www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www proprietary/po/all.fr.po proprietary/po/all...


From: GNUN
Subject: www proprietary/po/all.fr.po proprietary/po/all...
Date: Mon, 20 Sep 2021 07:36:15 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     21/09/20 07:36:14

Modified files:
        proprietary/po : all.fr.po all.pot all.pt-br.po all.ru.po de.po 
                         es.po fr.po it.po ja.po 
                         malware-apple.de-diff.html malware-apple.de.po 
                         malware-apple.es.po malware-apple.fr.po 
                         malware-apple.it-diff.html malware-apple.it.po 
                         malware-apple.ja-diff.html malware-apple.ja.po 
                         malware-apple.nl-diff.html malware-apple.nl.po 
                         malware-apple.pot malware-apple.pt-br.po 
                         malware-apple.ru.po nl.po pl.po pot 
                         proprietary-insecurity.de-diff.html 
                         proprietary-insecurity.de.po 
                         proprietary-insecurity.es.po 
                         proprietary-insecurity.fr.po 
                         proprietary-insecurity.it-diff.html 
                         proprietary-insecurity.it.po 
                         proprietary-insecurity.ja-diff.html 
                         proprietary-insecurity.ja.po 
                         proprietary-insecurity.pot 
                         proprietary-insecurity.pt-br.po 
                         proprietary-insecurity.ru.po 
                         proprietary-jails.de-diff.html 
                         proprietary-jails.de.po proprietary-jails.es.po 
                         proprietary-jails.fr.po 
                         proprietary-jails.it-diff.html 
                         proprietary-jails.it.po 
                         proprietary-jails.ja-diff.html 
                         proprietary-jails.ja.po proprietary-jails.pot 
                         proprietary-jails.pt-br.po 
                         proprietary-jails.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.tr.po 
                         proprietary.zh-cn.po 
                         proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po tr.po 
                         zh-cn.po zh-tw.po 
        thankgnus/po   : 2021supporters.pot 2021supporters.pt-br.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.fr.po?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.pot?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.pt-br.po?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.ru.po?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.339&r2=1.340
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.485&r2=1.486
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.600&r2=1.601
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.339&r2=1.340
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.347&r2=1.348
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de-diff.html?cvsroot=www&r1=1.84&r2=1.85
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de.po?cvsroot=www&r1=1.175&r2=1.176
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.es.po?cvsroot=www&r1=1.235&r2=1.236
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.fr.po?cvsroot=www&r1=1.234&r2=1.235
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it-diff.html?cvsroot=www&r1=1.89&r2=1.90
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it.po?cvsroot=www&r1=1.168&r2=1.169
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja-diff.html?cvsroot=www&r1=1.104&r2=1.105
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja.po?cvsroot=www&r1=1.151&r2=1.152
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl-diff.html?cvsroot=www&r1=1.107&r2=1.108
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl.po?cvsroot=www&r1=1.105&r2=1.106
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.pot?cvsroot=www&r1=1.115&r2=1.116
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.pt-br.po?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ru.po?cvsroot=www&r1=1.280&r2=1.281
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.340&r2=1.341
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.339&r2=1.340
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.338&r2=1.339
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de-diff.html?cvsroot=www&r1=1.91&r2=1.92
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.189&r2=1.190
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.es.po?cvsroot=www&r1=1.130&r2=1.131
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.278&r2=1.279
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-diff.html?cvsroot=www&r1=1.104&r2=1.105
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.206&r2=1.207
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja-diff.html?cvsroot=www&r1=1.125&r2=1.126
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja.po?cvsroot=www&r1=1.178&r2=1.179
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pot?cvsroot=www&r1=1.144&r2=1.145
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pt-br.po?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.320&r2=1.321
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.de-diff.html?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.de.po?cvsroot=www&r1=1.71&r2=1.72
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.es.po?cvsroot=www&r1=1.88&r2=1.89
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.fr.po?cvsroot=www&r1=1.90&r2=1.91
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.it-diff.html?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.it.po?cvsroot=www&r1=1.74&r2=1.75
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.ja-diff.html?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.ja.po?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.pot?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.pt-br.po?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.ru.po?cvsroot=www&r1=1.111&r2=1.112
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.296&r2=1.297
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.313&r2=1.314
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.515&r2=1.516
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.534&r2=1.535
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.306&r2=1.307
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.322&r2=1.323
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.311&r2=1.312
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.305&r2=1.306
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.307&r2=1.308
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.296&r2=1.297
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.323&r2=1.324
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.288&r2=1.289
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.285&r2=1.286
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.453&r2=1.454
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.551&r2=1.552
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.200&r2=1.201
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.251&r2=1.252
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.286&r2=1.287
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.275&r2=1.276
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.423&r2=1.424
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.710&r2=1.711
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.218&r2=1.219
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.219&r2=1.220
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.339&r2=1.340
http://web.cvs.savannah.gnu.org/viewcvs/www/thankgnus/po/2021supporters.pot?cvsroot=www&r1=1.89&r2=1.90
http://web.cvs.savannah.gnu.org/viewcvs/www/thankgnus/po/2021supporters.pt-br.po?cvsroot=www&r1=1.141&r2=1.142

Patches:
Index: proprietary/po/all.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.fr.po,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- proprietary/po/all.fr.po    15 Sep 2021 07:07:17 -0000      1.57
+++ proprietary/po/all.fr.po    20 Sep 2021 11:36:08 -0000      1.58
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
 "PO-Revision-Date: 2021-09-15 09:05+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-20 11:26+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -79,6 +80,20 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-";
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law.  The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Various models of security cameras, DVRs, and baby monitors that run "
 "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
 "video-feeds/\">are exploited by a security vulnerability that could give "

Index: proprietary/po/all.pot
===================================================================
RCS file: /web/www/www/proprietary/po/all.pot,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary/po/all.pot      15 Sep 2021 06:03:44 -0000      1.30
+++ proprietary/po/all.pot      20 Sep 2021 11:36:10 -0000      1.31
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -74,6 +74,21 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Apple has made it <a "
+"href=\"https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238\";>
 "
+"impossible to load Navalny's tactical voting app into an iPhone</a> in "
+"Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law.  The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Various models of security cameras, DVRs, and baby monitors that run "
 "proprietary software <a "
 "href=\"https://www.wired.com/story/kalay-iot-bug-video-feeds/\";>are "

Index: proprietary/po/all.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.pt-br.po,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- proprietary/po/all.pt-br.po 15 Sep 2021 06:03:44 -0000      1.28
+++ proprietary/po/all.pt-br.po 20 Sep 2021 11:36:10 -0000      1.29
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
 "PO-Revision-Date: 2021-06-26 09:39-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -81,6 +81,20 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-";
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law.  The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Various models of security cameras, DVRs, and baby monitors that run "
 "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
 "video-feeds/\">are exploited by a security vulnerability that could give "

Index: proprietary/po/all.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.ru.po,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- proprietary/po/all.ru.po    16 Sep 2021 09:02:57 -0000      1.54
+++ proprietary/po/all.ru.po    20 Sep 2021 11:36:10 -0000      1.55
@@ -9,7 +9,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
 "PO-Revision-Date: 2021-04-27 13:06+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -17,6 +17,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-20 11:26+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -85,6 +86,20 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-";
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law.  The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Various models of security cameras, DVRs, and baby monitors that run "
 "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
 "video-feeds/\">are exploited by a security vulnerability that could give "

Index: proprietary/po/de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.339
retrieving revision 1.340
diff -u -b -r1.339 -r1.340
--- proprietary/po/de.po        15 Sep 2021 06:03:44 -0000      1.339
+++ proprietary/po/de.po        20 Sep 2021 11:36:10 -0000      1.340
@@ -662,6 +662,20 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-";
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law.  The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Various models of security cameras, DVRs, and baby monitors that run "
 "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
 "video-feeds/\">are exploited by a security vulnerability that could give "
@@ -13464,6 +13478,14 @@
 "Software durch deren Nutzer kontrolliert wird, haben sie eine ziemlich gute "
 "Verteidigung gegen heimtückische Softwarefunktionen."
 
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+"video-feeds/\">are affected by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
 #. type: Content of: <div><p>
 # | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
 # | devices</a>-] {+href=\"/proprietary/all.html\">More items&hellip;</a>+}

Index: proprietary/po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.485
retrieving revision 1.486
diff -u -b -r1.485 -r1.486
--- proprietary/po/es.po        15 Sep 2021 09:32:56 -0000      1.485
+++ proprietary/po/es.po        20 Sep 2021 11:36:11 -0000      1.486
@@ -616,6 +616,20 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-";
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law.  The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Various models of security cameras, DVRs, and baby monitors that run "
 "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
 "video-feeds/\">are exploited by a security vulnerability that could give "
@@ -14742,6 +14756,29 @@
 "control, de modo que pueden defenderse muy bien de las funcionalidades "
 "maliciosas del software."
 
+#. type: Content of: <div><ul><li><p>
+# | Various models of security cameras, DVRs, and baby monitors that run
+# | proprietary software <a
+# | href=\"https://www.wired.com/story/kalay-iot-bug-video-feeds/\";>are
+# | [-exploited-] {+affected+} by a security vulnerability that could give
+# | attackers access to live feeds</a>.
+#, fuzzy
+#| msgid ""
+#| "Various models of security cameras, DVRs, and baby monitors that run "
+#| "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+#| "video-feeds/\">are exploited by a security vulnerability that could give "
+#| "attackers access to live feeds</a>."
+msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+"video-feeds/\">are affected by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+"Varios modelos de cámaras de seguridad, DVR y monitores de bebés que "
+"funcionan con software privativo <a href=\"https://www.wired.com/story/kalay-";
+"iot-bug-video-feeds/\">tienen una vulnerabilidad que puede permitir a "
+"posibles atacantes acceder a los registros en vivo</a>."
+
 #. type: Content of: <div><p>
 # | <a [-href=\"/proprietary/malware-mobiles.html\">Mobiles</a>-]
 # | {+href=\"/proprietary/all.html\">More items&hellip;</a>+}

Index: proprietary/po/fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.600
retrieving revision 1.601
diff -u -b -r1.600 -r1.601
--- proprietary/po/fr.po        15 Sep 2021 07:07:17 -0000      1.600
+++ proprietary/po/fr.po        20 Sep 2021 11:36:11 -0000      1.601
@@ -502,6 +502,20 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-";
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law.  The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Various models of security cameras, DVRs, and baby monitors that run "
 "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
 "video-feeds/\">are exploited by a security vulnerability that could give "
@@ -12401,6 +12415,30 @@
 "liberté)</a>. Ses utilisateurs ont d'assez bons moyens de se défendre 
contre "
 "les fonctionnalités malveillantes puisque ce sont eux qui le contrôlent."
 
+#. type: Content of: <div><ul><li><p>
+# | Various models of security cameras, DVRs, and baby monitors that run
+# | proprietary software <a
+# | href=\"https://www.wired.com/story/kalay-iot-bug-video-feeds/\";>are
+# | [-exploited-] {+affected+} by a security vulnerability that could give
+# | attackers access to live feeds</a>.
+#, fuzzy
+#| msgid ""
+#| "Various models of security cameras, DVRs, and baby monitors that run "
+#| "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+#| "video-feeds/\">are exploited by a security vulnerability that could give "
+#| "attackers access to live feeds</a>."
+msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+"video-feeds/\">are affected by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+"Différents modèles de caméras de surveillance, d'enregistreurs vidéo "
+"numériques et de moniteurs pour bébé qui fonctionnent avec du logiciel "
+"privateur ont une <a href=\"https://www.wired.com/story/kalay-iot-bug-video-";
+"feeds/\">faille de sécurité qui permettrait à des attaquant d'espionner le 
"
+"flux vidéo</a>."
+
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr "<a href=\"/proprietary/all.html\">Voir plus&hellip;</a>"

Index: proprietary/po/it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.339
retrieving revision 1.340
diff -u -b -r1.339 -r1.340
--- proprietary/po/it.po        15 Sep 2021 06:03:45 -0000      1.339
+++ proprietary/po/it.po        20 Sep 2021 11:36:11 -0000      1.340
@@ -628,6 +628,20 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-";
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law.  The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Various models of security cameras, DVRs, and baby monitors that run "
 "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
 "video-feeds/\">are exploited by a security vulnerability that could give "
@@ -12583,6 +12597,14 @@
 "a>. Visto che il software libero è controllato dai propri utenti, questi "
 "sono protetti a sufficienza dalle funzionalità malevole dei programmi."
 
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+"video-feeds/\">are affected by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
 #. type: Content of: <div><p>
 # | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
 # | devices</a>-] {+href=\"/proprietary/all.html\">More items&hellip;</a>+}

Index: proprietary/po/ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.347
retrieving revision 1.348
diff -u -b -r1.347 -r1.348
--- proprietary/po/ja.po        15 Sep 2021 06:03:45 -0000      1.347
+++ proprietary/po/ja.po        20 Sep 2021 11:36:11 -0000      1.348
@@ -471,6 +471,20 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-";
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law.  The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Various models of security cameras, DVRs, and baby monitors that run "
 "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
 "video-feeds/\">are exploited by a security vulnerability that could give "
@@ -10241,6 +10255,14 @@
 
"す。自由ソフトウェアは、そのユーザによってコントロールされますから、悪辣なソ"
 "フトウェアの機能に対して実に良い防衛となります。"
 
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+"video-feeds/\">are affected by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
 #. type: Content of: <div><p>
 #, fuzzy
 #| msgid "<a href=\"/proprietary/malware-mobiles.html\">Mobiles</a>"

Index: proprietary/po/malware-apple.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de-diff.html,v
retrieving revision 1.84
retrieving revision 1.85
diff -u -b -r1.84 -r1.85
--- proprietary/po/malware-apple.de-diff.html   4 Sep 2021 08:37:13 -0000       
1.84
+++ proprietary/po/malware-apple.de-diff.html   20 Sep 2021 11:36:11 -0000      
1.85
@@ -442,6 +442,20 @@
 &lt;p&gt;Jails are systems that impose censorship on application 
programs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202109170"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple has made it &lt;a
+    
href="https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238"&gt;
+    impossible to load Navalny's tactical voting app into an iPhone&lt;/a&gt;
+    in Russia.&lt;/p&gt;
+
+    &lt;p&gt;It is impossible because (1) the iPhone refuses to load apps
+    from anywhere other than Apple, and (2) Apple has obeyed a Russian
+    censorship law.  The first point is enforced by Apple's nonfree
+    software.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201904080"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -1316,8 +1330,8 @@
 
 &lt;p&gt;Curiously,</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-    Either</em></ins></span> Apple <span class="removed"><del><strong>is 
beginning to allow limited passage through the
-walls of</strong></del></span> <span 
class="inserted"><ins><em>helps</em></ins></span> the <span 
class="removed"><del><strong>iThing jail: users can now install apps built from
+    Either</em></ins></span> Apple <span class="removed"><del><strong>is 
beginning to allow limited passage through</strong></del></span> <span 
class="inserted"><ins><em>helps</em></ins></span> the
+<span class="removed"><del><strong>walls of the iThing jail: users can now 
install apps built from
 source code, provided</strong></del></span> <span 
class="inserted"><ins><em>NSA snoop on all</em></ins></span> the <span 
class="removed"><del><strong>source code is written in Swift.  Users
 cannot do this freely because they are required to identify
 themselves. &lt;a href="https://developer.apple.com/xcode/"&gt;Here
@@ -1404,11 +1418,11 @@
     &lt;p&gt;Apple has banned iThing applications that show the confederate 
flag.
       &lt;a 
href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html"&gt;
       Not only those that use it as a symbol of 
racism&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>default&lt;/a&gt;.  (That article talks about iOS 
6,</em></ins></span> but <span class="removed"><del><strong>even
-      strategic games that use it to represent confederate army units
+      strategic games that use</strong></del></span> it <span 
class="removed"><del><strong>to represent confederate army units
       fighting in the Civil War.&lt;/p&gt;
     &lt;p&gt;This ludicrous rigidity illustrates the point that Apple should 
not
       be allowed to censor apps.  Even if Apple carried out this act of
-      censorship with some care,</strong></del></span> it <span 
class="removed"><del><strong>would still be wrong.  Whether racism
+      censorship with some care, it would still be wrong.  Whether racism
       is bad, whether educating people about drone 
attacks</strong></del></span> is <span class="removed"><del><strong>bad, are not
       the real issue.  Apple should not have the power to impose its views
       about either of these questions, or any 
other.&lt;/p&gt;</strong></del></span>
@@ -1556,7 +1570,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/09/04 08:37:13 $
+$Date: 2021/09/20 11:36:11 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-apple.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de.po,v
retrieving revision 1.175
retrieving revision 1.176
diff -u -b -r1.175 -r1.176
--- proprietary/po/malware-apple.de.po  4 Sep 2021 08:37:14 -0000       1.175
+++ proprietary/po/malware-apple.de.po  20 Sep 2021 11:36:11 -0000      1.176
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -738,6 +738,20 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-";
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law.  The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Apple plans to require that <a href=\"https://www.macrumors.com/2019/04/08/";
 "mac-apps-notarization-macos-10-14-5/\"> all application software for MacOS "
 "be approved by Apple first</a>."

Index: proprietary/po/malware-apple.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.es.po,v
retrieving revision 1.235
retrieving revision 1.236
diff -u -b -r1.235 -r1.236
--- proprietary/po/malware-apple.es.po  6 Sep 2021 08:36:44 -0000       1.235
+++ proprietary/po/malware-apple.es.po  20 Sep 2021 11:36:11 -0000      1.236
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-20 11:26+0000\n"
 "X-Generator: Poedit 2.2.1\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 
@@ -608,6 +609,20 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-";
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law.  The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Apple plans to require that <a href=\"https://www.macrumors.com/2019/04/08/";
 "mac-apps-notarization-macos-10-14-5/\"> all application software for MacOS "
 "be approved by Apple first</a>."

Index: proprietary/po/malware-apple.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.fr.po,v
retrieving revision 1.234
retrieving revision 1.235
diff -u -b -r1.234 -r1.235
--- proprietary/po/malware-apple.fr.po  4 Sep 2021 10:22:07 -0000       1.234
+++ proprietary/po/malware-apple.fr.po  20 Sep 2021 11:36:11 -0000      1.235
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
 "PO-Revision-Date: 2021-09-04 12:15+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-20 11:26+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -602,6 +603,20 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-";
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law.  The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Apple plans to require that <a href=\"https://www.macrumors.com/2019/04/08/";
 "mac-apps-notarization-macos-10-14-5/\"> all application software for MacOS "
 "be approved by Apple first</a>."

Index: proprietary/po/malware-apple.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it-diff.html,v
retrieving revision 1.89
retrieving revision 1.90
diff -u -b -r1.89 -r1.90
--- proprietary/po/malware-apple.it-diff.html   4 Sep 2021 08:37:14 -0000       
1.89
+++ proprietary/po/malware-apple.it-diff.html   20 Sep 2021 11:36:11 -0000      
1.90
@@ -53,8 +53,8 @@
 &lt;em&gt;Malware&lt;/em&gt; means</strong></del></span> <span 
class="inserted"><ins><em>class="infobox"&gt;
 &lt;hr class="full-width" /&gt;
 &lt;p&gt;Nonfree (proprietary)</em></ins></span> software <span 
class="removed"><del><strong>designed</strong></del></span> <span 
class="inserted"><ins><em>is very often malware (designed</em></ins></span> to 
<span class="removed"><del><strong>function in ways that</strong></del></span>
-mistreat <span class="removed"><del><strong>or harm</strong></del></span> the 
<span class="removed"><del><strong>user.  (This does not include accidental 
errors.)
-This page explains how the software in Apple's computer products are
+mistreat <span class="removed"><del><strong>or harm the user.  (This does not 
include accidental errors.)
+This page explains how</strong></del></span> the <span 
class="removed"><del><strong>software in Apple's computer products are
 malware.
 &lt;/p&gt;
 
@@ -199,7 +199,7 @@
   &lt;li id="M201908150.1"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Apple is putting DRM on</em></ins></span> iPhone <span 
class="inserted"><ins><em>batteries, and the system proprietary
+    &lt;p&gt;Apple is putting DRM on</em></ins></span> iPhone <span 
class="removed"><del><strong>has</strong></del></span> <span 
class="inserted"><ins><em>batteries, and the system proprietary
     software &lt;a href="#M201908150"&gt;turns off certain features when 
batteries
     are replaced other than by Apple.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
@@ -217,7 +217,7 @@
     &lt;p&gt;&lt;a
     
href="https://www.vice.com/en/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017"&gt;
     Apple uses DRM software to prevent people from charging an iThing
-    with a generic USB cable&lt;/a&gt;.&lt;/p&gt;
+    with</em></ins></span> a <span class="removed"><del><strong>back 
door</strong></del></span> <span class="inserted"><ins><em>generic USB 
cable&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M200811210"&gt;
@@ -228,8 +228,8 @@
     DRM (digital restrictions mechanisms) in MacOS&lt;/a&gt;. This article
     focuses on the fact that a new model of Macbook introduced a
     requirement for monitors to have malicious hardware, but DRM software
-    in MacOS is involved in activating the hardware. The software for
-    accessing iTunes is also responsible.&lt;/p&gt;
+    in MacOS is involved in activating the hardware. The 
software</em></ins></span> for
+    <span class="inserted"><ins><em>accessing iTunes is also 
responsible.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M200708130"&gt;
@@ -243,8 +243,10 @@
   &lt;li id="M200703310"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2007-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;iTunes videos have DRM, which allows Apple to &lt;a
-    href="https://en.wikipedia.org/wiki/FairPlay"&gt;dictate where its
+    &lt;p&gt;iTunes videos have DRM, which allows Apple to</em></ins></span> 
&lt;a
+<span 
class="removed"><del><strong>href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
+remote wipe&lt;/a&gt;.  It's</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://en.wikipedia.org/wiki/FairPlay"&gt;dictate
 where its
     customers can watch the videos they purchased&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -299,7 +301,7 @@
 
 &lt;h3 id="insecurity"&gt;Insecurity&lt;/h3&gt;
 
-&lt;p&gt;These bugs are/were not intentional, so unlike the rest of the file
+&lt;p&gt;These bugs are/were</em></ins></span> not <span 
class="removed"><del><strong>always enabled,</strong></del></span> <span 
class="inserted"><ins><em>intentional, so unlike the rest of the file
   they do not count as malware. We mention them to refute the
   supposition that prestigious proprietary software doesn't have grave
   bugs.&lt;/p&gt;
@@ -318,7 +320,7 @@
        a technical analysis of this spyware&lt;/a&gt; available in PDF 
format.&lt;/p&gt;
 
     &lt;p&gt;A free operating system would've let people to fix the bugs for
-    themselves but now infected people will be compelled to wait for 
corporations to
+    themselves</em></ins></span> but <span class="inserted"><ins><em>now 
infected people will be compelled to wait for corporations to
     fix the problems.&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;Please note that the article
@@ -338,12 +340,13 @@
   &lt;li id="M202011120"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Apple</em></ins></span> has <span class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Apple has &lt;a
     
href="https://sneak.berlin/20201112/your-computer-isnt-yours"&gt;implemented
-    a malware in its computers that imposes surveillance&lt;/a&gt; on users
-    and reports users' computing to Apple.&lt;/p&gt;
+    a malware in its computers that imposes surveillance&lt;/a&gt; 
on</em></ins></span> users
+    <span class="inserted"><ins><em>and reports users' computing to 
Apple.&lt;/p&gt;
 
-    &lt;p&gt;The reports are even unencrypted and they've been leaking this
+    &lt;p&gt;The reports</em></ins></span> are <span 
class="removed"><del><strong>led into
+enabling</strong></del></span> <span class="inserted"><ins><em>even 
unencrypted and they've been leaking this
     data for two years already. This malware is reporting to Apple what
     user opens what program at what time. It also gives Apple
     power to sabotage users' computing.&lt;/p&gt;
@@ -360,7 +363,7 @@
 
     &lt;p&gt;The deep insecurity of iMonsters is even more pertinent given that
     Apple's proprietary software makes users totally dependent on Apple
-    for even</em></ins></span> a <span class="inserted"><ins><em>modicum of 
security.  It also means that the devices do
+    for even a modicum of security.  It also means that the devices do
     not even try to offer security against Apple itself.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -389,18 +392,22 @@
     
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
     The NSA can tap data in smart phones, including iPhones,
     Android, and BlackBerry&lt;/a&gt;.  While there is not much
-    detail here, it seems that this does not operate via
-    the universal</em></ins></span> back door <span 
class="inserted"><ins><em>that we know nearly all portable
+    detail here,</em></ins></span> it <span 
class="removed"><del><strong>without understanding.
+&lt;/p&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>seems that this does not operate via
+    the universal back door that we know nearly all portable
     phones have. It may involve exploiting various bugs.  There are &lt;a
     
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
     lots of bugs in the phones' radio software&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+  &lt;/li&gt;</em></ins></span>
 &lt;/ul&gt;
 
 
-&lt;h3 id="interference"&gt;Interference&lt;/h3&gt;
+&lt;h3 <span class="removed"><del><strong>id="censorship"&gt;Apple 
Censorship&lt;/h3&gt;
+&lt;ul&gt;
+
+&lt;li&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="interference"&gt;Interference&lt;/h3&gt;
 &lt;p&gt;Various proprietary programs often mess up the user's system. They
-  are like sabotage, but they are not grave enough to 
qualify</em></ins></span> for <span class="inserted"><ins><em>the
+  are like sabotage, but they are not grave enough to qualify for the
   word &ldquo;sabotage&rdquo;. Nonetheless, they are nasty and
   wrong. This section describes examples of Apple committing
   interference.&lt;/p&gt;
@@ -419,11 +426,11 @@
 
   &lt;li id="M201908150"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-08&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Apple is putting DRM on iPhone
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
+    &lt;p&gt;Apple <span class="inserted"><ins><em>is putting DRM on iPhone
     batteries, and the system proprietary software</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
-remote wipe&lt;/a&gt;.  It's</strong></del></span>
+<span 
class="removed"><del><strong>href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html"&gt;
+deleted several VPNs from its</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/59nz3k/apple-is-locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair"&gt;turns
     off certain features when batteries are replaced other than by
     Apple.&lt;/a&gt;&lt;/p&gt;
@@ -436,19 +443,34 @@
 &lt;p&gt;Jails are systems that impose censorship on application 
programs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202109170"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple has made it &lt;a
+    
href="https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238"&gt;
+    impossible to load Navalny's tactical voting</em></ins></span> app <span 
class="removed"><del><strong>store</strong></del></span> <span 
class="inserted"><ins><em>into an iPhone&lt;/a&gt;
+    in Russia.&lt;/p&gt;
+
+    &lt;p&gt;It is impossible because (1) the iPhone refuses to load apps
+    from anywhere other than Apple, and (2) Apple has obeyed a Russian
+    censorship law.  The first point is enforced by Apple's nonfree
+    software.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201904080"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Apple plans to require that &lt;a
     
href="https://www.macrumors.com/2019/04/08/mac-apps-notarization-macos-10-14-5/"&gt;
-    all application software for MacOS be approved by Apple 
first&lt;/a&gt;.&lt;/p&gt;
+    all application software</em></ins></span> for <span 
class="removed"><del><strong>China&lt;/a&gt;, 
+thus using its own</strong></del></span> <span class="inserted"><ins><em>MacOS 
be approved by Apple first&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Offering a checking service as an option could be
-    useful and would</em></ins></span> not <span 
class="removed"><del><strong>always enabled,</strong></del></span> <span 
class="inserted"><ins><em>be wrong.  Requiring users to get
+    useful and would not be wrong.  Requiring users to get
     Apple's approval is tyranny. Apple says the check will
     only look for malware (not counting the malware that is &lt;a
     href="/proprietary/malware-apple.html#TOC"&gt;part of
-    the operating system&lt;/a&gt;),</em></ins></span> but <span 
class="inserted"><ins><em>Apple could change that policy step
+    the operating system&lt;/a&gt;), but Apple could change that policy step
     by step.  Or perhaps Apple will define malware to include any app
     that China does not like.&lt;/p&gt;
 
@@ -463,7 +485,7 @@
     &lt;p&gt;&lt;a 
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&amp;oldid=835861046"&gt;
     iOS, the operating system of the Apple iThings, is the prototype
     of a jail&lt;/a&gt;.  It was Apple that introduced the practice of
-    designing general purpose computers with censorship of application
+    designing general purpose computers with</em></ins></span> censorship 
<span class="inserted"><ins><em>of application
     programs.&lt;/p&gt;
 
     &lt;p&gt;Here is an article about the &lt;a
@@ -471,34 +493,24 @@
     code signing&lt;/a&gt; that the iThings use to lock up the user.&lt;/p&gt;
 
     &lt;p&gt;Curiously, Apple is beginning to allow limited passage through the
-    walls of the iThing jail:</em></ins></span> users <span 
class="inserted"><ins><em>can now install apps built from
+    walls of the iThing jail: users can now install apps built from
     source code, provided the source code is written in Swift.  Users
-    cannot do this freely because they</em></ins></span> are <span 
class="removed"><del><strong>led into
-enabling</strong></del></span> <span class="inserted"><ins><em>required to 
identify
+    cannot do this freely because they are required to identify
     themselves. &lt;a href="https://developer.apple.com/xcode/"&gt;Here
-    are details&lt;/a&gt;. While this is a crack in the prison 
walls,</em></ins></span> it <span class="removed"><del><strong>without 
understanding.
-&lt;/p&gt;&lt;/li&gt;</strong></del></span> <span class="inserted"><ins><em>is 
not
+    are details&lt;/a&gt;. While this is a crack in the prison walls, it is not
     big enough to mean that the iThings are no longer jails.&lt;/p&gt;
-  &lt;/li&gt;</em></ins></span>
+  &lt;/li&gt;
 &lt;/ul&gt;
 
-<span class="removed"><del><strong>&lt;h3 id="censorship"&gt;Apple 
Censorship&lt;/h3&gt;
-&lt;ul&gt;
-
-&lt;li&gt;
-&lt;p&gt;Apple</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;h4 id="jail-censorship"&gt;Examples of 
censorship by Apple jails&lt;/h4&gt;
+&lt;h4 id="jail-censorship"&gt;Examples of censorship by Apple jails&lt;/h4&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M202108200"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Russian communications watchdog</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html"&gt;
-deleted several VPNs</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.reuters.com/legal/litigation/russian-watchdog-tells-google-apple-remove-navalny-app-report-2021-08-20/"&gt;
-    tells Google and Apple to remove Navalny's app&lt;/a&gt;</em></ins></span> 
from <span class="removed"><del><strong>its app store</strong></del></span> 
<span class="inserted"><ins><em>their
+    &lt;p&gt;The Russian communications watchdog &lt;a
+    
href="https://www.reuters.com/legal/litigation/russian-watchdog-tells-google-apple-remove-navalny-app-report-2021-08-20/"&gt;
+    tells Google and Apple to remove Navalny's app&lt;/a&gt; from their
     stores.&lt;/p&gt;
 
     &lt;p&gt;Because Apple controls what a user can install, this is absolute
@@ -511,9 +523,8 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Apple is &lt;a
     
href="https://www.theguardian.com/technology/2020/aug/30/this-isnt-the-1990s-apple-under-pressure-from-app-developers"&gt;
-    putting the squeeze on all business&lt;/a&gt; conducted through 
apps</em></ins></span>
-    for <span class="removed"><del><strong>China&lt;/a&gt;, 
-thus using its own censorship</strong></del></span> <span 
class="inserted"><ins><em>iMonsters.&lt;/p&gt;
+    putting the squeeze on all business&lt;/a&gt; conducted through apps
+    for iMonsters.&lt;/p&gt;
 
     &lt;p&gt;This is a symptom of a very big injustice: that Apple has 
the</em></ins></span>
     power to <span 
class="removed"><del><strong>strengthen</strong></del></span> <span 
class="inserted"><ins><em>decide what software can be installed on an iMonster.
@@ -1495,7 +1506,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/09/04 08:37:14 $
+$Date: 2021/09/20 11:36:11 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-apple.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it.po,v
retrieving revision 1.168
retrieving revision 1.169
diff -u -b -r1.168 -r1.169
--- proprietary/po/malware-apple.it.po  4 Sep 2021 08:37:14 -0000       1.168
+++ proprietary/po/malware-apple.it.po  20 Sep 2021 11:36:11 -0000      1.169
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
 "PO-Revision-Date: 2017-12-31 13:01+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -679,6 +679,20 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-";
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law.  The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Apple plans to require that <a href=\"https://www.macrumors.com/2019/04/08/";
 "mac-apps-notarization-macos-10-14-5/\"> all application software for MacOS "
 "be approved by Apple first</a>."

Index: proprietary/po/malware-apple.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja-diff.html,v
retrieving revision 1.104
retrieving revision 1.105
diff -u -b -r1.104 -r1.105
--- proprietary/po/malware-apple.ja-diff.html   4 Sep 2021 08:37:14 -0000       
1.104
+++ proprietary/po/malware-apple.ja-diff.html   20 Sep 2021 11:36:11 -0000      
1.105
@@ -59,8 +59,8 @@
 &lt;em&gt;Malware&lt;/em&gt; means</strong></del></span> <span 
class="inserted"><ins><em>class="infobox"&gt;
 &lt;hr class="full-width" /&gt;
 &lt;p&gt;Nonfree (proprietary)</em></ins></span> software <span 
class="removed"><del><strong>designed</strong></del></span> <span 
class="inserted"><ins><em>is very often malware (designed</em></ins></span> to 
<span class="removed"><del><strong>function in ways that</strong></del></span>
-mistreat <span class="removed"><del><strong>or harm the user.  (This does not 
include accidental errors.)
-This page explains how</strong></del></span> the <span 
class="removed"><del><strong>software in Apple's computer products are
+mistreat <span class="removed"><del><strong>or harm</strong></del></span> the 
<span class="removed"><del><strong>user.  (This does not include accidental 
errors.)
+This page explains how the software in Apple's computer products are
 malware.
 &lt;/p&gt;
 
@@ -93,10 +93,11 @@
 &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>serve as 
specific substantiation.&lt;/p&gt;</em></ins></span>
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;Here's how Apple's systems are 
malware.&lt;/p&gt;</strong></del></span>
+<span class="removed"><del><strong>&lt;p&gt;Here's how Apple's systems are 
malware.&lt;/p&gt;
 
-&lt;div <span class="removed"><del><strong>class="toc"&gt;
-&lt;div class="malfunctions"&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="TOC" class="toc-inline"&gt;
+&lt;div class="toc"&gt;</strong></del></span>
+
+&lt;div <span 
class="removed"><del><strong>class="malfunctions"&gt;</strong></del></span> 
<span class="inserted"><ins><em>id="TOC" class="toc-inline"&gt;
 &lt;h3 style="display: none"&gt;Types of Apple 
malware&lt;/h3&gt;</em></ins></span>
 &lt;ul&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
@@ -125,9 +126,9 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Apple appears</em></ins></span> to <span 
class="removed"><del><strong>restrict what users can do with the data in their 
computers.&lt;/li&gt;
-&lt;li&gt;&lt;a href="#jails"&gt;Jails&lt;/a&gt;&mdash;systems
-    that impose censorship on application programs.&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span> <span 
class="inserted"><ins><em>say</em></ins></span> that <span 
class="removed"><del><strong>reject any operating system</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
+&lt;li&gt;&lt;a 
href="#jails"&gt;Jails&lt;/a&gt;&mdash;systems</strong></del></span> <span 
class="inserted"><ins><em>say</em></ins></span> that <span 
class="removed"><del><strong>impose censorship on application 
programs.&lt;/li&gt;
+&lt;li&gt;&lt;a href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems
+    that reject any operating system</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/"&gt;
     there is a back door in MacOS&lt;/a&gt; for automatically updating some
     (all?) apps.&lt;/p&gt;
@@ -490,6 +491,20 @@
 &lt;p&gt;Jails are systems that impose censorship on application 
programs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202109170"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple has made it &lt;a
+    
href="https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238"&gt;
+    impossible to load Navalny's tactical voting app into an iPhone&lt;/a&gt;
+    in Russia.&lt;/p&gt;
+
+    &lt;p&gt;It is impossible because (1) the iPhone refuses to load apps
+    from anywhere other than Apple, and (2) Apple has obeyed a Russian
+    censorship law.  The first point is enforced by Apple's nonfree
+    software.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201904080"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -1083,8 +1098,8 @@
   &lt;li id="M201702150"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Apple proposes</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
+    &lt;p&gt;Apple proposes &lt;a
+    
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
     fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no way
     to use it without having your fingerprints taken. Users would have
     no way to tell whether the phone is snooping on them.&lt;/p&gt;
@@ -1093,8 +1108,8 @@
   &lt;li id="M201611170"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;iPhones &lt;a
-    
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send</em></ins></span>
+    &lt;p&gt;iPhones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send</em></ins></span>
     lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can get
     them from there.&lt;/p&gt;
   &lt;/li&gt;
@@ -1458,7 +1473,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/09/04 08:37:14 $
+$Date: 2021/09/20 11:36:11 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-apple.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja.po,v
retrieving revision 1.151
retrieving revision 1.152
diff -u -b -r1.151 -r1.152
--- proprietary/po/malware-apple.ja.po  4 Sep 2021 08:37:14 -0000       1.151
+++ proprietary/po/malware-apple.ja.po  20 Sep 2021 11:36:11 -0000      1.152
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
 "PO-Revision-Date: 2016-12-20 14:42+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -564,6 +564,20 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-";
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law.  The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Apple plans to require that <a href=\"https://www.macrumors.com/2019/04/08/";
 "mac-apps-notarization-macos-10-14-5/\"> all application software for MacOS "
 "be approved by Apple first</a>."

Index: proprietary/po/malware-apple.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl-diff.html,v
retrieving revision 1.107
retrieving revision 1.108
diff -u -b -r1.107 -r1.108
--- proprietary/po/malware-apple.nl-diff.html   4 Sep 2021 08:37:14 -0000       
1.107
+++ proprietary/po/malware-apple.nl-diff.html   20 Sep 2021 11:36:11 -0000      
1.108
@@ -59,8 +59,8 @@
 &lt;em&gt;Malware&lt;/em&gt; means</strong></del></span> <span 
class="inserted"><ins><em>class="infobox"&gt;
 &lt;hr class="full-width" /&gt;
 &lt;p&gt;Nonfree (proprietary)</em></ins></span> software <span 
class="removed"><del><strong>designed</strong></del></span> <span 
class="inserted"><ins><em>is very often malware (designed</em></ins></span> to 
<span class="removed"><del><strong>function in ways that</strong></del></span>
-mistreat <span class="removed"><del><strong>or harm the user.  (This does not 
include accidental errors.)
-This page explains how</strong></del></span> the <span 
class="removed"><del><strong>software in Apple's computer products are
+mistreat <span class="removed"><del><strong>or harm</strong></del></span> the 
<span class="removed"><del><strong>user.  (This does not include accidental 
errors.)
+This page explains how the software in Apple's computer products are
 malware.
 &lt;/p&gt;
 
@@ -93,10 +93,11 @@
 &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>serve as 
specific substantiation.&lt;/p&gt;</em></ins></span>
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;Here's how Apple's systems are 
malware.&lt;/p&gt;</strong></del></span>
+<span class="removed"><del><strong>&lt;p&gt;Here's how Apple's systems are 
malware.&lt;/p&gt;
 
-&lt;div <span class="removed"><del><strong>class="toc"&gt;
-&lt;div class="malfunctions"&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="TOC" class="toc-inline"&gt;
+&lt;div class="toc"&gt;</strong></del></span>
+
+&lt;div <span 
class="removed"><del><strong>class="malfunctions"&gt;</strong></del></span> 
<span class="inserted"><ins><em>id="TOC" class="toc-inline"&gt;
 &lt;h3 style="display: none"&gt;Types of Apple 
malware&lt;/h3&gt;</em></ins></span>
 &lt;ul&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
@@ -125,9 +126,9 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Apple appears</em></ins></span> to <span 
class="removed"><del><strong>restrict what users can do with the data in their 
computers.&lt;/li&gt;
-&lt;li&gt;&lt;a href="#jails"&gt;Jails&lt;/a&gt;&mdash;systems
-    that impose censorship on application programs.&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span> <span 
class="inserted"><ins><em>say</em></ins></span> that <span 
class="removed"><del><strong>reject any operating system</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
+&lt;li&gt;&lt;a 
href="#jails"&gt;Jails&lt;/a&gt;&mdash;systems</strong></del></span> <span 
class="inserted"><ins><em>say</em></ins></span> that <span 
class="removed"><del><strong>impose censorship on application 
programs.&lt;/li&gt;
+&lt;li&gt;&lt;a href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems
+    that reject any operating system</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/"&gt;
     there is a back door in MacOS&lt;/a&gt; for automatically updating some
     (all?) apps.&lt;/p&gt;
@@ -490,6 +491,20 @@
 &lt;p&gt;Jails are systems that impose censorship on application 
programs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202109170"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple has made it &lt;a
+    
href="https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238"&gt;
+    impossible to load Navalny's tactical voting app into an iPhone&lt;/a&gt;
+    in Russia.&lt;/p&gt;
+
+    &lt;p&gt;It is impossible because (1) the iPhone refuses to load apps
+    from anywhere other than Apple, and (2) Apple has obeyed a Russian
+    censorship law.  The first point is enforced by Apple's nonfree
+    software.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201904080"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -1083,8 +1098,8 @@
   &lt;li id="M201702150"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Apple proposes</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
+    &lt;p&gt;Apple proposes &lt;a
+    
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
     fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no way
     to use it without having your fingerprints taken. Users would have
     no way to tell whether the phone is snooping on them.&lt;/p&gt;
@@ -1093,8 +1108,8 @@
   &lt;li id="M201611170"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;iPhones &lt;a
-    
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send</em></ins></span>
+    &lt;p&gt;iPhones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send</em></ins></span>
     lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can get
     them from there.&lt;/p&gt;
   &lt;/li&gt;
@@ -1458,7 +1473,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/09/04 08:37:14 $
+$Date: 2021/09/20 11:36:11 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-apple.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl.po,v
retrieving revision 1.105
retrieving revision 1.106
diff -u -b -r1.105 -r1.106
--- proprietary/po/malware-apple.nl.po  4 Sep 2021 08:37:14 -0000       1.105
+++ proprietary/po/malware-apple.nl.po  20 Sep 2021 11:36:11 -0000      1.106
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
 "PO-Revision-Date: 2017-01-10 22:15+0100\n"
 "Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
 "Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -579,6 +579,20 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-";
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law.  The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Apple plans to require that <a href=\"https://www.macrumors.com/2019/04/08/";
 "mac-apps-notarization-macos-10-14-5/\"> all application software for MacOS "
 "be approved by Apple first</a>."

Index: proprietary/po/malware-apple.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.pot,v
retrieving revision 1.115
retrieving revision 1.116
diff -u -b -r1.115 -r1.116
--- proprietary/po/malware-apple.pot    4 Sep 2021 08:37:14 -0000       1.115
+++ proprietary/po/malware-apple.pot    20 Sep 2021 11:36:11 -0000      1.116
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -445,6 +445,21 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Apple has made it <a "
+"href=\"https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238\";>
 "
+"impossible to load Navalny's tactical voting app into an iPhone</a> in "
+"Russia."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law.  The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Apple plans to require that <a "
 
"href=\"https://www.macrumors.com/2019/04/08/mac-apps-notarization-macos-10-14-5/\";>
 "
 "all application software for MacOS be approved by Apple first</a>."

Index: proprietary/po/malware-apple.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.pt-br.po,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- proprietary/po/malware-apple.pt-br.po       6 Sep 2021 01:03:48 -0000       
1.14
+++ proprietary/po/malware-apple.pt-br.po       20 Sep 2021 11:36:12 -0000      
1.15
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
 "PO-Revision-Date: 2021-06-26 09:40-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -13,6 +13,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-20 11:26+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 
 #. type: Content of: <title>
@@ -597,6 +598,20 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-";
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law.  The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Apple plans to require that <a href=\"https://www.macrumors.com/2019/04/08/";
 "mac-apps-notarization-macos-10-14-5/\"> all application software for MacOS "
 "be approved by Apple first</a>."

Index: proprietary/po/malware-apple.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ru.po,v
retrieving revision 1.280
retrieving revision 1.281
diff -u -b -r1.280 -r1.281
--- proprietary/po/malware-apple.ru.po  6 Sep 2021 10:03:48 -0000       1.280
+++ proprietary/po/malware-apple.ru.po  20 Sep 2021 11:36:12 -0000      1.281
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-20 11:26+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -601,6 +602,20 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-";
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law.  The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Apple plans to require that <a href=\"https://www.macrumors.com/2019/04/08/";
 "mac-apps-notarization-macos-10-14-5/\"> all application software for MacOS "
 "be approved by Apple first</a>."

Index: proprietary/po/nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.340
retrieving revision 1.341
diff -u -b -r1.340 -r1.341
--- proprietary/po/nl.po        15 Sep 2021 06:03:45 -0000      1.340
+++ proprietary/po/nl.po        20 Sep 2021 11:36:12 -0000      1.341
@@ -449,6 +449,20 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-";
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law.  The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Various models of security cameras, DVRs, and baby monitors that run "
 "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
 "video-feeds/\">are exploited by a security vulnerability that could give "
@@ -9532,6 +9546,14 @@
 "a>. Omdat vrije software onder controle is van zijn gebruikers, hebben zij "
 "een vrij goede bescherming tegen malafide softwarefunctionaliteiten."
 
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+"video-feeds/\">are affected by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
 #. type: Content of: <div><p>
 # | <a [-href=\"/proprietary/malware-mobiles.html\">Mobiles</a>-]
 # | {+href=\"/proprietary/all.html\">More items&hellip;</a>+}

Index: proprietary/po/pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.339
retrieving revision 1.340
diff -u -b -r1.339 -r1.340
--- proprietary/po/pl.po        15 Sep 2021 06:03:45 -0000      1.339
+++ proprietary/po/pl.po        20 Sep 2021 11:36:12 -0000      1.340
@@ -438,6 +438,20 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-";
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law.  The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Various models of security cameras, DVRs, and baby monitors that run "
 "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
 "video-feeds/\">are exploited by a security vulnerability that could give "
@@ -9012,6 +9026,14 @@
 "przez jego użytkowników, mają oni dobrą ochronę przeciwko złośliwym "
 "działaniem oprogramowania."
 
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+"video-feeds/\">are affected by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
 #. type: Content of: <div><p>
 # | <a [-href=\"/philosophy/malware-mobiles.html\">Malware in mobile
 # | devices</a>-] {+href=\"/proprietary/all.html\">More items&hellip;</a>+}

Index: proprietary/po/pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.338
retrieving revision 1.339
diff -u -b -r1.338 -r1.339
--- proprietary/po/pot  15 Sep 2021 06:03:45 -0000      1.338
+++ proprietary/po/pot  20 Sep 2021 11:36:12 -0000      1.339
@@ -368,6 +368,20 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-";
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law.  The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Various models of security cameras, DVRs, and baby monitors that run "
 "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
 "video-feeds/\">are exploited by a security vulnerability that could give "
@@ -8303,6 +8317,14 @@
 "they have a pretty good defense against malicious software functionality."
 msgstr ""
 
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+"video-feeds/\">are affected by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr ""

Index: proprietary/po/proprietary-insecurity.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de-diff.html,v
retrieving revision 1.91
retrieving revision 1.92
diff -u -b -r1.91 -r1.92
--- proprietary/po/proprietary-insecurity.de-diff.html  15 Sep 2021 06:03:45 
-0000      1.91
+++ proprietary/po/proprietary-insecurity.de-diff.html  20 Sep 2021 11:36:12 
-0000      1.92
@@ -103,7 +103,7 @@
     &lt;p&gt;Various models of</em></ins></span> security <span 
class="removed"><del><strong>hole in</strong></del></span> <span 
class="inserted"><ins><em>cameras, DVRs,
     and baby monitors that run proprietary software &lt;a
     href="https://www.wired.com/story/kalay-iot-bug-video-feeds/"&gt;are
-    exploited by</em></ins></span> a <span class="inserted"><ins><em>security 
vulnerability that could give attackers access
+    affected by</em></ins></span> a <span class="inserted"><ins><em>security 
vulnerability that could give attackers access
     to live feeds&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -170,13 +170,13 @@
   &lt;li id="M202105040"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A motorcycle company named Klim</em></ins></span> is <span 
class="removed"><del><strong>discovered.</strong></del></span> <span 
class="inserted"><ins><em>selling airbag
+    &lt;p&gt;A motorcycle company named Klim is selling airbag
     vests with different payment methods, one of them is through a &lt;a
     
href="https://www.vice.com/en/article/93yyyd/this-motorcycle-airbag-vest-will-stop-working-if-you-miss-a-payment"&gt;proprietary
     subscription-based option that will block the vest from inflating if
     the payments don't go through&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;They say there is a 30-days grace period if you miss a payment
+    &lt;p&gt;They say there</em></ins></span> is <span 
class="removed"><del><strong>discovered.</strong></del></span> <span 
class="inserted"><ins><em>a 30-days grace period if you miss a payment
     but the grace period is no excuse to the insecurity.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1514,7 +1514,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/09/15 06:03:45 $
+$Date: 2021/09/20 11:36:12 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.189
retrieving revision 1.190
diff -u -b -r1.189 -r1.190
--- proprietary/po/proprietary-insecurity.de.po 15 Sep 2021 06:03:45 -0000      
1.189
+++ proprietary/po/proprietary-insecurity.de.po 20 Sep 2021 11:36:12 -0000      
1.190
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
 "PO-Revision-Date: 2018-08-29 02:41+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -177,7 +177,7 @@
 msgid ""
 "Various models of security cameras, DVRs, and baby monitors that run "
 "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
-"video-feeds/\">are exploited by a security vulnerability that could give "
+"video-feeds/\">are affected by a security vulnerability that could give "
 "attackers access to live feeds</a>."
 msgstr ""
 

Index: proprietary/po/proprietary-insecurity.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.es.po,v
retrieving revision 1.130
retrieving revision 1.131
diff -u -b -r1.130 -r1.131
--- proprietary/po/proprietary-insecurity.es.po 15 Sep 2021 09:32:56 -0000      
1.130
+++ proprietary/po/proprietary-insecurity.es.po 20 Sep 2021 11:36:12 -0000      
1.131
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: \n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-20 11:26+0000\n"
 "X-Generator: Poedit 2.2.1\n"
 
 #. type: Content of: <title>
@@ -140,10 +141,21 @@
 "confiables que justifiquen su inclusión."
 
 #. type: Content of: <div><div><ul><li><p>
+# | Various models of security cameras, DVRs, and baby monitors that run
+# | proprietary software <a
+# | href=\"https://www.wired.com/story/kalay-iot-bug-video-feeds/\";>are
+# | [-exploited-] {+affected+} by a security vulnerability that could give
+# | attackers access to live feeds</a>.
+#, fuzzy
+#| msgid ""
+#| "Various models of security cameras, DVRs, and baby monitors that run "
+#| "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+#| "video-feeds/\">are exploited by a security vulnerability that could give "
+#| "attackers access to live feeds</a>."
 msgid ""
 "Various models of security cameras, DVRs, and baby monitors that run "
 "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
-"video-feeds/\">are exploited by a security vulnerability that could give "
+"video-feeds/\">are affected by a security vulnerability that could give "
 "attackers access to live feeds</a>."
 msgstr ""
 "Varios modelos de cámaras de seguridad, DVR y monitores de bebés que "

Index: proprietary/po/proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.278
retrieving revision 1.279
diff -u -b -r1.278 -r1.279
--- proprietary/po/proprietary-insecurity.fr.po 15 Sep 2021 07:07:17 -0000      
1.278
+++ proprietary/po/proprietary-insecurity.fr.po 20 Sep 2021 11:36:12 -0000      
1.279
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
 "PO-Revision-Date: 2021-09-15 09:05+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-20 11:26+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -140,10 +141,21 @@
 "pour l'étayer."
 
 #. type: Content of: <div><div><ul><li><p>
+# | Various models of security cameras, DVRs, and baby monitors that run
+# | proprietary software <a
+# | href=\"https://www.wired.com/story/kalay-iot-bug-video-feeds/\";>are
+# | [-exploited-] {+affected+} by a security vulnerability that could give
+# | attackers access to live feeds</a>.
+#, fuzzy
+#| msgid ""
+#| "Various models of security cameras, DVRs, and baby monitors that run "
+#| "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+#| "video-feeds/\">are exploited by a security vulnerability that could give "
+#| "attackers access to live feeds</a>."
 msgid ""
 "Various models of security cameras, DVRs, and baby monitors that run "
 "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
-"video-feeds/\">are exploited by a security vulnerability that could give "
+"video-feeds/\">are affected by a security vulnerability that could give "
 "attackers access to live feeds</a>."
 msgstr ""
 "Différents modèles de caméras de surveillance, d'enregistreurs vidéo "

Index: proprietary/po/proprietary-insecurity.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it-diff.html,v
retrieving revision 1.104
retrieving revision 1.105
diff -u -b -r1.104 -r1.105
--- proprietary/po/proprietary-insecurity.it-diff.html  15 Sep 2021 06:03:45 
-0000      1.104
+++ proprietary/po/proprietary-insecurity.it-diff.html  20 Sep 2021 11:36:12 
-0000      1.105
@@ -103,7 +103,7 @@
     &lt;p&gt;Various models of</em></ins></span> security <span 
class="removed"><del><strong>hole in</strong></del></span> <span 
class="inserted"><ins><em>cameras, DVRs,
     and baby monitors that run proprietary software &lt;a
     href="https://www.wired.com/story/kalay-iot-bug-video-feeds/"&gt;are
-    exploited by</em></ins></span> a <span class="inserted"><ins><em>security 
vulnerability that could give attackers access
+    affected by</em></ins></span> a <span class="inserted"><ins><em>security 
vulnerability that could give attackers access
     to live feeds&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -177,7 +177,7 @@
     the payments don't go through&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;They say there is a 30-days grace period if you miss a payment
-    but the grace period</em></ins></span> is <span 
class="removed"><del><strong>discovered.</strong></del></span> <span 
class="inserted"><ins><em>no excuse to the insecurity.&lt;/p&gt;
+    but the grace period is no excuse to the insecurity.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202105030"&gt;
@@ -188,7 +188,7 @@
     up with private companies to monitor American citizens' private online
     activity and digital communications&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;What creates the opportunity to try this is the fact that these
+    &lt;p&gt;What creates the opportunity to try this</em></ins></span> is 
<span class="removed"><del><strong>discovered.</strong></del></span> <span 
class="inserted"><ins><em>the fact that these
     companies are already snooping on users' private activities. That
     in turn is due to people's use of nonfree software which snoops,
     and online dis-services which snoop.&lt;/p&gt;
@@ -386,7 +386,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Some security breakers (wrongly referred in this article as &lt;a
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;)
-    managed to interfere the Amazon Ring proprietary system, and &lt;a
+    managed to interfere the Amazon Ring proprietary system,</em></ins></span> 
and <span class="inserted"><ins><em>&lt;a
     
href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras"&gt;access
     its camera, speakers and microphones&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -397,7 +397,7 @@
     &lt;p&gt;Internet-tethered Amazon Ring had
     a security vulnerability that enabled attackers to &lt;a
     
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;
-    access the user's wifi password&lt;/a&gt;,</em></ins></span> and <span 
class="inserted"><ins><em>snoop on the household
+    access the user's wifi password&lt;/a&gt;, and snoop on the household
     through connected surveillance devices.&lt;/p&gt;
 
     &lt;p&gt;Knowledge of the wifi password would</em></ins></span> not <span 
class="removed"><del><strong>culpable.</strong></del></span> <span 
class="inserted"><ins><em>be sufficient to carry
@@ -1487,7 +1487,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/09/15 06:03:45 $
+$Date: 2021/09/20 11:36:12 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.206
retrieving revision 1.207
diff -u -b -r1.206 -r1.207
--- proprietary/po/proprietary-insecurity.it.po 15 Sep 2021 06:03:45 -0000      
1.206
+++ proprietary/po/proprietary-insecurity.it.po 20 Sep 2021 11:36:12 -0000      
1.207
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
 "PO-Revision-Date: 2017-12-31 13:13+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -167,7 +167,7 @@
 msgid ""
 "Various models of security cameras, DVRs, and baby monitors that run "
 "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
-"video-feeds/\">are exploited by a security vulnerability that could give "
+"video-feeds/\">are affected by a security vulnerability that could give "
 "attackers access to live feeds</a>."
 msgstr ""
 

Index: proprietary/po/proprietary-insecurity.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja-diff.html,v
retrieving revision 1.125
retrieving revision 1.126
diff -u -b -r1.125 -r1.126
--- proprietary/po/proprietary-insecurity.ja-diff.html  15 Sep 2021 06:03:45 
-0000      1.125
+++ proprietary/po/proprietary-insecurity.ja-diff.html  20 Sep 2021 11:36:12 
-0000      1.126
@@ -103,7 +103,7 @@
     &lt;p&gt;Various models of security cameras, DVRs,
     and baby monitors that run proprietary software &lt;a
     href="https://www.wired.com/story/kalay-iot-bug-video-feeds/"&gt;are
-    exploited by a security vulnerability that could give attackers access
+    affected by a security vulnerability that could give attackers access
     to live feeds&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -516,7 +516,8 @@
     and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
     turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
 
-    &lt;p&gt;It was very difficult for them to do this. The job would be much
+    &lt;p&gt;It was very difficult for</em></ins></span> them
+<span class="removed"><del><strong>deliberately,</strong></del></span> <span 
class="inserted"><ins><em>to do this. The job would be much
     easier for Amazon. And if some government such as China or the US
     told Amazon to do this, or cease to sell the product in that country,
     do you think Amazon would have the moral fiber to say no?&lt;/p&gt;
@@ -566,7 +567,7 @@
   &lt;li id="M201711200"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Amazon recently invited consumers to be suckers and &lt;a
+    &lt;p&gt;Amazon recently invited consumers to be suckers</em></ins></span> 
and <span class="removed"><del><strong>&lt;em&gt;the</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
     
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo"&gt;
     allow delivery staff to open their front doors&lt;/a&gt;. Wouldn't you know
     it, the system has a grave security flaw.&lt;/p&gt;
@@ -616,8 +617,7 @@
     &lt;p&gt;That is a malicious functionality, but in addition it
     is a gross insecurity since anyone, including malicious crackers, &lt;a
     
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;can
-    find those accounts and use</em></ins></span> them
-<span class="removed"><del><strong>deliberately,</strong></del></span> <span 
class="inserted"><ins><em>to get into users' cameras&lt;/a&gt;.&lt;/p&gt;
+    find those accounts and use them to get into users' 
cameras&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201706050"&gt;
@@ -631,7 +631,7 @@
     &lt;p&gt;The vulnerability allowed a cracker to access
     the computer's Intel Active Management Technology (AMT) &lt;a
     
href="https://arstechnica.com/security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-anyone-thought/"&gt;
-    web interface with an empty password</em></ins></span> and <span 
class="removed"><del><strong>&lt;em&gt;the</strong></del></span> <span 
class="inserted"><ins><em>gave administrative
+    web interface with an empty password and gave administrative
     access&lt;/a&gt; to access the computer's keyboard, mouse, monitor among
     other privileges.&lt;/p&gt;
 
@@ -1208,12 +1208,10 @@
     from the state.  Quite the contrary: confiding your data to someone
     else's server, if not first encrypted by you with free software,
     undermines your <span class="removed"><del><strong>rights.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>rights.&lt;/p&gt;</em></ins></span>
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>rights.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201404250"&gt;
+  &lt;li id="M201404250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Lots of &lt;a
@@ -1226,10 +1224,12 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The &lt;a
     
href="http://arstechnica.com/security/2014/02/crypto-weaknesses-in-whatsapp-the-kind-of-stuff-the-nsa-would-love/"&gt;insecurity
-    of WhatsApp&lt;/a&gt; makes eavesdropping a snap.&lt;/p&gt;
+    of WhatsApp&lt;/a&gt; makes eavesdropping a 
snap.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201312290"&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201312290"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
     &lt;p&gt;&lt;a href="http://www.bunniestudios.com/blog/?p=3554"&gt; Some 
flash
@@ -1414,7 +1414,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/09/15 06:03:45 $
+$Date: 2021/09/20 11:36:12 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-insecurity.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja.po,v
retrieving revision 1.178
retrieving revision 1.179
diff -u -b -r1.178 -r1.179
--- proprietary/po/proprietary-insecurity.ja.po 15 Sep 2021 06:03:46 -0000      
1.178
+++ proprietary/po/proprietary-insecurity.ja.po 20 Sep 2021 11:36:12 -0000      
1.179
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
 "PO-Revision-Date: 2016-10-31 12:56+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -143,7 +143,7 @@
 msgid ""
 "Various models of security cameras, DVRs, and baby monitors that run "
 "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
-"video-feeds/\">are exploited by a security vulnerability that could give "
+"video-feeds/\">are affected by a security vulnerability that could give "
 "attackers access to live feeds</a>."
 msgstr ""
 

Index: proprietary/po/proprietary-insecurity.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pot,v
retrieving revision 1.144
retrieving revision 1.145
diff -u -b -r1.144 -r1.145
--- proprietary/po/proprietary-insecurity.pot   15 Sep 2021 06:03:46 -0000      
1.144
+++ proprietary/po/proprietary-insecurity.pot   20 Sep 2021 11:36:12 -0000      
1.145
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -108,9 +108,9 @@
 msgid ""
 "Various models of security cameras, DVRs, and baby monitors that run "
 "proprietary software <a "
-"href=\"https://www.wired.com/story/kalay-iot-bug-video-feeds/\";>are "
-"exploited by a security vulnerability that could give attackers access to "
-"live feeds</a>."
+"href=\"https://www.wired.com/story/kalay-iot-bug-video-feeds/\";>are affected "
+"by a security vulnerability that could give attackers access to live "
+"feeds</a>."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>

Index: proprietary/po/proprietary-insecurity.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pt-br.po,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary/po/proprietary-insecurity.pt-br.po      15 Sep 2021 06:03:46 
-0000      1.18
+++ proprietary/po/proprietary-insecurity.pt-br.po      20 Sep 2021 11:36:12 
-0000      1.19
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
 "PO-Revision-Date: 2021-06-26 09:40-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -137,7 +137,7 @@
 msgid ""
 "Various models of security cameras, DVRs, and baby monitors that run "
 "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
-"video-feeds/\">are exploited by a security vulnerability that could give "
+"video-feeds/\">are affected by a security vulnerability that could give "
 "attackers access to live feeds</a>."
 msgstr ""
 

Index: proprietary/po/proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.320
retrieving revision 1.321
diff -u -b -r1.320 -r1.321
--- proprietary/po/proprietary-insecurity.ru.po 16 Sep 2021 09:02:57 -0000      
1.320
+++ proprietary/po/proprietary-insecurity.ru.po 20 Sep 2021 11:36:12 -0000      
1.321
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-20 11:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -137,10 +138,21 @@
 "качестве конкретных свидетельств."
 
 #. type: Content of: <div><div><ul><li><p>
+# | Various models of security cameras, DVRs, and baby monitors that run
+# | proprietary software <a
+# | href=\"https://www.wired.com/story/kalay-iot-bug-video-feeds/\";>are
+# | [-exploited-] {+affected+} by a security vulnerability that could give
+# | attackers access to live feeds</a>.
+#, fuzzy
+#| msgid ""
+#| "Various models of security cameras, DVRs, and baby monitors that run "
+#| "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+#| "video-feeds/\">are exploited by a security vulnerability that could give "
+#| "attackers access to live feeds</a>."
 msgid ""
 "Various models of security cameras, DVRs, and baby monitors that run "
 "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
-"video-feeds/\">are exploited by a security vulnerability that could give "
+"video-feeds/\">are affected by a security vulnerability that could give "
 "attackers access to live feeds</a>."
 msgstr ""
 "Различные модели камер охраны и 
наблюдения за грудными детьми, работающими 
"

Index: proprietary/po/proprietary-jails.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.de-diff.html,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- proprietary/po/proprietary-jails.de-diff.html       4 Sep 2021 08:37:15 
-0000       1.47
+++ proprietary/po/proprietary-jails.de-diff.html       20 Sep 2021 11:36:12 
-0000      1.48
@@ -105,21 +105,35 @@
 &lt;h3 id="apple"&gt;Apple&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202109170"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple has made it</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="#microsoft"&gt;Microsoft&nbsp;jails&lt;/a&gt;
 |</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238"&gt;
+    impossible to load Navalny's tactical voting app into an iPhone&lt;/a&gt;
+    in Russia.&lt;/p&gt;
+
+    &lt;p&gt;It is impossible because (1) the iPhone refuses to load apps
+    from anywhere other than Apple, and (2) Apple has obeyed a Russian
+    censorship law.  The first point is enforced by Apple's nonfree
+    software.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201904080"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Apple plans to require that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="#microsoft"&gt;Microsoft&nbsp;jails&lt;/a&gt;
 |</strong></del></span>
+    &lt;p&gt;Apple plans to require that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="#consoles"&gt;Game consoles&lt;/a&gt;
+&lt;/p&gt;
+
+&lt;h3 id="apple"&gt;Apple jails&lt;/h3&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.macrumors.com/2019/04/08/mac-apps-notarization-macos-10-14-5/"&gt;
     all application software for MacOS be approved by Apple 
first&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Offering a checking service as an option could be
     useful and would not be wrong.  Requiring users to get
     Apple's approval is tyranny. Apple says the check will
-    only look for malware (not counting the malware that is</em></ins></span> 
&lt;a <span class="removed"><del><strong>href="#consoles"&gt;Game 
consoles&lt;/a&gt;
-&lt;/p&gt;
-
-&lt;h3 id="apple"&gt;Apple jails&lt;/h3&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html#TOC"&gt;part of
+    only look for malware (not counting the malware that is &lt;a
+    href="/proprietary/malware-apple.html#TOC"&gt;part of
     the operating system&lt;/a&gt;), but Apple could change that policy step
     by step.  Or perhaps Apple will define malware to include any app
     that China does not like.&lt;/p&gt;
@@ -489,7 +503,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/09/04 08:37:15 $
+$Date: 2021/09/20 11:36:12 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-jails.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.de.po,v
retrieving revision 1.71
retrieving revision 1.72
diff -u -b -r1.71 -r1.72
--- proprietary/po/proprietary-jails.de.po      4 Sep 2021 08:37:15 -0000       
1.71
+++ proprietary/po/proprietary-jails.de.po      20 Sep 2021 11:36:12 -0000      
1.72
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-jails.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-09-04 08:26+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -204,6 +204,20 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-";
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law.  The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Apple plans to require that <a href=\"https://www.macrumors.com/2019/04/08/";
 "mac-apps-notarization-macos-10-14-5/\"> all application software for MacOS "
 "be approved by Apple first</a>."

Index: proprietary/po/proprietary-jails.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.es.po,v
retrieving revision 1.88
retrieving revision 1.89
diff -u -b -r1.88 -r1.89
--- proprietary/po/proprietary-jails.es.po      6 Sep 2021 08:36:45 -0000       
1.88
+++ proprietary/po/proprietary-jails.es.po      20 Sep 2021 11:36:12 -0000      
1.89
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-jails.html\n"
-"POT-Creation-Date: 2021-09-04 08:26+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
 "PO-Revision-Date: 2021-09-06 10:01+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=utf-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-20 11:26+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -146,6 +147,20 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-";
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law.  The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Apple plans to require that <a href=\"https://www.macrumors.com/2019/04/08/";
 "mac-apps-notarization-macos-10-14-5/\"> all application software for MacOS "
 "be approved by Apple first</a>."

Index: proprietary/po/proprietary-jails.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.fr.po,v
retrieving revision 1.90
retrieving revision 1.91
diff -u -b -r1.90 -r1.91
--- proprietary/po/proprietary-jails.fr.po      4 Sep 2021 10:22:07 -0000       
1.90
+++ proprietary/po/proprietary-jails.fr.po      20 Sep 2021 11:36:12 -0000      
1.91
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-jails.html\n"
-"POT-Creation-Date: 2021-09-04 08:26+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
 "PO-Revision-Date: 2021-09-04 12:15+0200\n"
 "Last-Translator: Félicien Pillot <felicien AT gnu.org>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-20 11:26+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 
 #. type: Content of: <title>
@@ -142,6 +143,20 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-";
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law.  The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Apple plans to require that <a href=\"https://www.macrumors.com/2019/04/08/";
 "mac-apps-notarization-macos-10-14-5/\"> all application software for MacOS "
 "be approved by Apple first</a>."

Index: proprietary/po/proprietary-jails.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.it-diff.html,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- proprietary/po/proprietary-jails.it-diff.html       4 Sep 2021 08:37:15 
-0000       1.52
+++ proprietary/po/proprietary-jails.it-diff.html       20 Sep 2021 11:36:12 
-0000      1.53
@@ -102,13 +102,27 @@
 &lt;h3 id="apple"&gt;Apple&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201904080"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
+  &lt;li id="M202109170"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
-    &lt;p&gt;Apple <span class="inserted"><ins><em>plans to require 
that</em></ins></span> &lt;a
+    &lt;p&gt;Apple <span class="inserted"><ins><em>has made 
it</em></ins></span> &lt;a
 <span 
class="removed"><del><strong>href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html"&gt;
-deleted several VPNs from its app store</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.macrumors.com/2019/04/08/mac-apps-notarization-macos-10-14-5/"&gt;
+deleted several VPNs from its</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238"&gt;
+    impossible to load Navalny's tactical voting</em></ins></span> app <span 
class="removed"><del><strong>store</strong></del></span> <span 
class="inserted"><ins><em>into an iPhone&lt;/a&gt;
+    in Russia.&lt;/p&gt;
+
+    &lt;p&gt;It is impossible because (1) the iPhone refuses to load apps
+    from anywhere other than Apple, and (2) Apple has obeyed a Russian
+    censorship law.  The first point is enforced by Apple's nonfree
+    software.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201904080"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple plans to require that &lt;a
+    
href="https://www.macrumors.com/2019/04/08/mac-apps-notarization-macos-10-14-5/"&gt;
     all application software</em></ins></span> for <span 
class="removed"><del><strong>China&lt;/a&gt;, 
 thus using its own</strong></del></span> <span class="inserted"><ins><em>MacOS 
be approved by Apple first&lt;/a&gt;.&lt;/p&gt;
 
@@ -350,10 +364,10 @@
 
 &lt;p&gt;Google's censorship, unlike that of Apple and Microsoft, is not total:
 Android allows users to install apps in other ways. You can install
-free programs from f-droid.org.&lt;/p&gt;
-&lt;/li&gt;
+free programs from f-droid.org.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>services&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-&lt;li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
 &lt;p&gt;&lt;a 
href="http://boingboing.net/2010/04/02/why-i-wont-buy-an-ipad-and-think-yo.html"&gt;
 iOS, the operating system of the Apple iThings, is the prototype of a
 jail.&lt;/a&gt;  It was Apple that introduced the practice of designing
@@ -379,10 +393,10 @@
 &lt;a href="https://developer.apple.com/xcode/"&gt;Here are 
details.&lt;/a&gt;&lt;/p&gt;
 
 &lt;p&gt;While this is a crack in the prison walls, it is not big enough to
-mean that the iThings are no longer jails.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>services&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+mean that the iThings are no longer jails.&lt;/p&gt;
+&lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+&lt;li&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201506250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-06&lt;/small&gt;'
@@ -424,10 +438,12 @@
     
href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/"&gt;
     banned a game about growing marijuana&lt;/a&gt;, while permitting games
     about other crimes such as killing people.  Perhaps Apple considers
-    killing more acceptable than marijuana.&lt;/p&gt;
+    killing more acceptable than marijuana.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201402070"&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201402070"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Apple rejected an app that displayed the locations
@@ -435,11 +451,9 @@
     time the developers fixed one &ldquo;problem&rdquo;, Apple
     complained about another.  After the fifth rejection, Apple &lt;a
     href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;
-    admitted it was censoring the app based on the subject 
matter&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    admitted it was censoring the app based on the subject 
matter&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;h3 id="microsoft"&gt;Microsoft&lt;/h3&gt;
@@ -547,7 +561,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/09/04 08:37:15 $
+$Date: 2021/09/20 11:36:12 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-jails.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.it.po,v
retrieving revision 1.74
retrieving revision 1.75
diff -u -b -r1.74 -r1.75
--- proprietary/po/proprietary-jails.it.po      4 Sep 2021 08:37:15 -0000       
1.74
+++ proprietary/po/proprietary-jails.it.po      20 Sep 2021 11:36:12 -0000      
1.75
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-jails.html\n"
-"POT-Creation-Date: 2021-09-04 08:26+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
 "PO-Revision-Date: 2017-12-31 13:15+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -193,6 +193,20 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-";
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law.  The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Apple plans to require that <a href=\"https://www.macrumors.com/2019/04/08/";
 "mac-apps-notarization-macos-10-14-5/\"> all application software for MacOS "
 "be approved by Apple first</a>."

Index: proprietary/po/proprietary-jails.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.ja-diff.html,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- proprietary/po/proprietary-jails.ja-diff.html       4 Sep 2021 08:37:15 
-0000       1.55
+++ proprietary/po/proprietary-jails.ja-diff.html       20 Sep 2021 11:36:12 
-0000      1.56
@@ -102,6 +102,20 @@
 &lt;h3 id="apple"&gt;Apple&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202109170"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple has made it &lt;a
+    
href="https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238"&gt;
+    impossible to load Navalny's tactical voting app into an iPhone&lt;/a&gt;
+    in Russia.&lt;/p&gt;
+
+    &lt;p&gt;It is impossible because (1) the iPhone refuses to load apps
+    from anywhere other than Apple, and (2) Apple has obeyed a Russian
+    censorship law.  The first point is enforced by Apple's nonfree
+    software.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201904080"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -332,10 +346,12 @@
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans"&gt;
     More</em></ins></span> examples of Apple's arbitrary and inconsistent 
<span class="removed"><del><strong>censorship&lt;/a&gt;.
-  &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>censorship&lt;/a&gt;.&lt;/p&gt;
+  &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>censorship&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201405250"&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201405250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Apple used this censorship power in 2014 to &lt;a
@@ -355,11 +371,9 @@
     time the developers fixed one &ldquo;problem&rdquo;, Apple
     complained about another.  After the fifth rejection, Apple &lt;a
     href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;
-    admitted it was censoring the app based on the subject 
matter&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    admitted it was censoring the app based on the subject 
matter&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;h3 id="microsoft"&gt;Microsoft&lt;/h3&gt;
@@ -467,7 +481,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/09/04 08:37:15 $
+$Date: 2021/09/20 11:36:12 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-jails.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.ja.po,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- proprietary/po/proprietary-jails.ja.po      4 Sep 2021 08:37:15 -0000       
1.63
+++ proprietary/po/proprietary-jails.ja.po      20 Sep 2021 11:36:12 -0000      
1.64
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-jails.html\n"
-"POT-Creation-Date: 2021-09-04 08:26+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
 "PO-Revision-Date: 2017-01-11 11:28+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -163,6 +163,20 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-";
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law.  The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Apple plans to require that <a href=\"https://www.macrumors.com/2019/04/08/";
 "mac-apps-notarization-macos-10-14-5/\"> all application software for MacOS "
 "be approved by Apple first</a>."

Index: proprietary/po/proprietary-jails.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.pot,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- proprietary/po/proprietary-jails.pot        4 Sep 2021 08:37:15 -0000       
1.45
+++ proprietary/po/proprietary-jails.pot        20 Sep 2021 11:36:12 -0000      
1.46
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-jails.html\n"
-"POT-Creation-Date: 2021-09-04 08:26+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -117,6 +117,21 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Apple has made it <a "
+"href=\"https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238\";>
 "
+"impossible to load Navalny's tactical voting app into an iPhone</a> in "
+"Russia."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law.  The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Apple plans to require that <a "
 
"href=\"https://www.macrumors.com/2019/04/08/mac-apps-notarization-macos-10-14-5/\";>
 "
 "all application software for MacOS be approved by Apple first</a>."

Index: proprietary/po/proprietary-jails.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.pt-br.po,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary/po/proprietary-jails.pt-br.po   6 Sep 2021 01:03:49 -0000       
1.5
+++ proprietary/po/proprietary-jails.pt-br.po   20 Sep 2021 11:36:12 -0000      
1.6
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-jails.html\n"
-"POT-Creation-Date: 2021-09-04 08:26+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
 "PO-Revision-Date: 2021-06-26 09:40-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -13,6 +13,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-20 11:26+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 
 #. type: Content of: <title>
@@ -137,6 +138,20 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-";
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law.  The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Apple plans to require that <a href=\"https://www.macrumors.com/2019/04/08/";
 "mac-apps-notarization-macos-10-14-5/\"> all application software for MacOS "
 "be approved by Apple first</a>."

Index: proprietary/po/proprietary-jails.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.ru.po,v
retrieving revision 1.111
retrieving revision 1.112
diff -u -b -r1.111 -r1.112
--- proprietary/po/proprietary-jails.ru.po      6 Sep 2021 10:03:52 -0000       
1.111
+++ proprietary/po/proprietary-jails.ru.po      20 Sep 2021 11:36:12 -0000      
1.112
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-09-04 08:26+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-20 11:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Jails - GNU Project - Free Software Foundation"
@@ -141,6 +142,20 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-";
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law.  The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Apple plans to require that <a href=\"https://www.macrumors.com/2019/04/08/";
 "mac-apps-notarization-macos-10-14-5/\"> all application software for MacOS "
 "be approved by Apple first</a>."

Index: proprietary/po/proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.296
retrieving revision 1.297
diff -u -b -r1.296 -r1.297
--- proprietary/po/proprietary.de-diff.html     15 Sep 2021 06:03:46 -0000      
1.296
+++ proprietary/po/proprietary.de-diff.html     20 Sep 2021 11:36:12 -0000      
1.297
@@ -58,21 +58,21 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
 #TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
-#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration: 
none;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC a:hover { text-decoration: underline; }
+#TOC a { text-decoration: none; }
+#TOC a:hover { text-decoration: underline; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-  .reduced-width { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+  .reduced-width { width: 55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 <span class="inserted"><ins><em>&lt;div 
class="reduced-width"&gt;</em></ins></span>
 
@@ -137,19 +137,19 @@
  &lt;/tr&gt;
  &lt;tr&gt;
   &lt;td&gt;
-   &lt;ul class="columns"&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
+   &lt;ul class="columns"&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a 
href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
@@ -200,10 +200,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -224,13 +224,27 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202109170"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple has made it &lt;a
+    
href="https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238"&gt;
+    impossible to load Navalny's tactical voting app into an iPhone&lt;/a&gt;
+    in Russia.&lt;/p&gt;
+
+    &lt;p&gt;It is impossible because (1) the iPhone refuses to load apps
+    from anywhere other than Apple, and (2) Apple has obeyed a Russian
+    censorship law.  The first point is enforced by Apple's nonfree
+    software.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202108170"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Various models of security cameras, DVRs,
     and baby monitors that run proprietary software &lt;a
     href="https://www.wired.com/story/kalay-iot-bug-video-feeds/"&gt;are
-    exploited by a security vulnerability that could give attackers access
+    affected by a security vulnerability that could give attackers access
     to live feeds&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -275,24 +289,6 @@
     wrongly refers to crackers as &ldquo;&lt;a
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202107090"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A newly found Microsoft Windows vulnerability &lt;a
-    
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/"&gt;
-    can allow crackers to remotely gain access to the operating 
system&lt;/a&gt;
-    and install programs, view and delete data, or even create new user
-    accounts with full user rights.&lt;/p&gt;
-
-    &lt;p&gt;The security research firm accidentally leaked instructions on
-    how the flaw could be exploited but Windows users should still wait
-    for Microsoft to fix the flaw, if they fix it.&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;Please note that the article
-    wrongly refers to crackers as &ldquo;&lt;a
-    
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 &lt;p class="button right-align"&gt;
 &lt;a href="/proprietary/all.html"&gt;More items&hellip;&lt;/a&gt;&lt;/p&gt;
@@ -356,7 +352,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/09/15 06:03:46 $
+$Date: 2021/09/20 11:36:12 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.313
retrieving revision 1.314
diff -u -b -r1.313 -r1.314
--- proprietary/po/proprietary.de.po    15 Sep 2021 06:03:46 -0000      1.313
+++ proprietary/po/proprietary.de.po    20 Sep 2021 11:36:12 -0000      1.314
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -480,9 +480,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-";
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law.  The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Various models of security cameras, DVRs, and baby monitors that run "
 "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
-"video-feeds/\">are exploited by a security vulnerability that could give "
+"video-feeds/\">are affected by a security vulnerability that could give "
 "attackers access to live feeds</a>."
 msgstr ""
 
@@ -545,22 +559,6 @@
 "Es ist bedauerlich, dass der Artikel den Begriff <a href=\"/philosophy/words-"
 "to-avoid#Monetize\">„monetarisieren“</a> verwendet."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
-"crackers to remotely gain access to the operating system</a> and install "
-"programs, view and delete data, or even create new user accounts with full "
-"user rights."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The security research firm accidentally leaked instructions on how the flaw "
-"could be exploited but Windows users should still wait for Microsoft to fix "
-"the flaw, if they fix it."
-msgstr ""
-
 #. type: Content of: <div><p>
 # | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
 # | devices</a>-] {+href=\"/proprietary/all.html\">More items&hellip;</a>+}

Index: proprietary/po/proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.515
retrieving revision 1.516
diff -u -b -r1.515 -r1.516
--- proprietary/po/proprietary.es.po    15 Sep 2021 09:32:56 -0000      1.515
+++ proprietary/po/proprietary.es.po    20 Sep 2021 11:36:12 -0000      1.516
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-20 11:26+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -341,9 +342,34 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-";
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law.  The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+# | Various models of security cameras, DVRs, and baby monitors that run
+# | proprietary software <a
+# | href=\"https://www.wired.com/story/kalay-iot-bug-video-feeds/\";>are
+# | [-exploited-] {+affected+} by a security vulnerability that could give
+# | attackers access to live feeds</a>.
+#, fuzzy
+#| msgid ""
+#| "Various models of security cameras, DVRs, and baby monitors that run "
+#| "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+#| "video-feeds/\">are exploited by a security vulnerability that could give "
+#| "attackers access to live feeds</a>."
+msgid ""
 "Various models of security cameras, DVRs, and baby monitors that run "
 "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
-"video-feeds/\">are exploited by a security vulnerability that could give "
+"video-feeds/\">are affected by a security vulnerability that could give "
 "attackers access to live feeds</a>."
 msgstr ""
 "Varios modelos de cámaras de seguridad, DVR y monitores de bebés que "
@@ -424,30 +450,6 @@
 "«<cite>crackers</cite>» como <a href=\"/philosophy/words-to-avoid.es."
 "html#Hacker\">«<cite>hackers</cite>»</a>).</small>"
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
-"crackers to remotely gain access to the operating system</a> and install "
-"programs, view and delete data, or even create new user accounts with full "
-"user rights."
-msgstr ""
-"Una nueva vulnerabilidad descubierta en Microsoft Windows <a href=\"https://";
-"edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/"
-"\">permite que delincuentes informáticos accedan de forma remota al sistema "
-"operativo</a> e instalen programas, vean y borren datos, o incluso creen "
-"nuevas cuentas de usuario con todos los permisos."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The security research firm accidentally leaked instructions on how the flaw "
-"could be exploited but Windows users should still wait for Microsoft to fix "
-"the flaw, if they fix it."
-msgstr ""
-"La empresa de seguridad que la descubrió ha filtrado accidentalmente "
-"instrucciones para aprovechar ese fallo, pero los usuarios de de Windows "
-"tendrán que esperar a que Microsoft lo arregle, si es que lo hace."
-
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr "<a href=\"/proprietary/all.html\">Ver más&hellip;</a>"
@@ -526,3 +528,25 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Última actualización:"
+
+#~ msgid ""
+#~ "A newly found Microsoft Windows vulnerability <a href=\"https://edition.";
+#~ "cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
+#~ "crackers to remotely gain access to the operating system</a> and install "
+#~ "programs, view and delete data, or even create new user accounts with "
+#~ "full user rights."
+#~ msgstr ""
+#~ "Una nueva vulnerabilidad descubierta en Microsoft Windows <a href="
+#~ "\"https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-";
+#~ "printnightmare/\">permite que delincuentes informáticos accedan de forma "
+#~ "remota al sistema operativo</a> e instalen programas, vean y borren "
+#~ "datos, o incluso creen nuevas cuentas de usuario con todos los permisos."
+
+#~ msgid ""
+#~ "The security research firm accidentally leaked instructions on how the "
+#~ "flaw could be exploited but Windows users should still wait for Microsoft "
+#~ "to fix the flaw, if they fix it."
+#~ msgstr ""
+#~ "La empresa de seguridad que la descubrió ha filtrado accidentalmente "
+#~ "instrucciones para aprovechar ese fallo, pero los usuarios de de Windows "
+#~ "tendrán que esperar a que Microsoft lo arregle, si es que lo hace."

Index: proprietary/po/proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.534
retrieving revision 1.535
diff -u -b -r1.534 -r1.535
--- proprietary/po/proprietary.fr.po    15 Sep 2021 07:07:17 -0000      1.534
+++ proprietary/po/proprietary.fr.po    20 Sep 2021 11:36:12 -0000      1.535
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
 "PO-Revision-Date: 2021-09-15 09:05+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-20 11:26+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -338,9 +339,34 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-";
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law.  The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+# | Various models of security cameras, DVRs, and baby monitors that run
+# | proprietary software <a
+# | href=\"https://www.wired.com/story/kalay-iot-bug-video-feeds/\";>are
+# | [-exploited-] {+affected+} by a security vulnerability that could give
+# | attackers access to live feeds</a>.
+#, fuzzy
+#| msgid ""
+#| "Various models of security cameras, DVRs, and baby monitors that run "
+#| "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+#| "video-feeds/\">are exploited by a security vulnerability that could give "
+#| "attackers access to live feeds</a>."
+msgid ""
 "Various models of security cameras, DVRs, and baby monitors that run "
 "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
-"video-feeds/\">are exploited by a security vulnerability that could give "
+"video-feeds/\">are affected by a security vulnerability that could give "
 "attackers access to live feeds</a>."
 msgstr ""
 "Différents modèles de caméras de surveillance, d'enregistreurs vidéo "
@@ -418,31 +444,6 @@
 "<small>(Notez que cet article utilise le terme « <a 
href=\"/philosophy/words-"
 "to-avoid.html#Hacker\">hackers</a> » à mauvais escient.)</small>"
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
-"crackers to remotely gain access to the operating system</a> and install "
-"programs, view and delete data, or even create new user accounts with full "
-"user rights."
-msgstr ""
-"Une vulnérabilité détectée récemment dans Microsoft Windows <a href="
-"\"https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-";
-"printnightmare/\">permet à des pirates d'avoir accès au système "
-"d'exploitation</a> pour installer des programmes, voir et supprimer des "
-"données et même créer de nouveaux comptes utilisateurs avec tous les 
droits."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The security research firm accidentally leaked instructions on how the flaw "
-"could be exploited but Windows users should still wait for Microsoft to fix "
-"the flaw, if they fix it."
-msgstr ""
-"L'entreprise de recherche en sécurité a divulgué accidentellement des "
-"instructions sur la manière d'exploiter cette faille, mais les utilisateurs "
-"de Windows attendent toujours que Microsoft la corrige – si cela arrive un "
-"jour."
-
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr "<a href=\"/proprietary/all.html\">Voir plus&hellip;</a>"
@@ -515,3 +516,27 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "A newly found Microsoft Windows vulnerability <a href=\"https://edition.";
+#~ "cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
+#~ "crackers to remotely gain access to the operating system</a> and install "
+#~ "programs, view and delete data, or even create new user accounts with "
+#~ "full user rights."
+#~ msgstr ""
+#~ "Une vulnérabilité détectée récemment dans Microsoft Windows <a href="
+#~ "\"https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-";
+#~ "printnightmare/\">permet à des pirates d'avoir accès au système "
+#~ "d'exploitation</a> pour installer des programmes, voir et supprimer des "
+#~ "données et même créer de nouveaux comptes utilisateurs avec tous les "
+#~ "droits."
+
+#~ msgid ""
+#~ "The security research firm accidentally leaked instructions on how the "
+#~ "flaw could be exploited but Windows users should still wait for Microsoft "
+#~ "to fix the flaw, if they fix it."
+#~ msgstr ""
+#~ "L'entreprise de recherche en sécurité a divulgué accidentellement des "
+#~ "instructions sur la manière d'exploiter cette faille, mais les "
+#~ "utilisateurs de Windows attendent toujours que Microsoft la corrige – si 
"
+#~ "cela arrive un jour."

Index: proprietary/po/proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.306
retrieving revision 1.307
diff -u -b -r1.306 -r1.307
--- proprietary/po/proprietary.it-diff.html     15 Sep 2021 06:03:46 -0000      
1.306
+++ proprietary/po/proprietary.it-diff.html     20 Sep 2021 11:36:12 -0000      
1.307
@@ -58,21 +58,21 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
 #TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
-#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration: 
none;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC a:hover { text-decoration: underline; }
+#TOC a { text-decoration: none; }
+#TOC a:hover { text-decoration: underline; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-  .reduced-width { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+  .reduced-width { width: 55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 <span class="inserted"><ins><em>&lt;div 
class="reduced-width"&gt;</em></ins></span>
 
@@ -223,13 +223,27 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202109170"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple has made it &lt;a
+    
href="https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238"&gt;
+    impossible to load Navalny's tactical voting app into an iPhone&lt;/a&gt;
+    in Russia.&lt;/p&gt;
+
+    &lt;p&gt;It is impossible because (1) the iPhone refuses to load apps
+    from anywhere other than Apple, and (2) Apple has obeyed a Russian
+    censorship law.  The first point is enforced by Apple's nonfree
+    software.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202108170"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Various models of security cameras, DVRs,
     and baby monitors that run proprietary software &lt;a
     href="https://www.wired.com/story/kalay-iot-bug-video-feeds/"&gt;are
-    exploited by a security vulnerability that could give attackers access
+    affected by a security vulnerability that could give attackers access
     to live feeds&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -274,24 +288,6 @@
     wrongly refers to crackers as &ldquo;&lt;a
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202107090"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A newly found Microsoft Windows vulnerability &lt;a
-    
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/"&gt;
-    can allow crackers to remotely gain access to the operating 
system&lt;/a&gt;
-    and install programs, view and delete data, or even create new user
-    accounts with full user rights.&lt;/p&gt;
-
-    &lt;p&gt;The security research firm accidentally leaked instructions on
-    how the flaw could be exploited but Windows users should still wait
-    for Microsoft to fix the flaw, if they fix it.&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;Please note that the article
-    wrongly refers to crackers as &ldquo;&lt;a
-    
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 &lt;p class="button right-align"&gt;
 &lt;a href="/proprietary/all.html"&gt;More items&hellip;&lt;/a&gt;&lt;/p&gt;
@@ -355,7 +351,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/09/15 06:03:46 $
+$Date: 2021/09/20 11:36:12 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.322
retrieving revision 1.323
diff -u -b -r1.322 -r1.323
--- proprietary/po/proprietary.it.po    15 Sep 2021 06:03:46 -0000      1.322
+++ proprietary/po/proprietary.it.po    20 Sep 2021 11:36:13 -0000      1.323
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -485,9 +485,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-";
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law.  The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Various models of security cameras, DVRs, and baby monitors that run "
 "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
-"video-feeds/\">are exploited by a security vulnerability that could give "
+"video-feeds/\">are affected by a security vulnerability that could give "
 "attackers access to live feeds</a>."
 msgstr ""
 
@@ -538,22 +552,6 @@
 "href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
-"crackers to remotely gain access to the operating system</a> and install "
-"programs, view and delete data, or even create new user accounts with full "
-"user rights."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The security research firm accidentally leaked instructions on how the flaw "
-"could be exploited but Windows users should still wait for Microsoft to fix "
-"the flaw, if they fix it."
-msgstr ""
-
 #. type: Content of: <div><p>
 # | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
 # | devices</a>-] {+href=\"/proprietary/all.html\">More items&hellip;</a>+}

Index: proprietary/po/proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.311
retrieving revision 1.312
diff -u -b -r1.311 -r1.312
--- proprietary/po/proprietary.ja-diff.html     15 Sep 2021 06:03:46 -0000      
1.311
+++ proprietary/po/proprietary.ja-diff.html     20 Sep 2021 11:36:13 -0000      
1.312
@@ -57,13 +57,13 @@
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom: 
.5em; margin: 0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 5%; }
+#TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
-#TOC a { text-decoration: none; }
+#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration: 
none; }
 #TOC a:hover { text-decoration: underline;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
@@ -129,7 +129,8 @@
   &lt;li&gt;&lt;a href="/proprietary/malware-mobiles.html"&gt;Malware in 
mobile devices&lt;/a&gt;&lt;/li&gt;
   &lt;li&gt;&lt;a href="/proprietary/malware-kindle-swindle.html"&gt;Malware 
in</strong></del></span> <span class="inserted"><ins><em>make other changes,
 subscribe to</em></ins></span> the <span class="removed"><del><strong>Amazon
-      Swindle&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+      Swindle&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a href="/proprietary/malware-games.html"&gt;Malware in 
games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
 href="https://lists.gnu.org/mailman/listinfo/www-malware-commits"&gt;mailing 
list
 &lt;www-malware-commits@gnu.org&gt;&lt;/a&gt;.&lt;/p&gt;
 
@@ -141,8 +142,7 @@
  &lt;tr&gt;
   &lt;td&gt;
    &lt;ul class="columns"&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;a href="/proprietary/malware-appliances.html"&gt;Malware in 
appliances&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
 &lt;/div&gt;
 
@@ -166,8 +166,8 @@
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;&nbsp;(&lt;a
 href="#f4"&gt;4&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;
 to
-servers&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&nbsp;(&lt;a
 href="#f5"&gt;5&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/potential-malware.html"&gt;In the 
pipe&lt;/a&gt;&lt;/li&gt;
+servers&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&nbsp;(&lt;a
 href="#f5"&gt;5&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a href="/proprietary/potential-malware.html"&gt;In the 
pipe&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
   &lt;td&gt;
@@ -183,8 +183,8 @@
     &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
  &lt;/tr&gt;
@@ -228,13 +228,27 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202109170"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple has made it &lt;a
+    
href="https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238"&gt;
+    impossible to load Navalny's tactical voting app into an iPhone&lt;/a&gt;
+    in Russia.&lt;/p&gt;
+
+    &lt;p&gt;It is impossible because (1) the iPhone refuses to load apps
+    from anywhere other than Apple, and (2) Apple has obeyed a Russian
+    censorship law.  The first point is enforced by Apple's nonfree
+    software.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202108170"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Various models of security cameras, DVRs,
     and baby monitors that run proprietary software &lt;a
     href="https://www.wired.com/story/kalay-iot-bug-video-feeds/"&gt;are
-    exploited by a security vulnerability that could give attackers access
+    affected by a security vulnerability that could give attackers access
     to live feeds&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -279,24 +293,6 @@
     wrongly refers to crackers as &ldquo;&lt;a
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202107090"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A newly found Microsoft Windows vulnerability &lt;a
-    
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/"&gt;
-    can allow crackers to remotely gain access to the operating 
system&lt;/a&gt;
-    and install programs, view and delete data, or even create new user
-    accounts with full user rights.&lt;/p&gt;
-
-    &lt;p&gt;The security research firm accidentally leaked instructions on
-    how the flaw could be exploited but Windows users should still wait
-    for Microsoft to fix the flaw, if they fix it.&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;Please note that the article
-    wrongly refers to crackers as &ldquo;&lt;a
-    
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 &lt;p class="button right-align"&gt;
 &lt;a href="/proprietary/all.html"&gt;More items&hellip;&lt;/a&gt;&lt;/p&gt;
@@ -360,7 +356,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/09/15 06:03:46 $
+$Date: 2021/09/20 11:36:13 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.305
retrieving revision 1.306
diff -u -b -r1.305 -r1.306
--- proprietary/po/proprietary.ja.po    15 Sep 2021 06:03:46 -0000      1.305
+++ proprietary/po/proprietary.ja.po    20 Sep 2021 11:36:13 -0000      1.306
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -343,9 +343,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-";
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law.  The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Various models of security cameras, DVRs, and baby monitors that run "
 "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
-"video-feeds/\">are exploited by a security vulnerability that could give "
+"video-feeds/\">are affected by a security vulnerability that could give "
 "attackers access to live feeds</a>."
 msgstr ""
 
@@ -396,22 +410,6 @@
 "href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
-"crackers to remotely gain access to the operating system</a> and install "
-"programs, view and delete data, or even create new user accounts with full "
-"user rights."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The security research firm accidentally leaked instructions on how the flaw "
-"could be exploited but Windows users should still wait for Microsoft to fix "
-"the flaw, if they fix it."
-msgstr ""
-
 #. type: Content of: <div><p>
 #, fuzzy
 #| msgid "<a href=\"/proprietary/malware-mobiles.html\">Mobiles</a>"

Index: proprietary/po/proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.307
retrieving revision 1.308
diff -u -b -r1.307 -r1.308
--- proprietary/po/proprietary.nl-diff.html     15 Sep 2021 06:03:46 -0000      
1.307
+++ proprietary/po/proprietary.nl-diff.html     20 Sep 2021 11:36:13 -0000      
1.308
@@ -58,21 +58,21 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
 #TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
-#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration: 
none;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC a:hover { text-decoration: underline; }
+#TOC a { text-decoration: none; }
+#TOC a:hover { text-decoration: underline; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-  .reduced-width { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+  .reduced-width { width: 55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 <span class="inserted"><ins><em>&lt;div 
class="reduced-width"&gt;</em></ins></span>
 
@@ -223,13 +223,27 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202109170"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple has made it &lt;a
+    
href="https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238"&gt;
+    impossible to load Navalny's tactical voting app into an iPhone&lt;/a&gt;
+    in Russia.&lt;/p&gt;
+
+    &lt;p&gt;It is impossible because (1) the iPhone refuses to load apps
+    from anywhere other than Apple, and (2) Apple has obeyed a Russian
+    censorship law.  The first point is enforced by Apple's nonfree
+    software.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202108170"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Various models of security cameras, DVRs,
     and baby monitors that run proprietary software &lt;a
     href="https://www.wired.com/story/kalay-iot-bug-video-feeds/"&gt;are
-    exploited by a security vulnerability that could give attackers access
+    affected by a security vulnerability that could give attackers access
     to live feeds&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -274,24 +288,6 @@
     wrongly refers to crackers as &ldquo;&lt;a
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202107090"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A newly found Microsoft Windows vulnerability &lt;a
-    
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/"&gt;
-    can allow crackers to remotely gain access to the operating 
system&lt;/a&gt;
-    and install programs, view and delete data, or even create new user
-    accounts with full user rights.&lt;/p&gt;
-
-    &lt;p&gt;The security research firm accidentally leaked instructions on
-    how the flaw could be exploited but Windows users should still wait
-    for Microsoft to fix the flaw, if they fix it.&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;Please note that the article
-    wrongly refers to crackers as &ldquo;&lt;a
-    
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 &lt;p class="button right-align"&gt;
 &lt;a href="/proprietary/all.html"&gt;More items&hellip;&lt;/a&gt;&lt;/p&gt;
@@ -355,7 +351,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/09/15 06:03:46 $
+$Date: 2021/09/20 11:36:13 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.296
retrieving revision 1.297
diff -u -b -r1.296 -r1.297
--- proprietary/po/proprietary.nl.po    15 Sep 2021 06:03:46 -0000      1.296
+++ proprietary/po/proprietary.nl.po    20 Sep 2021 11:36:13 -0000      1.297
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
 "Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -388,9 +388,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-";
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law.  The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Various models of security cameras, DVRs, and baby monitors that run "
 "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
-"video-feeds/\">are exploited by a security vulnerability that could give "
+"video-feeds/\">are affected by a security vulnerability that could give "
 "attackers access to live feeds</a>."
 msgstr ""
 
@@ -441,22 +455,6 @@
 "href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
-"crackers to remotely gain access to the operating system</a> and install "
-"programs, view and delete data, or even create new user accounts with full "
-"user rights."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The security research firm accidentally leaked instructions on how the flaw "
-"could be exploited but Windows users should still wait for Microsoft to fix "
-"the flaw, if they fix it."
-msgstr ""
-
 #. type: Content of: <div><p>
 # | <a [-href=\"/proprietary/malware-mobiles.html\">Mobiles</a>-]
 # | {+href=\"/proprietary/all.html\">More items&hellip;</a>+}

Index: proprietary/po/proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.323
retrieving revision 1.324
diff -u -b -r1.323 -r1.324
--- proprietary/po/proprietary.pl-diff.html     15 Sep 2021 06:03:46 -0000      
1.323
+++ proprietary/po/proprietary.pl-diff.html     20 Sep 2021 11:36:13 -0000      
1.324
@@ -28,10 +28,10 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
 #about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%; width: max-content;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -56,7 +56,7 @@
 #TOC ul { padding-top: .5em; margin: 0; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom: 
.5em; margin: 0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
 #TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
@@ -64,7 +64,7 @@
    text-decoration: none;
 }
 #TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline;</em></ins></span> }
+#TOC a:hover</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -121,8 +121,8 @@
 &lt;hr class="thin" /&gt;
 &lt;/div&gt;
 
-&lt;p&gt;As</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>July, 2021, the pages in this directory list 
around 500
-instances of malicious functionalities (with more than 610 references to
+&lt;p&gt;As of July, 2021, the pages in this directory list around 500
+instances</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>malicious functionalities (with more than 610 
references to
 back them up), but there are surely thousands more we don't know 
about.&lt;/p&gt;
 
 &lt;p&gt;If you want to be notified when we add new items or make other 
changes,
@@ -166,19 +166,19 @@
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html"&gt;Conferencing&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html"&gt;Conferencing&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
  &lt;/tr&gt;
@@ -222,13 +222,27 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202109170"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple has made it &lt;a
+    
href="https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238"&gt;
+    impossible to load Navalny's tactical voting app into an iPhone&lt;/a&gt;
+    in Russia.&lt;/p&gt;
+
+    &lt;p&gt;It is impossible because (1) the iPhone refuses to load apps
+    from anywhere other than Apple, and (2) Apple has obeyed a Russian
+    censorship law.  The first point is enforced by Apple's nonfree
+    software.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202108170"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Various models of security cameras, DVRs,
     and baby monitors that run proprietary software &lt;a
     href="https://www.wired.com/story/kalay-iot-bug-video-feeds/"&gt;are
-    exploited by a security vulnerability that could give attackers access
+    affected by a security vulnerability that could give attackers access
     to live feeds&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -273,24 +287,6 @@
     wrongly refers to crackers as &ldquo;&lt;a
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202107090"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A newly found Microsoft Windows vulnerability &lt;a
-    
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/"&gt;
-    can allow crackers to remotely gain access to the operating 
system&lt;/a&gt;
-    and install programs, view and delete data, or even create new user
-    accounts with full user rights.&lt;/p&gt;
-
-    &lt;p&gt;The security research firm accidentally leaked instructions on
-    how the flaw could be exploited but Windows users should still wait
-    for Microsoft to fix the flaw, if they fix it.&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;Please note that the article
-    wrongly refers to crackers as &ldquo;&lt;a
-    
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 &lt;p class="button right-align"&gt;
 &lt;a href="/proprietary/all.html"&gt;More items&hellip;&lt;/a&gt;&lt;/p&gt;
@@ -354,7 +350,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/09/15 06:03:46 $
+$Date: 2021/09/20 11:36:13 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.288
retrieving revision 1.289
diff -u -b -r1.288 -r1.289
--- proprietary/po/proprietary.pl.po    15 Sep 2021 06:03:46 -0000      1.288
+++ proprietary/po/proprietary.pl.po    20 Sep 2021 11:36:13 -0000      1.289
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -569,9 +569,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-";
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law.  The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Various models of security cameras, DVRs, and baby monitors that run "
 "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
-"video-feeds/\">are exploited by a security vulnerability that could give "
+"video-feeds/\">are affected by a security vulnerability that could give "
 "attackers access to live feeds</a>."
 msgstr ""
 
@@ -622,22 +636,6 @@
 "href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
-"crackers to remotely gain access to the operating system</a> and install "
-"programs, view and delete data, or even create new user accounts with full "
-"user rights."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The security research firm accidentally leaked instructions on how the flaw "
-"could be exploited but Windows users should still wait for Microsoft to fix "
-"the flaw, if they fix it."
-msgstr ""
-
 #. type: Content of: <div><p>
 # | <a [-href=\"/philosophy/malware-mobiles.html\">Malware in mobile
 # | devices</a>-] {+href=\"/proprietary/all.html\">More items&hellip;</a>+}

Index: proprietary/po/proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.285
retrieving revision 1.286
diff -u -b -r1.285 -r1.286
--- proprietary/po/proprietary.pot      15 Sep 2021 06:03:46 -0000      1.285
+++ proprietary/po/proprietary.pot      20 Sep 2021 11:36:13 -0000      1.286
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -280,11 +280,26 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Apple has made it <a "
+"href=\"https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238\";>
 "
+"impossible to load Navalny's tactical voting app into an iPhone</a> in "
+"Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law.  The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Various models of security cameras, DVRs, and baby monitors that run "
 "proprietary software <a "
-"href=\"https://www.wired.com/story/kalay-iot-bug-video-feeds/\";>are "
-"exploited by a security vulnerability that could give attackers access to "
-"live feeds</a>."
+"href=\"https://www.wired.com/story/kalay-iot-bug-video-feeds/\";>are affected "
+"by a security vulnerability that could give attackers access to live "
+"feeds</a>."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
@@ -333,22 +348,6 @@
 "href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"A newly found Microsoft Windows vulnerability <a "
-"href=\"https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/\";>
 "
-"can allow crackers to remotely gain access to the operating system</a> and "
-"install programs, view and delete data, or even create new user accounts "
-"with full user rights."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The security research firm accidentally leaked instructions on how the flaw "
-"could be exploited but Windows users should still wait for Microsoft to fix "
-"the flaw, if they fix it."
-msgstr ""
-
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr ""

Index: proprietary/po/proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.453
retrieving revision 1.454
diff -u -b -r1.453 -r1.454
--- proprietary/po/proprietary.pt-br.po 15 Sep 2021 06:03:46 -0000      1.453
+++ proprietary/po/proprietary.pt-br.po 20 Sep 2021 11:36:13 -0000      1.454
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
 "PO-Revision-Date: 2021-06-13 12:11-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -336,9 +336,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-";
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law.  The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Various models of security cameras, DVRs, and baby monitors that run "
 "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
-"video-feeds/\">are exploited by a security vulnerability that could give "
+"video-feeds/\">are affected by a security vulnerability that could give "
 "attackers access to live feeds</a>."
 msgstr ""
 
@@ -413,30 +427,6 @@
 "como “<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.)</"
 "small>"
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
-"crackers to remotely gain access to the operating system</a> and install "
-"programs, view and delete data, or even create new user accounts with full "
-"user rights."
-msgstr ""
-"Uma vulnerabilidade recém-descoberta no Microsoft Windows <a href=\"https://";
-"edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> pode "
-"permitir que <em>crackers</em> obtenham acesso remoto ao sistema "
-"operacional</a> e instalem programas, visualizem e excluam dados ou até "
-"mesmo criem novas contas de usuário com direitos totais de usuário."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The security research firm accidentally leaked instructions on how the flaw "
-"could be exploited but Windows users should still wait for Microsoft to fix "
-"the flaw, if they fix it."
-msgstr ""
-"A empresa de pesquisa de segurança vazou acidentalmente instruções sobre "
-"como a falha poderia ser explorada, mas os usuários do Windows ainda devem "
-"esperar que a Microsoft conserte a falha, se ela consertar."
-
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr "<a href=\"/proprietary/all.html\">Mais itens…</a>"
@@ -512,6 +502,29 @@
 msgstr "Última atualização:"
 
 #~ msgid ""
+#~ "A newly found Microsoft Windows vulnerability <a href=\"https://edition.";
+#~ "cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
+#~ "crackers to remotely gain access to the operating system</a> and install "
+#~ "programs, view and delete data, or even create new user accounts with "
+#~ "full user rights."
+#~ msgstr ""
+#~ "Uma vulnerabilidade recém-descoberta no Microsoft Windows <a href="
+#~ "\"https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-";
+#~ "printnightmare/\"> pode permitir que <em>crackers</em> obtenham acesso "
+#~ "remoto ao sistema operacional</a> e instalem programas, visualizem e "
+#~ "excluam dados ou até mesmo criem novas contas de usuário com direitos "
+#~ "totais de usuário."
+
+#~ msgid ""
+#~ "The security research firm accidentally leaked instructions on how the "
+#~ "flaw could be exploited but Windows users should still wait for Microsoft "
+#~ "to fix the flaw, if they fix it."
+#~ msgstr ""
+#~ "A empresa de pesquisa de segurança vazou acidentalmente instruções 
sobre "
+#~ "como a falha poderia ser explorada, mas os usuários do Windows ainda "
+#~ "devem esperar que a Microsoft conserte a falha, se ela consertar."
+
+#~ msgid ""
 #~ "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-";
 #~ "targeted-dream-incubation\"> Advertising companies are experimenting to "
 #~ "manipulate people's minds</a>, and impose a new way of advertising by "

Index: proprietary/po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.551
retrieving revision 1.552
diff -u -b -r1.551 -r1.552
--- proprietary/po/proprietary.ru.po    16 Sep 2021 09:02:58 -0000      1.551
+++ proprietary/po/proprietary.ru.po    20 Sep 2021 11:36:13 -0000      1.552
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-20 11:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -340,9 +341,34 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-";
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law.  The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+# | Various models of security cameras, DVRs, and baby monitors that run
+# | proprietary software <a
+# | href=\"https://www.wired.com/story/kalay-iot-bug-video-feeds/\";>are
+# | [-exploited-] {+affected+} by a security vulnerability that could give
+# | attackers access to live feeds</a>.
+#, fuzzy
+#| msgid ""
+#| "Various models of security cameras, DVRs, and baby monitors that run "
+#| "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+#| "video-feeds/\">are exploited by a security vulnerability that could give "
+#| "attackers access to live feeds</a>."
+msgid ""
 "Various models of security cameras, DVRs, and baby monitors that run "
 "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
-"video-feeds/\">are exploited by a security vulnerability that could give "
+"video-feeds/\">are affected by a security vulnerability that could give "
 "attackers access to live feeds</a>."
 msgstr ""
 "Различные модели камер охраны и 
наблюдения за грудными детьми, работающими 
"
@@ -421,31 +447,6 @@
 "html#Hacker\">&ldquo;хакеры&rdquo;</a> неверно 
используется для обозначения "
 "взломщиков.</small>"
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
-"crackers to remotely gain access to the operating system</a> and install "
-"programs, view and delete data, or even create new user accounts with full "
-"user rights."
-msgstr ""
-"Недавно обнаруженная уязвимость Microsoft 
Windows <a href=\"https://edition.";
-"cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> может "
-"позволять взломщикам получать удаленный 
доступ к операционной системе</a> и "
-"устанавливать программы, просматривать и 
удалять данные и даже создавать "
-"новые учетные записи с полными 
пользовательскими правами."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The security research firm accidentally leaked instructions on how the flaw "
-"could be exploited but Windows users should still wait for Microsoft to fix "
-"the flaw, if they fix it."
-msgstr ""
-"Из фирмы, занимающейся исследованиями 
безопасности, случайно произошла "
-"утечка инструкций о том, как можно 
воспользоваться прорехой, но пользователи "
-"Windows все равно должны ждать, пока Microsoft ее 
устранит, если они вообще "
-"это сделают."
-
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr "<a href=\"/proprietary/all.html\">Далее...</a>"
@@ -523,6 +524,29 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "A newly found Microsoft Windows vulnerability <a href=\"https://edition.";
+#~ "cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
+#~ "crackers to remotely gain access to the operating system</a> and install "
+#~ "programs, view and delete data, or even create new user accounts with "
+#~ "full user rights."
+#~ msgstr ""
+#~ "Недавно обнаруженная уязвимость Microsoft 
Windows <a href=\"https://";
+#~ "edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> "
+#~ "может позволять взломщикам получать 
удаленный доступ к операционной "
+#~ "системе</a> и устанавливать программы, 
просматривать и удалять данные и "
+#~ "даже создавать новые учетные записи с 
полными пользовательскими правами."
+
+#~ msgid ""
+#~ "The security research firm accidentally leaked instructions on how the "
+#~ "flaw could be exploited but Windows users should still wait for Microsoft "
+#~ "to fix the flaw, if they fix it."
+#~ msgstr ""
+#~ "Из фирмы, занимающейся исследованиями 
безопасности, случайно произошла "
+#~ "утечка инструкций о том, как можно 
воспользоваться прорехой, но "
+#~ "пользователи Windows все равно должны 
ждать, пока Microsoft ее устранит, "
+#~ "если они вообще это сделают."
+
+#~ msgid ""
 #~ "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-";
 #~ "targeted-dream-incubation\"> Advertising companies are experimenting to "
 #~ "manipulate people's minds</a>, and impose a new way of advertising by "

Index: proprietary/po/proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.200
retrieving revision 1.201
diff -u -b -r1.200 -r1.201
--- proprietary/po/proprietary.tr.po    18 Sep 2021 06:36:58 -0000      1.200
+++ proprietary/po/proprietary.tr.po    20 Sep 2021 11:36:13 -0000      1.201
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
 "PO-Revision-Date: 2021-09-18 08:34+0200\n"
 "Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
 "Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-20 11:26+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 "X-Generator: Poedit 2.4.2\n"
 
@@ -336,9 +337,29 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-";
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law.  The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Various models of security cameras, DVRs, and baby monitors that run "
+#| "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+#| "video-feeds/\">are exploited by a security vulnerability that could give "
+#| "attackers access to live feeds</a>."
+msgid ""
 "Various models of security cameras, DVRs, and baby monitors that run "
 "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
-"video-feeds/\">are exploited by a security vulnerability that could give "
+"video-feeds/\">are affected by a security vulnerability that could give "
 "attackers access to live feeds</a>."
 msgstr ""
 "Özel mülk yazılım içeren çeşitli güvenlik kamerası, dijital kayıt 
cihazı ve "
@@ -417,30 +438,6 @@
 "philosophy/words-to-avoid.html#Hacker\">üstât (hacker)</a>\" olarak "
 "adlandırmaktır.</small>"
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
-"crackers to remotely gain access to the operating system</a> and install "
-"programs, view and delete data, or even create new user accounts with full "
-"user rights."
-msgstr ""
-"Yeni keşfedilen bir Windows açığı <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">kırıcıların "
-"işletim sistemine uzaktan erişmesine izin veriyor</a> ve böylece program "
-"kurabiliyorlar, veriyi görüp silebiliyorlar veya bütün haklarıyla yeni 
bir "
-"kullanıcı oluşturabiliyorlar."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The security research firm accidentally leaked instructions on how the flaw "
-"could be exploited but Windows users should still wait for Microsoft to fix "
-"the flaw, if they fix it."
-msgstr ""
-"Güvenlik araştırma şirketi, açıktan nasıl yararlanılabileceğini 
kazara "
-"sızdırdı ancak Windows kullanıcıları yine de Microsoft'un (elbette 
eğer "
-"onaracaksa) açığı onarmasını beklemek zorunda."
-
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr "<a href=\"/proprietary/all.html\">Daha fazlası&hellip;</a>"
@@ -522,6 +519,28 @@
 msgstr "Son Güncelleme:"
 
 #~ msgid ""
+#~ "A newly found Microsoft Windows vulnerability <a href=\"https://edition.";
+#~ "cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
+#~ "crackers to remotely gain access to the operating system</a> and install "
+#~ "programs, view and delete data, or even create new user accounts with "
+#~ "full user rights."
+#~ msgstr ""
+#~ "Yeni keşfedilen bir Windows açığı <a href=\"https://edition.cnn.";
+#~ "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">kırıcıların 
"
+#~ "işletim sistemine uzaktan erişmesine izin veriyor</a> ve böylece 
program "
+#~ "kurabiliyorlar, veriyi görüp silebiliyorlar veya bütün haklarıyla 
yeni "
+#~ "bir kullanıcı oluşturabiliyorlar."
+
+#~ msgid ""
+#~ "The security research firm accidentally leaked instructions on how the "
+#~ "flaw could be exploited but Windows users should still wait for Microsoft "
+#~ "to fix the flaw, if they fix it."
+#~ msgstr ""
+#~ "Güvenlik araştırma şirketi, açıktan nasıl yararlanılabileceğini 
kazara "
+#~ "sızdırdı ancak Windows kullanıcıları yine de Microsoft'un (elbette 
eğer "
+#~ "onaracaksa) açığı onarmasını beklemek zorunda."
+
+#~ msgid ""
 #~ "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-";
 #~ "targeted-dream-incubation\"> Advertising companies are experimenting to "
 #~ "manipulate people's minds</a>, and impose a new way of advertising by "

Index: proprietary/po/proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.251
retrieving revision 1.252
diff -u -b -r1.251 -r1.252
--- proprietary/po/proprietary.zh-cn.po 15 Sep 2021 09:32:56 -0000      1.251
+++ proprietary/po/proprietary.zh-cn.po 20 Sep 2021 11:36:13 -0000      1.252
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
 "PO-Revision-Date: 2021-09-15 16:58+0800\n"
 "Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
 "Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-20 11:26+0000\n"
 "X-Generator: Poedit 2.3\n"
 
 #. type: Content of: <title>
@@ -315,9 +316,29 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-";
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law.  The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Various models of security cameras, DVRs, and baby monitors that run "
+#| "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+#| "video-feeds/\">are exploited by a security vulnerability that could give "
+#| "attackers access to live feeds</a>."
+msgid ""
 "Various models of security cameras, DVRs, and baby monitors that run "
 "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
-"video-feeds/\">are exploited by a security vulnerability that could give "
+"video-feeds/\">are affected by a security vulnerability that could give "
 "attackers access to live feeds</a>."
 msgstr ""
 "多种型号的安保摄像头、DVR 
和婴儿监护设备运行着专有软件,它们的 <a href="
@@ -388,27 +409,6 @@
 "<small>请注意,本文错误地将&ldquo;<a 
href=\"/philosophy/words-to-avoid."
 "html#Hacker\">黑客</a>&rdquo;一词当成骇客来用。</small>"
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
-"crackers to remotely gain access to the operating system</a> and install "
-"programs, view and delete data, or even create new user accounts with full "
-"user rights."
-msgstr ""
-"一个新发现的微软 Windows 漏洞 <a 
href=\"https://edition.cnn.com/2021/07/08/";
-"tech/microsoft-windows-10-printnightmare/\"> 
让骇客能够远程获得操作系统的权限"
-"</a> 并安装程序、查看和删除数据,甚至创建å…
·æœ‰å®Œæ•´æƒé™çš„新账户。"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The security research firm accidentally leaked instructions on how the flaw "
-"could be exploited but Windows users should still wait for Microsoft to fix "
-"the flaw, if they fix it."
-msgstr ""
-"安全ç 
”究机构意外泄漏了如何利用该漏洞的操作步骤,但是 Windows 
用户还在等待微软"
-"对此的修复,或者是否修复。"
-
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr "<a href=\"/proprietary/all.html\">更多内容&hellip;</a>"
@@ -484,6 +484,26 @@
 msgstr "最后更新:"
 
 #~ msgid ""
+#~ "A newly found Microsoft Windows vulnerability <a href=\"https://edition.";
+#~ "cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
+#~ "crackers to remotely gain access to the operating system</a> and install "
+#~ "programs, view and delete data, or even create new user accounts with "
+#~ "full user rights."
+#~ msgstr ""
+#~ "一个新发现的微软 Windows 漏洞 <a href=\"https://edition.cnn.";
+#~ "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> 
让骇客能够远程"
+#~ "获得操作系统的权限</a> 并安装程序、查看和删
除数据,甚至创建具有完整权限的"
+#~ "新账户。"
+
+#~ msgid ""
+#~ "The security research firm accidentally leaked instructions on how the "
+#~ "flaw could be exploited but Windows users should still wait for Microsoft "
+#~ "to fix the flaw, if they fix it."
+#~ msgstr ""
+#~ "安全ç 
”究机构意外泄漏了如何利用该漏洞的操作步骤,但是 Windows 
用户还在等待"
+#~ "微软对此的修复,或者是否修复。"
+
+#~ msgid ""
 #~ "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-";
 #~ "targeted-dream-incubation\"> Advertising companies are experimenting to "
 #~ "manipulate people's minds</a>, and impose a new way of advertising by "

Index: proprietary/po/proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.286
retrieving revision 1.287
diff -u -b -r1.286 -r1.287
--- proprietary/po/proprietary.zh-tw-diff.html  15 Sep 2021 06:03:46 -0000      
1.286
+++ proprietary/po/proprietary.zh-tw-diff.html  20 Sep 2021 11:36:13 -0000      
1.287
@@ -58,21 +58,21 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
 #TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
-#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration: 
none;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC a:hover { text-decoration: underline; }
+#TOC a { text-decoration: none; }
+#TOC a:hover { text-decoration: underline; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-  .reduced-width { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+  .reduced-width { width: 55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 <span class="inserted"><ins><em>&lt;div 
class="reduced-width"&gt;</em></ins></span>
 
@@ -137,19 +137,19 @@
  &lt;/tr&gt;
  &lt;tr&gt;
   &lt;td&gt;
-   &lt;ul class="columns"&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
+   &lt;ul class="columns"&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a 
href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
@@ -200,10 +200,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -224,13 +224,27 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202109170"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple has made it &lt;a
+    
href="https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238"&gt;
+    impossible to load Navalny's tactical voting app into an iPhone&lt;/a&gt;
+    in Russia.&lt;/p&gt;
+
+    &lt;p&gt;It is impossible because (1) the iPhone refuses to load apps
+    from anywhere other than Apple, and (2) Apple has obeyed a Russian
+    censorship law.  The first point is enforced by Apple's nonfree
+    software.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202108170"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Various models of security cameras, DVRs,
     and baby monitors that run proprietary software &lt;a
     href="https://www.wired.com/story/kalay-iot-bug-video-feeds/"&gt;are
-    exploited by a security vulnerability that could give attackers access
+    affected by a security vulnerability that could give attackers access
     to live feeds&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -275,24 +289,6 @@
     wrongly refers to crackers as &ldquo;&lt;a
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202107090"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A newly found Microsoft Windows vulnerability &lt;a
-    
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/"&gt;
-    can allow crackers to remotely gain access to the operating 
system&lt;/a&gt;
-    and install programs, view and delete data, or even create new user
-    accounts with full user rights.&lt;/p&gt;
-
-    &lt;p&gt;The security research firm accidentally leaked instructions on
-    how the flaw could be exploited but Windows users should still wait
-    for Microsoft to fix the flaw, if they fix it.&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;Please note that the article
-    wrongly refers to crackers as &ldquo;&lt;a
-    
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 &lt;p class="button right-align"&gt;
 &lt;a href="/proprietary/all.html"&gt;More items&hellip;&lt;/a&gt;&lt;/p&gt;
@@ -356,7 +352,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/09/15 06:03:46 $
+$Date: 2021/09/20 11:36:13 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.275
retrieving revision 1.276
diff -u -b -r1.275 -r1.276
--- proprietary/po/proprietary.zh-tw.po 15 Sep 2021 06:03:46 -0000      1.275
+++ proprietary/po/proprietary.zh-tw.po 20 Sep 2021 11:36:13 -0000      1.276
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
 "PO-Revision-Date: 2020-02-08 17:12+0800\n"
 "Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
 "Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -458,9 +458,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-";
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law.  The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Various models of security cameras, DVRs, and baby monitors that run "
 "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
-"video-feeds/\">are exploited by a security vulnerability that could give "
+"video-feeds/\">are affected by a security vulnerability that could give "
 "attackers access to live feeds</a>."
 msgstr ""
 
@@ -511,22 +525,6 @@
 "href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
-"crackers to remotely gain access to the operating system</a> and install "
-"programs, view and delete data, or even create new user accounts with full "
-"user rights."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The security research firm accidentally leaked instructions on how the flaw "
-"could be exploited but Windows users should still wait for Microsoft to fix "
-"the flaw, if they fix it."
-msgstr ""
-
 #. type: Content of: <div><p>
 # | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
 # | devices</a>-] {+href=\"/proprietary/all.html\">More items&hellip;</a>+}

Index: proprietary/po/pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.423
retrieving revision 1.424
diff -u -b -r1.423 -r1.424
--- proprietary/po/pt-br.po     15 Sep 2021 06:03:47 -0000      1.423
+++ proprietary/po/pt-br.po     20 Sep 2021 11:36:13 -0000      1.424
@@ -508,6 +508,20 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-";
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law.  The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Various models of security cameras, DVRs, and baby monitors that run "
 "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
 "video-feeds/\">are exploited by a security vulnerability that could give "
@@ -12171,6 +12185,14 @@
 "liberdade)</a>. Uma vez que o software livre é controlado por seus 
usuários, "
 "eles têm uma boa defesa contra a funcionalidade de software maliciosa."
 
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+"video-feeds/\">are affected by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr "<a href=\"/proprietary/all.html\">Mais itens…</a>"

Index: proprietary/po/ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.710
retrieving revision 1.711
diff -u -b -r1.710 -r1.711
--- proprietary/po/ru.po        16 Sep 2021 07:35:29 -0000      1.710
+++ proprietary/po/ru.po        20 Sep 2021 11:36:13 -0000      1.711
@@ -509,15 +509,29 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-";
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law.  The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Various models of security cameras, DVRs, and baby monitors that run "
 "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
 "video-feeds/\">are exploited by a security vulnerability that could give "
 "attackers access to live feeds</a>."
 msgstr ""
 "Различные модели камер охраны и 
наблюдения за грудными детьми, работающими 
"
-"под управлением несвободных программ, <a 
href=\"https://www.wired.com/story/kalay-iot-bug-";
-"video-feeds/\">содержат уязвимость, которая 
могла бы позволить злоумышленникам "
-"получить доступ к видеопотоку</a>."
+"под управлением несвободных программ, <a 
href=\"https://www.wired.com/story/";
+"kalay-iot-bug-video-feeds/\">содержат уязвимость, 
которая могла бы позволить "
+"злоумышленникам получить доступ к 
видеопотоку</a>."
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
@@ -12330,6 +12344,29 @@
 "программах</a>. Поскольку свободные 
программы контролируются пользователями, "
 "они довольно хорошо защищены от 
вредоносной функциональности."
 
+#. type: Content of: <div><ul><li><p>
+# | Various models of security cameras, DVRs, and baby monitors that run
+# | proprietary software <a
+# | href=\"https://www.wired.com/story/kalay-iot-bug-video-feeds/\";>are
+# | [-exploited-] {+affected+} by a security vulnerability that could give
+# | attackers access to live feeds</a>.
+#, fuzzy
+#| msgid ""
+#| "Various models of security cameras, DVRs, and baby monitors that run "
+#| "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+#| "video-feeds/\">are exploited by a security vulnerability that could give "
+#| "attackers access to live feeds</a>."
+msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+"video-feeds/\">are affected by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+"Различные модели камер охраны и 
наблюдения за грудными детьми, работающими 
"
+"под управлением несвободных программ, <a 
href=\"https://www.wired.com/story/";
+"kalay-iot-bug-video-feeds/\">содержат уязвимость, 
которая могла бы позволить "
+"злоумышленникам получить доступ к 
видеопотоку</a>."
+
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr "<a href=\"/proprietary/all.html\">Далее...</a>"

Index: proprietary/po/tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.218
retrieving revision 1.219
diff -u -b -r1.218 -r1.219
--- proprietary/po/tr.po        18 Sep 2021 07:01:32 -0000      1.218
+++ proprietary/po/tr.po        20 Sep 2021 11:36:14 -0000      1.219
@@ -414,6 +414,20 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-";
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law.  The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Various models of security cameras, DVRs, and baby monitors that run "
 "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
 "video-feeds/\">are exploited by a security vulnerability that could give "
@@ -9585,6 +9599,24 @@
 "etmektir. Özgür yazılım kullanıcıları tarafından kontrol 
edildiğinden kötü "
 "amaçlı yazılım işlevselliklerine karşı oldukça iyi bir savunmaya 
sahiptirler."
 
+#. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Various models of security cameras, DVRs, and baby monitors that run "
+#| "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+#| "video-feeds/\">are exploited by a security vulnerability that could give "
+#| "attackers access to live feeds</a>."
+msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+"video-feeds/\">are affected by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+"Özel mülk yazılım içeren çeşitli güvenlik kamerası, dijital kayıt 
cihazı ve "
+"bebek monitörü modelleri, <a href=\"https://www.wired.com/story/kalay-iot-";
+"bug-video-feeds/\">saldırganların canlı yayına erişmesini sağlayan bir "
+"güvenlik açığına sahip</a>."
+
 #. type: Content of: <div><p>
 #, fuzzy
 #| msgid "<a href=\"/proprietary/malware-mobiles.html\">Mobiles</a>"

Index: proprietary/po/zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.219
retrieving revision 1.220
diff -u -b -r1.219 -r1.220
--- proprietary/po/zh-cn.po     15 Sep 2021 09:32:56 -0000      1.219
+++ proprietary/po/zh-cn.po     20 Sep 2021 11:36:14 -0000      1.220
@@ -414,6 +414,20 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-";
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law.  The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Various models of security cameras, DVRs, and baby monitors that run "
 "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
 "video-feeds/\">are exploited by a security vulnerability that could give "
@@ -9210,6 +9224,23 @@
 
"philosophy/free-software-even-more-important.html\">自由(尊重自由的)软件</"
 "a>。由于自由软件由其用户控制,因
此它们可以很好地防御软件的恶意功能。"
 
+#. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Various models of security cameras, DVRs, and baby monitors that run "
+#| "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+#| "video-feeds/\">are exploited by a security vulnerability that could give "
+#| "attackers access to live feeds</a>."
+msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+"video-feeds/\">are affected by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+"多种型号的安保摄像头、DVR 
和婴儿监护设备运行着专有软件,它们的 <a href="
+"\"https://www.wired.com/story/kalay-iot-bug-video-feeds/\";>一个安å…
¨æ¼æ´žè¢«æ”»å‡»"
+"者利用来访问现场视频</a>。"
+
 #. type: Content of: <div><p>
 #, fuzzy
 #| msgid "<a href=\"/proprietary/malware-mobiles.html\">Mobiles</a>"

Index: proprietary/po/zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.339
retrieving revision 1.340
diff -u -b -r1.339 -r1.340
--- proprietary/po/zh-tw.po     15 Sep 2021 06:03:47 -0000      1.339
+++ proprietary/po/zh-tw.po     20 Sep 2021 11:36:14 -0000      1.340
@@ -439,6 +439,20 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-";
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law.  The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Various models of security cameras, DVRs, and baby monitors that run "
 "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
 "video-feeds/\">are exploited by a security vulnerability that could give "
@@ -8887,6 +8901,14 @@
 "</a>因為自由軟體是由使用者自主掌控,因
此能對惡意的軟體功能起相當大的保護效"
 "果。"
 
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-";
+"video-feeds/\">are affected by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
 #. type: Content of: <div><p>
 # | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
 # | devices</a>-] {+href=\"/proprietary/all.html\">More items&hellip;</a>+}

Index: thankgnus/po/2021supporters.pot
===================================================================
RCS file: /web/www/www/thankgnus/po/2021supporters.pot,v
retrieving revision 1.89
retrieving revision 1.90
diff -u -b -r1.89 -r1.90
--- thankgnus/po/2021supporters.pot     15 Sep 2021 06:03:49 -0000      1.89
+++ thankgnus/po/2021supporters.pot     20 Sep 2021 11:36:14 -0000      1.90
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: 2021supporters.html\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -83,6 +83,10 @@
 msgstr ""
 
 #. type: Content of: <ul><li>
+msgid "Adam Jung"
+msgstr ""
+
+#. type: Content of: <ul><li>
 msgid "Anonymous Anonymous"
 msgstr ""
 
@@ -117,6 +121,10 @@
 msgstr ""
 
 #. type: Content of: <ul><li>
+msgid "Benjamin Smith"
+msgstr ""
+
+#. type: Content of: <ul><li>
 msgid "Brett Sears"
 msgstr ""
 
@@ -237,6 +245,10 @@
 msgstr ""
 
 #. type: Content of: <ul><li>
+msgid "The Huisking Foundation, Inc."
+msgstr ""
+
+#. type: Content of: <ul><li>
 msgid "Yuchen Pei, in honor of RMS"
 msgstr ""
 
@@ -431,6 +443,10 @@
 msgstr ""
 
 #. type: Content of: <ul><li>
+msgid "Mathew Woodyard"
+msgstr ""
+
+#. type: Content of: <ul><li>
 msgid "Matomo.org"
 msgstr ""
 
@@ -543,7 +559,7 @@
 msgstr ""
 
 #. type: Content of: <ul><li>
-msgid "WILLIAM Hill Jr."
+msgid "William Hill Jr."
 msgstr ""
 
 #. type: Content of: <ul><li>

Index: thankgnus/po/2021supporters.pt-br.po
===================================================================
RCS file: /web/www/www/thankgnus/po/2021supporters.pt-br.po,v
retrieving revision 1.141
retrieving revision 1.142
diff -u -b -r1.141 -r1.142
--- thankgnus/po/2021supporters.pt-br.po        15 Sep 2021 06:03:52 -0000      
1.141
+++ thankgnus/po/2021supporters.pt-br.po        20 Sep 2021 11:36:14 -0000      
1.142
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: 2021supporters.html\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
 "PO-Revision-Date: 2021-09-05 12:46-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -98,6 +98,10 @@
 "<a href= \"#TOCpatrons\" id=\"patrons\">Patronos</a> (US$ 5.000,00 ou mais)"
 
 #. type: Content of: <ul><li>
+msgid "Adam Jung"
+msgstr ""
+
+#. type: Content of: <ul><li>
 msgid "Anonymous Anonymous"
 msgstr "Anonymous Anonymous"
 
@@ -134,6 +138,10 @@
 msgstr "AskApache, em homenagem a RMS e Bill Joy"
 
 #. type: Content of: <ul><li>
+msgid "Benjamin Smith"
+msgstr ""
+
+#. type: Content of: <ul><li>
 msgid "Brett Sears"
 msgstr "Brett Sears"
 
@@ -254,6 +262,10 @@
 msgstr "Takeshi Nishimatsu"
 
 #. type: Content of: <ul><li>
+msgid "The Huisking Foundation, Inc."
+msgstr ""
+
+#. type: Content of: <ul><li>
 msgid "Yuchen Pei, in honor of RMS"
 msgstr "Yuchen Pei, em homenagem a RMS"
 
@@ -450,6 +462,10 @@
 msgstr "Martin Jässing"
 
 #. type: Content of: <ul><li>
+msgid "Mathew Woodyard"
+msgstr "Mathew Woodyard"
+
+#. type: Content of: <ul><li>
 msgid "Matomo.org"
 msgstr "Matomo.org"
 
@@ -562,7 +578,9 @@
 msgstr "Valerio Poggi"
 
 #. type: Content of: <ul><li>
-msgid "WILLIAM Hill Jr."
+#, fuzzy
+#| msgid "WILLIAM Hill Jr."
+msgid "William Hill Jr."
 msgstr "WILLIAM Hill Jr."
 
 #. type: Content of: <ul><li>
@@ -643,9 +661,6 @@
 msgid "Updated:"
 msgstr "Última atualização:"
 
-#~ msgid "Mathew Woodyard"
-#~ msgstr "Mathew Woodyard"
-
 #~ msgid "Andrew Auernheimer, in honor of RMS"
 #~ msgstr "Andrew Auernheimer, em homenagem a RMS"
 



reply via email to

[Prev in Thread] Current Thread [Next in Thread]