class="removed"><del><strong>discovered.</strong></del></span> <span 
class="inserted"><ins><em>selling airbag
     vests with different payment methods, one of them is through a &lt;a
     
href="https://www.vice.com/en/article/93yyyd/this-motorcycle-airbag-vest-will-stop-working-if-you-miss-a-payment"&gt;proprietary
     subscription-based option that will block the vest from inflating if
     the payments don't go through&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;They say there</em></ins></span> is <span 
class="removed"><del><strong>discovered.</strong></del></span> <span 
class="inserted"><ins><em>a 30-days grace period if you miss a payment
+    &lt;p&gt;They say there is a 30-days grace period if you miss a payment
     but the grace period is no excuse to the insecurity.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -207,13 +217,13 @@
 
     &lt;p&gt;&lt;a 
href="/philosophy/surveillance-vs-democracy.html"&gt;It</em></ins></span> is 
<span class="removed"><del><strong>often quite sloppy.&lt;/p&gt;
 
-&lt;p&gt;It would be equally incorrect</strong></del></span> <span 
class="inserted"><ins><em>injustice
-    to the public&lt;/a&gt; for gyms, stores, hospitals, jails, and schools to
+&lt;p&gt;It would be equally incorrect</strong></del></span> <span 
class="inserted"><ins><em>injustice</em></ins></span>
+    to <span class="removed"><del><strong>compare</strong></del></span> <span 
class="inserted"><ins><em>the public&lt;/a&gt; for gyms, stores, hospitals, 
jails, and schools to
     hand &ldquo;security&rdquo; footage to a company from which the government 
can
     collect it at any time, without even telling them.&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;Please note that the article
-    wrongly refers</em></ins></span> to <span 
class="removed"><del><strong>compare</strong></del></span> <span 
class="inserted"><ins><em>crackers as &ldquo;&lt;a
+    wrongly refers to crackers as &ldquo;&lt;a
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
@@ -411,21 +421,21 @@
     Apple's proprietary software makes</em></ins></span> users
 <span class="removed"><del><strong>&lt;em&gt;helpless</strong></del></span> 
<span class="inserted"><ins><em>totally dependent on Apple
     for even a modicum of security.  It also means that the devices do
-    not even try</em></ins></span> to <span class="removed"><del><strong>fix 
any</strong></del></span> <span class="inserted"><ins><em>offer security 
against Apple itself.&lt;/p&gt;
+    not even try</em></ins></span> to <span class="removed"><del><strong>fix 
any</strong></del></span> <span 
class="inserted"><ins><em>offer</em></ins></span> security <span 
class="removed"><del><strong>problems</strong></del></span> <span 
class="inserted"><ins><em>against Apple itself.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201908020"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Out of 21 gratis Android antivirus apps
-    that were tested by</em></ins></span> security <span 
class="removed"><del><strong>problems</strong></del></span> <span 
class="inserted"><ins><em>researchers, eight &lt;a
+    &lt;p&gt;Out of 21 gratis Android antivirus apps</em></ins></span>
+    that <span class="removed"><del><strong>arise&lt;/em&gt;.  
Keeping</strong></del></span> <span class="inserted"><ins><em>were tested by 
security researchers, eight &lt;a
     
href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/"&gt;
     failed to detect a test virus&lt;/a&gt;. All of them asked for dangerous
     permissions or contained advertising trackers, with seven being more
-    risky than the average of the 100 most popular Android apps.&lt;/p&gt;
+    risky than</em></ins></span> the
+<span class="removed"><del><strong>users helpless is what's culpable 
about</strong></del></span> <span class="inserted"><ins><em>average of the 100 
most popular Android apps.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(Note</em></ins></span> that <span 
class="removed"><del><strong>arise&lt;/em&gt;.  Keeping</strong></del></span> 
the
-<span class="removed"><del><strong>users helpless is what's culpable 
about</strong></del></span> <span class="inserted"><ins><em>article refers to 
these</em></ins></span> proprietary <span 
class="removed"><del><strong>software.&lt;/p&gt;
+    &lt;p&gt;&lt;small&gt;(Note that the article refers to 
these</em></ins></span> proprietary <span 
class="removed"><del><strong>software.&lt;/p&gt;
 
 &lt;p&gt;If you know</strong></del></span> <span 
class="inserted"><ins><em>apps as
     &ldquo;free&rdquo;. It should have said &ldquo;gratis&rdquo;
@@ -500,7 +510,7 @@
   &lt;li id="M201808130"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Since</em></ins></span> the <span 
class="removed"><del><strong>URL</strong></del></span> <span 
class="inserted"><ins><em>beginning of 2017, &lt;a
+    &lt;p&gt;Since</em></ins></span> the <span 
class="removed"><del><strong>URL</strong></del></span> <span 
class="inserted"><ins><em>beginning</em></ins></span> of <span 
class="inserted"><ins><em>2017, &lt;a
     
href="https://qz.com/1131515/google-collects-android-users-locations-even-when-location-services-are-disabled/"&gt;Android
     phones have been collecting the addresses of nearby cellular
     towers&lt;/a&gt;, even when location services are disabled, and sending
@@ -510,27 +520,27 @@
   &lt;li id="M201808120"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Crackers found a way to break the security</em></ins></span> of 
<span class="inserted"><ins><em>an Amazon device,
+    &lt;p&gt;Crackers found</em></ins></span> a <span 
class="removed"><del><strong>trustworthy reference</strong></del></span> <span 
class="inserted"><ins><em>way to break the security of an Amazon device,
     and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
-    turn it into</em></ins></span> a <span 
class="removed"><del><strong>trustworthy reference</strong></del></span> <span 
class="inserted"><ins><em>listening device&lt;/a&gt; for them.&lt;/p&gt;
+    turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
 
     &lt;p&gt;It was very difficult for them to do this. The job would be much
     easier for Amazon. And if some government such as China</em></ins></span> 
or <span class="removed"><del><strong>two</strong></del></span> <span 
class="inserted"><ins><em>the US
-    told Amazon to do this, or cease to sell the product in that country,
+    told Amazon to do this, or cease</em></ins></span> to <span 
class="removed"><del><strong>present</strong></del></span> <span 
class="inserted"><ins><em>sell</em></ins></span> the <span 
class="removed"><del><strong>specifics.&lt;/p&gt;
+
+&lt;ul&gt;
+&lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>product in 
that country,
     do you think Amazon would have the moral fiber to say no?&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;(These crackers are probably hackers too, but please 
&lt;a
     href="https://stallman.org/articles/on-hacking.html"&gt; don't use
-    &ldquo;hacking&rdquo;</em></ins></span> to <span 
class="removed"><del><strong>present</strong></del></span> <span 
class="inserted"><ins><em>mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
+    &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201807100"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Siri, Alexa, and all</em></ins></span> the <span 
class="removed"><del><strong>specifics.&lt;/p&gt;
-
-&lt;ul&gt;
-&lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>other 
voice-control systems can be &lt;a
+    &lt;p&gt;Siri, Alexa, and all the other voice-control systems can be &lt;a
     
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;
     hijacked by programs that play commands in ultrasound that humans
     can't hear&lt;/a&gt;.&lt;/p&gt;
@@ -1240,8 +1250,8 @@
 
 &lt;li&gt;
 &lt;p&gt;&lt;a 
href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html"&gt;
-The FTC punished a company for making webcams with bad security so
-that it was easy</strong></del></span> for <span 
class="removed"><del><strong>anyone to watch them&lt;/a&gt;.
+The FTC punished a company</strong></del></span> for <span 
class="removed"><del><strong>making webcams with bad security so
+that it was easy for anyone to watch them&lt;/a&gt;.
 &lt;/p&gt;
 &lt;/li&gt;
 
@@ -1299,10 +1309,12 @@
     from the state.  Quite the contrary: confiding your data to someone
     else's server, if not first encrypted by you with free software,
     undermines your <span class="removed"><del><strong>rights.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>rights.&lt;/p&gt;
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>rights.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201404250"&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201404250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Lots of &lt;a
@@ -1315,12 +1327,10 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The &lt;a
     
href="http://arstechnica.com/security/2014/02/crypto-weaknesses-in-whatsapp-the-kind-of-stuff-the-nsa-would-love/"&gt;insecurity
-    of WhatsApp&lt;/a&gt; makes eavesdropping a 
snap.&lt;/p&gt;</em></ins></span>
+    of WhatsApp&lt;/a&gt; makes eavesdropping a snap.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201312290"&gt;
+  &lt;li id="M201312290"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
     &lt;p&gt;&lt;a href="http://www.bunniestudios.com/blog/?p=3554"&gt; Some 
flash
@@ -1504,7 +1514,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/08/11 02:03:49 $
+$Date: 2021/09/15 06:03:45 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.188
retrieving revision 1.189
diff -u -b -r1.188 -r1.189
--- proprietary/po/proprietary-insecurity.de.po 11 Aug 2021 02:03:49 -0000      
1.188
+++ proprietary/po/proprietary-insecurity.de.po 15 Sep 2021 06:03:45 -0000      
1.189
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-08-11 01:55+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
 "PO-Revision-Date: 2018-08-29 02:41+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -175,6 +175,14 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "

Index: proprietary/po/proprietary-insecurity.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.es.po,v
retrieving revision 1.127
retrieving revision 1.128
diff -u -b -r1.127 -r1.128
--- proprietary/po/proprietary-insecurity.es.po 11 Aug 2021 09:02:53 -0000      
1.127
+++ proprietary/po/proprietary-insecurity.es.po 15 Sep 2021 06:03:45 -0000      
1.128
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-08-11 01:55+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: \n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-15 05:55+0000\n"
 "X-Generator: Poedit 2.2.1\n"
 
 #. type: Content of: <title>
@@ -141,6 +142,14 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "

Index: proprietary/po/proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.276
retrieving revision 1.277
diff -u -b -r1.276 -r1.277
--- proprietary/po/proprietary-insecurity.fr.po 11 Aug 2021 06:28:36 -0000      
1.276
+++ proprietary/po/proprietary-insecurity.fr.po 15 Sep 2021 06:03:45 -0000      
1.277
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-08-11 01:55+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
 "PO-Revision-Date: 2021-08-11 08:26+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-15 05:55+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -141,6 +142,14 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "

Index: proprietary/po/proprietary-insecurity.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it-diff.html,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -b -r1.103 -r1.104
--- proprietary/po/proprietary-insecurity.it-diff.html  11 Aug 2021 02:03:49 
-0000      1.103
+++ proprietary/po/proprietary-insecurity.it-diff.html  15 Sep 2021 06:03:45 
-0000      1.104
@@ -76,11 +76,11 @@
 the handling</em></ins></span> of
 <span class="removed"><del><strong>proprietary</strong></del></span> <span 
class="inserted"><ins><em>the bugs: free</em></ins></span> software <span 
class="inserted"><ins><em>users are able to study the
 program and/or fix the bugs they find, often in communities</em></ins></span> 
as <span class="removed"><del><strong>perfect, but</strong></del></span> <span 
class="inserted"><ins><em>they are
-able to share the program, while proprietary program users are forced to
+able to share</em></ins></span> the <span 
class="removed"><del><strong>press</strong></del></span> <span 
class="inserted"><ins><em>program, while proprietary program users are forced to
 rely on the program's developer for fixes.&lt;/p&gt;
 
 
-&lt;p&gt;If</em></ins></span> the <span 
class="removed"><del><strong>press</strong></del></span> <span 
class="inserted"><ins><em>developer does not care to fix the problem 
&mdash;</em></ins></span> often <span 
class="removed"><del><strong>implicitly</strong></del></span> <span 
class="inserted"><ins><em>the case for
+&lt;p&gt;If the developer does not care to fix the problem 
&mdash;</em></ins></span> often <span 
class="removed"><del><strong>implicitly</strong></del></span> <span 
class="inserted"><ins><em>the case for
 embedded software and old releases &mdash; the users are sunk. But if the
 developer</em></ins></span> does <span class="inserted"><ins><em>send a 
corrected version, it may contain new malicious
 functionalities as well as bug fixes.&lt;/p&gt;
@@ -90,13 +90,23 @@
 &lt;p&gt;If you know of an example</em></ins></span> that <span 
class="removed"><del><strong>whenever</strong></del></span> <span 
class="inserted"><ins><em>ought to be in this page but isn't
 here, please write
 to &lt;a 
href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;
-to inform us. Please include the URL of a trustworthy reference or two
+to inform us. Please include the URL of</em></ins></span> a <span 
class="inserted"><ins><em>trustworthy reference or two
 to serve as specific substantiation.&lt;/p&gt;
 &lt;/div&gt;
 
 &lt;div class="column-limit" id="proprietary-insecurity"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202108170"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Various models of</em></ins></span> security <span 
class="removed"><del><strong>hole in</strong></del></span> <span 
class="inserted"><ins><em>cameras, DVRs,
+    and baby monitors that run proprietary software &lt;a
+    href="https://www.wired.com/story/kalay-iot-bug-video-feeds/"&gt;are
+    exploited by</em></ins></span> a <span class="inserted"><ins><em>security 
vulnerability that could give attackers access
+    to live feeds&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202107180"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -104,10 +114,10 @@
     
href="https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones"&gt;
     The pegasus spyware used vulnerabilities on proprietary smartphone
     operating systems&lt;/a&gt; to impose surveillance on people. It can record
-    people's calls, copy their messages, and secretly film them, 
using</em></ins></span> a
-    security <span class="removed"><del><strong>hole in</strong></del></span> 
<span class="inserted"><ins><em>vulnerability. There's also &lt;a
-    
href="https://info.lookout.com/rs/051-ESQ-475/images/lookout-pegasus-technical-analysis.pdf"&gt;</em></ins></span>
-       a <span class="inserted"><ins><em>technical analysis of this 
spyware&lt;/a&gt; available in PDF format.&lt;/p&gt;
+    people's calls, copy their messages, and secretly film them, using a
+    security vulnerability. There's also &lt;a
+    
href="https://info.lookout.com/rs/051-ESQ-475/images/lookout-pegasus-technical-analysis.pdf"&gt;
+       a technical analysis of this spyware&lt;/a&gt; available in PDF 
format.&lt;/p&gt;
 
     &lt;p&gt;A</em></ins></span> free <span 
class="removed"><del><strong>program</strong></del></span> <span 
class="inserted"><ins><em>operating system would've let people to fix the bugs 
for
     themselves but now infected people will be compelled to wait for 
corporations to
@@ -152,7 +162,7 @@
     &lt;p&gt;&lt;a
     
href="https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-to-chinese-government-conflicts-with-apples-privacy-first-focus/"&gt;Apple
     is moving its Chinese customers' iCloud data to a datacenter controlled
-    by the Chinese government&lt;/a&gt;. Apple</em></ins></span> is <span 
class="removed"><del><strong>discovered.</strong></del></span> <span 
class="inserted"><ins><em>already storing the encryption
+    by the Chinese government&lt;/a&gt;. Apple is already storing the 
encryption
     keys on these servers, obeying Chinese authority, making all Chinese
     user data available to the government.&lt;/p&gt;
   &lt;/li&gt;
@@ -167,7 +177,7 @@
     the payments don't go through&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;They say there is a 30-days grace period if you miss a payment
-    but the grace period is no excuse to the insecurity.&lt;/p&gt;
+    but the grace period</em></ins></span> is <span 
class="removed"><del><strong>discovered.</strong></del></span> <span 
class="inserted"><ins><em>no excuse to the insecurity.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202105030"&gt;
@@ -192,14 +202,14 @@
     be used to launch remote code execution (RCE) attacks&lt;/a&gt; has been
     disclosed by researchers.</em></ins></span> The
 <span class="removed"><del><strong>examples below show</strong></del></span> 
<span class="inserted"><ins><em>researchers demonstrated a three-bug
-    attack chain</em></ins></span> that <span class="inserted"><ins><em>caused 
an RCE on a target machine, all this without
+    attack chain that caused an RCE on a target machine, all this without
     any form of user interaction.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202103090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a 
href="https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach-of-150-000-security-cams"&gt;Over
 150 thousand security cameras that used Verkada
+    &lt;p&gt;&lt;a 
href="https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach-of-150-000-security-cams"&gt;Over
 150 thousand security cameras</em></ins></span> that <span 
class="inserted"><ins><em>used Verkada
     company's</em></ins></span> proprietary software <span 
class="removed"><del><strong>isn't perfect,</strong></del></span> <span 
class="inserted"><ins><em>are cracked&lt;/a&gt; by a major security
     breach. Crackers have had access to security archives of various
     gyms, hospitals, jails, schools,</em></ins></span> and <span 
class="inserted"><ins><em>police stations that have used
@@ -208,12 +218,12 @@
     &lt;p&gt;&lt;a 
href="/philosophy/surveillance-vs-democracy.html"&gt;It</em></ins></span> is 
<span class="removed"><del><strong>often quite sloppy.&lt;/p&gt;
 
 &lt;p&gt;It would be equally incorrect</strong></del></span> <span 
class="inserted"><ins><em>injustice
-    to the public&lt;/a&gt; for gyms, stores, hospitals, jails, and 
schools</em></ins></span> to <span 
class="removed"><del><strong>compare</strong></del></span>
-    <span class="inserted"><ins><em>hand &ldquo;security&rdquo; footage to a 
company from which the government can
+    to the public&lt;/a&gt; for gyms, stores, hospitals, jails, and schools to
+    hand &ldquo;security&rdquo; footage to a company from which the government 
can
     collect it at any time, without even telling them.&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;Please note that the article
-    wrongly refers to crackers as &ldquo;&lt;a
+    wrongly refers</em></ins></span> to <span 
class="removed"><del><strong>compare</strong></del></span> <span 
class="inserted"><ins><em>crackers as &ldquo;&lt;a
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
@@ -378,7 +388,7 @@
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;)
     managed to interfere the Amazon Ring proprietary system, and &lt;a
     
href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras"&gt;access
-    its camera, speakers</em></ins></span> and <span 
class="inserted"><ins><em>microphones&lt;/a&gt;.&lt;/p&gt;
+    its camera, speakers and microphones&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201911190"&gt;
@@ -387,7 +397,7 @@
     &lt;p&gt;Internet-tethered Amazon Ring had
     a security vulnerability that enabled attackers to &lt;a
     
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;
-    access the user's wifi password&lt;/a&gt;, and snoop on the household
+    access the user's wifi password&lt;/a&gt;,</em></ins></span> and <span 
class="inserted"><ins><em>snoop on the household
     through connected surveillance devices.&lt;/p&gt;
 
     &lt;p&gt;Knowledge of the wifi password would</em></ins></span> not <span 
class="removed"><del><strong>culpable.</strong></del></span> <span 
class="inserted"><ins><em>be sufficient to carry
@@ -666,16 +676,16 @@
     enables malware authors to capture keystrokes without taking the risk
     of being classified as malicious task by AV
     <span class="removed"><del><strong>heuristics&rdquo;.
-  &lt;/p&gt;
-&lt;/li&gt;
-&lt;li&gt;
+  &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>heuristics&rdquo;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
 &lt;p&gt;The proprietary code that runs pacemakers, insulin pumps, and other
 medical devices is &lt;a 
href="http://www.bbc.co.uk/news/technology-40042584"&gt;
-full of gross security faults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>heuristics&rdquo;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+full of gross security faults&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
 
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+&lt;li&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201705120"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-05&lt;/small&gt;'
@@ -1080,19 +1090,19 @@
     can't trust it.  Western Digital's &ldquo;My Passport&rdquo; drives &lt;a 
<span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;have</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;
     have</em></ins></span> a back <span 
class="removed"><del><strong>door&lt;/a&gt;.
-&lt;/p&gt;
-&lt;/li&gt;
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>door&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-&lt;li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
 &lt;p&gt;
 Mac OS X had an
 &lt;a 
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/"&gt;
 intentional local back door for 4 years&lt;/a&gt;, which could be
 exploited by attackers to gain root privileges.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>door&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+&lt;/p&gt;
+&lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+&lt;li&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201508120"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-08&lt;/small&gt;'
@@ -1477,7 +1487,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/08/11 02:03:49 $
+$Date: 2021/09/15 06:03:45 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.205
retrieving revision 1.206
diff -u -b -r1.205 -r1.206
--- proprietary/po/proprietary-insecurity.it.po 11 Aug 2021 02:03:49 -0000      
1.205
+++ proprietary/po/proprietary-insecurity.it.po 15 Sep 2021 06:03:45 -0000      
1.206
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-08-11 01:55+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
 "PO-Revision-Date: 2017-12-31 13:13+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -165,6 +165,14 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "

Index: proprietary/po/proprietary-insecurity.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja-diff.html,v
retrieving revision 1.124
retrieving revision 1.125
diff -u -b -r1.124 -r1.125
--- proprietary/po/proprietary-insecurity.ja-diff.html  11 Aug 2021 02:03:49 
-0000      1.124
+++ proprietary/po/proprietary-insecurity.ja-diff.html  15 Sep 2021 06:03:45 
-0000      1.125
@@ -97,6 +97,16 @@
 &lt;div class="column-limit" id="proprietary-insecurity"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202108170"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Various models of security cameras, DVRs,
+    and baby monitors that run proprietary software &lt;a
+    href="https://www.wired.com/story/kalay-iot-bug-video-feeds/"&gt;are
+    exploited by a security vulnerability that could give attackers access
+    to live feeds&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202107180"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -429,10 +439,9 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Many Android apps can track
-    users' movements</em></ins></span> even <span 
class="removed"><del><strong>introduce</strong></del></span> <span 
class="inserted"><ins><em>when the user says &lt;a
+    users' movements even when the user says &lt;a
     
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
-    not to allow</em></ins></span> them
-<span class="removed"><del><strong>deliberately,</strong></del></span> <span 
class="inserted"><ins><em>access to locations&lt;/a&gt;.&lt;/p&gt;
+    not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This involves an apparently unintentional weakness in Android,
     exploited intentionally by malicious apps.&lt;/p&gt;
@@ -443,11 +452,11 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Users caught in the jail of an iMonster are &lt;a
     href="https://boingboing.net/2019/05/15/brittle-security.html"&gt; sitting
-    ducks for other attackers&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>&lt;em&gt;the</strong></del></span> <span 
class="inserted"><ins><em>the app censorship prevents security
+    ducks for other attackers&lt;/a&gt;, and the app censorship prevents 
security
     companies from figuring out how those attacks work.&lt;/p&gt;
 
     &lt;p&gt;Apple's censorship of apps is fundamentally unjust, and would be
-    inexcusable even if it didn't lead to security threats as well.&lt;/p&gt;
+    inexcusable</em></ins></span> even <span 
class="removed"><del><strong>introduce</strong></del></span> <span 
class="inserted"><ins><em>if it didn't lead to security threats as 
well.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903210"&gt;
@@ -607,7 +616,8 @@
     &lt;p&gt;That is a malicious functionality, but in addition it
     is a gross insecurity since anyone, including malicious crackers, &lt;a
     
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;can
-    find those accounts and use them to get into users' 
cameras&lt;/a&gt;.&lt;/p&gt;
+    find those accounts and use</em></ins></span> them
+<span class="removed"><del><strong>deliberately,</strong></del></span> <span 
class="inserted"><ins><em>to get into users' cameras&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201706050"&gt;
@@ -621,7 +631,7 @@
     &lt;p&gt;The vulnerability allowed a cracker to access
     the computer's Intel Active Management Technology (AMT) &lt;a
     
href="https://arstechnica.com/security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-anyone-thought/"&gt;
-    web interface with an empty password and gave administrative
+    web interface with an empty password</em></ins></span> and <span 
class="removed"><del><strong>&lt;em&gt;the</strong></del></span> <span 
class="inserted"><ins><em>gave administrative
     access&lt;/a&gt; to access the computer's keyboard, mouse, monitor among
     other privileges.&lt;/p&gt;
 
@@ -1007,19 +1017,19 @@
     can't trust it.  Western Digital's &ldquo;My Passport&rdquo; drives &lt;a 
<span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;have</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;
     have</em></ins></span> a back <span 
class="removed"><del><strong>door&lt;/a&gt;.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>door&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+&lt;/p&gt;
+&lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
+&lt;li&gt;
 &lt;p&gt;
 Mac OS X had an
 &lt;a 
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/"&gt;
 intentional local back door for 4 years&lt;/a&gt;, which could be
 exploited by attackers to gain root privileges.
-&lt;/p&gt;
-&lt;/li&gt;
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>door&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-&lt;li&gt;</strong></del></span>
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201508120"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-08&lt;/small&gt;'
@@ -1198,10 +1208,12 @@
     from the state.  Quite the contrary: confiding your data to someone
     else's server, if not first encrypted by you with free software,
     undermines your <span class="removed"><del><strong>rights.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>rights.&lt;/p&gt;
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>rights.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201404250"&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201404250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Lots of &lt;a
@@ -1214,12 +1226,10 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The &lt;a
     
href="http://arstechnica.com/security/2014/02/crypto-weaknesses-in-whatsapp-the-kind-of-stuff-the-nsa-would-love/"&gt;insecurity
-    of WhatsApp&lt;/a&gt; makes eavesdropping a 
snap.&lt;/p&gt;</em></ins></span>
+    of WhatsApp&lt;/a&gt; makes eavesdropping a snap.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201312290"&gt;
+  &lt;li id="M201312290"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
     &lt;p&gt;&lt;a href="http://www.bunniestudios.com/blog/?p=3554"&gt; Some 
flash
@@ -1404,7 +1414,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/08/11 02:03:49 $
+$Date: 2021/09/15 06:03:45 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-insecurity.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja.po,v
retrieving revision 1.177
retrieving revision 1.178
diff -u -b -r1.177 -r1.178
--- proprietary/po/proprietary-insecurity.ja.po 11 Aug 2021 02:03:49 -0000      
1.177
+++ proprietary/po/proprietary-insecurity.ja.po 15 Sep 2021 06:03:46 -0000      
1.178
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-08-11 01:55+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
 "PO-Revision-Date: 2016-10-31 12:56+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -141,6 +141,14 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "

Index: proprietary/po/proprietary-insecurity.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pot,v
retrieving revision 1.143
retrieving revision 1.144
diff -u -b -r1.143 -r1.144
--- proprietary/po/proprietary-insecurity.pot   11 Aug 2021 02:03:49 -0000      
1.143
+++ proprietary/po/proprietary-insecurity.pot   15 Sep 2021 06:03:46 -0000      
1.144
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-08-11 01:55+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -106,6 +106,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a "
+"href=\"https://www.wired.com/story/kalay-iot-bug-video-feeds/\";>are "
+"exploited by a security vulnerability that could give attackers access to "
+"live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "<a "
 
"href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones\";>
 "
 "The pegasus spyware used vulnerabilities on proprietary smartphone operating "

Index: proprietary/po/proprietary-insecurity.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pt-br.po,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary/po/proprietary-insecurity.pt-br.po      6 Sep 2021 01:03:49 
-0000       1.17
+++ proprietary/po/proprietary-insecurity.pt-br.po      15 Sep 2021 06:03:46 
-0000      1.18
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-08-11 01:55+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
 "PO-Revision-Date: 2021-06-26 09:40-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -13,6 +13,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-15 05:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 
 #. type: Content of: <title>
@@ -134,6 +135,14 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "

Index: proprietary/po/proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.317
retrieving revision 1.318
diff -u -b -r1.317 -r1.318
--- proprietary/po/proprietary-insecurity.ru.po 11 Aug 2021 02:03:49 -0000      
1.317
+++ proprietary/po/proprietary-insecurity.ru.po 15 Sep 2021 06:03:46 -0000      
1.318
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-08-11 01:55+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-15 05:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -138,6 +139,14 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "

Index: proprietary/po/proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.295
retrieving revision 1.296
diff -u -b -r1.295 -r1.296
--- proprietary/po/proprietary.de-diff.html     4 Sep 2021 08:37:15 -0000       
1.295
+++ proprietary/po/proprietary.de-diff.html     15 Sep 2021 06:03:46 -0000      
1.296
@@ -29,9 +29,9 @@
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
 <span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%; width: max-content;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -58,16 +58,16 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
+#TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
-#TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
+#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration: 
none;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC a:hover { text-decoration: underline; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
@@ -137,19 +137,19 @@
  &lt;/tr&gt;
  &lt;tr&gt;
   &lt;td&gt;
-   &lt;ul class="columns"&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a 
href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
+   &lt;ul class="columns"&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
@@ -224,6 +224,16 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202108170"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Various models of security cameras, DVRs,
+    and baby monitors that run proprietary software &lt;a
+    href="https://www.wired.com/story/kalay-iot-bug-video-feeds/"&gt;are
+    exploited by a security vulnerability that could give attackers access
+    to live feeds&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202108240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -283,18 +293,6 @@
     wrongly refers to crackers as &ldquo;&lt;a
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202107050"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a
-    
href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation"&gt;
-    Advertising companies are experimenting to manipulate people's
-    minds&lt;/a&gt;, and impose a new way of advertising by altering their
-    dreams. This &ldquo;targeted dream incubation&rdquo; would trigger
-    &ldquo;refreshing dreams&rdquo; of the product, according to the
-    companies.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 &lt;p class="button right-align"&gt;
 &lt;a href="/proprietary/all.html"&gt;More items&hellip;&lt;/a&gt;&lt;/p&gt;
@@ -358,7 +356,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/09/04 08:37:15 $
+$Date: 2021/09/15 06:03:46 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.312
retrieving revision 1.313
diff -u -b -r1.312 -r1.313
--- proprietary/po/proprietary.de.po    4 Sep 2021 08:37:15 -0000       1.312
+++ proprietary/po/proprietary.de.po    15 Sep 2021 06:03:46 -0000      1.313
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -480,6 +480,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Recent Samsung TVs have a back door with which Samsung can <a href=\"https://";
 "www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
 "brick them remotely</a>."
@@ -553,15 +561,6 @@
 "the flaw, if they fix it."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\"> Advertising companies are experimenting to manipulate "
-"people's minds</a>, and impose a new way of advertising by altering their "
-"dreams. This &ldquo;targeted dream incubation&rdquo; would trigger &ldquo;"
-"refreshing dreams&rdquo; of the product, according to the companies."
-msgstr ""
-
 #. type: Content of: <div><p>
 # | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
 # | devices</a>-] {+href=\"/proprietary/all.html\">More items&hellip;</a>+}

Index: proprietary/po/proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.512
retrieving revision 1.513
diff -u -b -r1.512 -r1.513
--- proprietary/po/proprietary.es.po    6 Sep 2021 08:36:45 -0000       1.512
+++ proprietary/po/proprietary.es.po    15 Sep 2021 06:03:46 -0000      1.513
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-15 05:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -341,6 +342,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Recent Samsung TVs have a back door with which Samsung can <a href=\"https://";
 "www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
 "brick them remotely</a>."
@@ -436,20 +445,6 @@
 "instrucciones para aprovechar ese fallo, pero los usuarios de de Windows "
 "tendrán que esperar a que Microsoft lo arregle, si es que lo hace."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\"> Advertising companies are experimenting to manipulate "
-"people's minds</a>, and impose a new way of advertising by altering their "
-"dreams. This &ldquo;targeted dream incubation&rdquo; would trigger &ldquo;"
-"refreshing dreams&rdquo; of the product, according to the companies."
-msgstr ""
-"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\">Hay empresas de publicidad que están experimentando con "
-"la manipulación de la mente</a>, y buscan una nueva forma de publicidad "
-"alterando los sueños de la gente. Según esas empresas, esta «incubación "
-"selectiva de sueños» activaría «sueños estimulantes» del producto."
-
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr "<a href=\"/proprietary/all.html\">Ver más&hellip;</a>"
@@ -528,3 +523,18 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Última actualización:"
+
+#~ msgid ""
+#~ "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-";
+#~ "targeted-dream-incubation\"> Advertising companies are experimenting to "
+#~ "manipulate people's minds</a>, and impose a new way of advertising by "
+#~ "altering their dreams. This &ldquo;targeted dream incubation&rdquo; would "
+#~ "trigger &ldquo;refreshing dreams&rdquo; of the product, according to the "
+#~ "companies."
+#~ msgstr ""
+#~ "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-";
+#~ "targeted-dream-incubation\">Hay empresas de publicidad que están "
+#~ "experimentando con la manipulación de la mente</a>, y buscan una nueva "
+#~ "forma de publicidad alterando los sueños de la gente. Según esas "
+#~ "empresas, esta «incubación selectiva de sueños» activaría «sueños "
+#~ "estimulantes» del producto."

Index: proprietary/po/proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.532
retrieving revision 1.533
diff -u -b -r1.532 -r1.533
--- proprietary/po/proprietary.fr.po    4 Sep 2021 10:22:07 -0000       1.532
+++ proprietary/po/proprietary.fr.po    15 Sep 2021 06:03:46 -0000      1.533
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
 "PO-Revision-Date: 2021-09-04 12:15+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-15 05:55+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -338,6 +339,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Recent Samsung TVs have a back door with which Samsung can <a href=\"https://";
 "www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
 "brick them remotely</a>."
@@ -430,20 +439,6 @@
 "de Windows attendent toujours que Microsoft la corrige – si cela arrive un "
 "jour."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\"> Advertising companies are experimenting to manipulate "
-"people's minds</a>, and impose a new way of advertising by altering their "
-"dreams. This &ldquo;targeted dream incubation&rdquo; would trigger &ldquo;"
-"refreshing dreams&rdquo; of the product, according to the companies."
-msgstr ""
-"Des publicitaires sont en train d'expérimenter une technique de manipulation 
"
-"mentale consistant à <a 
href=\"https://www.theguardian.com/media/2021/jul/05/";
-"advertisers-targeted-dream-incubation\">altérer les rêves</a> pour "
-"promouvoir un produit. D'après eux, cette « incubation ciblée des rêves 
» "
-"est censée provoquer chez le sujet des « rêves de réactivation »."
-
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr "<a href=\"/proprietary/all.html\">Voir plus&hellip;</a>"
@@ -516,3 +511,18 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-";
+#~ "targeted-dream-incubation\"> Advertising companies are experimenting to "
+#~ "manipulate people's minds</a>, and impose a new way of advertising by "
+#~ "altering their dreams. This &ldquo;targeted dream incubation&rdquo; would "
+#~ "trigger &ldquo;refreshing dreams&rdquo; of the product, according to the "
+#~ "companies."
+#~ msgstr ""
+#~ "Des publicitaires sont en train d'expérimenter une technique de "
+#~ "manipulation mentale consistant à <a href=\"https://www.theguardian.com/";
+#~ "media/2021/jul/05/advertisers-targeted-dream-incubation\">altérer les "
+#~ "rêves</a> pour promouvoir un produit. D'après eux, cette « incubation "
+#~ "ciblée des rêves » est censée provoquer chez le sujet des « rêves 
de "
+#~ "réactivation »."

Index: proprietary/po/proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.305
retrieving revision 1.306
diff -u -b -r1.305 -r1.306
--- proprietary/po/proprietary.it-diff.html     4 Sep 2021 08:37:15 -0000       
1.305
+++ proprietary/po/proprietary.it-diff.html     15 Sep 2021 06:03:46 -0000      
1.306
@@ -29,9 +29,9 @@
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
 <span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%; width: max-content;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -58,16 +58,16 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
+#TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
-#TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
+#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration: 
none;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC a:hover { text-decoration: underline; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
@@ -137,19 +137,19 @@
  &lt;/tr&gt;
  &lt;tr&gt;
   &lt;td&gt;
-   &lt;ul class="columns"&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
+   &lt;ul class="columns"&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a 
href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
@@ -223,6 +223,16 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202108170"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Various models of security cameras, DVRs,
+    and baby monitors that run proprietary software &lt;a
+    href="https://www.wired.com/story/kalay-iot-bug-video-feeds/"&gt;are
+    exploited by a security vulnerability that could give attackers access
+    to live feeds&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202108240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -282,18 +292,6 @@
     wrongly refers to crackers as &ldquo;&lt;a
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202107050"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a
-    
href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation"&gt;
-    Advertising companies are experimenting to manipulate people's
-    minds&lt;/a&gt;, and impose a new way of advertising by altering their
-    dreams. This &ldquo;targeted dream incubation&rdquo; would trigger
-    &ldquo;refreshing dreams&rdquo; of the product, according to the
-    companies.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 &lt;p class="button right-align"&gt;
 &lt;a href="/proprietary/all.html"&gt;More items&hellip;&lt;/a&gt;&lt;/p&gt;
@@ -357,7 +355,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/09/04 08:37:15 $
+$Date: 2021/09/15 06:03:46 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.321
retrieving revision 1.322
diff -u -b -r1.321 -r1.322
--- proprietary/po/proprietary.it.po    4 Sep 2021 08:37:15 -0000       1.321
+++ proprietary/po/proprietary.it.po    15 Sep 2021 06:03:46 -0000      1.322
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -485,6 +485,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Recent Samsung TVs have a back door with which Samsung can <a href=\"https://";
 "www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
 "brick them remotely</a>."
@@ -546,15 +554,6 @@
 "the flaw, if they fix it."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\"> Advertising companies are experimenting to manipulate "
-"people's minds</a>, and impose a new way of advertising by altering their "
-"dreams. This &ldquo;targeted dream incubation&rdquo; would trigger &ldquo;"
-"refreshing dreams&rdquo; of the product, according to the companies."
-msgstr ""
-
 #. type: Content of: <div><p>
 # | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
 # | devices</a>-] {+href=\"/proprietary/all.html\">More items&hellip;</a>+}

Index: proprietary/po/proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.310
retrieving revision 1.311
diff -u -b -r1.310 -r1.311
--- proprietary/po/proprietary.ja-diff.html     4 Sep 2021 08:37:15 -0000       
1.310
+++ proprietary/po/proprietary.ja-diff.html     15 Sep 2021 06:03:46 -0000      
1.311
@@ -57,14 +57,14 @@
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom: 
.5em; margin: 0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
 #TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
+#TOC a:hover { text-decoration: underline;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -129,8 +129,7 @@
   &lt;li&gt;&lt;a href="/proprietary/malware-mobiles.html"&gt;Malware in 
mobile devices&lt;/a&gt;&lt;/li&gt;
   &lt;li&gt;&lt;a href="/proprietary/malware-kindle-swindle.html"&gt;Malware 
in</strong></del></span> <span class="inserted"><ins><em>make other changes,
 subscribe to</em></ins></span> the <span class="removed"><del><strong>Amazon
-      Swindle&lt;/a&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;a href="/proprietary/malware-games.html"&gt;Malware in 
games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+      Swindle&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
 href="https://lists.gnu.org/mailman/listinfo/www-malware-commits"&gt;mailing 
list
 &lt;www-malware-commits@gnu.org&gt;&lt;/a&gt;.&lt;/p&gt;
 
@@ -142,7 +141,8 @@
  &lt;tr&gt;
   &lt;td&gt;
    &lt;ul class="columns"&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a href="/proprietary/malware-appliances.html"&gt;Malware in 
appliances&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
 &lt;/div&gt;
 
@@ -166,8 +166,8 @@
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;&nbsp;(&lt;a
 href="#f4"&gt;4&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;
 to
-servers&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&nbsp;(&lt;a
 href="#f5"&gt;5&lt;/a&gt;)&lt;/li&gt;
-    &lt;li&gt;&lt;a href="/proprietary/potential-malware.html"&gt;In the 
pipe&lt;/a&gt;&lt;/li&gt;
+servers&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&nbsp;(&lt;a
 href="#f5"&gt;5&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/potential-malware.html"&gt;In the 
pipe&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
   &lt;td&gt;
@@ -179,8 +179,8 @@
     &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-in-online-conferencing.html"&gt;Conferencing&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
-   &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;
+   &lt;ul&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
@@ -205,10 +205,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -228,6 +228,16 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202108170"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Various models of security cameras, DVRs,
+    and baby monitors that run proprietary software &lt;a
+    href="https://www.wired.com/story/kalay-iot-bug-video-feeds/"&gt;are
+    exploited by a security vulnerability that could give attackers access
+    to live feeds&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202108240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -287,18 +297,6 @@
     wrongly refers to crackers as &ldquo;&lt;a
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202107050"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a
-    
href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation"&gt;
-    Advertising companies are experimenting to manipulate people's
-    minds&lt;/a&gt;, and impose a new way of advertising by altering their
-    dreams. This &ldquo;targeted dream incubation&rdquo; would trigger
-    &ldquo;refreshing dreams&rdquo; of the product, according to the
-    companies.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 &lt;p class="button right-align"&gt;
 &lt;a href="/proprietary/all.html"&gt;More items&hellip;&lt;/a&gt;&lt;/p&gt;
@@ -362,7 +360,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/09/04 08:37:15 $
+$Date: 2021/09/15 06:03:46 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.304
retrieving revision 1.305
diff -u -b -r1.304 -r1.305
--- proprietary/po/proprietary.ja.po    4 Sep 2021 08:37:15 -0000       1.304
+++ proprietary/po/proprietary.ja.po    15 Sep 2021 06:03:46 -0000      1.305
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -343,6 +343,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Recent Samsung TVs have a back door with which Samsung can <a href=\"https://";
 "www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
 "brick them remotely</a>."
@@ -404,15 +412,6 @@
 "the flaw, if they fix it."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\"> Advertising companies are experimenting to manipulate "
-"people's minds</a>, and impose a new way of advertising by altering their "
-"dreams. This &ldquo;targeted dream incubation&rdquo; would trigger &ldquo;"
-"refreshing dreams&rdquo; of the product, according to the companies."
-msgstr ""
-
 #. type: Content of: <div><p>
 #, fuzzy
 #| msgid "<a href=\"/proprietary/malware-mobiles.html\">Mobiles</a>"

Index: proprietary/po/proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.306
retrieving revision 1.307
diff -u -b -r1.306 -r1.307
--- proprietary/po/proprietary.nl-diff.html     4 Sep 2021 08:37:15 -0000       
1.306
+++ proprietary/po/proprietary.nl-diff.html     15 Sep 2021 06:03:46 -0000      
1.307
@@ -29,9 +29,9 @@
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
 <span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%; width: max-content;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -58,16 +58,16 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
+#TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
-#TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
+#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration: 
none;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC a:hover { text-decoration: underline; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
@@ -137,20 +137,20 @@
  &lt;/tr&gt;
  &lt;tr&gt;
   &lt;td&gt;
-   &lt;ul class="columns"&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-phones.html"&gt;Malware 
in phones&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
+   &lt;ul class="columns"&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-phones.html"&gt;Malware 
in phones&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
@@ -223,6 +223,16 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202108170"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Various models of security cameras, DVRs,
+    and baby monitors that run proprietary software &lt;a
+    href="https://www.wired.com/story/kalay-iot-bug-video-feeds/"&gt;are
+    exploited by a security vulnerability that could give attackers access
+    to live feeds&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202108240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -282,18 +292,6 @@
     wrongly refers to crackers as &ldquo;&lt;a
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202107050"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a
-    
href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation"&gt;
-    Advertising companies are experimenting to manipulate people's
-    minds&lt;/a&gt;, and impose a new way of advertising by altering their
-    dreams. This &ldquo;targeted dream incubation&rdquo; would trigger
-    &ldquo;refreshing dreams&rdquo; of the product, according to the
-    companies.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 &lt;p class="button right-align"&gt;
 &lt;a href="/proprietary/all.html"&gt;More items&hellip;&lt;/a&gt;&lt;/p&gt;
@@ -357,7 +355,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/09/04 08:37:15 $
+$Date: 2021/09/15 06:03:46 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.295
retrieving revision 1.296
diff -u -b -r1.295 -r1.296
--- proprietary/po/proprietary.nl.po    4 Sep 2021 08:37:15 -0000       1.295
+++ proprietary/po/proprietary.nl.po    15 Sep 2021 06:03:46 -0000      1.296
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
 "Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -388,6 +388,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Recent Samsung TVs have a back door with which Samsung can <a href=\"https://";
 "www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
 "brick them remotely</a>."
@@ -449,15 +457,6 @@
 "the flaw, if they fix it."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\"> Advertising companies are experimenting to manipulate "
-"people's minds</a>, and impose a new way of advertising by altering their "
-"dreams. This &ldquo;targeted dream incubation&rdquo; would trigger &ldquo;"
-"refreshing dreams&rdquo; of the product, according to the companies."
-msgstr ""
-
 #. type: Content of: <div><p>
 # | <a [-href=\"/proprietary/malware-mobiles.html\">Mobiles</a>-]
 # | {+href=\"/proprietary/all.html\">More items&hellip;</a>+}

Index: proprietary/po/proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.322
retrieving revision 1.323
diff -u -b -r1.322 -r1.323
--- proprietary/po/proprietary.pl-diff.html     4 Sep 2021 08:37:15 -0000       
1.322
+++ proprietary/po/proprietary.pl-diff.html     15 Sep 2021 06:03:46 -0000      
1.323
@@ -56,7 +56,7 @@
 #TOC ul { padding-top: .5em; margin: 0; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom: 
.5em; margin: 0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
 #TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
@@ -64,7 +64,7 @@
    text-decoration: none;
 }
 #TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
+#TOC a:hover { text-decoration: underline;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -121,8 +121,8 @@
 &lt;hr class="thin" /&gt;
 &lt;/div&gt;
 
-&lt;p&gt;As of July, 2021, the pages in this directory list around 500
-instances</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>malicious functionalities (with more than 610 
references to
+&lt;p&gt;As</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>July, 2021, the pages in this directory list 
around 500
+instances of malicious functionalities (with more than 610 references to
 back them up), but there are surely thousands more we don't know 
about.&lt;/p&gt;
 
 &lt;p&gt;If you want to be notified when we add new items or make other 
changes,
@@ -167,11 +167,11 @@
    &lt;ul&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-in-online-conferencing.html"&gt;Conferencing&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html"&gt;Conferencing&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
@@ -222,6 +222,16 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202108170"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Various models of security cameras, DVRs,
+    and baby monitors that run proprietary software &lt;a
+    href="https://www.wired.com/story/kalay-iot-bug-video-feeds/"&gt;are
+    exploited by a security vulnerability that could give attackers access
+    to live feeds&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202108240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -281,18 +291,6 @@
     wrongly refers to crackers as &ldquo;&lt;a
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202107050"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a
-    
href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation"&gt;
-    Advertising companies are experimenting to manipulate people's
-    minds&lt;/a&gt;, and impose a new way of advertising by altering their
-    dreams. This &ldquo;targeted dream incubation&rdquo; would trigger
-    &ldquo;refreshing dreams&rdquo; of the product, according to the
-    companies.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 &lt;p class="button right-align"&gt;
 &lt;a href="/proprietary/all.html"&gt;More items&hellip;&lt;/a&gt;&lt;/p&gt;
@@ -356,7 +354,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/09/04 08:37:15 $
+$Date: 2021/09/15 06:03:46 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.287
retrieving revision 1.288
diff -u -b -r1.287 -r1.288
--- proprietary/po/proprietary.pl.po    4 Sep 2021 08:37:15 -0000       1.287
+++ proprietary/po/proprietary.pl.po    15 Sep 2021 06:03:46 -0000      1.288
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -569,6 +569,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Recent Samsung TVs have a back door with which Samsung can <a href=\"https://";
 "www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
 "brick them remotely</a>."
@@ -630,15 +638,6 @@
 "the flaw, if they fix it."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\"> Advertising companies are experimenting to manipulate "
-"people's minds</a>, and impose a new way of advertising by altering their "
-"dreams. This &ldquo;targeted dream incubation&rdquo; would trigger &ldquo;"
-"refreshing dreams&rdquo; of the product, according to the companies."
-msgstr ""
-
 #. type: Content of: <div><p>
 # | <a [-href=\"/philosophy/malware-mobiles.html\">Malware in mobile
 # | devices</a>-] {+href=\"/proprietary/all.html\">More items&hellip;</a>+}

Index: proprietary/po/proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.284
retrieving revision 1.285
diff -u -b -r1.284 -r1.285
--- proprietary/po/proprietary.pot      4 Sep 2021 08:37:15 -0000       1.284
+++ proprietary/po/proprietary.pot      15 Sep 2021 06:03:46 -0000      1.285
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -280,6 +280,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a "
+"href=\"https://www.wired.com/story/kalay-iot-bug-video-feeds/\";>are "
+"exploited by a security vulnerability that could give attackers access to "
+"live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Recent Samsung TVs have a back door with which Samsung can <a "
 
"href=\"https://www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\";>
 "
 "brick them remotely</a>."
@@ -340,16 +349,6 @@
 "the flaw, if they fix it."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a "
-"href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation\";>
 "
-"Advertising companies are experimenting to manipulate people's minds</a>, "
-"and impose a new way of advertising by altering their dreams. This "
-"&ldquo;targeted dream incubation&rdquo; would trigger &ldquo;refreshing "
-"dreams&rdquo; of the product, according to the companies."
-msgstr ""
-
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr ""

Index: proprietary/po/proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.452
retrieving revision 1.453
diff -u -b -r1.452 -r1.453
--- proprietary/po/proprietary.pt-br.po 6 Sep 2021 01:03:49 -0000       1.452
+++ proprietary/po/proprietary.pt-br.po 15 Sep 2021 06:03:46 -0000      1.453
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
 "PO-Revision-Date: 2021-06-13 12:11-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-15 05:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1)\n"
 "X-Generator: Gtranslator 40.0\n"
 
@@ -335,6 +336,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Recent Samsung TVs have a back door with which Samsung can <a href=\"https://";
 "www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
 "brick them remotely</a>."
@@ -428,20 +437,6 @@
 "como a falha poderia ser explorada, mas os usuários do Windows ainda devem "
 "esperar que a Microsoft conserte a falha, se ela consertar."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\"> Advertising companies are experimenting to manipulate "
-"people's minds</a>, and impose a new way of advertising by altering their "
-"dreams. This &ldquo;targeted dream incubation&rdquo; would trigger &ldquo;"
-"refreshing dreams&rdquo; of the product, according to the companies."
-msgstr ""
-"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\"> As empresas de publicidade estão experimentando "
-"manipular a mente das pessoas</a> e impor uma nova forma de publicidade "
-"alterando seus sonhos. Esta “incubação de sonhos direcionados” 
desencadearia "
-"“sonhos revigorantes” do produto, segundo as empresas."
-
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr "<a href=\"/proprietary/all.html\">Mais itens…</a>"
@@ -517,6 +512,21 @@
 msgstr "Última atualização:"
 
 #~ msgid ""
+#~ "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-";
+#~ "targeted-dream-incubation\"> Advertising companies are experimenting to "
+#~ "manipulate people's minds</a>, and impose a new way of advertising by "
+#~ "altering their dreams. This &ldquo;targeted dream incubation&rdquo; would "
+#~ "trigger &ldquo;refreshing dreams&rdquo; of the product, according to the "
+#~ "companies."
+#~ msgstr ""
+#~ "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-";
+#~ "targeted-dream-incubation\"> As empresas de publicidade estão "
+#~ "experimentando manipular a mente das pessoas</a> e impor uma nova forma "
+#~ "de publicidade alterando seus sonhos. Esta “incubação de sonhos "
+#~ "direcionados” desencadearia “sonhos revigorantes” do produto, 
segundo as "
+#~ "empresas."
+
+#~ msgid ""
 #~ "Peloton company which produces treadmills recently <a href=\"https://www.";
 #~ "bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-"
 #~ "monthly-subscription-after-recall/\">locked people out of basic features "

Index: proprietary/po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.548
retrieving revision 1.549
diff -u -b -r1.548 -r1.549
--- proprietary/po/proprietary.ru.po    6 Sep 2021 10:03:53 -0000       1.548
+++ proprietary/po/proprietary.ru.po    15 Sep 2021 06:03:46 -0000      1.549
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-15 05:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -340,6 +341,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Recent Samsung TVs have a back door with which Samsung can <a href=\"https://";
 "www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
 "brick them remotely</a>."
@@ -434,20 +443,6 @@
 "Windows все равно должны ждать, пока Microsoft ее 
устранит, если они вообще "
 "это сделают."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\"> Advertising companies are experimenting to manipulate "
-"people's minds</a>, and impose a new way of advertising by altering their "
-"dreams. This &ldquo;targeted dream incubation&rdquo; would trigger &ldquo;"
-"refreshing dreams&rdquo; of the product, according to the companies."
-msgstr ""
-"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\"> Рекламные компании проводят 
опыты по манипуляциям "
-"сознанием людей</a>, чтобы навязывать новый 
способ рекламы, изменяя их "
-"мечты. Эта &ldquo;инкубация целевой мечты&rdquo; 
привела бы к &ldquo;"
-"освежающей мечте&rdquo; о продукте, по 
заявлениям компании."
-
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr "<a href=\"/proprietary/all.html\">Далее...</a>"
@@ -525,6 +520,20 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-";
+#~ "targeted-dream-incubation\"> Advertising companies are experimenting to "
+#~ "manipulate people's minds</a>, and impose a new way of advertising by "
+#~ "altering their dreams. This &ldquo;targeted dream incubation&rdquo; would "
+#~ "trigger &ldquo;refreshing dreams&rdquo; of the product, according to the "
+#~ "companies."
+#~ msgstr ""
+#~ "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-";
+#~ "targeted-dream-incubation\"> Рекламные компании 
проводят опыты по "
+#~ "манипуляциям сознанием людей</a>, чтобы 
навязывать новый способ рекламы, "
+#~ "изменяя их мечты. Эта &ldquo;инкубация 
целевой мечты&rdquo; привела бы к "
+#~ "&ldquo;освежающей мечте&rdquo; о продукте, по 
заявлениям компании."
+
+#~ msgid ""
 #~ "Peloton company which produces treadmills recently <a href=\"https://www.";
 #~ "bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-"
 #~ "monthly-subscription-after-recall/\">locked people out of basic features "

Index: proprietary/po/proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.198
retrieving revision 1.199
diff -u -b -r1.198 -r1.199
--- proprietary/po/proprietary.tr.po    12 Sep 2021 06:55:45 -0000      1.198
+++ proprietary/po/proprietary.tr.po    15 Sep 2021 06:03:46 -0000      1.199
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
 "PO-Revision-Date: 2021-09-12 08:53+0200\n"
 "Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
 "Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-15 05:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 "X-Generator: Poedit 2.4.2\n"
 
@@ -336,6 +337,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Recent Samsung TVs have a back door with which Samsung can <a href=\"https://";
 "www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
 "brick them remotely</a>."
@@ -429,20 +438,6 @@
 "sızdırdı ancak Windows kullanıcıları yine de Microsoft'un (elbette 
eğer "
 "onaracaksa) açığı onarmasını beklemek zorunda."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\"> Advertising companies are experimenting to manipulate "
-"people's minds</a>, and impose a new way of advertising by altering their "
-"dreams. This &ldquo;targeted dream incubation&rdquo; would trigger &ldquo;"
-"refreshing dreams&rdquo; of the product, according to the companies."
-msgstr ""
-"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\">Reklamveren şirketler insanların zihnine müdahaleye "
-"yönelik deneyler yapıyorlar</a> ve insanların rüyasını değiştirerek 
yeni bir "
-"reklam yolu dayatmaya çalışıyorlar. Şirketlere göre bu &ldquo;hedefli 
rüya "
-"tasarlama&rdquo;, ürünün &ldquo;ferahlatıcı rüyalarını&rdquo; 
tetikleyecek."
-
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr "<a href=\"/proprietary/all.html\">Daha fazlası&hellip;</a>"
@@ -524,6 +519,21 @@
 msgstr "Son Güncelleme:"
 
 #~ msgid ""
+#~ "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-";
+#~ "targeted-dream-incubation\"> Advertising companies are experimenting to "
+#~ "manipulate people's minds</a>, and impose a new way of advertising by "
+#~ "altering their dreams. This &ldquo;targeted dream incubation&rdquo; would "
+#~ "trigger &ldquo;refreshing dreams&rdquo; of the product, according to the "
+#~ "companies."
+#~ msgstr ""
+#~ "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-";
+#~ "targeted-dream-incubation\">Reklamveren şirketler insanların zihnine "
+#~ "müdahaleye yönelik deneyler yapıyorlar</a> ve insanların rüyasını "
+#~ "değiştirerek yeni bir reklam yolu dayatmaya çalışıyorlar. 
Şirketlere göre "
+#~ "bu &ldquo;hedefli rüya tasarlama&rdquo;, ürünün &ldquo;ferahlatıcı "
+#~ "rüyalarını&rdquo; tetikleyecek."
+
+#~ msgid ""
 #~ "Peloton company which produces treadmills recently <a href=\"https://www.";
 #~ "bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-"
 #~ "monthly-subscription-after-recall/\">locked people out of basic features "

Index: proprietary/po/proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.248
retrieving revision 1.249
diff -u -b -r1.248 -r1.249
--- proprietary/po/proprietary.zh-cn.po 9 Sep 2021 03:32:22 -0000       1.248
+++ proprietary/po/proprietary.zh-cn.po 15 Sep 2021 06:03:46 -0000      1.249
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
 "PO-Revision-Date: 2021-09-09 10:52+0800\n"
 "Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
 "Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-15 05:55+0000\n"
 "X-Generator: Poedit 2.3\n"
 
 #. type: Content of: <title>
@@ -315,6 +316,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Recent Samsung TVs have a back door with which Samsung can <a href=\"https://";
 "www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
 "brick them remotely</a>."
@@ -398,19 +407,6 @@
 "安全ç 
”究机构意外泄漏了如何利用该漏洞的操作步骤,但是 Windows 
用户还在等待微软"
 "对此的修复,或者是否修复。"
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\"> Advertising companies are experimenting to manipulate "
-"people's minds</a>, and impose a new way of advertising by altering their "
-"dreams. This &ldquo;targeted dream incubation&rdquo; would trigger &ldquo;"
-"refreshing dreams&rdquo; of the product, according to the companies."
-msgstr ""
-"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\">广告å…
¬å¸æ­£åœ¨è¯•éªŒæ€ç»´æ“æŽ§</a>,一种通过改变梦境来植入广告的"
-"新方式。这些公司声称,这种 &ldquo;针对性梦境孵化&rdquo; 
会激发产品的 &ldquo;"
-"梦境刷新&rdquo;。"
-
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr "<a href=\"/proprietary/all.html\">更多内容&hellip;</a>"
@@ -486,6 +482,19 @@
 msgstr "最后更新:"
 
 #~ msgid ""
+#~ "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-";
+#~ "targeted-dream-incubation\"> Advertising companies are experimenting to "
+#~ "manipulate people's minds</a>, and impose a new way of advertising by "
+#~ "altering their dreams. This &ldquo;targeted dream incubation&rdquo; would "
+#~ "trigger &ldquo;refreshing dreams&rdquo; of the product, according to the "
+#~ "companies."
+#~ msgstr ""
+#~ "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-";
+#~ "targeted-dream-incubation\">广告å…
¬å¸æ­£åœ¨è¯•éªŒæ€ç»´æ“æŽ§</a>,一种通过改变梦境"
+#~ "来植入广告的新方式。这些公司声称,这种 
&ldquo;针对性梦境孵化&rdquo; 会激发"
+#~ "产品的 &ldquo;梦境刷新&rdquo;。"
+
+#~ msgid ""
 #~ "Peloton company which produces treadmills recently <a href=\"https://www.";
 #~ "bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-"
 #~ "monthly-subscription-after-recall/\">locked people out of basic features "

Index: proprietary/po/proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.285
retrieving revision 1.286
diff -u -b -r1.285 -r1.286
--- proprietary/po/proprietary.zh-tw-diff.html  4 Sep 2021 08:37:16 -0000       
1.285
+++ proprietary/po/proprietary.zh-tw-diff.html  15 Sep 2021 06:03:46 -0000      
1.286
@@ -29,9 +29,9 @@
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
 <span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%; width: max-content;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -58,16 +58,16 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
+#TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
-#TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
+#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration: 
none;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC a:hover { text-decoration: underline; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
@@ -137,19 +137,19 @@
  &lt;/tr&gt;
  &lt;tr&gt;
   &lt;td&gt;
-   &lt;ul class="columns"&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a 
href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
+   &lt;ul class="columns"&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
@@ -224,6 +224,16 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202108170"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Various models of security cameras, DVRs,
+    and baby monitors that run proprietary software &lt;a
+    href="https://www.wired.com/story/kalay-iot-bug-video-feeds/"&gt;are
+    exploited by a security vulnerability that could give attackers access
+    to live feeds&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202108240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -283,18 +293,6 @@
     wrongly refers to crackers as &ldquo;&lt;a
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202107050"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a
-    
href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation"&gt;
-    Advertising companies are experimenting to manipulate people's
-    minds&lt;/a&gt;, and impose a new way of advertising by altering their
-    dreams. This &ldquo;targeted dream incubation&rdquo; would trigger
-    &ldquo;refreshing dreams&rdquo; of the product, according to the
-    companies.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 &lt;p class="button right-align"&gt;
 &lt;a href="/proprietary/all.html"&gt;More items&hellip;&lt;/a&gt;&lt;/p&gt;
@@ -358,7 +356,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/09/04 08:37:16 $
+$Date: 2021/09/15 06:03:46 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.274
retrieving revision 1.275
diff -u -b -r1.274 -r1.275
--- proprietary/po/proprietary.zh-tw.po 4 Sep 2021 08:37:16 -0000       1.274
+++ proprietary/po/proprietary.zh-tw.po 15 Sep 2021 06:03:46 -0000      1.275
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
 "PO-Revision-Date: 2020-02-08 17:12+0800\n"
 "Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
 "Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -458,6 +458,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Recent Samsung TVs have a back door with which Samsung can <a href=\"https://";
 "www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
 "brick them remotely</a>."
@@ -519,15 +527,6 @@
 "the flaw, if they fix it."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-";
-"dream-incubation\"> Advertising companies are experimenting to manipulate "
-"people's minds</a>, and impose a new way of advertising by altering their "
-"dreams. This &ldquo;targeted dream incubation&rdquo; would trigger &ldquo;"
-"refreshing dreams&rdquo; of the product, according to the companies."
-msgstr ""
-
 #. type: Content of: <div><p>
 # | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
 # | devices</a>-] {+href=\"/proprietary/all.html\">More items&hellip;</a>+}

Index: proprietary/po/pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.422
retrieving revision 1.423
diff -u -b -r1.422 -r1.423
--- proprietary/po/pt-br.po     5 Sep 2021 15:54:37 -0000       1.422
+++ proprietary/po/pt-br.po     15 Sep 2021 06:03:47 -0000      1.423
@@ -176,8 +176,8 @@
 msgid ""
 "<small>(Note that the article refers to the infected software as &ldquo;"
 "content management system&rdquo;. A better term would be &ldquo;<a href=\"/"
-"philosophy/words-to-avoid.html#Content\">website revision system</"
-"a>&rdquo;.)</small>"
+"philosophy/words-to-avoid.html#Content\">website revision system</a>&rdquo;.)"
+"</small>"
 msgstr ""
 "<small>(Note que o artigo se refere ao software infectado como “sistema de "
 "gestão de conteúdo”. Um termo melhor seria “<a 
href=\"/philosophy/words-to-"
@@ -508,6 +508,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Recent Samsung TVs have a back door with which Samsung can <a href=\"https://";
 "www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
 "brick them remotely</a>."
@@ -5619,8 +5627,8 @@
 "windows-diagnostic-data-in-your-organization#full-level\"> &ldquo;"
 "Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers to access, "
 "among other things, registry keys <a href=\"https://docs.microsoft.com/en-us/";
-"previous-versions/windows/it-pro/windows-2000-server/"
-"cc939702(v=technet.10)\"> which can contain sensitive information like "
+"previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\"> which can contain sensitive information like "
 "administrator's login password</a>."
 msgstr ""
 "O <a href=\"https://docs.microsoft.com/pt-br/windows/privacy/configure-";
@@ -7816,8 +7824,8 @@
 #. type: Content of: <div><div><p>
 msgid ""
 "<small>(Unfortunately, the last two articles use &ldquo;free&rdquo; to mean "
-"&ldquo;zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; "
-"instead.)</small>"
+"&ldquo;zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead.)"
+"</small>"
 msgstr ""
 "<small>(Infelizmente, os últimos dois artigos usam <i 
lang=\"en\">“free”</i> "
 "no sentido de “preço zero”. Nós recomendamos dizer 
“grátis”.)</small>"
@@ -9268,8 +9276,8 @@
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "<small>(Note that this article misuses the words &ldquo;<a href=\"/"
-"philosophy/free-sw.html\">free software</a>&rdquo; referring to zero "
-"price.)</small>"
+"philosophy/free-sw.html\">free software</a>&rdquo; referring to zero price.)"
+"</small>"
 msgstr ""
 "<small>(Note que este artigo usa indevidamente as palavras “<a href=\"/"
 "philosophy/free-sw.html\"><i lang=\"en\">free software</i></a>” 
referindo-se "

Index: proprietary/po/ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.708
retrieving revision 1.709
diff -u -b -r1.708 -r1.709
--- proprietary/po/ru.po        6 Sep 2021 10:33:28 -0000       1.708
+++ proprietary/po/ru.po        15 Sep 2021 06:03:47 -0000      1.709
@@ -509,6 +509,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Recent Samsung TVs have a back door with which Samsung can <a href=\"https://";
 "www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
 "brick them remotely</a>."

Index: proprietary/po/tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.216
retrieving revision 1.217
diff -u -b -r1.216 -r1.217
--- proprietary/po/tr.po        12 Sep 2021 07:34:26 -0000      1.216
+++ proprietary/po/tr.po        15 Sep 2021 06:03:47 -0000      1.217
@@ -414,6 +414,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Recent Samsung TVs have a back door with which Samsung can <a href=\"https://";
 "www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
 "brick them remotely</a>."

Index: proprietary/po/zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.217
retrieving revision 1.218
diff -u -b -r1.217 -r1.218
--- proprietary/po/zh-cn.po     9 Sep 2021 03:32:22 -0000       1.217
+++ proprietary/po/zh-cn.po     15 Sep 2021 06:03:47 -0000      1.218
@@ -414,6 +414,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Recent Samsung TVs have a back door with which Samsung can <a href=\"https://";
 "www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
 "brick them remotely</a>."

Index: proprietary/po/zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.338
retrieving revision 1.339
diff -u -b -r1.338 -r1.339
--- proprietary/po/zh-tw.po     4 Sep 2021 08:37:16 -0000       1.338
+++ proprietary/po/zh-tw.po     15 Sep 2021 06:03:47 -0000      1.339
@@ -439,6 +439,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+"video-feeds/\">are exploited by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Recent Samsung TVs have a back door with which Samsung can <a href=\"https://";
 "www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
 "brick them remotely</a>."

Index: thankgnus/po/2021supporters.pot
===================================================================
RCS file: /web/www/www/thankgnus/po/2021supporters.pot,v
retrieving revision 1.88
retrieving revision 1.89
diff -u -b -r1.88 -r1.89
--- thankgnus/po/2021supporters.pot     1 Sep 2021 14:37:25 -0000       1.88
+++ thankgnus/po/2021supporters.pot     15 Sep 2021 06:03:49 -0000      1.89
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: 2021supporters.html\n"
-"POT-Creation-Date: 2021-09-01 14:26+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -255,6 +255,10 @@
 msgstr ""
 
 #. type: Content of: <ul><li>
+msgid "Adam Van Ymeren"
+msgstr ""
+
+#. type: Content of: <ul><li>
 msgid "Alan Stein"
 msgstr ""
 

Index: thankgnus/po/2021supporters.pt-br.po
===================================================================
RCS file: /web/www/www/thankgnus/po/2021supporters.pt-br.po,v
retrieving revision 1.140
retrieving revision 1.141
diff -u -b -r1.140 -r1.141
--- thankgnus/po/2021supporters.pt-br.po        6 Sep 2021 01:03:51 -0000       
1.140
+++ thankgnus/po/2021supporters.pt-br.po        15 Sep 2021 06:03:52 -0000      
1.141
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: 2021supporters.html\n"
-"POT-Creation-Date: 2021-09-01 14:26+0000\n"
+"POT-Creation-Date: 2021-09-15 05:55+0000\n"
 "PO-Revision-Date: 2021-09-05 12:46-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-15 05:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1)\n"
 "X-Generator: Gtranslator 40.0\n"
 
@@ -273,6 +274,10 @@
 msgstr "Acorn Pooley"
 
 #. type: Content of: <ul><li>
+msgid "Adam Van Ymeren"
+msgstr ""
+
+#. type: Content of: <ul><li>
 msgid "Alan Stein"
 msgstr "Alan Stein"
 



reply via email to

[Prev in Thread] Current Thread [Next in Thread]