[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www proprietary/po/all.fr.po proprietary/po/all...
From: |
GNUN |
Subject: |
www proprietary/po/all.fr.po proprietary/po/all... |
Date: |
Mon, 20 Sep 2021 07:36:15 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 21/09/20 07:36:14
Modified files:
proprietary/po : all.fr.po all.pot all.pt-br.po all.ru.po de.po
es.po fr.po it.po ja.po
malware-apple.de-diff.html malware-apple.de.po
malware-apple.es.po malware-apple.fr.po
malware-apple.it-diff.html malware-apple.it.po
malware-apple.ja-diff.html malware-apple.ja.po
malware-apple.nl-diff.html malware-apple.nl.po
malware-apple.pot malware-apple.pt-br.po
malware-apple.ru.po nl.po pl.po pot
proprietary-insecurity.de-diff.html
proprietary-insecurity.de.po
proprietary-insecurity.es.po
proprietary-insecurity.fr.po
proprietary-insecurity.it-diff.html
proprietary-insecurity.it.po
proprietary-insecurity.ja-diff.html
proprietary-insecurity.ja.po
proprietary-insecurity.pot
proprietary-insecurity.pt-br.po
proprietary-insecurity.ru.po
proprietary-jails.de-diff.html
proprietary-jails.de.po proprietary-jails.es.po
proprietary-jails.fr.po
proprietary-jails.it-diff.html
proprietary-jails.it.po
proprietary-jails.ja-diff.html
proprietary-jails.ja.po proprietary-jails.pot
proprietary-jails.pt-br.po
proprietary-jails.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.tr.po
proprietary.zh-cn.po
proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po tr.po
zh-cn.po zh-tw.po
thankgnus/po : 2021supporters.pot 2021supporters.pt-br.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.fr.po?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.pot?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.pt-br.po?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.ru.po?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.339&r2=1.340
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.485&r2=1.486
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.600&r2=1.601
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.339&r2=1.340
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.347&r2=1.348
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de-diff.html?cvsroot=www&r1=1.84&r2=1.85
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de.po?cvsroot=www&r1=1.175&r2=1.176
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.es.po?cvsroot=www&r1=1.235&r2=1.236
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.fr.po?cvsroot=www&r1=1.234&r2=1.235
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it-diff.html?cvsroot=www&r1=1.89&r2=1.90
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it.po?cvsroot=www&r1=1.168&r2=1.169
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja-diff.html?cvsroot=www&r1=1.104&r2=1.105
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja.po?cvsroot=www&r1=1.151&r2=1.152
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl-diff.html?cvsroot=www&r1=1.107&r2=1.108
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl.po?cvsroot=www&r1=1.105&r2=1.106
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.pot?cvsroot=www&r1=1.115&r2=1.116
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.pt-br.po?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ru.po?cvsroot=www&r1=1.280&r2=1.281
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.340&r2=1.341
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.339&r2=1.340
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.338&r2=1.339
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de-diff.html?cvsroot=www&r1=1.91&r2=1.92
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.189&r2=1.190
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.es.po?cvsroot=www&r1=1.130&r2=1.131
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.278&r2=1.279
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-diff.html?cvsroot=www&r1=1.104&r2=1.105
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.206&r2=1.207
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja-diff.html?cvsroot=www&r1=1.125&r2=1.126
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja.po?cvsroot=www&r1=1.178&r2=1.179
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pot?cvsroot=www&r1=1.144&r2=1.145
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pt-br.po?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.320&r2=1.321
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.de-diff.html?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.de.po?cvsroot=www&r1=1.71&r2=1.72
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.es.po?cvsroot=www&r1=1.88&r2=1.89
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.fr.po?cvsroot=www&r1=1.90&r2=1.91
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.it-diff.html?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.it.po?cvsroot=www&r1=1.74&r2=1.75
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.ja-diff.html?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.ja.po?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.pot?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.pt-br.po?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.ru.po?cvsroot=www&r1=1.111&r2=1.112
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.296&r2=1.297
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.313&r2=1.314
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.515&r2=1.516
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.534&r2=1.535
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.306&r2=1.307
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.322&r2=1.323
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.311&r2=1.312
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.305&r2=1.306
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.307&r2=1.308
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.296&r2=1.297
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.323&r2=1.324
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.288&r2=1.289
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.285&r2=1.286
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.453&r2=1.454
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.551&r2=1.552
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.200&r2=1.201
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.251&r2=1.252
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.286&r2=1.287
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.275&r2=1.276
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.423&r2=1.424
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.710&r2=1.711
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.218&r2=1.219
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.219&r2=1.220
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.339&r2=1.340
http://web.cvs.savannah.gnu.org/viewcvs/www/thankgnus/po/2021supporters.pot?cvsroot=www&r1=1.89&r2=1.90
http://web.cvs.savannah.gnu.org/viewcvs/www/thankgnus/po/2021supporters.pt-br.po?cvsroot=www&r1=1.141&r2=1.142
Patches:
Index: proprietary/po/all.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.fr.po,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- proprietary/po/all.fr.po 15 Sep 2021 07:07:17 -0000 1.57
+++ proprietary/po/all.fr.po 20 Sep 2021 11:36:08 -0000 1.58
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
"PO-Revision-Date: 2021-09-15 09:05+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-20 11:26+0000\n"
#. type: Content of: <title>
msgid ""
@@ -79,6 +80,20 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-"
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law. The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Various models of security cameras, DVRs, and baby monitors that run "
"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
"video-feeds/\">are exploited by a security vulnerability that could give "
Index: proprietary/po/all.pot
===================================================================
RCS file: /web/www/www/proprietary/po/all.pot,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary/po/all.pot 15 Sep 2021 06:03:44 -0000 1.30
+++ proprietary/po/all.pot 20 Sep 2021 11:36:10 -0000 1.31
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -74,6 +74,21 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Apple has made it <a "
+"href=\"https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238\">
"
+"impossible to load Navalny's tactical voting app into an iPhone</a> in "
+"Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law. The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Various models of security cameras, DVRs, and baby monitors that run "
"proprietary software <a "
"href=\"https://www.wired.com/story/kalay-iot-bug-video-feeds/\">are "
Index: proprietary/po/all.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.pt-br.po,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- proprietary/po/all.pt-br.po 15 Sep 2021 06:03:44 -0000 1.28
+++ proprietary/po/all.pt-br.po 20 Sep 2021 11:36:10 -0000 1.29
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
"PO-Revision-Date: 2021-06-26 09:39-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -81,6 +81,20 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-"
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law. The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Various models of security cameras, DVRs, and baby monitors that run "
"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
"video-feeds/\">are exploited by a security vulnerability that could give "
Index: proprietary/po/all.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.ru.po,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- proprietary/po/all.ru.po 16 Sep 2021 09:02:57 -0000 1.54
+++ proprietary/po/all.ru.po 20 Sep 2021 11:36:10 -0000 1.55
@@ -9,7 +9,7 @@
msgid ""
msgstr ""
"Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
"PO-Revision-Date: 2021-04-27 13:06+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -17,6 +17,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-20 11:26+0000\n"
#. type: Content of: <title>
msgid ""
@@ -85,6 +86,20 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-"
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law. The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Various models of security cameras, DVRs, and baby monitors that run "
"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
"video-feeds/\">are exploited by a security vulnerability that could give "
Index: proprietary/po/de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.339
retrieving revision 1.340
diff -u -b -r1.339 -r1.340
--- proprietary/po/de.po 15 Sep 2021 06:03:44 -0000 1.339
+++ proprietary/po/de.po 20 Sep 2021 11:36:10 -0000 1.340
@@ -662,6 +662,20 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-"
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law. The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Various models of security cameras, DVRs, and baby monitors that run "
"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
"video-feeds/\">are exploited by a security vulnerability that could give "
@@ -13464,6 +13478,14 @@
"Software durch deren Nutzer kontrolliert wird, haben sie eine ziemlich gute "
"Verteidigung gegen heimtückische Softwarefunktionen."
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+"video-feeds/\">are affected by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
#. type: Content of: <div><p>
# | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
# | devices</a>-] {+href=\"/proprietary/all.html\">More items…</a>+}
Index: proprietary/po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.485
retrieving revision 1.486
diff -u -b -r1.485 -r1.486
--- proprietary/po/es.po 15 Sep 2021 09:32:56 -0000 1.485
+++ proprietary/po/es.po 20 Sep 2021 11:36:11 -0000 1.486
@@ -616,6 +616,20 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-"
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law. The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Various models of security cameras, DVRs, and baby monitors that run "
"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
"video-feeds/\">are exploited by a security vulnerability that could give "
@@ -14742,6 +14756,29 @@
"control, de modo que pueden defenderse muy bien de las funcionalidades "
"maliciosas del software."
+#. type: Content of: <div><ul><li><p>
+# | Various models of security cameras, DVRs, and baby monitors that run
+# | proprietary software <a
+# | href=\"https://www.wired.com/story/kalay-iot-bug-video-feeds/\">are
+# | [-exploited-] {+affected+} by a security vulnerability that could give
+# | attackers access to live feeds</a>.
+#, fuzzy
+#| msgid ""
+#| "Various models of security cameras, DVRs, and baby monitors that run "
+#| "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+#| "video-feeds/\">are exploited by a security vulnerability that could give "
+#| "attackers access to live feeds</a>."
+msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+"video-feeds/\">are affected by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+"Varios modelos de cámaras de seguridad, DVR y monitores de bebés que "
+"funcionan con software privativo <a href=\"https://www.wired.com/story/kalay-"
+"iot-bug-video-feeds/\">tienen una vulnerabilidad que puede permitir a "
+"posibles atacantes acceder a los registros en vivo</a>."
+
#. type: Content of: <div><p>
# | <a [-href=\"/proprietary/malware-mobiles.html\">Mobiles</a>-]
# | {+href=\"/proprietary/all.html\">More items…</a>+}
Index: proprietary/po/fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.600
retrieving revision 1.601
diff -u -b -r1.600 -r1.601
--- proprietary/po/fr.po 15 Sep 2021 07:07:17 -0000 1.600
+++ proprietary/po/fr.po 20 Sep 2021 11:36:11 -0000 1.601
@@ -502,6 +502,20 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-"
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law. The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Various models of security cameras, DVRs, and baby monitors that run "
"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
"video-feeds/\">are exploited by a security vulnerability that could give "
@@ -12401,6 +12415,30 @@
"liberté)</a>. Ses utilisateurs ont d'assez bons moyens de se défendre
contre "
"les fonctionnalités malveillantes puisque ce sont eux qui le contrôlent."
+#. type: Content of: <div><ul><li><p>
+# | Various models of security cameras, DVRs, and baby monitors that run
+# | proprietary software <a
+# | href=\"https://www.wired.com/story/kalay-iot-bug-video-feeds/\">are
+# | [-exploited-] {+affected+} by a security vulnerability that could give
+# | attackers access to live feeds</a>.
+#, fuzzy
+#| msgid ""
+#| "Various models of security cameras, DVRs, and baby monitors that run "
+#| "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+#| "video-feeds/\">are exploited by a security vulnerability that could give "
+#| "attackers access to live feeds</a>."
+msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+"video-feeds/\">are affected by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+"Différents modèles de caméras de surveillance, d'enregistreurs vidéo "
+"numériques et de moniteurs pour bébé qui fonctionnent avec du logiciel "
+"privateur ont une <a href=\"https://www.wired.com/story/kalay-iot-bug-video-"
+"feeds/\">faille de sécurité qui permettrait à des attaquant d'espionner le
"
+"flux vidéo</a>."
+
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr "<a href=\"/proprietary/all.html\">Voir plus…</a>"
Index: proprietary/po/it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.339
retrieving revision 1.340
diff -u -b -r1.339 -r1.340
--- proprietary/po/it.po 15 Sep 2021 06:03:45 -0000 1.339
+++ proprietary/po/it.po 20 Sep 2021 11:36:11 -0000 1.340
@@ -628,6 +628,20 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-"
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law. The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Various models of security cameras, DVRs, and baby monitors that run "
"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
"video-feeds/\">are exploited by a security vulnerability that could give "
@@ -12583,6 +12597,14 @@
"a>. Visto che il software libero è controllato dai propri utenti, questi "
"sono protetti a sufficienza dalle funzionalità malevole dei programmi."
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+"video-feeds/\">are affected by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
#. type: Content of: <div><p>
# | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
# | devices</a>-] {+href=\"/proprietary/all.html\">More items…</a>+}
Index: proprietary/po/ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.347
retrieving revision 1.348
diff -u -b -r1.347 -r1.348
--- proprietary/po/ja.po 15 Sep 2021 06:03:45 -0000 1.347
+++ proprietary/po/ja.po 20 Sep 2021 11:36:11 -0000 1.348
@@ -471,6 +471,20 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-"
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law. The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Various models of security cameras, DVRs, and baby monitors that run "
"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
"video-feeds/\">are exploited by a security vulnerability that could give "
@@ -10241,6 +10255,14 @@
"ããèªç±ã½ããã¦ã§ã¢ã¯ããã®ã¦ã¼ã¶ã«ãã£ã¦ã³ã³ããã¼ã«ããã¾ããããæªè¾£ãªã½"
"ããã¦ã§ã¢ã®æ©è½ã«å¯¾ãã¦å®ã«è¯ãé²è¡ã¨ãªãã¾ãã"
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+"video-feeds/\">are affected by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
#. type: Content of: <div><p>
#, fuzzy
#| msgid "<a href=\"/proprietary/malware-mobiles.html\">Mobiles</a>"
Index: proprietary/po/malware-apple.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de-diff.html,v
retrieving revision 1.84
retrieving revision 1.85
diff -u -b -r1.84 -r1.85
--- proprietary/po/malware-apple.de-diff.html 4 Sep 2021 08:37:13 -0000
1.84
+++ proprietary/po/malware-apple.de-diff.html 20 Sep 2021 11:36:11 -0000
1.85
@@ -442,6 +442,20 @@
<p>Jails are systems that impose censorship on application
programs.</p>
<ul class="blurbs">
+ <li id="M202109170">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-09</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Apple has made it <a
+
href="https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238">
+ impossible to load Navalny's tactical voting app into an iPhone</a>
+ in Russia.</p>
+
+ <p>It is impossible because (1) the iPhone refuses to load apps
+ from anywhere other than Apple, and (2) Apple has obeyed a Russian
+ censorship law. The first point is enforced by Apple's nonfree
+ software.</p>
+ </li>
+
<li id="M201904080">
<!--#set var="DATE" value='<small
class="date-tag">2019-04</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -1316,8 +1330,8 @@
<p>Curiously,</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either</em></ins></span> Apple <span class="removed"><del><strong>is
beginning to allow limited passage through the
-walls of</strong></del></span> <span
class="inserted"><ins><em>helps</em></ins></span> the <span
class="removed"><del><strong>iThing jail: users can now install apps built from
+ Either</em></ins></span> Apple <span class="removed"><del><strong>is
beginning to allow limited passage through</strong></del></span> <span
class="inserted"><ins><em>helps</em></ins></span> the
+<span class="removed"><del><strong>walls of the iThing jail: users can now
install apps built from
source code, provided</strong></del></span> <span
class="inserted"><ins><em>NSA snoop on all</em></ins></span> the <span
class="removed"><del><strong>source code is written in Swift. Users
cannot do this freely because they are required to identify
themselves. <a href="https://developer.apple.com/xcode/">Here
@@ -1404,11 +1418,11 @@
<p>Apple has banned iThing applications that show the confederate
flag.
<a
href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html">
Not only those that use it as a symbol of
racism</a>,</strong></del></span> <span
class="inserted"><ins><em>default</a>. (That article talks about iOS
6,</em></ins></span> but <span class="removed"><del><strong>even
- strategic games that use it to represent confederate army units
+ strategic games that use</strong></del></span> it <span
class="removed"><del><strong>to represent confederate army units
fighting in the Civil War.</p>
<p>This ludicrous rigidity illustrates the point that Apple should
not
be allowed to censor apps. Even if Apple carried out this act of
- censorship with some care,</strong></del></span> it <span
class="removed"><del><strong>would still be wrong. Whether racism
+ censorship with some care, it would still be wrong. Whether racism
is bad, whether educating people about drone
attacks</strong></del></span> is <span class="removed"><del><strong>bad, are not
the real issue. Apple should not have the power to impose its views
about either of these questions, or any
other.</p></strong></del></span>
@@ -1556,7 +1570,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/09/04 08:37:13 $
+$Date: 2021/09/20 11:36:11 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-apple.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de.po,v
retrieving revision 1.175
retrieving revision 1.176
diff -u -b -r1.175 -r1.176
--- proprietary/po/malware-apple.de.po 4 Sep 2021 08:37:14 -0000 1.175
+++ proprietary/po/malware-apple.de.po 20 Sep 2021 11:36:11 -0000 1.176
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-apple.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -738,6 +738,20 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-"
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law. The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Apple plans to require that <a href=\"https://www.macrumors.com/2019/04/08/"
"mac-apps-notarization-macos-10-14-5/\"> all application software for MacOS "
"be approved by Apple first</a>."
Index: proprietary/po/malware-apple.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.es.po,v
retrieving revision 1.235
retrieving revision 1.236
diff -u -b -r1.235 -r1.236
--- proprietary/po/malware-apple.es.po 6 Sep 2021 08:36:44 -0000 1.235
+++ proprietary/po/malware-apple.es.po 20 Sep 2021 11:36:11 -0000 1.236
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-20 11:26+0000\n"
"X-Generator: Poedit 2.2.1\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
@@ -608,6 +609,20 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-"
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law. The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Apple plans to require that <a href=\"https://www.macrumors.com/2019/04/08/"
"mac-apps-notarization-macos-10-14-5/\"> all application software for MacOS "
"be approved by Apple first</a>."
Index: proprietary/po/malware-apple.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.fr.po,v
retrieving revision 1.234
retrieving revision 1.235
diff -u -b -r1.234 -r1.235
--- proprietary/po/malware-apple.fr.po 4 Sep 2021 10:22:07 -0000 1.234
+++ proprietary/po/malware-apple.fr.po 20 Sep 2021 11:36:11 -0000 1.235
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
"PO-Revision-Date: 2021-09-04 12:15+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-20 11:26+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -602,6 +603,20 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-"
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law. The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Apple plans to require that <a href=\"https://www.macrumors.com/2019/04/08/"
"mac-apps-notarization-macos-10-14-5/\"> all application software for MacOS "
"be approved by Apple first</a>."
Index: proprietary/po/malware-apple.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it-diff.html,v
retrieving revision 1.89
retrieving revision 1.90
diff -u -b -r1.89 -r1.90
--- proprietary/po/malware-apple.it-diff.html 4 Sep 2021 08:37:14 -0000
1.89
+++ proprietary/po/malware-apple.it-diff.html 20 Sep 2021 11:36:11 -0000
1.90
@@ -53,8 +53,8 @@
<em>Malware</em> means</strong></del></span> <span
class="inserted"><ins><em>class="infobox">
<hr class="full-width" />
<p>Nonfree (proprietary)</em></ins></span> software <span
class="removed"><del><strong>designed</strong></del></span> <span
class="inserted"><ins><em>is very often malware (designed</em></ins></span> to
<span class="removed"><del><strong>function in ways that</strong></del></span>
-mistreat <span class="removed"><del><strong>or harm</strong></del></span> the
<span class="removed"><del><strong>user. (This does not include accidental
errors.)
-This page explains how the software in Apple's computer products are
+mistreat <span class="removed"><del><strong>or harm the user. (This does not
include accidental errors.)
+This page explains how</strong></del></span> the <span
class="removed"><del><strong>software in Apple's computer products are
malware.
</p>
@@ -199,7 +199,7 @@
<li id="M201908150.1">
<!--#set var="DATE" value='<small
class="date-tag">2019-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Apple is putting DRM on</em></ins></span> iPhone <span
class="inserted"><ins><em>batteries, and the system proprietary
+ <p>Apple is putting DRM on</em></ins></span> iPhone <span
class="removed"><del><strong>has</strong></del></span> <span
class="inserted"><ins><em>batteries, and the system proprietary
software <a href="#M201908150">turns off certain features when
batteries
are replaced other than by Apple.</a></p>
</li>
@@ -217,7 +217,7 @@
<p><a
href="https://www.vice.com/en/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017">
Apple uses DRM software to prevent people from charging an iThing
- with a generic USB cable</a>.</p>
+ with</em></ins></span> a <span class="removed"><del><strong>back
door</strong></del></span> <span class="inserted"><ins><em>generic USB
cable</a>.</p>
</li>
<li id="M200811210">
@@ -228,8 +228,8 @@
DRM (digital restrictions mechanisms) in MacOS</a>. This article
focuses on the fact that a new model of Macbook introduced a
requirement for monitors to have malicious hardware, but DRM software
- in MacOS is involved in activating the hardware. The software for
- accessing iTunes is also responsible.</p>
+ in MacOS is involved in activating the hardware. The
software</em></ins></span> for
+ <span class="inserted"><ins><em>accessing iTunes is also
responsible.</p>
</li>
<li id="M200708130">
@@ -243,8 +243,10 @@
<li id="M200703310">
<!--#set var="DATE" value='<small
class="date-tag">2007-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>iTunes videos have DRM, which allows Apple to <a
- href="https://en.wikipedia.org/wiki/FairPlay">dictate where its
+ <p>iTunes videos have DRM, which allows Apple to</em></ins></span>
<a
+<span
class="removed"><del><strong>href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
+remote wipe</a>. It's</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://en.wikipedia.org/wiki/FairPlay">dictate
where its
customers can watch the videos they purchased</a>.</p>
</li>
</ul>
@@ -299,7 +301,7 @@
<h3 id="insecurity">Insecurity</h3>
-<p>These bugs are/were not intentional, so unlike the rest of the file
+<p>These bugs are/were</em></ins></span> not <span
class="removed"><del><strong>always enabled,</strong></del></span> <span
class="inserted"><ins><em>intentional, so unlike the rest of the file
they do not count as malware. We mention them to refute the
supposition that prestigious proprietary software doesn't have grave
bugs.</p>
@@ -318,7 +320,7 @@
a technical analysis of this spyware</a> available in PDF
format.</p>
<p>A free operating system would've let people to fix the bugs for
- themselves but now infected people will be compelled to wait for
corporations to
+ themselves</em></ins></span> but <span class="inserted"><ins><em>now
infected people will be compelled to wait for corporations to
fix the problems.</p>
<p><small>Please note that the article
@@ -338,12 +340,13 @@
<li id="M202011120">
<!--#set var="DATE" value='<small
class="date-tag">2020-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Apple</em></ins></span> has <span class="inserted"><ins><em><a
+ <p>Apple has <a
href="https://sneak.berlin/20201112/your-computer-isnt-yours">implemented
- a malware in its computers that imposes surveillance</a> on users
- and reports users' computing to Apple.</p>
+ a malware in its computers that imposes surveillance</a>
on</em></ins></span> users
+ <span class="inserted"><ins><em>and reports users' computing to
Apple.</p>
- <p>The reports are even unencrypted and they've been leaking this
+ <p>The reports</em></ins></span> are <span
class="removed"><del><strong>led into
+enabling</strong></del></span> <span class="inserted"><ins><em>even
unencrypted and they've been leaking this
data for two years already. This malware is reporting to Apple what
user opens what program at what time. It also gives Apple
power to sabotage users' computing.</p>
@@ -360,7 +363,7 @@
<p>The deep insecurity of iMonsters is even more pertinent given that
Apple's proprietary software makes users totally dependent on Apple
- for even</em></ins></span> a <span class="inserted"><ins><em>modicum of
security. It also means that the devices do
+ for even a modicum of security. It also means that the devices do
not even try to offer security against Apple itself.</p>
</li>
@@ -389,18 +392,22 @@
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
The NSA can tap data in smart phones, including iPhones,
Android, and BlackBerry</a>. While there is not much
- detail here, it seems that this does not operate via
- the universal</em></ins></span> back door <span
class="inserted"><ins><em>that we know nearly all portable
+ detail here,</em></ins></span> it <span
class="removed"><del><strong>without understanding.
+</p></li></strong></del></span> <span
class="inserted"><ins><em>seems that this does not operate via
+ the universal back door that we know nearly all portable
phones have. It may involve exploiting various bugs. There are <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
lots of bugs in the phones' radio software</a>.</p>
- </li>
+ </li></em></ins></span>
</ul>
-<h3 id="interference">Interference</h3>
+<h3 <span class="removed"><del><strong>id="censorship">Apple
Censorship</h3>
+<ul>
+
+<li></strong></del></span> <span
class="inserted"><ins><em>id="interference">Interference</h3>
<p>Various proprietary programs often mess up the user's system. They
- are like sabotage, but they are not grave enough to
qualify</em></ins></span> for <span class="inserted"><ins><em>the
+ are like sabotage, but they are not grave enough to qualify for the
word “sabotage”. Nonetheless, they are nasty and
wrong. This section describes examples of Apple committing
interference.</p>
@@ -419,11 +426,11 @@
<li id="M201908150">
<!--#set var="DATE" value='<small
class="date-tag">2019-08</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Apple is putting DRM on iPhone
+ --><!--#echo encoding="none" var="DATE" --></em></ins></span>
+ <p>Apple <span class="inserted"><ins><em>is putting DRM on iPhone
batteries, and the system proprietary software</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
-remote wipe</a>. It's</strong></del></span>
+<span
class="removed"><del><strong>href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html">
+deleted several VPNs from its</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.vice.com/en/article/59nz3k/apple-is-locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair">turns
off certain features when batteries are replaced other than by
Apple.</a></p>
@@ -436,19 +443,34 @@
<p>Jails are systems that impose censorship on application
programs.</p>
<ul class="blurbs">
+ <li id="M202109170">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-09</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Apple has made it <a
+
href="https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238">
+ impossible to load Navalny's tactical voting</em></ins></span> app <span
class="removed"><del><strong>store</strong></del></span> <span
class="inserted"><ins><em>into an iPhone</a>
+ in Russia.</p>
+
+ <p>It is impossible because (1) the iPhone refuses to load apps
+ from anywhere other than Apple, and (2) Apple has obeyed a Russian
+ censorship law. The first point is enforced by Apple's nonfree
+ software.</p>
+ </li>
+
<li id="M201904080">
<!--#set var="DATE" value='<small
class="date-tag">2019-04</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Apple plans to require that <a
href="https://www.macrumors.com/2019/04/08/mac-apps-notarization-macos-10-14-5/">
- all application software for MacOS be approved by Apple
first</a>.</p>
+ all application software</em></ins></span> for <span
class="removed"><del><strong>China</a>,
+thus using its own</strong></del></span> <span class="inserted"><ins><em>MacOS
be approved by Apple first</a>.</p>
<p>Offering a checking service as an option could be
- useful and would</em></ins></span> not <span
class="removed"><del><strong>always enabled,</strong></del></span> <span
class="inserted"><ins><em>be wrong. Requiring users to get
+ useful and would not be wrong. Requiring users to get
Apple's approval is tyranny. Apple says the check will
only look for malware (not counting the malware that is <a
href="/proprietary/malware-apple.html#TOC">part of
- the operating system</a>),</em></ins></span> but <span
class="inserted"><ins><em>Apple could change that policy step
+ the operating system</a>), but Apple could change that policy step
by step. Or perhaps Apple will define malware to include any app
that China does not like.</p>
@@ -463,7 +485,7 @@
<p><a
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&oldid=835861046">
iOS, the operating system of the Apple iThings, is the prototype
of a jail</a>. It was Apple that introduced the practice of
- designing general purpose computers with censorship of application
+ designing general purpose computers with</em></ins></span> censorship
<span class="inserted"><ins><em>of application
programs.</p>
<p>Here is an article about the <a
@@ -471,34 +493,24 @@
code signing</a> that the iThings use to lock up the user.</p>
<p>Curiously, Apple is beginning to allow limited passage through the
- walls of the iThing jail:</em></ins></span> users <span
class="inserted"><ins><em>can now install apps built from
+ walls of the iThing jail: users can now install apps built from
source code, provided the source code is written in Swift. Users
- cannot do this freely because they</em></ins></span> are <span
class="removed"><del><strong>led into
-enabling</strong></del></span> <span class="inserted"><ins><em>required to
identify
+ cannot do this freely because they are required to identify
themselves. <a href="https://developer.apple.com/xcode/">Here
- are details</a>. While this is a crack in the prison
walls,</em></ins></span> it <span class="removed"><del><strong>without
understanding.
-</p></li></strong></del></span> <span class="inserted"><ins><em>is
not
+ are details</a>. While this is a crack in the prison walls, it is not
big enough to mean that the iThings are no longer jails.</p>
- </li></em></ins></span>
+ </li>
</ul>
-<span class="removed"><del><strong><h3 id="censorship">Apple
Censorship</h3>
-<ul>
-
-<li>
-<p>Apple</strong></del></span>
-
-<span class="inserted"><ins><em><h4 id="jail-censorship">Examples of
censorship by Apple jails</h4>
+<h4 id="jail-censorship">Examples of censorship by Apple jails</h4>
<ul class="blurbs">
<li id="M202108200">
<!--#set var="DATE" value='<small
class="date-tag">2021-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Russian communications watchdog</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html">
-deleted several VPNs</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.reuters.com/legal/litigation/russian-watchdog-tells-google-apple-remove-navalny-app-report-2021-08-20/">
- tells Google and Apple to remove Navalny's app</a></em></ins></span>
from <span class="removed"><del><strong>its app store</strong></del></span>
<span class="inserted"><ins><em>their
+ <p>The Russian communications watchdog <a
+
href="https://www.reuters.com/legal/litigation/russian-watchdog-tells-google-apple-remove-navalny-app-report-2021-08-20/">
+ tells Google and Apple to remove Navalny's app</a> from their
stores.</p>
<p>Because Apple controls what a user can install, this is absolute
@@ -511,9 +523,8 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Apple is <a
href="https://www.theguardian.com/technology/2020/aug/30/this-isnt-the-1990s-apple-under-pressure-from-app-developers">
- putting the squeeze on all business</a> conducted through
apps</em></ins></span>
- for <span class="removed"><del><strong>China</a>,
-thus using its own censorship</strong></del></span> <span
class="inserted"><ins><em>iMonsters.</p>
+ putting the squeeze on all business</a> conducted through apps
+ for iMonsters.</p>
<p>This is a symptom of a very big injustice: that Apple has
the</em></ins></span>
power to <span
class="removed"><del><strong>strengthen</strong></del></span> <span
class="inserted"><ins><em>decide what software can be installed on an iMonster.
@@ -1495,7 +1506,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/09/04 08:37:14 $
+$Date: 2021/09/20 11:36:11 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-apple.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it.po,v
retrieving revision 1.168
retrieving revision 1.169
diff -u -b -r1.168 -r1.169
--- proprietary/po/malware-apple.it.po 4 Sep 2021 08:37:14 -0000 1.168
+++ proprietary/po/malware-apple.it.po 20 Sep 2021 11:36:11 -0000 1.169
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
"PO-Revision-Date: 2017-12-31 13:01+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -679,6 +679,20 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-"
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law. The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Apple plans to require that <a href=\"https://www.macrumors.com/2019/04/08/"
"mac-apps-notarization-macos-10-14-5/\"> all application software for MacOS "
"be approved by Apple first</a>."
Index: proprietary/po/malware-apple.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja-diff.html,v
retrieving revision 1.104
retrieving revision 1.105
diff -u -b -r1.104 -r1.105
--- proprietary/po/malware-apple.ja-diff.html 4 Sep 2021 08:37:14 -0000
1.104
+++ proprietary/po/malware-apple.ja-diff.html 20 Sep 2021 11:36:11 -0000
1.105
@@ -59,8 +59,8 @@
<em>Malware</em> means</strong></del></span> <span
class="inserted"><ins><em>class="infobox">
<hr class="full-width" />
<p>Nonfree (proprietary)</em></ins></span> software <span
class="removed"><del><strong>designed</strong></del></span> <span
class="inserted"><ins><em>is very often malware (designed</em></ins></span> to
<span class="removed"><del><strong>function in ways that</strong></del></span>
-mistreat <span class="removed"><del><strong>or harm the user. (This does not
include accidental errors.)
-This page explains how</strong></del></span> the <span
class="removed"><del><strong>software in Apple's computer products are
+mistreat <span class="removed"><del><strong>or harm</strong></del></span> the
<span class="removed"><del><strong>user. (This does not include accidental
errors.)
+This page explains how the software in Apple's computer products are
malware.
</p>
@@ -93,10 +93,11 @@
</p></strong></del></span> <span class="inserted"><ins><em>serve as
specific substantiation.</p></em></ins></span>
</div>
-<span class="removed"><del><strong><p>Here's how Apple's systems are
malware.</p></strong></del></span>
+<span class="removed"><del><strong><p>Here's how Apple's systems are
malware.</p>
-<div <span class="removed"><del><strong>class="toc">
-<div class="malfunctions"></strong></del></span> <span
class="inserted"><ins><em>id="TOC" class="toc-inline">
+<div class="toc"></strong></del></span>
+
+<div <span
class="removed"><del><strong>class="malfunctions"></strong></del></span>
<span class="inserted"><ins><em>id="TOC" class="toc-inline">
<h3 style="display: none">Types of Apple
malware</h3></em></ins></span>
<ul>
<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
@@ -125,9 +126,9 @@
<!--#set var="DATE" value='<small
class="date-tag">2019-07</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Apple appears</em></ins></span> to <span
class="removed"><del><strong>restrict what users can do with the data in their
computers.</li>
-<li><a href="#jails">Jails</a>—systems
- that impose censorship on application programs.</li>
-<li><a
href="#tyrants">Tyrants</a>—systems</strong></del></span> <span
class="inserted"><ins><em>say</em></ins></span> that <span
class="removed"><del><strong>reject any operating system</strong></del></span>
<span class="inserted"><ins><em><a
+<li><a
href="#jails">Jails</a>—systems</strong></del></span> <span
class="inserted"><ins><em>say</em></ins></span> that <span
class="removed"><del><strong>impose censorship on application
programs.</li>
+<li><a href="#tyrants">Tyrants</a>—systems
+ that reject any operating system</strong></del></span> <span
class="inserted"><ins><em><a
href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/">
there is a back door in MacOS</a> for automatically updating some
(all?) apps.</p>
@@ -490,6 +491,20 @@
<p>Jails are systems that impose censorship on application
programs.</p>
<ul class="blurbs">
+ <li id="M202109170">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-09</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Apple has made it <a
+
href="https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238">
+ impossible to load Navalny's tactical voting app into an iPhone</a>
+ in Russia.</p>
+
+ <p>It is impossible because (1) the iPhone refuses to load apps
+ from anywhere other than Apple, and (2) Apple has obeyed a Russian
+ censorship law. The first point is enforced by Apple's nonfree
+ software.</p>
+ </li>
+
<li id="M201904080">
<!--#set var="DATE" value='<small
class="date-tag">2019-04</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -1083,8 +1098,8 @@
<li id="M201702150">
<!--#set var="DATE" value='<small
class="date-tag">2017-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Apple proposes</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
+ <p>Apple proposes <a
+
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>—which would mean no way
to use it without having your fingerprints taken. Users would have
no way to tell whether the phone is snooping on them.</p>
@@ -1093,8 +1108,8 @@
<li id="M201611170">
<!--#set var="DATE" value='<small
class="date-tag">2016-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>iPhones <a
-
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send</em></ins></span>
+ <p>iPhones</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send</em></ins></span>
lots of personal data to Apple's servers</a>. Big Brother can get
them from there.</p>
</li>
@@ -1458,7 +1473,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/09/04 08:37:14 $
+$Date: 2021/09/20 11:36:11 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-apple.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja.po,v
retrieving revision 1.151
retrieving revision 1.152
diff -u -b -r1.151 -r1.152
--- proprietary/po/malware-apple.ja.po 4 Sep 2021 08:37:14 -0000 1.151
+++ proprietary/po/malware-apple.ja.po 20 Sep 2021 11:36:11 -0000 1.152
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
"PO-Revision-Date: 2016-12-20 14:42+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -564,6 +564,20 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-"
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law. The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Apple plans to require that <a href=\"https://www.macrumors.com/2019/04/08/"
"mac-apps-notarization-macos-10-14-5/\"> all application software for MacOS "
"be approved by Apple first</a>."
Index: proprietary/po/malware-apple.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl-diff.html,v
retrieving revision 1.107
retrieving revision 1.108
diff -u -b -r1.107 -r1.108
--- proprietary/po/malware-apple.nl-diff.html 4 Sep 2021 08:37:14 -0000
1.107
+++ proprietary/po/malware-apple.nl-diff.html 20 Sep 2021 11:36:11 -0000
1.108
@@ -59,8 +59,8 @@
<em>Malware</em> means</strong></del></span> <span
class="inserted"><ins><em>class="infobox">
<hr class="full-width" />
<p>Nonfree (proprietary)</em></ins></span> software <span
class="removed"><del><strong>designed</strong></del></span> <span
class="inserted"><ins><em>is very often malware (designed</em></ins></span> to
<span class="removed"><del><strong>function in ways that</strong></del></span>
-mistreat <span class="removed"><del><strong>or harm the user. (This does not
include accidental errors.)
-This page explains how</strong></del></span> the <span
class="removed"><del><strong>software in Apple's computer products are
+mistreat <span class="removed"><del><strong>or harm</strong></del></span> the
<span class="removed"><del><strong>user. (This does not include accidental
errors.)
+This page explains how the software in Apple's computer products are
malware.
</p>
@@ -93,10 +93,11 @@
</p></strong></del></span> <span class="inserted"><ins><em>serve as
specific substantiation.</p></em></ins></span>
</div>
-<span class="removed"><del><strong><p>Here's how Apple's systems are
malware.</p></strong></del></span>
+<span class="removed"><del><strong><p>Here's how Apple's systems are
malware.</p>
-<div <span class="removed"><del><strong>class="toc">
-<div class="malfunctions"></strong></del></span> <span
class="inserted"><ins><em>id="TOC" class="toc-inline">
+<div class="toc"></strong></del></span>
+
+<div <span
class="removed"><del><strong>class="malfunctions"></strong></del></span>
<span class="inserted"><ins><em>id="TOC" class="toc-inline">
<h3 style="display: none">Types of Apple
malware</h3></em></ins></span>
<ul>
<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
@@ -125,9 +126,9 @@
<!--#set var="DATE" value='<small
class="date-tag">2019-07</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Apple appears</em></ins></span> to <span
class="removed"><del><strong>restrict what users can do with the data in their
computers.</li>
-<li><a href="#jails">Jails</a>—systems
- that impose censorship on application programs.</li>
-<li><a
href="#tyrants">Tyrants</a>—systems</strong></del></span> <span
class="inserted"><ins><em>say</em></ins></span> that <span
class="removed"><del><strong>reject any operating system</strong></del></span>
<span class="inserted"><ins><em><a
+<li><a
href="#jails">Jails</a>—systems</strong></del></span> <span
class="inserted"><ins><em>say</em></ins></span> that <span
class="removed"><del><strong>impose censorship on application
programs.</li>
+<li><a href="#tyrants">Tyrants</a>—systems
+ that reject any operating system</strong></del></span> <span
class="inserted"><ins><em><a
href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/">
there is a back door in MacOS</a> for automatically updating some
(all?) apps.</p>
@@ -490,6 +491,20 @@
<p>Jails are systems that impose censorship on application
programs.</p>
<ul class="blurbs">
+ <li id="M202109170">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-09</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Apple has made it <a
+
href="https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238">
+ impossible to load Navalny's tactical voting app into an iPhone</a>
+ in Russia.</p>
+
+ <p>It is impossible because (1) the iPhone refuses to load apps
+ from anywhere other than Apple, and (2) Apple has obeyed a Russian
+ censorship law. The first point is enforced by Apple's nonfree
+ software.</p>
+ </li>
+
<li id="M201904080">
<!--#set var="DATE" value='<small
class="date-tag">2019-04</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -1083,8 +1098,8 @@
<li id="M201702150">
<!--#set var="DATE" value='<small
class="date-tag">2017-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Apple proposes</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
+ <p>Apple proposes <a
+
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>—which would mean no way
to use it without having your fingerprints taken. Users would have
no way to tell whether the phone is snooping on them.</p>
@@ -1093,8 +1108,8 @@
<li id="M201611170">
<!--#set var="DATE" value='<small
class="date-tag">2016-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>iPhones <a
-
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send</em></ins></span>
+ <p>iPhones</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send</em></ins></span>
lots of personal data to Apple's servers</a>. Big Brother can get
them from there.</p>
</li>
@@ -1458,7 +1473,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/09/04 08:37:14 $
+$Date: 2021/09/20 11:36:11 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-apple.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl.po,v
retrieving revision 1.105
retrieving revision 1.106
diff -u -b -r1.105 -r1.106
--- proprietary/po/malware-apple.nl.po 4 Sep 2021 08:37:14 -0000 1.105
+++ proprietary/po/malware-apple.nl.po 20 Sep 2021 11:36:11 -0000 1.106
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
"PO-Revision-Date: 2017-01-10 22:15+0100\n"
"Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
"Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -579,6 +579,20 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-"
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law. The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Apple plans to require that <a href=\"https://www.macrumors.com/2019/04/08/"
"mac-apps-notarization-macos-10-14-5/\"> all application software for MacOS "
"be approved by Apple first</a>."
Index: proprietary/po/malware-apple.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.pot,v
retrieving revision 1.115
retrieving revision 1.116
diff -u -b -r1.115 -r1.116
--- proprietary/po/malware-apple.pot 4 Sep 2021 08:37:14 -0000 1.115
+++ proprietary/po/malware-apple.pot 20 Sep 2021 11:36:11 -0000 1.116
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -445,6 +445,21 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Apple has made it <a "
+"href=\"https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238\">
"
+"impossible to load Navalny's tactical voting app into an iPhone</a> in "
+"Russia."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law. The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Apple plans to require that <a "
"href=\"https://www.macrumors.com/2019/04/08/mac-apps-notarization-macos-10-14-5/\">
"
"all application software for MacOS be approved by Apple first</a>."
Index: proprietary/po/malware-apple.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.pt-br.po,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- proprietary/po/malware-apple.pt-br.po 6 Sep 2021 01:03:48 -0000
1.14
+++ proprietary/po/malware-apple.pt-br.po 20 Sep 2021 11:36:12 -0000
1.15
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
"PO-Revision-Date: 2021-06-26 09:40-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -13,6 +13,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-20 11:26+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
#. type: Content of: <title>
@@ -597,6 +598,20 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-"
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law. The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Apple plans to require that <a href=\"https://www.macrumors.com/2019/04/08/"
"mac-apps-notarization-macos-10-14-5/\"> all application software for MacOS "
"be approved by Apple first</a>."
Index: proprietary/po/malware-apple.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ru.po,v
retrieving revision 1.280
retrieving revision 1.281
diff -u -b -r1.280 -r1.281
--- proprietary/po/malware-apple.ru.po 6 Sep 2021 10:03:48 -0000 1.280
+++ proprietary/po/malware-apple.ru.po 20 Sep 2021 11:36:12 -0000 1.281
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-09-04 08:25+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-20 11:26+0000\n"
#. type: Content of: <title>
msgid ""
@@ -601,6 +602,20 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-"
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law. The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Apple plans to require that <a href=\"https://www.macrumors.com/2019/04/08/"
"mac-apps-notarization-macos-10-14-5/\"> all application software for MacOS "
"be approved by Apple first</a>."
Index: proprietary/po/nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.340
retrieving revision 1.341
diff -u -b -r1.340 -r1.341
--- proprietary/po/nl.po 15 Sep 2021 06:03:45 -0000 1.340
+++ proprietary/po/nl.po 20 Sep 2021 11:36:12 -0000 1.341
@@ -449,6 +449,20 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-"
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law. The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Various models of security cameras, DVRs, and baby monitors that run "
"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
"video-feeds/\">are exploited by a security vulnerability that could give "
@@ -9532,6 +9546,14 @@
"a>. Omdat vrije software onder controle is van zijn gebruikers, hebben zij "
"een vrij goede bescherming tegen malafide softwarefunctionaliteiten."
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+"video-feeds/\">are affected by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
#. type: Content of: <div><p>
# | <a [-href=\"/proprietary/malware-mobiles.html\">Mobiles</a>-]
# | {+href=\"/proprietary/all.html\">More items…</a>+}
Index: proprietary/po/pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.339
retrieving revision 1.340
diff -u -b -r1.339 -r1.340
--- proprietary/po/pl.po 15 Sep 2021 06:03:45 -0000 1.339
+++ proprietary/po/pl.po 20 Sep 2021 11:36:12 -0000 1.340
@@ -438,6 +438,20 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-"
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law. The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Various models of security cameras, DVRs, and baby monitors that run "
"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
"video-feeds/\">are exploited by a security vulnerability that could give "
@@ -9012,6 +9026,14 @@
"przez jego użytkowników, majÄ
oni dobrÄ
ochronÄ przeciwko zÅoÅliwym "
"dziaÅaniem oprogramowania."
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+"video-feeds/\">are affected by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
#. type: Content of: <div><p>
# | <a [-href=\"/philosophy/malware-mobiles.html\">Malware in mobile
# | devices</a>-] {+href=\"/proprietary/all.html\">More items…</a>+}
Index: proprietary/po/pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.338
retrieving revision 1.339
diff -u -b -r1.338 -r1.339
--- proprietary/po/pot 15 Sep 2021 06:03:45 -0000 1.338
+++ proprietary/po/pot 20 Sep 2021 11:36:12 -0000 1.339
@@ -368,6 +368,20 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-"
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law. The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Various models of security cameras, DVRs, and baby monitors that run "
"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
"video-feeds/\">are exploited by a security vulnerability that could give "
@@ -8303,6 +8317,14 @@
"they have a pretty good defense against malicious software functionality."
msgstr ""
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+"video-feeds/\">are affected by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr ""
Index: proprietary/po/proprietary-insecurity.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de-diff.html,v
retrieving revision 1.91
retrieving revision 1.92
diff -u -b -r1.91 -r1.92
--- proprietary/po/proprietary-insecurity.de-diff.html 15 Sep 2021 06:03:45
-0000 1.91
+++ proprietary/po/proprietary-insecurity.de-diff.html 20 Sep 2021 11:36:12
-0000 1.92
@@ -103,7 +103,7 @@
<p>Various models of</em></ins></span> security <span
class="removed"><del><strong>hole in</strong></del></span> <span
class="inserted"><ins><em>cameras, DVRs,
and baby monitors that run proprietary software <a
href="https://www.wired.com/story/kalay-iot-bug-video-feeds/">are
- exploited by</em></ins></span> a <span class="inserted"><ins><em>security
vulnerability that could give attackers access
+ affected by</em></ins></span> a <span class="inserted"><ins><em>security
vulnerability that could give attackers access
to live feeds</a>.</p>
</li>
@@ -170,13 +170,13 @@
<li id="M202105040">
<!--#set var="DATE" value='<small
class="date-tag">2021-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A motorcycle company named Klim</em></ins></span> is <span
class="removed"><del><strong>discovered.</strong></del></span> <span
class="inserted"><ins><em>selling airbag
+ <p>A motorcycle company named Klim is selling airbag
vests with different payment methods, one of them is through a <a
href="https://www.vice.com/en/article/93yyyd/this-motorcycle-airbag-vest-will-stop-working-if-you-miss-a-payment">proprietary
subscription-based option that will block the vest from inflating if
the payments don't go through</a>.</p>
- <p>They say there is a 30-days grace period if you miss a payment
+ <p>They say there</em></ins></span> is <span
class="removed"><del><strong>discovered.</strong></del></span> <span
class="inserted"><ins><em>a 30-days grace period if you miss a payment
but the grace period is no excuse to the insecurity.</p>
</li>
@@ -1514,7 +1514,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/09/15 06:03:45 $
+$Date: 2021/09/20 11:36:12 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.189
retrieving revision 1.190
diff -u -b -r1.189 -r1.190
--- proprietary/po/proprietary-insecurity.de.po 15 Sep 2021 06:03:45 -0000
1.189
+++ proprietary/po/proprietary-insecurity.de.po 20 Sep 2021 11:36:12 -0000
1.190
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
"PO-Revision-Date: 2018-08-29 02:41+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -177,7 +177,7 @@
msgid ""
"Various models of security cameras, DVRs, and baby monitors that run "
"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
-"video-feeds/\">are exploited by a security vulnerability that could give "
+"video-feeds/\">are affected by a security vulnerability that could give "
"attackers access to live feeds</a>."
msgstr ""
Index: proprietary/po/proprietary-insecurity.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.es.po,v
retrieving revision 1.130
retrieving revision 1.131
diff -u -b -r1.130 -r1.131
--- proprietary/po/proprietary-insecurity.es.po 15 Sep 2021 09:32:56 -0000
1.130
+++ proprietary/po/proprietary-insecurity.es.po 20 Sep 2021 11:36:12 -0000
1.131
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: \n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-20 11:26+0000\n"
"X-Generator: Poedit 2.2.1\n"
#. type: Content of: <title>
@@ -140,10 +141,21 @@
"confiables que justifiquen su inclusión."
#. type: Content of: <div><div><ul><li><p>
+# | Various models of security cameras, DVRs, and baby monitors that run
+# | proprietary software <a
+# | href=\"https://www.wired.com/story/kalay-iot-bug-video-feeds/\">are
+# | [-exploited-] {+affected+} by a security vulnerability that could give
+# | attackers access to live feeds</a>.
+#, fuzzy
+#| msgid ""
+#| "Various models of security cameras, DVRs, and baby monitors that run "
+#| "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+#| "video-feeds/\">are exploited by a security vulnerability that could give "
+#| "attackers access to live feeds</a>."
msgid ""
"Various models of security cameras, DVRs, and baby monitors that run "
"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
-"video-feeds/\">are exploited by a security vulnerability that could give "
+"video-feeds/\">are affected by a security vulnerability that could give "
"attackers access to live feeds</a>."
msgstr ""
"Varios modelos de cámaras de seguridad, DVR y monitores de bebés que "
Index: proprietary/po/proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.278
retrieving revision 1.279
diff -u -b -r1.278 -r1.279
--- proprietary/po/proprietary-insecurity.fr.po 15 Sep 2021 07:07:17 -0000
1.278
+++ proprietary/po/proprietary-insecurity.fr.po 20 Sep 2021 11:36:12 -0000
1.279
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
"PO-Revision-Date: 2021-09-15 09:05+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-20 11:26+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -140,10 +141,21 @@
"pour l'étayer."
#. type: Content of: <div><div><ul><li><p>
+# | Various models of security cameras, DVRs, and baby monitors that run
+# | proprietary software <a
+# | href=\"https://www.wired.com/story/kalay-iot-bug-video-feeds/\">are
+# | [-exploited-] {+affected+} by a security vulnerability that could give
+# | attackers access to live feeds</a>.
+#, fuzzy
+#| msgid ""
+#| "Various models of security cameras, DVRs, and baby monitors that run "
+#| "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+#| "video-feeds/\">are exploited by a security vulnerability that could give "
+#| "attackers access to live feeds</a>."
msgid ""
"Various models of security cameras, DVRs, and baby monitors that run "
"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
-"video-feeds/\">are exploited by a security vulnerability that could give "
+"video-feeds/\">are affected by a security vulnerability that could give "
"attackers access to live feeds</a>."
msgstr ""
"Différents modèles de caméras de surveillance, d'enregistreurs vidéo "
Index: proprietary/po/proprietary-insecurity.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it-diff.html,v
retrieving revision 1.104
retrieving revision 1.105
diff -u -b -r1.104 -r1.105
--- proprietary/po/proprietary-insecurity.it-diff.html 15 Sep 2021 06:03:45
-0000 1.104
+++ proprietary/po/proprietary-insecurity.it-diff.html 20 Sep 2021 11:36:12
-0000 1.105
@@ -103,7 +103,7 @@
<p>Various models of</em></ins></span> security <span
class="removed"><del><strong>hole in</strong></del></span> <span
class="inserted"><ins><em>cameras, DVRs,
and baby monitors that run proprietary software <a
href="https://www.wired.com/story/kalay-iot-bug-video-feeds/">are
- exploited by</em></ins></span> a <span class="inserted"><ins><em>security
vulnerability that could give attackers access
+ affected by</em></ins></span> a <span class="inserted"><ins><em>security
vulnerability that could give attackers access
to live feeds</a>.</p>
</li>
@@ -177,7 +177,7 @@
the payments don't go through</a>.</p>
<p>They say there is a 30-days grace period if you miss a payment
- but the grace period</em></ins></span> is <span
class="removed"><del><strong>discovered.</strong></del></span> <span
class="inserted"><ins><em>no excuse to the insecurity.</p>
+ but the grace period is no excuse to the insecurity.</p>
</li>
<li id="M202105030">
@@ -188,7 +188,7 @@
up with private companies to monitor American citizens' private online
activity and digital communications</a>.</p>
- <p>What creates the opportunity to try this is the fact that these
+ <p>What creates the opportunity to try this</em></ins></span> is
<span class="removed"><del><strong>discovered.</strong></del></span> <span
class="inserted"><ins><em>the fact that these
companies are already snooping on users' private activities. That
in turn is due to people's use of nonfree software which snoops,
and online dis-services which snoop.</p>
@@ -386,7 +386,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Some security breakers (wrongly referred in this article as <a
href="/philosophy/words-to-avoid.html#Hacker">“hackers”</a>)
- managed to interfere the Amazon Ring proprietary system, and <a
+ managed to interfere the Amazon Ring proprietary system,</em></ins></span>
and <span class="inserted"><ins><em><a
href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras">access
its camera, speakers and microphones</a>.</p>
</li>
@@ -397,7 +397,7 @@
<p>Internet-tethered Amazon Ring had
a security vulnerability that enabled attackers to <a
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
- access the user's wifi password</a>,</em></ins></span> and <span
class="inserted"><ins><em>snoop on the household
+ access the user's wifi password</a>, and snoop on the household
through connected surveillance devices.</p>
<p>Knowledge of the wifi password would</em></ins></span> not <span
class="removed"><del><strong>culpable.</strong></del></span> <span
class="inserted"><ins><em>be sufficient to carry
@@ -1487,7 +1487,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/09/15 06:03:45 $
+$Date: 2021/09/20 11:36:12 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.206
retrieving revision 1.207
diff -u -b -r1.206 -r1.207
--- proprietary/po/proprietary-insecurity.it.po 15 Sep 2021 06:03:45 -0000
1.206
+++ proprietary/po/proprietary-insecurity.it.po 20 Sep 2021 11:36:12 -0000
1.207
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
"PO-Revision-Date: 2017-12-31 13:13+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -167,7 +167,7 @@
msgid ""
"Various models of security cameras, DVRs, and baby monitors that run "
"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
-"video-feeds/\">are exploited by a security vulnerability that could give "
+"video-feeds/\">are affected by a security vulnerability that could give "
"attackers access to live feeds</a>."
msgstr ""
Index: proprietary/po/proprietary-insecurity.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja-diff.html,v
retrieving revision 1.125
retrieving revision 1.126
diff -u -b -r1.125 -r1.126
--- proprietary/po/proprietary-insecurity.ja-diff.html 15 Sep 2021 06:03:45
-0000 1.125
+++ proprietary/po/proprietary-insecurity.ja-diff.html 20 Sep 2021 11:36:12
-0000 1.126
@@ -103,7 +103,7 @@
<p>Various models of security cameras, DVRs,
and baby monitors that run proprietary software <a
href="https://www.wired.com/story/kalay-iot-bug-video-feeds/">are
- exploited by a security vulnerability that could give attackers access
+ affected by a security vulnerability that could give attackers access
to live feeds</a>.</p>
</li>
@@ -516,7 +516,8 @@
and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
turn it into a listening device</a> for them.</p>
- <p>It was very difficult for them to do this. The job would be much
+ <p>It was very difficult for</em></ins></span> them
+<span class="removed"><del><strong>deliberately,</strong></del></span> <span
class="inserted"><ins><em>to do this. The job would be much
easier for Amazon. And if some government such as China or the US
told Amazon to do this, or cease to sell the product in that country,
do you think Amazon would have the moral fiber to say no?</p>
@@ -566,7 +567,7 @@
<li id="M201711200">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Amazon recently invited consumers to be suckers and <a
+ <p>Amazon recently invited consumers to be suckers</em></ins></span>
and <span class="removed"><del><strong><em>the</strong></del></span>
<span class="inserted"><ins><em><a
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
allow delivery staff to open their front doors</a>. Wouldn't you know
it, the system has a grave security flaw.</p>
@@ -616,8 +617,7 @@
<p>That is a malicious functionality, but in addition it
is a gross insecurity since anyone, including malicious crackers, <a
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">can
- find those accounts and use</em></ins></span> them
-<span class="removed"><del><strong>deliberately,</strong></del></span> <span
class="inserted"><ins><em>to get into users' cameras</a>.</p>
+ find those accounts and use them to get into users'
cameras</a>.</p>
</li>
<li id="M201706050">
@@ -631,7 +631,7 @@
<p>The vulnerability allowed a cracker to access
the computer's Intel Active Management Technology (AMT) <a
href="https://arstechnica.com/security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-anyone-thought/">
- web interface with an empty password</em></ins></span> and <span
class="removed"><del><strong><em>the</strong></del></span> <span
class="inserted"><ins><em>gave administrative
+ web interface with an empty password and gave administrative
access</a> to access the computer's keyboard, mouse, monitor among
other privileges.</p>
@@ -1208,12 +1208,10 @@
from the state. Quite the contrary: confiding your data to someone
else's server, if not first encrypted by you with free software,
undermines your <span class="removed"><del><strong>rights.
-</p></strong></del></span> <span
class="inserted"><ins><em>rights.</p></em></ins></span>
+</p></strong></del></span> <span
class="inserted"><ins><em>rights.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201404250">
+ <li id="M201404250">
<!--#set var="DATE" value='<small
class="date-tag">2014-04</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Lots of <a
@@ -1226,10 +1224,12 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The <a
href="http://arstechnica.com/security/2014/02/crypto-weaknesses-in-whatsapp-the-kind-of-stuff-the-nsa-would-love/">insecurity
- of WhatsApp</a> makes eavesdropping a snap.</p>
+ of WhatsApp</a> makes eavesdropping a
snap.</p></em></ins></span>
</li>
- <li id="M201312290">
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201312290">
<!--#set var="DATE" value='<small
class="date-tag">2013-12</small>'
--><!--#echo encoding="none" var="DATE" --></em></ins></span>
<p><a href="http://www.bunniestudios.com/blog/?p=3554"> Some
flash
@@ -1414,7 +1414,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/09/15 06:03:45 $
+$Date: 2021/09/20 11:36:12 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-insecurity.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja.po,v
retrieving revision 1.178
retrieving revision 1.179
diff -u -b -r1.178 -r1.179
--- proprietary/po/proprietary-insecurity.ja.po 15 Sep 2021 06:03:46 -0000
1.178
+++ proprietary/po/proprietary-insecurity.ja.po 20 Sep 2021 11:36:12 -0000
1.179
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
"PO-Revision-Date: 2016-10-31 12:56+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -143,7 +143,7 @@
msgid ""
"Various models of security cameras, DVRs, and baby monitors that run "
"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
-"video-feeds/\">are exploited by a security vulnerability that could give "
+"video-feeds/\">are affected by a security vulnerability that could give "
"attackers access to live feeds</a>."
msgstr ""
Index: proprietary/po/proprietary-insecurity.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pot,v
retrieving revision 1.144
retrieving revision 1.145
diff -u -b -r1.144 -r1.145
--- proprietary/po/proprietary-insecurity.pot 15 Sep 2021 06:03:46 -0000
1.144
+++ proprietary/po/proprietary-insecurity.pot 20 Sep 2021 11:36:12 -0000
1.145
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -108,9 +108,9 @@
msgid ""
"Various models of security cameras, DVRs, and baby monitors that run "
"proprietary software <a "
-"href=\"https://www.wired.com/story/kalay-iot-bug-video-feeds/\">are "
-"exploited by a security vulnerability that could give attackers access to "
-"live feeds</a>."
+"href=\"https://www.wired.com/story/kalay-iot-bug-video-feeds/\">are affected "
+"by a security vulnerability that could give attackers access to live "
+"feeds</a>."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
Index: proprietary/po/proprietary-insecurity.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pt-br.po,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary/po/proprietary-insecurity.pt-br.po 15 Sep 2021 06:03:46
-0000 1.18
+++ proprietary/po/proprietary-insecurity.pt-br.po 20 Sep 2021 11:36:12
-0000 1.19
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
"PO-Revision-Date: 2021-06-26 09:40-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -137,7 +137,7 @@
msgid ""
"Various models of security cameras, DVRs, and baby monitors that run "
"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
-"video-feeds/\">are exploited by a security vulnerability that could give "
+"video-feeds/\">are affected by a security vulnerability that could give "
"attackers access to live feeds</a>."
msgstr ""
Index: proprietary/po/proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.320
retrieving revision 1.321
diff -u -b -r1.320 -r1.321
--- proprietary/po/proprietary-insecurity.ru.po 16 Sep 2021 09:02:57 -0000
1.320
+++ proprietary/po/proprietary-insecurity.ru.po 20 Sep 2021 11:36:12 -0000
1.321
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-20 11:26+0000\n"
#. type: Content of: <title>
msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -137,10 +138,21 @@
"каÑеÑÑве конкÑеÑнÑÑ
ÑвидеÑелÑÑÑв."
#. type: Content of: <div><div><ul><li><p>
+# | Various models of security cameras, DVRs, and baby monitors that run
+# | proprietary software <a
+# | href=\"https://www.wired.com/story/kalay-iot-bug-video-feeds/\">are
+# | [-exploited-] {+affected+} by a security vulnerability that could give
+# | attackers access to live feeds</a>.
+#, fuzzy
+#| msgid ""
+#| "Various models of security cameras, DVRs, and baby monitors that run "
+#| "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+#| "video-feeds/\">are exploited by a security vulnerability that could give "
+#| "attackers access to live feeds</a>."
msgid ""
"Various models of security cameras, DVRs, and baby monitors that run "
"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
-"video-feeds/\">are exploited by a security vulnerability that could give "
+"video-feeds/\">are affected by a security vulnerability that could give "
"attackers access to live feeds</a>."
msgstr ""
"РазлиÑнÑе модели ÐºÐ°Ð¼ÐµÑ Ð¾Ñ
ÑÐ°Ð½Ñ Ð¸
наблÑÐ´ÐµÐ½Ð¸Ñ Ð·Ð° гÑÑднÑми деÑÑми, ÑабоÑаÑÑими
"
Index: proprietary/po/proprietary-jails.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.de-diff.html,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- proprietary/po/proprietary-jails.de-diff.html 4 Sep 2021 08:37:15
-0000 1.47
+++ proprietary/po/proprietary-jails.de-diff.html 20 Sep 2021 11:36:12
-0000 1.48
@@ -105,21 +105,35 @@
<h3 id="apple">Apple</h3>
<ul class="blurbs">
+ <li id="M202109170">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-09</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Apple has made it</em></ins></span> <a <span
class="removed"><del><strong>href="#microsoft">Microsoft jails</a>
|</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238">
+ impossible to load Navalny's tactical voting app into an iPhone</a>
+ in Russia.</p>
+
+ <p>It is impossible because (1) the iPhone refuses to load apps
+ from anywhere other than Apple, and (2) Apple has obeyed a Russian
+ censorship law. The first point is enforced by Apple's nonfree
+ software.</p>
+ </li>
+
<li id="M201904080">
<!--#set var="DATE" value='<small
class="date-tag">2019-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Apple plans to require that</em></ins></span> <a <span
class="removed"><del><strong>href="#microsoft">Microsoft jails</a>
|</strong></del></span>
+ <p>Apple plans to require that</em></ins></span> <a <span
class="removed"><del><strong>href="#consoles">Game consoles</a>
+</p>
+
+<h3 id="apple">Apple jails</h3></strong></del></span>
<span
class="inserted"><ins><em>href="https://www.macrumors.com/2019/04/08/mac-apps-notarization-macos-10-14-5/">
all application software for MacOS be approved by Apple
first</a>.</p>
<p>Offering a checking service as an option could be
useful and would not be wrong. Requiring users to get
Apple's approval is tyranny. Apple says the check will
- only look for malware (not counting the malware that is</em></ins></span>
<a <span class="removed"><del><strong>href="#consoles">Game
consoles</a>
-</p>
-
-<h3 id="apple">Apple jails</h3></strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/malware-apple.html#TOC">part of
+ only look for malware (not counting the malware that is <a
+ href="/proprietary/malware-apple.html#TOC">part of
the operating system</a>), but Apple could change that policy step
by step. Or perhaps Apple will define malware to include any app
that China does not like.</p>
@@ -489,7 +503,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/09/04 08:37:15 $
+$Date: 2021/09/20 11:36:12 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-jails.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.de.po,v
retrieving revision 1.71
retrieving revision 1.72
diff -u -b -r1.71 -r1.72
--- proprietary/po/proprietary-jails.de.po 4 Sep 2021 08:37:15 -0000
1.71
+++ proprietary/po/proprietary-jails.de.po 20 Sep 2021 11:36:12 -0000
1.72
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-jails.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-09-04 08:26+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -204,6 +204,20 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-"
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law. The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Apple plans to require that <a href=\"https://www.macrumors.com/2019/04/08/"
"mac-apps-notarization-macos-10-14-5/\"> all application software for MacOS "
"be approved by Apple first</a>."
Index: proprietary/po/proprietary-jails.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.es.po,v
retrieving revision 1.88
retrieving revision 1.89
diff -u -b -r1.88 -r1.89
--- proprietary/po/proprietary-jails.es.po 6 Sep 2021 08:36:45 -0000
1.88
+++ proprietary/po/proprietary-jails.es.po 20 Sep 2021 11:36:12 -0000
1.89
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-jails.html\n"
-"POT-Creation-Date: 2021-09-04 08:26+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
"PO-Revision-Date: 2021-09-06 10:01+0200\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=utf-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-20 11:26+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -146,6 +147,20 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-"
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law. The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Apple plans to require that <a href=\"https://www.macrumors.com/2019/04/08/"
"mac-apps-notarization-macos-10-14-5/\"> all application software for MacOS "
"be approved by Apple first</a>."
Index: proprietary/po/proprietary-jails.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.fr.po,v
retrieving revision 1.90
retrieving revision 1.91
diff -u -b -r1.90 -r1.91
--- proprietary/po/proprietary-jails.fr.po 4 Sep 2021 10:22:07 -0000
1.90
+++ proprietary/po/proprietary-jails.fr.po 20 Sep 2021 11:36:12 -0000
1.91
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-jails.html\n"
-"POT-Creation-Date: 2021-09-04 08:26+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
"PO-Revision-Date: 2021-09-04 12:15+0200\n"
"Last-Translator: Félicien Pillot <felicien AT gnu.org>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-20 11:26+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
#. type: Content of: <title>
@@ -142,6 +143,20 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-"
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law. The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Apple plans to require that <a href=\"https://www.macrumors.com/2019/04/08/"
"mac-apps-notarization-macos-10-14-5/\"> all application software for MacOS "
"be approved by Apple first</a>."
Index: proprietary/po/proprietary-jails.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.it-diff.html,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- proprietary/po/proprietary-jails.it-diff.html 4 Sep 2021 08:37:15
-0000 1.52
+++ proprietary/po/proprietary-jails.it-diff.html 20 Sep 2021 11:36:12
-0000 1.53
@@ -102,13 +102,27 @@
<h3 id="apple">Apple</h3>
<ul class="blurbs">
- <li id="M201904080">
- <!--#set var="DATE" value='<small
class="date-tag">2019-04</small>'
+ <li id="M202109170">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-09</small>'
--><!--#echo encoding="none" var="DATE" --></em></ins></span>
- <p>Apple <span class="inserted"><ins><em>plans to require
that</em></ins></span> <a
+ <p>Apple <span class="inserted"><ins><em>has made
it</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html">
-deleted several VPNs from its app store</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.macrumors.com/2019/04/08/mac-apps-notarization-macos-10-14-5/">
+deleted several VPNs from its</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238">
+ impossible to load Navalny's tactical voting</em></ins></span> app <span
class="removed"><del><strong>store</strong></del></span> <span
class="inserted"><ins><em>into an iPhone</a>
+ in Russia.</p>
+
+ <p>It is impossible because (1) the iPhone refuses to load apps
+ from anywhere other than Apple, and (2) Apple has obeyed a Russian
+ censorship law. The first point is enforced by Apple's nonfree
+ software.</p>
+ </li>
+
+ <li id="M201904080">
+ <!--#set var="DATE" value='<small
class="date-tag">2019-04</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Apple plans to require that <a
+
href="https://www.macrumors.com/2019/04/08/mac-apps-notarization-macos-10-14-5/">
all application software</em></ins></span> for <span
class="removed"><del><strong>China</a>,
thus using its own</strong></del></span> <span class="inserted"><ins><em>MacOS
be approved by Apple first</a>.</p>
@@ -350,10 +364,10 @@
<p>Google's censorship, unlike that of Apple and Microsoft, is not total:
Android allows users to install apps in other ways. You can install
-free programs from f-droid.org.</p>
-</li>
+free programs from f-droid.org.</p></strong></del></span> <span
class="inserted"><ins><em>services</a>.</p></em></ins></span>
+ </li>
-<li>
+<span class="removed"><del><strong><li>
<p><a
href="http://boingboing.net/2010/04/02/why-i-wont-buy-an-ipad-and-think-yo.html">
iOS, the operating system of the Apple iThings, is the prototype of a
jail.</a> It was Apple that introduced the practice of designing
@@ -379,10 +393,10 @@
<a href="https://developer.apple.com/xcode/">Here are
details.</a></p>
<p>While this is a crack in the prison walls, it is not big enough to
-mean that the iThings are no longer jails.</p></strong></del></span>
<span class="inserted"><ins><em>services</a>.</p></em></ins></span>
- </li>
+mean that the iThings are no longer jails.</p>
+</li>
-<span class="removed"><del><strong><li></strong></del></span>
+<li></strong></del></span>
<span class="inserted"><ins><em><li id="M201506250">
<!--#set var="DATE" value='<small
class="date-tag">2015-06</small>'
@@ -424,10 +438,12 @@
href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/">
banned a game about growing marijuana</a>, while permitting games
about other crimes such as killing people. Perhaps Apple considers
- killing more acceptable than marijuana.</p>
+ killing more acceptable than marijuana.</p></em></ins></span>
</li>
- <li id="M201402070">
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201402070">
<!--#set var="DATE" value='<small
class="date-tag">2014-02</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Apple rejected an app that displayed the locations
@@ -435,11 +451,9 @@
time the developers fixed one “problem”, Apple
complained about another. After the fifth rejection, Apple <a
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">
- admitted it was censoring the app based on the subject
matter</a>.</p></em></ins></span>
+ admitted it was censoring the app based on the subject
matter</a>.</p>
</li>
-
-<span class="removed"><del><strong><li></strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<h3 id="microsoft">Microsoft</h3>
@@ -547,7 +561,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/09/04 08:37:15 $
+$Date: 2021/09/20 11:36:12 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-jails.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.it.po,v
retrieving revision 1.74
retrieving revision 1.75
diff -u -b -r1.74 -r1.75
--- proprietary/po/proprietary-jails.it.po 4 Sep 2021 08:37:15 -0000
1.74
+++ proprietary/po/proprietary-jails.it.po 20 Sep 2021 11:36:12 -0000
1.75
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-jails.html\n"
-"POT-Creation-Date: 2021-09-04 08:26+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
"PO-Revision-Date: 2017-12-31 13:15+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -193,6 +193,20 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-"
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law. The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Apple plans to require that <a href=\"https://www.macrumors.com/2019/04/08/"
"mac-apps-notarization-macos-10-14-5/\"> all application software for MacOS "
"be approved by Apple first</a>."
Index: proprietary/po/proprietary-jails.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.ja-diff.html,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- proprietary/po/proprietary-jails.ja-diff.html 4 Sep 2021 08:37:15
-0000 1.55
+++ proprietary/po/proprietary-jails.ja-diff.html 20 Sep 2021 11:36:12
-0000 1.56
@@ -102,6 +102,20 @@
<h3 id="apple">Apple</h3>
<ul class="blurbs">
+ <li id="M202109170">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-09</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Apple has made it <a
+
href="https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238">
+ impossible to load Navalny's tactical voting app into an iPhone</a>
+ in Russia.</p>
+
+ <p>It is impossible because (1) the iPhone refuses to load apps
+ from anywhere other than Apple, and (2) Apple has obeyed a Russian
+ censorship law. The first point is enforced by Apple's nonfree
+ software.</p>
+ </li>
+
<li id="M201904080">
<!--#set var="DATE" value='<small
class="date-tag">2019-04</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -332,10 +346,12 @@
<p><a
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans">
More</em></ins></span> examples of Apple's arbitrary and inconsistent
<span class="removed"><del><strong>censorship</a>.
- </p></strong></del></span> <span
class="inserted"><ins><em>censorship</a>.</p>
+ </p></strong></del></span> <span
class="inserted"><ins><em>censorship</a>.</p></em></ins></span>
</li>
- <li id="M201405250">
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201405250">
<!--#set var="DATE" value='<small
class="date-tag">2014-05</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Apple used this censorship power in 2014 to <a
@@ -355,11 +371,9 @@
time the developers fixed one “problem”, Apple
complained about another. After the fifth rejection, Apple <a
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">
- admitted it was censoring the app based on the subject
matter</a>.</p></em></ins></span>
+ admitted it was censoring the app based on the subject
matter</a>.</p>
</li>
-
-<span class="removed"><del><strong><li></strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<h3 id="microsoft">Microsoft</h3>
@@ -467,7 +481,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/09/04 08:37:15 $
+$Date: 2021/09/20 11:36:12 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-jails.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.ja.po,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- proprietary/po/proprietary-jails.ja.po 4 Sep 2021 08:37:15 -0000
1.63
+++ proprietary/po/proprietary-jails.ja.po 20 Sep 2021 11:36:12 -0000
1.64
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-jails.html\n"
-"POT-Creation-Date: 2021-09-04 08:26+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
"PO-Revision-Date: 2017-01-11 11:28+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -163,6 +163,20 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-"
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law. The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Apple plans to require that <a href=\"https://www.macrumors.com/2019/04/08/"
"mac-apps-notarization-macos-10-14-5/\"> all application software for MacOS "
"be approved by Apple first</a>."
Index: proprietary/po/proprietary-jails.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.pot,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- proprietary/po/proprietary-jails.pot 4 Sep 2021 08:37:15 -0000
1.45
+++ proprietary/po/proprietary-jails.pot 20 Sep 2021 11:36:12 -0000
1.46
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-jails.html\n"
-"POT-Creation-Date: 2021-09-04 08:26+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -117,6 +117,21 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Apple has made it <a "
+"href=\"https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238\">
"
+"impossible to load Navalny's tactical voting app into an iPhone</a> in "
+"Russia."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law. The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Apple plans to require that <a "
"href=\"https://www.macrumors.com/2019/04/08/mac-apps-notarization-macos-10-14-5/\">
"
"all application software for MacOS be approved by Apple first</a>."
Index: proprietary/po/proprietary-jails.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.pt-br.po,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary/po/proprietary-jails.pt-br.po 6 Sep 2021 01:03:49 -0000
1.5
+++ proprietary/po/proprietary-jails.pt-br.po 20 Sep 2021 11:36:12 -0000
1.6
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-jails.html\n"
-"POT-Creation-Date: 2021-09-04 08:26+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
"PO-Revision-Date: 2021-06-26 09:40-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -13,6 +13,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-20 11:26+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
#. type: Content of: <title>
@@ -137,6 +138,20 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-"
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law. The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Apple plans to require that <a href=\"https://www.macrumors.com/2019/04/08/"
"mac-apps-notarization-macos-10-14-5/\"> all application software for MacOS "
"be approved by Apple first</a>."
Index: proprietary/po/proprietary-jails.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.ru.po,v
retrieving revision 1.111
retrieving revision 1.112
diff -u -b -r1.111 -r1.112
--- proprietary/po/proprietary-jails.ru.po 6 Sep 2021 10:03:52 -0000
1.111
+++ proprietary/po/proprietary-jails.ru.po 20 Sep 2021 11:36:12 -0000
1.112
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-09-04 08:26+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-20 11:26+0000\n"
#. type: Content of: <title>
msgid "Proprietary Jails - GNU Project - Free Software Foundation"
@@ -141,6 +142,20 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-"
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law. The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Apple plans to require that <a href=\"https://www.macrumors.com/2019/04/08/"
"mac-apps-notarization-macos-10-14-5/\"> all application software for MacOS "
"be approved by Apple first</a>."
Index: proprietary/po/proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.296
retrieving revision 1.297
diff -u -b -r1.296 -r1.297
--- proprietary/po/proprietary.de-diff.html 15 Sep 2021 06:03:46 -0000
1.296
+++ proprietary/po/proprietary.de-diff.html 20 Sep 2021 11:36:12 -0000
1.297
@@ -58,21 +58,21 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
}
-#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration:
none;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC a:hover { text-decoration: underline; }
+#TOC a { text-decoration: none; }
+#TOC a:hover { text-decoration: underline; }
-->
</style>
<style type="text/css" media="print,screen">
- .reduced-width { width: 55em; }
-</style></em></ins></span>
+ .reduced-width { width: 55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<span class="inserted"><ins><em><div
class="reduced-width"></em></ins></span>
@@ -137,19 +137,19 @@
</tr>
<tr>
<td>
- <ul class="columns">
- <li><a
href="/proprietary/proprietary-addictions.html">Addictions</a></li>
- <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
+ <ul class="columns"></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li>
+ <li><a
href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
+ <li><a
href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
<li><a
href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
<li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
<li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
@@ -200,10 +200,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -224,13 +224,27 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202109170">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-09</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Apple has made it <a
+
href="https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238">
+ impossible to load Navalny's tactical voting app into an iPhone</a>
+ in Russia.</p>
+
+ <p>It is impossible because (1) the iPhone refuses to load apps
+ from anywhere other than Apple, and (2) Apple has obeyed a Russian
+ censorship law. The first point is enforced by Apple's nonfree
+ software.</p>
+ </li>
+
<li id="M202108170">
<!--#set var="DATE" value='<small
class="date-tag">2021-08</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Various models of security cameras, DVRs,
and baby monitors that run proprietary software <a
href="https://www.wired.com/story/kalay-iot-bug-video-feeds/">are
- exploited by a security vulnerability that could give attackers access
+ affected by a security vulnerability that could give attackers access
to live feeds</a>.</p>
</li>
@@ -275,24 +289,6 @@
wrongly refers to crackers as “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
</li>
-
- <li id="M202107090">
- <!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>A newly found Microsoft Windows vulnerability <a
-
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/">
- can allow crackers to remotely gain access to the operating
system</a>
- and install programs, view and delete data, or even create new user
- accounts with full user rights.</p>
-
- <p>The security research firm accidentally leaked instructions on
- how the flaw could be exploited but Windows users should still wait
- for Microsoft to fix the flaw, if they fix it.</p>
-
- <p><small>Please note that the article
- wrongly refers to crackers as “<a
-
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -356,7 +352,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/09/15 06:03:46 $
+$Date: 2021/09/20 11:36:12 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.313
retrieving revision 1.314
diff -u -b -r1.313 -r1.314
--- proprietary/po/proprietary.de.po 15 Sep 2021 06:03:46 -0000 1.313
+++ proprietary/po/proprietary.de.po 20 Sep 2021 11:36:12 -0000 1.314
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -480,9 +480,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-"
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law. The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Various models of security cameras, DVRs, and baby monitors that run "
"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
-"video-feeds/\">are exploited by a security vulnerability that could give "
+"video-feeds/\">are affected by a security vulnerability that could give "
"attackers access to live feeds</a>."
msgstr ""
@@ -545,22 +559,6 @@
"Es ist bedauerlich, dass der Artikel den Begriff <a href=\"/philosophy/words-"
"to-avoid#Monetize\">âmonetarisierenâ</a> verwendet."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
-"crackers to remotely gain access to the operating system</a> and install "
-"programs, view and delete data, or even create new user accounts with full "
-"user rights."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The security research firm accidentally leaked instructions on how the flaw "
-"could be exploited but Windows users should still wait for Microsoft to fix "
-"the flaw, if they fix it."
-msgstr ""
-
#. type: Content of: <div><p>
# | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
# | devices</a>-] {+href=\"/proprietary/all.html\">More items…</a>+}
Index: proprietary/po/proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.515
retrieving revision 1.516
diff -u -b -r1.515 -r1.516
--- proprietary/po/proprietary.es.po 15 Sep 2021 09:32:56 -0000 1.515
+++ proprietary/po/proprietary.es.po 20 Sep 2021 11:36:12 -0000 1.516
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-20 11:26+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -341,9 +342,34 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-"
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law. The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+# | Various models of security cameras, DVRs, and baby monitors that run
+# | proprietary software <a
+# | href=\"https://www.wired.com/story/kalay-iot-bug-video-feeds/\">are
+# | [-exploited-] {+affected+} by a security vulnerability that could give
+# | attackers access to live feeds</a>.
+#, fuzzy
+#| msgid ""
+#| "Various models of security cameras, DVRs, and baby monitors that run "
+#| "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+#| "video-feeds/\">are exploited by a security vulnerability that could give "
+#| "attackers access to live feeds</a>."
+msgid ""
"Various models of security cameras, DVRs, and baby monitors that run "
"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
-"video-feeds/\">are exploited by a security vulnerability that could give "
+"video-feeds/\">are affected by a security vulnerability that could give "
"attackers access to live feeds</a>."
msgstr ""
"Varios modelos de cámaras de seguridad, DVR y monitores de bebés que "
@@ -424,30 +450,6 @@
"«<cite>crackers</cite>» como <a href=\"/philosophy/words-to-avoid.es."
"html#Hacker\">«<cite>hackers</cite>»</a>).</small>"
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
-"crackers to remotely gain access to the operating system</a> and install "
-"programs, view and delete data, or even create new user accounts with full "
-"user rights."
-msgstr ""
-"Una nueva vulnerabilidad descubierta en Microsoft Windows <a href=\"https://"
-"edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/"
-"\">permite que delincuentes informáticos accedan de forma remota al sistema "
-"operativo</a> e instalen programas, vean y borren datos, o incluso creen "
-"nuevas cuentas de usuario con todos los permisos."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The security research firm accidentally leaked instructions on how the flaw "
-"could be exploited but Windows users should still wait for Microsoft to fix "
-"the flaw, if they fix it."
-msgstr ""
-"La empresa de seguridad que la descubrió ha filtrado accidentalmente "
-"instrucciones para aprovechar ese fallo, pero los usuarios de de Windows "
-"tendrán que esperar a que Microsoft lo arregle, si es que lo hace."
-
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr "<a href=\"/proprietary/all.html\">Ver más…</a>"
@@ -526,3 +528,25 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Ãltima actualización:"
+
+#~ msgid ""
+#~ "A newly found Microsoft Windows vulnerability <a href=\"https://edition."
+#~ "cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
+#~ "crackers to remotely gain access to the operating system</a> and install "
+#~ "programs, view and delete data, or even create new user accounts with "
+#~ "full user rights."
+#~ msgstr ""
+#~ "Una nueva vulnerabilidad descubierta en Microsoft Windows <a href="
+#~ "\"https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-"
+#~ "printnightmare/\">permite que delincuentes informáticos accedan de forma "
+#~ "remota al sistema operativo</a> e instalen programas, vean y borren "
+#~ "datos, o incluso creen nuevas cuentas de usuario con todos los permisos."
+
+#~ msgid ""
+#~ "The security research firm accidentally leaked instructions on how the "
+#~ "flaw could be exploited but Windows users should still wait for Microsoft "
+#~ "to fix the flaw, if they fix it."
+#~ msgstr ""
+#~ "La empresa de seguridad que la descubrió ha filtrado accidentalmente "
+#~ "instrucciones para aprovechar ese fallo, pero los usuarios de de Windows "
+#~ "tendrán que esperar a que Microsoft lo arregle, si es que lo hace."
Index: proprietary/po/proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.534
retrieving revision 1.535
diff -u -b -r1.534 -r1.535
--- proprietary/po/proprietary.fr.po 15 Sep 2021 07:07:17 -0000 1.534
+++ proprietary/po/proprietary.fr.po 20 Sep 2021 11:36:12 -0000 1.535
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
"PO-Revision-Date: 2021-09-15 09:05+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-20 11:26+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -338,9 +339,34 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-"
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law. The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+# | Various models of security cameras, DVRs, and baby monitors that run
+# | proprietary software <a
+# | href=\"https://www.wired.com/story/kalay-iot-bug-video-feeds/\">are
+# | [-exploited-] {+affected+} by a security vulnerability that could give
+# | attackers access to live feeds</a>.
+#, fuzzy
+#| msgid ""
+#| "Various models of security cameras, DVRs, and baby monitors that run "
+#| "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+#| "video-feeds/\">are exploited by a security vulnerability that could give "
+#| "attackers access to live feeds</a>."
+msgid ""
"Various models of security cameras, DVRs, and baby monitors that run "
"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
-"video-feeds/\">are exploited by a security vulnerability that could give "
+"video-feeds/\">are affected by a security vulnerability that could give "
"attackers access to live feeds</a>."
msgstr ""
"Différents modèles de caméras de surveillance, d'enregistreurs vidéo "
@@ -418,31 +444,6 @@
"<small>(Notez que cet article utilise le terme « <a
href=\"/philosophy/words-"
"to-avoid.html#Hacker\">hackers</a> » à mauvais escient.)</small>"
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
-"crackers to remotely gain access to the operating system</a> and install "
-"programs, view and delete data, or even create new user accounts with full "
-"user rights."
-msgstr ""
-"Une vulnérabilité détectée récemment dans Microsoft Windows <a href="
-"\"https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-"
-"printnightmare/\">permet à des pirates d'avoir accès au système "
-"d'exploitation</a> pour installer des programmes, voir et supprimer des "
-"données et même créer de nouveaux comptes utilisateurs avec tous les
droits."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The security research firm accidentally leaked instructions on how the flaw "
-"could be exploited but Windows users should still wait for Microsoft to fix "
-"the flaw, if they fix it."
-msgstr ""
-"L'entreprise de recherche en sécurité a divulgué accidentellement des "
-"instructions sur la manière d'exploiter cette faille, mais les utilisateurs "
-"de Windows attendent toujours que Microsoft la corrige â si cela arrive un "
-"jour."
-
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr "<a href=\"/proprietary/all.html\">Voir plus…</a>"
@@ -515,3 +516,27 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "A newly found Microsoft Windows vulnerability <a href=\"https://edition."
+#~ "cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
+#~ "crackers to remotely gain access to the operating system</a> and install "
+#~ "programs, view and delete data, or even create new user accounts with "
+#~ "full user rights."
+#~ msgstr ""
+#~ "Une vulnérabilité détectée récemment dans Microsoft Windows <a href="
+#~ "\"https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-"
+#~ "printnightmare/\">permet à des pirates d'avoir accès au système "
+#~ "d'exploitation</a> pour installer des programmes, voir et supprimer des "
+#~ "données et même créer de nouveaux comptes utilisateurs avec tous les "
+#~ "droits."
+
+#~ msgid ""
+#~ "The security research firm accidentally leaked instructions on how the "
+#~ "flaw could be exploited but Windows users should still wait for Microsoft "
+#~ "to fix the flaw, if they fix it."
+#~ msgstr ""
+#~ "L'entreprise de recherche en sécurité a divulgué accidentellement des "
+#~ "instructions sur la manière d'exploiter cette faille, mais les "
+#~ "utilisateurs de Windows attendent toujours que Microsoft la corrige â si
"
+#~ "cela arrive un jour."
Index: proprietary/po/proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.306
retrieving revision 1.307
diff -u -b -r1.306 -r1.307
--- proprietary/po/proprietary.it-diff.html 15 Sep 2021 06:03:46 -0000
1.306
+++ proprietary/po/proprietary.it-diff.html 20 Sep 2021 11:36:12 -0000
1.307
@@ -58,21 +58,21 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
}
-#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration:
none;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC a:hover { text-decoration: underline; }
+#TOC a { text-decoration: none; }
+#TOC a:hover { text-decoration: underline; }
-->
</style>
<style type="text/css" media="print,screen">
- .reduced-width { width: 55em; }
-</style></em></ins></span>
+ .reduced-width { width: 55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<span class="inserted"><ins><em><div
class="reduced-width"></em></ins></span>
@@ -223,13 +223,27 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202109170">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-09</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Apple has made it <a
+
href="https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238">
+ impossible to load Navalny's tactical voting app into an iPhone</a>
+ in Russia.</p>
+
+ <p>It is impossible because (1) the iPhone refuses to load apps
+ from anywhere other than Apple, and (2) Apple has obeyed a Russian
+ censorship law. The first point is enforced by Apple's nonfree
+ software.</p>
+ </li>
+
<li id="M202108170">
<!--#set var="DATE" value='<small
class="date-tag">2021-08</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Various models of security cameras, DVRs,
and baby monitors that run proprietary software <a
href="https://www.wired.com/story/kalay-iot-bug-video-feeds/">are
- exploited by a security vulnerability that could give attackers access
+ affected by a security vulnerability that could give attackers access
to live feeds</a>.</p>
</li>
@@ -274,24 +288,6 @@
wrongly refers to crackers as “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
</li>
-
- <li id="M202107090">
- <!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>A newly found Microsoft Windows vulnerability <a
-
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/">
- can allow crackers to remotely gain access to the operating
system</a>
- and install programs, view and delete data, or even create new user
- accounts with full user rights.</p>
-
- <p>The security research firm accidentally leaked instructions on
- how the flaw could be exploited but Windows users should still wait
- for Microsoft to fix the flaw, if they fix it.</p>
-
- <p><small>Please note that the article
- wrongly refers to crackers as “<a
-
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -355,7 +351,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/09/15 06:03:46 $
+$Date: 2021/09/20 11:36:12 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.322
retrieving revision 1.323
diff -u -b -r1.322 -r1.323
--- proprietary/po/proprietary.it.po 15 Sep 2021 06:03:46 -0000 1.322
+++ proprietary/po/proprietary.it.po 20 Sep 2021 11:36:13 -0000 1.323
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -485,9 +485,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-"
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law. The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Various models of security cameras, DVRs, and baby monitors that run "
"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
-"video-feeds/\">are exploited by a security vulnerability that could give "
+"video-feeds/\">are affected by a security vulnerability that could give "
"attackers access to live feeds</a>."
msgstr ""
@@ -538,22 +552,6 @@
"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
-"crackers to remotely gain access to the operating system</a> and install "
-"programs, view and delete data, or even create new user accounts with full "
-"user rights."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The security research firm accidentally leaked instructions on how the flaw "
-"could be exploited but Windows users should still wait for Microsoft to fix "
-"the flaw, if they fix it."
-msgstr ""
-
#. type: Content of: <div><p>
# | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
# | devices</a>-] {+href=\"/proprietary/all.html\">More items…</a>+}
Index: proprietary/po/proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.311
retrieving revision 1.312
diff -u -b -r1.311 -r1.312
--- proprietary/po/proprietary.ja-diff.html 15 Sep 2021 06:03:46 -0000
1.311
+++ proprietary/po/proprietary.ja-diff.html 20 Sep 2021 11:36:13 -0000
1.312
@@ -57,13 +57,13 @@
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom:
.5em; margin: 0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 5%; }
+#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
}
-#TOC a { text-decoration: none; }
+#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration:
none; }
#TOC a:hover { text-decoration: underline;</em></ins></span> }
-->
</style>
@@ -129,7 +129,8 @@
<li><a href="/proprietary/malware-mobiles.html">Malware in
mobile devices</a></li>
<li><a href="/proprietary/malware-kindle-swindle.html">Malware
in</strong></del></span> <span class="inserted"><ins><em>make other changes,
subscribe to</em></ins></span> the <span class="removed"><del><strong>Amazon
- Swindle</a></li></strong></del></span> <span
class="inserted"><ins><em><a
+ Swindle</a></li>
+ <li><a href="/proprietary/malware-games.html">Malware in
games</a></li></strong></del></span> <span
class="inserted"><ins><em><a
href="https://lists.gnu.org/mailman/listinfo/www-malware-commits">mailing
list
<www-malware-commits@gnu.org></a>.</p>
@@ -141,8 +142,7 @@
<tr>
<td>
<ul class="columns"></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li>
- <li><a href="/proprietary/malware-appliances.html">Malware in
appliances</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li>
</ul>
</div>
@@ -166,8 +166,8 @@
<li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary-tethers.html">Tethers</a> (<a
href="#f4">4</a>)</li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html">Tethers</a>
to
-servers</li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-tyrants.html">Tyrants</a> (<a
href="#f5">5</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/potential-malware.html">In the
pipe</a></li>
+servers</li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-tyrants.html">Tyrants</a> (<a
href="#f5">5</a>)</li>
+ <li><a href="/proprietary/potential-malware.html">In the
pipe</a></li>
</ul>
</td>
<td>
@@ -183,8 +183,8 @@
<li><a
href="/proprietary/malware-adobe.html">Adobe</a></li>
<li><a
href="/proprietary/malware-amazon.html">Amazon</a></li>
<li><a
href="/proprietary/malware-apple.html">Apple</a></li>
- <li><a
href="/proprietary/malware-google.html">Google</a></li>
- <li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+ <li><a
href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
</tr>
@@ -228,13 +228,27 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202109170">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-09</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Apple has made it <a
+
href="https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238">
+ impossible to load Navalny's tactical voting app into an iPhone</a>
+ in Russia.</p>
+
+ <p>It is impossible because (1) the iPhone refuses to load apps
+ from anywhere other than Apple, and (2) Apple has obeyed a Russian
+ censorship law. The first point is enforced by Apple's nonfree
+ software.</p>
+ </li>
+
<li id="M202108170">
<!--#set var="DATE" value='<small
class="date-tag">2021-08</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Various models of security cameras, DVRs,
and baby monitors that run proprietary software <a
href="https://www.wired.com/story/kalay-iot-bug-video-feeds/">are
- exploited by a security vulnerability that could give attackers access
+ affected by a security vulnerability that could give attackers access
to live feeds</a>.</p>
</li>
@@ -279,24 +293,6 @@
wrongly refers to crackers as “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
</li>
-
- <li id="M202107090">
- <!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>A newly found Microsoft Windows vulnerability <a
-
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/">
- can allow crackers to remotely gain access to the operating
system</a>
- and install programs, view and delete data, or even create new user
- accounts with full user rights.</p>
-
- <p>The security research firm accidentally leaked instructions on
- how the flaw could be exploited but Windows users should still wait
- for Microsoft to fix the flaw, if they fix it.</p>
-
- <p><small>Please note that the article
- wrongly refers to crackers as “<a
-
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -360,7 +356,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/09/15 06:03:46 $
+$Date: 2021/09/20 11:36:13 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.305
retrieving revision 1.306
diff -u -b -r1.305 -r1.306
--- proprietary/po/proprietary.ja.po 15 Sep 2021 06:03:46 -0000 1.305
+++ proprietary/po/proprietary.ja.po 20 Sep 2021 11:36:13 -0000 1.306
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -343,9 +343,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-"
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law. The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Various models of security cameras, DVRs, and baby monitors that run "
"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
-"video-feeds/\">are exploited by a security vulnerability that could give "
+"video-feeds/\">are affected by a security vulnerability that could give "
"attackers access to live feeds</a>."
msgstr ""
@@ -396,22 +410,6 @@
"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
-"crackers to remotely gain access to the operating system</a> and install "
-"programs, view and delete data, or even create new user accounts with full "
-"user rights."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The security research firm accidentally leaked instructions on how the flaw "
-"could be exploited but Windows users should still wait for Microsoft to fix "
-"the flaw, if they fix it."
-msgstr ""
-
#. type: Content of: <div><p>
#, fuzzy
#| msgid "<a href=\"/proprietary/malware-mobiles.html\">Mobiles</a>"
Index: proprietary/po/proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.307
retrieving revision 1.308
diff -u -b -r1.307 -r1.308
--- proprietary/po/proprietary.nl-diff.html 15 Sep 2021 06:03:46 -0000
1.307
+++ proprietary/po/proprietary.nl-diff.html 20 Sep 2021 11:36:13 -0000
1.308
@@ -58,21 +58,21 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
}
-#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration:
none;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC a:hover { text-decoration: underline; }
+#TOC a { text-decoration: none; }
+#TOC a:hover { text-decoration: underline; }
-->
</style>
<style type="text/css" media="print,screen">
- .reduced-width { width: 55em; }
-</style></em></ins></span>
+ .reduced-width { width: 55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<span class="inserted"><ins><em><div
class="reduced-width"></em></ins></span>
@@ -223,13 +223,27 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202109170">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-09</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Apple has made it <a
+
href="https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238">
+ impossible to load Navalny's tactical voting app into an iPhone</a>
+ in Russia.</p>
+
+ <p>It is impossible because (1) the iPhone refuses to load apps
+ from anywhere other than Apple, and (2) Apple has obeyed a Russian
+ censorship law. The first point is enforced by Apple's nonfree
+ software.</p>
+ </li>
+
<li id="M202108170">
<!--#set var="DATE" value='<small
class="date-tag">2021-08</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Various models of security cameras, DVRs,
and baby monitors that run proprietary software <a
href="https://www.wired.com/story/kalay-iot-bug-video-feeds/">are
- exploited by a security vulnerability that could give attackers access
+ affected by a security vulnerability that could give attackers access
to live feeds</a>.</p>
</li>
@@ -274,24 +288,6 @@
wrongly refers to crackers as “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
</li>
-
- <li id="M202107090">
- <!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>A newly found Microsoft Windows vulnerability <a
-
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/">
- can allow crackers to remotely gain access to the operating
system</a>
- and install programs, view and delete data, or even create new user
- accounts with full user rights.</p>
-
- <p>The security research firm accidentally leaked instructions on
- how the flaw could be exploited but Windows users should still wait
- for Microsoft to fix the flaw, if they fix it.</p>
-
- <p><small>Please note that the article
- wrongly refers to crackers as “<a
-
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -355,7 +351,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/09/15 06:03:46 $
+$Date: 2021/09/20 11:36:13 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.296
retrieving revision 1.297
diff -u -b -r1.296 -r1.297
--- proprietary/po/proprietary.nl.po 15 Sep 2021 06:03:46 -0000 1.296
+++ proprietary/po/proprietary.nl.po 20 Sep 2021 11:36:13 -0000 1.297
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
"Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -388,9 +388,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-"
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law. The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Various models of security cameras, DVRs, and baby monitors that run "
"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
-"video-feeds/\">are exploited by a security vulnerability that could give "
+"video-feeds/\">are affected by a security vulnerability that could give "
"attackers access to live feeds</a>."
msgstr ""
@@ -441,22 +455,6 @@
"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
-"crackers to remotely gain access to the operating system</a> and install "
-"programs, view and delete data, or even create new user accounts with full "
-"user rights."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The security research firm accidentally leaked instructions on how the flaw "
-"could be exploited but Windows users should still wait for Microsoft to fix "
-"the flaw, if they fix it."
-msgstr ""
-
#. type: Content of: <div><p>
# | <a [-href=\"/proprietary/malware-mobiles.html\">Mobiles</a>-]
# | {+href=\"/proprietary/all.html\">More items…</a>+}
Index: proprietary/po/proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.323
retrieving revision 1.324
diff -u -b -r1.323 -r1.324
--- proprietary/po/proprietary.pl-diff.html 15 Sep 2021 06:03:46 -0000
1.323
+++ proprietary/po/proprietary.pl-diff.html 20 Sep 2021 11:36:13 -0000
1.324
@@ -28,10 +28,10 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%; width: max-content;
overflow: auto;
border: .2em solid #e0dfda;
@@ -56,7 +56,7 @@
#TOC ul { padding-top: .5em; margin: 0; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom:
.5em; margin: 0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
@@ -64,7 +64,7 @@
text-decoration: none;
}
#TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline;</em></ins></span> }
+#TOC a:hover</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -121,8 +121,8 @@
<hr class="thin" />
</div>
-<p>As</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>July, 2021, the pages in this directory list
around 500
-instances of malicious functionalities (with more than 610 references to
+<p>As of July, 2021, the pages in this directory list around 500
+instances</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>malicious functionalities (with more than 610
references to
back them up), but there are surely thousands more we don't know
about.</p>
<p>If you want to be notified when we add new items or make other
changes,
@@ -166,19 +166,19 @@
<td></em></ins></span>
<ul>
<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
- <li><a
href="/proprietary/malware-cars.html">Cars</a></li>
- <li><a
href="/proprietary/malware-games.html">Games</a></li>
- <li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li>
- <li><a
href="/proprietary/malware-webpages.html">Webpages</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html">Conferencing</a></li>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html">Conferencing</a></li>
</ul>
<ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li>
+ <li><a
href="/proprietary/malware-amazon.html">Amazon</a></li>
+ <li><a
href="/proprietary/malware-apple.html">Apple</a></li>
+ <li><a
href="/proprietary/malware-google.html">Google</a></li>
+ <li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
</tr>
@@ -222,13 +222,27 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202109170">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-09</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Apple has made it <a
+
href="https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238">
+ impossible to load Navalny's tactical voting app into an iPhone</a>
+ in Russia.</p>
+
+ <p>It is impossible because (1) the iPhone refuses to load apps
+ from anywhere other than Apple, and (2) Apple has obeyed a Russian
+ censorship law. The first point is enforced by Apple's nonfree
+ software.</p>
+ </li>
+
<li id="M202108170">
<!--#set var="DATE" value='<small
class="date-tag">2021-08</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Various models of security cameras, DVRs,
and baby monitors that run proprietary software <a
href="https://www.wired.com/story/kalay-iot-bug-video-feeds/">are
- exploited by a security vulnerability that could give attackers access
+ affected by a security vulnerability that could give attackers access
to live feeds</a>.</p>
</li>
@@ -273,24 +287,6 @@
wrongly refers to crackers as “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
</li>
-
- <li id="M202107090">
- <!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>A newly found Microsoft Windows vulnerability <a
-
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/">
- can allow crackers to remotely gain access to the operating
system</a>
- and install programs, view and delete data, or even create new user
- accounts with full user rights.</p>
-
- <p>The security research firm accidentally leaked instructions on
- how the flaw could be exploited but Windows users should still wait
- for Microsoft to fix the flaw, if they fix it.</p>
-
- <p><small>Please note that the article
- wrongly refers to crackers as “<a
-
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -354,7 +350,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/09/15 06:03:46 $
+$Date: 2021/09/20 11:36:13 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.288
retrieving revision 1.289
diff -u -b -r1.288 -r1.289
--- proprietary/po/proprietary.pl.po 15 Sep 2021 06:03:46 -0000 1.288
+++ proprietary/po/proprietary.pl.po 20 Sep 2021 11:36:13 -0000 1.289
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -569,9 +569,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-"
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law. The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Various models of security cameras, DVRs, and baby monitors that run "
"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
-"video-feeds/\">are exploited by a security vulnerability that could give "
+"video-feeds/\">are affected by a security vulnerability that could give "
"attackers access to live feeds</a>."
msgstr ""
@@ -622,22 +636,6 @@
"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
-"crackers to remotely gain access to the operating system</a> and install "
-"programs, view and delete data, or even create new user accounts with full "
-"user rights."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The security research firm accidentally leaked instructions on how the flaw "
-"could be exploited but Windows users should still wait for Microsoft to fix "
-"the flaw, if they fix it."
-msgstr ""
-
#. type: Content of: <div><p>
# | <a [-href=\"/philosophy/malware-mobiles.html\">Malware in mobile
# | devices</a>-] {+href=\"/proprietary/all.html\">More items…</a>+}
Index: proprietary/po/proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.285
retrieving revision 1.286
diff -u -b -r1.285 -r1.286
--- proprietary/po/proprietary.pot 15 Sep 2021 06:03:46 -0000 1.285
+++ proprietary/po/proprietary.pot 20 Sep 2021 11:36:13 -0000 1.286
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -280,11 +280,26 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Apple has made it <a "
+"href=\"https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238\">
"
+"impossible to load Navalny's tactical voting app into an iPhone</a> in "
+"Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law. The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Various models of security cameras, DVRs, and baby monitors that run "
"proprietary software <a "
-"href=\"https://www.wired.com/story/kalay-iot-bug-video-feeds/\">are "
-"exploited by a security vulnerability that could give attackers access to "
-"live feeds</a>."
+"href=\"https://www.wired.com/story/kalay-iot-bug-video-feeds/\">are affected "
+"by a security vulnerability that could give attackers access to live "
+"feeds</a>."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -333,22 +348,6 @@
"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"A newly found Microsoft Windows vulnerability <a "
-"href=\"https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">
"
-"can allow crackers to remotely gain access to the operating system</a> and "
-"install programs, view and delete data, or even create new user accounts "
-"with full user rights."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The security research firm accidentally leaked instructions on how the flaw "
-"could be exploited but Windows users should still wait for Microsoft to fix "
-"the flaw, if they fix it."
-msgstr ""
-
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr ""
Index: proprietary/po/proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.453
retrieving revision 1.454
diff -u -b -r1.453 -r1.454
--- proprietary/po/proprietary.pt-br.po 15 Sep 2021 06:03:46 -0000 1.453
+++ proprietary/po/proprietary.pt-br.po 20 Sep 2021 11:36:13 -0000 1.454
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
"PO-Revision-Date: 2021-06-13 12:11-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -336,9 +336,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-"
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law. The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Various models of security cameras, DVRs, and baby monitors that run "
"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
-"video-feeds/\">are exploited by a security vulnerability that could give "
+"video-feeds/\">are affected by a security vulnerability that could give "
"attackers access to live feeds</a>."
msgstr ""
@@ -413,30 +427,6 @@
"como â<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>â.)</"
"small>"
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
-"crackers to remotely gain access to the operating system</a> and install "
-"programs, view and delete data, or even create new user accounts with full "
-"user rights."
-msgstr ""
-"Uma vulnerabilidade recém-descoberta no Microsoft Windows <a href=\"https://"
-"edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> pode "
-"permitir que <em>crackers</em> obtenham acesso remoto ao sistema "
-"operacional</a> e instalem programas, visualizem e excluam dados ou até "
-"mesmo criem novas contas de usuário com direitos totais de usuário."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The security research firm accidentally leaked instructions on how the flaw "
-"could be exploited but Windows users should still wait for Microsoft to fix "
-"the flaw, if they fix it."
-msgstr ""
-"A empresa de pesquisa de segurança vazou acidentalmente instruções sobre "
-"como a falha poderia ser explorada, mas os usuários do Windows ainda devem "
-"esperar que a Microsoft conserte a falha, se ela consertar."
-
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr "<a href=\"/proprietary/all.html\">Mais itensâ¦</a>"
@@ -512,6 +502,29 @@
msgstr "Ãltima atualização:"
#~ msgid ""
+#~ "A newly found Microsoft Windows vulnerability <a href=\"https://edition."
+#~ "cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
+#~ "crackers to remotely gain access to the operating system</a> and install "
+#~ "programs, view and delete data, or even create new user accounts with "
+#~ "full user rights."
+#~ msgstr ""
+#~ "Uma vulnerabilidade recém-descoberta no Microsoft Windows <a href="
+#~ "\"https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-"
+#~ "printnightmare/\"> pode permitir que <em>crackers</em> obtenham acesso "
+#~ "remoto ao sistema operacional</a> e instalem programas, visualizem e "
+#~ "excluam dados ou até mesmo criem novas contas de usuário com direitos "
+#~ "totais de usuário."
+
+#~ msgid ""
+#~ "The security research firm accidentally leaked instructions on how the "
+#~ "flaw could be exploited but Windows users should still wait for Microsoft "
+#~ "to fix the flaw, if they fix it."
+#~ msgstr ""
+#~ "A empresa de pesquisa de segurança vazou acidentalmente instruções
sobre "
+#~ "como a falha poderia ser explorada, mas os usuários do Windows ainda "
+#~ "devem esperar que a Microsoft conserte a falha, se ela consertar."
+
+#~ msgid ""
#~ "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-"
#~ "targeted-dream-incubation\"> Advertising companies are experimenting to "
#~ "manipulate people's minds</a>, and impose a new way of advertising by "
Index: proprietary/po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.551
retrieving revision 1.552
diff -u -b -r1.551 -r1.552
--- proprietary/po/proprietary.ru.po 16 Sep 2021 09:02:58 -0000 1.551
+++ proprietary/po/proprietary.ru.po 20 Sep 2021 11:36:13 -0000 1.552
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-20 11:26+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -340,9 +341,34 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-"
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law. The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+# | Various models of security cameras, DVRs, and baby monitors that run
+# | proprietary software <a
+# | href=\"https://www.wired.com/story/kalay-iot-bug-video-feeds/\">are
+# | [-exploited-] {+affected+} by a security vulnerability that could give
+# | attackers access to live feeds</a>.
+#, fuzzy
+#| msgid ""
+#| "Various models of security cameras, DVRs, and baby monitors that run "
+#| "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+#| "video-feeds/\">are exploited by a security vulnerability that could give "
+#| "attackers access to live feeds</a>."
+msgid ""
"Various models of security cameras, DVRs, and baby monitors that run "
"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
-"video-feeds/\">are exploited by a security vulnerability that could give "
+"video-feeds/\">are affected by a security vulnerability that could give "
"attackers access to live feeds</a>."
msgstr ""
"РазлиÑнÑе модели ÐºÐ°Ð¼ÐµÑ Ð¾Ñ
ÑÐ°Ð½Ñ Ð¸
наблÑÐ´ÐµÐ½Ð¸Ñ Ð·Ð° гÑÑднÑми деÑÑми, ÑабоÑаÑÑими
"
@@ -421,31 +447,6 @@
"html#Hacker\">“Ñ
акеÑÑ”</a> невеÑно
иÑполÑзÑеÑÑÑ Ð´Ð»Ñ Ð¾Ð±Ð¾Ð·Ð½Ð°ÑÐµÐ½Ð¸Ñ "
"взломÑиков.</small>"
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
-"crackers to remotely gain access to the operating system</a> and install "
-"programs, view and delete data, or even create new user accounts with full "
-"user rights."
-msgstr ""
-"Ðедавно обнаÑÑÐ¶ÐµÐ½Ð½Ð°Ñ ÑÑзвимоÑÑÑ Microsoft
Windows <a href=\"https://edition."
-"cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> Ð¼Ð¾Ð¶ÐµÑ "
-"позволÑÑÑ Ð²Ð·Ð»Ð¾Ð¼Ñикам полÑÑаÑÑ ÑдаленнÑй
доÑÑÑп к опеÑаÑионной ÑиÑÑеме</a> и "
-"ÑÑÑанавливаÑÑ Ð¿ÑогÑаммÑ, пÑоÑмаÑÑиваÑÑ Ð¸
ÑдалÑÑÑ Ð´Ð°Ð½Ð½Ñе и даже ÑоздаваÑÑ "
-"новÑе ÑÑеÑнÑе запиÑи Ñ Ð¿Ð¾Ð»Ð½Ñми
полÑзоваÑелÑÑкими пÑавами."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The security research firm accidentally leaked instructions on how the flaw "
-"could be exploited but Windows users should still wait for Microsoft to fix "
-"the flaw, if they fix it."
-msgstr ""
-"Ðз ÑиÑмÑ, занимаÑÑейÑÑ Ð¸ÑÑледованиÑми
безопаÑноÑÑи, ÑлÑÑайно пÑоизоÑла "
-"ÑÑеÑка инÑÑÑÑкÑий о Ñом, как можно
воÑполÑзоваÑÑÑÑ Ð¿ÑоÑеÑ
ой, но полÑзоваÑели "
-"Windows вÑе Ñавно Ð´Ð¾Ð»Ð¶Ð½Ñ Ð¶Ð´Ð°ÑÑ, пока Microsoft ее
ÑÑÑÑаниÑ, еÑли они вообÑе "
-"ÑÑо ÑделаÑÑ."
-
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr "<a href=\"/proprietary/all.html\">Ðалее...</a>"
@@ -523,6 +524,29 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "A newly found Microsoft Windows vulnerability <a href=\"https://edition."
+#~ "cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
+#~ "crackers to remotely gain access to the operating system</a> and install "
+#~ "programs, view and delete data, or even create new user accounts with "
+#~ "full user rights."
+#~ msgstr ""
+#~ "Ðедавно обнаÑÑÐ¶ÐµÐ½Ð½Ð°Ñ ÑÑзвимоÑÑÑ Microsoft
Windows <a href=\"https://"
+#~ "edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> "
+#~ "Ð¼Ð¾Ð¶ÐµÑ Ð¿Ð¾Ð·Ð²Ð¾Ð»ÑÑÑ Ð²Ð·Ð»Ð¾Ð¼Ñикам полÑÑаÑÑ
ÑдаленнÑй доÑÑÑп к опеÑаÑионной "
+#~ "ÑиÑÑеме</a> и ÑÑÑанавливаÑÑ Ð¿ÑогÑаммÑ,
пÑоÑмаÑÑиваÑÑ Ð¸ ÑдалÑÑÑ Ð´Ð°Ð½Ð½Ñе и "
+#~ "даже ÑоздаваÑÑ Ð½Ð¾Ð²Ñе ÑÑеÑнÑе запиÑи Ñ
полнÑми полÑзоваÑелÑÑкими пÑавами."
+
+#~ msgid ""
+#~ "The security research firm accidentally leaked instructions on how the "
+#~ "flaw could be exploited but Windows users should still wait for Microsoft "
+#~ "to fix the flaw, if they fix it."
+#~ msgstr ""
+#~ "Ðз ÑиÑмÑ, занимаÑÑейÑÑ Ð¸ÑÑледованиÑми
безопаÑноÑÑи, ÑлÑÑайно пÑоизоÑла "
+#~ "ÑÑеÑка инÑÑÑÑкÑий о Ñом, как можно
воÑполÑзоваÑÑÑÑ Ð¿ÑоÑеÑ
ой, но "
+#~ "полÑзоваÑели Windows вÑе Ñавно должнÑ
ждаÑÑ, пока Microsoft ее ÑÑÑÑаниÑ, "
+#~ "еÑли они вообÑе ÑÑо ÑделаÑÑ."
+
+#~ msgid ""
#~ "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-"
#~ "targeted-dream-incubation\"> Advertising companies are experimenting to "
#~ "manipulate people's minds</a>, and impose a new way of advertising by "
Index: proprietary/po/proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.200
retrieving revision 1.201
diff -u -b -r1.200 -r1.201
--- proprietary/po/proprietary.tr.po 18 Sep 2021 06:36:58 -0000 1.200
+++ proprietary/po/proprietary.tr.po 20 Sep 2021 11:36:13 -0000 1.201
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
"PO-Revision-Date: 2021-09-18 08:34+0200\n"
"Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
"Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-20 11:26+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"X-Generator: Poedit 2.4.2\n"
@@ -336,9 +337,29 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-"
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law. The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Various models of security cameras, DVRs, and baby monitors that run "
+#| "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+#| "video-feeds/\">are exploited by a security vulnerability that could give "
+#| "attackers access to live feeds</a>."
+msgid ""
"Various models of security cameras, DVRs, and baby monitors that run "
"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
-"video-feeds/\">are exploited by a security vulnerability that could give "
+"video-feeds/\">are affected by a security vulnerability that could give "
"attackers access to live feeds</a>."
msgstr ""
"Ãzel mülk yazılım içeren çeÅitli güvenlik kamerası, dijital kayıt
cihazı ve "
@@ -417,30 +438,6 @@
"philosophy/words-to-avoid.html#Hacker\">üstât (hacker)</a>\" olarak "
"adlandırmaktır.</small>"
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
-"crackers to remotely gain access to the operating system</a> and install "
-"programs, view and delete data, or even create new user accounts with full "
-"user rights."
-msgstr ""
-"Yeni keÅfedilen bir Windows açıÄı <a href=\"https://edition.cnn."
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">kırıcıların "
-"iÅletim sistemine uzaktan eriÅmesine izin veriyor</a> ve böylece program "
-"kurabiliyorlar, veriyi görüp silebiliyorlar veya bütün haklarıyla yeni
bir "
-"kullanıcı oluÅturabiliyorlar."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The security research firm accidentally leaked instructions on how the flaw "
-"could be exploited but Windows users should still wait for Microsoft to fix "
-"the flaw, if they fix it."
-msgstr ""
-"Güvenlik araÅtırma Åirketi, açıktan nasıl yararlanılabileceÄini
kazara "
-"sızdırdı ancak Windows kullanıcıları yine de Microsoft'un (elbette
eÄer "
-"onaracaksa) açıÄı onarmasını beklemek zorunda."
-
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr "<a href=\"/proprietary/all.html\">Daha fazlası…</a>"
@@ -522,6 +519,28 @@
msgstr "Son Güncelleme:"
#~ msgid ""
+#~ "A newly found Microsoft Windows vulnerability <a href=\"https://edition."
+#~ "cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
+#~ "crackers to remotely gain access to the operating system</a> and install "
+#~ "programs, view and delete data, or even create new user accounts with "
+#~ "full user rights."
+#~ msgstr ""
+#~ "Yeni keÅfedilen bir Windows açıÄı <a href=\"https://edition.cnn."
+#~ "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">kırıcıların
"
+#~ "iÅletim sistemine uzaktan eriÅmesine izin veriyor</a> ve böylece
program "
+#~ "kurabiliyorlar, veriyi görüp silebiliyorlar veya bütün haklarıyla
yeni "
+#~ "bir kullanıcı oluÅturabiliyorlar."
+
+#~ msgid ""
+#~ "The security research firm accidentally leaked instructions on how the "
+#~ "flaw could be exploited but Windows users should still wait for Microsoft "
+#~ "to fix the flaw, if they fix it."
+#~ msgstr ""
+#~ "Güvenlik araÅtırma Åirketi, açıktan nasıl yararlanılabileceÄini
kazara "
+#~ "sızdırdı ancak Windows kullanıcıları yine de Microsoft'un (elbette
eÄer "
+#~ "onaracaksa) açıÄı onarmasını beklemek zorunda."
+
+#~ msgid ""
#~ "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-"
#~ "targeted-dream-incubation\"> Advertising companies are experimenting to "
#~ "manipulate people's minds</a>, and impose a new way of advertising by "
Index: proprietary/po/proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.251
retrieving revision 1.252
diff -u -b -r1.251 -r1.252
--- proprietary/po/proprietary.zh-cn.po 15 Sep 2021 09:32:56 -0000 1.251
+++ proprietary/po/proprietary.zh-cn.po 20 Sep 2021 11:36:13 -0000 1.252
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
"PO-Revision-Date: 2021-09-15 16:58+0800\n"
"Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
"Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-09-20 11:26+0000\n"
"X-Generator: Poedit 2.3\n"
#. type: Content of: <title>
@@ -315,9 +316,29 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-"
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law. The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Various models of security cameras, DVRs, and baby monitors that run "
+#| "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+#| "video-feeds/\">are exploited by a security vulnerability that could give "
+#| "attackers access to live feeds</a>."
+msgid ""
"Various models of security cameras, DVRs, and baby monitors that run "
"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
-"video-feeds/\">are exploited by a security vulnerability that could give "
+"video-feeds/\">are affected by a security vulnerability that could give "
"attackers access to live feeds</a>."
msgstr ""
"å¤ç§åå·çå®ä¿æå头ãDVR
åå©´å¿çæ¤è®¾å¤è¿è¡çä¸æ软件ï¼å®ä»¬ç <a href="
@@ -388,27 +409,6 @@
"<small>请注æï¼æ¬æé误å°å°“<a
href=\"/philosophy/words-to-avoid."
"html#Hacker\">é»å®¢</a>”ä¸è¯å½æéªå®¢æ¥ç¨ã</small>"
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
-"crackers to remotely gain access to the operating system</a> and install "
-"programs, view and delete data, or even create new user accounts with full "
-"user rights."
-msgstr ""
-"ä¸ä¸ªæ°åç°ç微软 Windows æ¼æ´ <a
href=\"https://edition.cnn.com/2021/07/08/"
-"tech/microsoft-windows-10-printnightmare/\">
让éªå®¢è½å¤è¿ç¨è·å¾æä½ç³»ç»çæé"
-"</a> 并å®è£
ç¨åºãæ¥çåå é¤æ°æ®ï¼çè³å建å
·æå®æ´æéçæ°è´¦æ·ã"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The security research firm accidentally leaked instructions on how the flaw "
-"could be exploited but Windows users should still wait for Microsoft to fix "
-"the flaw, if they fix it."
-msgstr ""
-"å®å
¨ç
究æºææå¤æ³æ¼äºå¦ä½å©ç¨è¯¥æ¼æ´çæä½æ¥éª¤ï¼ä½æ¯ Windows
ç¨æ·è¿å¨çå¾
微软"
-"对æ¤çä¿®å¤ï¼æè
æ¯å¦ä¿®å¤ã"
-
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr "<a href=\"/proprietary/all.html\">æ´å¤å
容…</a>"
@@ -484,6 +484,26 @@
msgstr "æåæ´æ°ï¼"
#~ msgid ""
+#~ "A newly found Microsoft Windows vulnerability <a href=\"https://edition."
+#~ "cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
+#~ "crackers to remotely gain access to the operating system</a> and install "
+#~ "programs, view and delete data, or even create new user accounts with "
+#~ "full user rights."
+#~ msgstr ""
+#~ "ä¸ä¸ªæ°åç°ç微软 Windows æ¼æ´ <a href=\"https://edition.cnn."
+#~ "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\">
让éªå®¢è½å¤è¿ç¨"
+#~ "è·å¾æä½ç³»ç»çæé</a> 并å®è£
ç¨åºãæ¥çåå
é¤æ°æ®ï¼çè³å建å
·æå®æ´æéç"
+#~ "æ°è´¦æ·ã"
+
+#~ msgid ""
+#~ "The security research firm accidentally leaked instructions on how the "
+#~ "flaw could be exploited but Windows users should still wait for Microsoft "
+#~ "to fix the flaw, if they fix it."
+#~ msgstr ""
+#~ "å®å
¨ç
究æºææå¤æ³æ¼äºå¦ä½å©ç¨è¯¥æ¼æ´çæä½æ¥éª¤ï¼ä½æ¯ Windows
ç¨æ·è¿å¨çå¾
"
+#~ "微软对æ¤çä¿®å¤ï¼æè
æ¯å¦ä¿®å¤ã"
+
+#~ msgid ""
#~ "<a href=\"https://www.theguardian.com/media/2021/jul/05/advertisers-"
#~ "targeted-dream-incubation\"> Advertising companies are experimenting to "
#~ "manipulate people's minds</a>, and impose a new way of advertising by "
Index: proprietary/po/proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.286
retrieving revision 1.287
diff -u -b -r1.286 -r1.287
--- proprietary/po/proprietary.zh-tw-diff.html 15 Sep 2021 06:03:46 -0000
1.286
+++ proprietary/po/proprietary.zh-tw-diff.html 20 Sep 2021 11:36:13 -0000
1.287
@@ -58,21 +58,21 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
}
-#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration:
none;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC a:hover { text-decoration: underline; }
+#TOC a { text-decoration: none; }
+#TOC a:hover { text-decoration: underline; }
-->
</style>
<style type="text/css" media="print,screen">
- .reduced-width { width: 55em; }
-</style></em></ins></span>
+ .reduced-width { width: 55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<span class="inserted"><ins><em><div
class="reduced-width"></em></ins></span>
@@ -137,19 +137,19 @@
</tr>
<tr>
<td>
- <ul class="columns">
- <li><a
href="/proprietary/proprietary-addictions.html">Addictions</a></li>
- <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
+ <ul class="columns"></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li>
+ <li><a
href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
+ <li><a
href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
<li><a
href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
<li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
<li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
@@ -200,10 +200,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -224,13 +224,27 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202109170">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-09</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Apple has made it <a
+
href="https://gizmodo.com/apple-and-google-pull-opposition-app-from-russian-store-1847695238">
+ impossible to load Navalny's tactical voting app into an iPhone</a>
+ in Russia.</p>
+
+ <p>It is impossible because (1) the iPhone refuses to load apps
+ from anywhere other than Apple, and (2) Apple has obeyed a Russian
+ censorship law. The first point is enforced by Apple's nonfree
+ software.</p>
+ </li>
+
<li id="M202108170">
<!--#set var="DATE" value='<small
class="date-tag">2021-08</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Various models of security cameras, DVRs,
and baby monitors that run proprietary software <a
href="https://www.wired.com/story/kalay-iot-bug-video-feeds/">are
- exploited by a security vulnerability that could give attackers access
+ affected by a security vulnerability that could give attackers access
to live feeds</a>.</p>
</li>
@@ -275,24 +289,6 @@
wrongly refers to crackers as “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
</li>
-
- <li id="M202107090">
- <!--#set var="DATE" value='<small
class="date-tag">2021-07</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>A newly found Microsoft Windows vulnerability <a
-
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/">
- can allow crackers to remotely gain access to the operating
system</a>
- and install programs, view and delete data, or even create new user
- accounts with full user rights.</p>
-
- <p>The security research firm accidentally leaked instructions on
- how the flaw could be exploited but Windows users should still wait
- for Microsoft to fix the flaw, if they fix it.</p>
-
- <p><small>Please note that the article
- wrongly refers to crackers as “<a
-
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -356,7 +352,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/09/15 06:03:46 $
+$Date: 2021/09/20 11:36:13 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.275
retrieving revision 1.276
diff -u -b -r1.275 -r1.276
--- proprietary/po/proprietary.zh-tw.po 15 Sep 2021 06:03:46 -0000 1.275
+++ proprietary/po/proprietary.zh-tw.po 20 Sep 2021 11:36:13 -0000 1.276
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
"PO-Revision-Date: 2020-02-08 17:12+0800\n"
"Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
"Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -458,9 +458,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-"
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law. The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Various models of security cameras, DVRs, and baby monitors that run "
"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
-"video-feeds/\">are exploited by a security vulnerability that could give "
+"video-feeds/\">are affected by a security vulnerability that could give "
"attackers access to live feeds</a>."
msgstr ""
@@ -511,22 +525,6 @@
"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn."
-"com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
-"crackers to remotely gain access to the operating system</a> and install "
-"programs, view and delete data, or even create new user accounts with full "
-"user rights."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The security research firm accidentally leaked instructions on how the flaw "
-"could be exploited but Windows users should still wait for Microsoft to fix "
-"the flaw, if they fix it."
-msgstr ""
-
#. type: Content of: <div><p>
# | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
# | devices</a>-] {+href=\"/proprietary/all.html\">More items…</a>+}
Index: proprietary/po/pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.423
retrieving revision 1.424
diff -u -b -r1.423 -r1.424
--- proprietary/po/pt-br.po 15 Sep 2021 06:03:47 -0000 1.423
+++ proprietary/po/pt-br.po 20 Sep 2021 11:36:13 -0000 1.424
@@ -508,6 +508,20 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-"
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law. The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Various models of security cameras, DVRs, and baby monitors that run "
"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
"video-feeds/\">are exploited by a security vulnerability that could give "
@@ -12171,6 +12185,14 @@
"liberdade)</a>. Uma vez que o software livre é controlado por seus
usuários, "
"eles têm uma boa defesa contra a funcionalidade de software maliciosa."
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+"video-feeds/\">are affected by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr "<a href=\"/proprietary/all.html\">Mais itensâ¦</a>"
Index: proprietary/po/ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.710
retrieving revision 1.711
diff -u -b -r1.710 -r1.711
--- proprietary/po/ru.po 16 Sep 2021 07:35:29 -0000 1.710
+++ proprietary/po/ru.po 20 Sep 2021 11:36:13 -0000 1.711
@@ -509,15 +509,29 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-"
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law. The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Various models of security cameras, DVRs, and baby monitors that run "
"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
"video-feeds/\">are exploited by a security vulnerability that could give "
"attackers access to live feeds</a>."
msgstr ""
"РазлиÑнÑе модели ÐºÐ°Ð¼ÐµÑ Ð¾Ñ
ÑÐ°Ð½Ñ Ð¸
наблÑÐ´ÐµÐ½Ð¸Ñ Ð·Ð° гÑÑднÑми деÑÑми, ÑабоÑаÑÑими
"
-"под ÑпÑавлением неÑвободнÑÑ
пÑогÑамм, <a
href=\"https://www.wired.com/story/kalay-iot-bug-"
-"video-feeds/\">ÑодеÑÐ¶Ð°Ñ ÑÑзвимоÑÑÑ, коÑоÑаÑ
могла Ð±Ñ Ð¿Ð¾Ð·Ð²Ð¾Ð»Ð¸ÑÑ Ð·Ð»Ð¾ÑмÑÑленникам "
-"полÑÑиÑÑ Ð´Ð¾ÑÑÑп к видеопоÑокÑ</a>."
+"под ÑпÑавлением неÑвободнÑÑ
пÑогÑамм, <a
href=\"https://www.wired.com/story/"
+"kalay-iot-bug-video-feeds/\">ÑодеÑÐ¶Ð°Ñ ÑÑзвимоÑÑÑ,
коÑоÑÐ°Ñ Ð¼Ð¾Ð³Ð»Ð° Ð±Ñ Ð¿Ð¾Ð·Ð²Ð¾Ð»Ð¸ÑÑ "
+"злоÑмÑÑленникам полÑÑиÑÑ Ð´Ð¾ÑÑÑп к
видеопоÑокÑ</a>."
#. type: Content of: <div><ul><li><p>
msgid ""
@@ -12330,6 +12344,29 @@
"пÑогÑаммаÑ
</a>. ÐоÑколÑÐºÑ ÑвободнÑе
пÑогÑÐ°Ð¼Ð¼Ñ ÐºÐ¾Ð½ÑÑолиÑÑÑÑÑÑ Ð¿Ð¾Ð»ÑзоваÑелÑми, "
"они доволÑно Ñ
оÑоÑо заÑиÑÐµÐ½Ñ Ð¾Ñ
вÑедоноÑной ÑÑнкÑионалÑноÑÑи."
+#. type: Content of: <div><ul><li><p>
+# | Various models of security cameras, DVRs, and baby monitors that run
+# | proprietary software <a
+# | href=\"https://www.wired.com/story/kalay-iot-bug-video-feeds/\">are
+# | [-exploited-] {+affected+} by a security vulnerability that could give
+# | attackers access to live feeds</a>.
+#, fuzzy
+#| msgid ""
+#| "Various models of security cameras, DVRs, and baby monitors that run "
+#| "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+#| "video-feeds/\">are exploited by a security vulnerability that could give "
+#| "attackers access to live feeds</a>."
+msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+"video-feeds/\">are affected by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+"РазлиÑнÑе модели ÐºÐ°Ð¼ÐµÑ Ð¾Ñ
ÑÐ°Ð½Ñ Ð¸
наблÑÐ´ÐµÐ½Ð¸Ñ Ð·Ð° гÑÑднÑми деÑÑми, ÑабоÑаÑÑими
"
+"под ÑпÑавлением неÑвободнÑÑ
пÑогÑамм, <a
href=\"https://www.wired.com/story/"
+"kalay-iot-bug-video-feeds/\">ÑодеÑÐ¶Ð°Ñ ÑÑзвимоÑÑÑ,
коÑоÑÐ°Ñ Ð¼Ð¾Ð³Ð»Ð° Ð±Ñ Ð¿Ð¾Ð·Ð²Ð¾Ð»Ð¸ÑÑ "
+"злоÑмÑÑленникам полÑÑиÑÑ Ð´Ð¾ÑÑÑп к
видеопоÑокÑ</a>."
+
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr "<a href=\"/proprietary/all.html\">Ðалее...</a>"
Index: proprietary/po/tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.218
retrieving revision 1.219
diff -u -b -r1.218 -r1.219
--- proprietary/po/tr.po 18 Sep 2021 07:01:32 -0000 1.218
+++ proprietary/po/tr.po 20 Sep 2021 11:36:14 -0000 1.219
@@ -414,6 +414,20 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-"
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law. The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Various models of security cameras, DVRs, and baby monitors that run "
"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
"video-feeds/\">are exploited by a security vulnerability that could give "
@@ -9585,6 +9599,24 @@
"etmektir. Ãzgür yazılım kullanıcıları tarafından kontrol
edildiÄinden kötü "
"amaçlı yazılım iÅlevselliklerine karÅı oldukça iyi bir savunmaya
sahiptirler."
+#. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Various models of security cameras, DVRs, and baby monitors that run "
+#| "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+#| "video-feeds/\">are exploited by a security vulnerability that could give "
+#| "attackers access to live feeds</a>."
+msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+"video-feeds/\">are affected by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+"Ãzel mülk yazılım içeren çeÅitli güvenlik kamerası, dijital kayıt
cihazı ve "
+"bebek monitörü modelleri, <a href=\"https://www.wired.com/story/kalay-iot-"
+"bug-video-feeds/\">saldırganların canlı yayına eriÅmesini saÄlayan bir "
+"güvenlik açıÄına sahip</a>."
+
#. type: Content of: <div><p>
#, fuzzy
#| msgid "<a href=\"/proprietary/malware-mobiles.html\">Mobiles</a>"
Index: proprietary/po/zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.219
retrieving revision 1.220
diff -u -b -r1.219 -r1.220
--- proprietary/po/zh-cn.po 15 Sep 2021 09:32:56 -0000 1.219
+++ proprietary/po/zh-cn.po 20 Sep 2021 11:36:14 -0000 1.220
@@ -414,6 +414,20 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-"
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law. The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Various models of security cameras, DVRs, and baby monitors that run "
"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
"video-feeds/\">are exploited by a security vulnerability that could give "
@@ -9210,6 +9224,23 @@
"philosophy/free-software-even-more-important.html\">èªç±ï¼å°éèªç±çï¼è½¯ä»¶</"
"a>ãç±äºèªç±è½¯ä»¶ç±å
¶ç¨æ·æ§å¶ï¼å
æ¤å®ä»¬å¯ä»¥å¾å¥½å°é²å¾¡è½¯ä»¶çæ¶æåè½ã"
+#. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Various models of security cameras, DVRs, and baby monitors that run "
+#| "proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+#| "video-feeds/\">are exploited by a security vulnerability that could give "
+#| "attackers access to live feeds</a>."
+msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+"video-feeds/\">are affected by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+"å¤ç§åå·çå®ä¿æå头ãDVR
åå©´å¿çæ¤è®¾å¤è¿è¡çä¸æ软件ï¼å®ä»¬ç <a href="
+"\"https://www.wired.com/story/kalay-iot-bug-video-feeds/\">ä¸ä¸ªå®å
¨æ¼æ´è¢«æ»å»"
+"è
å©ç¨æ¥è®¿é®ç°åºè§é¢</a>ã"
+
#. type: Content of: <div><p>
#, fuzzy
#| msgid "<a href=\"/proprietary/malware-mobiles.html\">Mobiles</a>"
Index: proprietary/po/zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.339
retrieving revision 1.340
diff -u -b -r1.339 -r1.340
--- proprietary/po/zh-tw.po 15 Sep 2021 06:03:47 -0000 1.339
+++ proprietary/po/zh-tw.po 20 Sep 2021 11:36:14 -0000 1.340
@@ -439,6 +439,20 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Apple has made it <a href=\"https://gizmodo.com/apple-and-google-pull-"
+"opposition-app-from-russian-store-1847695238\"> impossible to load Navalny's "
+"tactical voting app into an iPhone</a> in Russia."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"It is impossible because (1) the iPhone refuses to load apps from anywhere "
+"other than Apple, and (2) Apple has obeyed a Russian censorship law. The "
+"first point is enforced by Apple's nonfree software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Various models of security cameras, DVRs, and baby monitors that run "
"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
"video-feeds/\">are exploited by a security vulnerability that could give "
@@ -8887,6 +8901,14 @@
"</a>å çºèªç±è»é«æ¯ç±ä½¿ç¨è
èªä¸»ææ§ï¼å
æ¤è½å°æ¡æçè»é«åè½èµ·ç¸ç¶å¤§çä¿è·æ"
"æã"
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Various models of security cameras, DVRs, and baby monitors that run "
+"proprietary software <a href=\"https://www.wired.com/story/kalay-iot-bug-"
+"video-feeds/\">are affected by a security vulnerability that could give "
+"attackers access to live feeds</a>."
+msgstr ""
+
#. type: Content of: <div><p>
# | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
# | devices</a>-] {+href=\"/proprietary/all.html\">More items…</a>+}
Index: thankgnus/po/2021supporters.pot
===================================================================
RCS file: /web/www/www/thankgnus/po/2021supporters.pot,v
retrieving revision 1.89
retrieving revision 1.90
diff -u -b -r1.89 -r1.90
--- thankgnus/po/2021supporters.pot 15 Sep 2021 06:03:49 -0000 1.89
+++ thankgnus/po/2021supporters.pot 20 Sep 2021 11:36:14 -0000 1.90
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: 2021supporters.html\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -83,6 +83,10 @@
msgstr ""
#. type: Content of: <ul><li>
+msgid "Adam Jung"
+msgstr ""
+
+#. type: Content of: <ul><li>
msgid "Anonymous Anonymous"
msgstr ""
@@ -117,6 +121,10 @@
msgstr ""
#. type: Content of: <ul><li>
+msgid "Benjamin Smith"
+msgstr ""
+
+#. type: Content of: <ul><li>
msgid "Brett Sears"
msgstr ""
@@ -237,6 +245,10 @@
msgstr ""
#. type: Content of: <ul><li>
+msgid "The Huisking Foundation, Inc."
+msgstr ""
+
+#. type: Content of: <ul><li>
msgid "Yuchen Pei, in honor of RMS"
msgstr ""
@@ -431,6 +443,10 @@
msgstr ""
#. type: Content of: <ul><li>
+msgid "Mathew Woodyard"
+msgstr ""
+
+#. type: Content of: <ul><li>
msgid "Matomo.org"
msgstr ""
@@ -543,7 +559,7 @@
msgstr ""
#. type: Content of: <ul><li>
-msgid "WILLIAM Hill Jr."
+msgid "William Hill Jr."
msgstr ""
#. type: Content of: <ul><li>
Index: thankgnus/po/2021supporters.pt-br.po
===================================================================
RCS file: /web/www/www/thankgnus/po/2021supporters.pt-br.po,v
retrieving revision 1.141
retrieving revision 1.142
diff -u -b -r1.141 -r1.142
--- thankgnus/po/2021supporters.pt-br.po 15 Sep 2021 06:03:52 -0000
1.141
+++ thankgnus/po/2021supporters.pt-br.po 20 Sep 2021 11:36:14 -0000
1.142
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: 2021supporters.html\n"
-"POT-Creation-Date: 2021-09-15 05:55+0000\n"
+"POT-Creation-Date: 2021-09-20 11:26+0000\n"
"PO-Revision-Date: 2021-09-05 12:46-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -98,6 +98,10 @@
"<a href= \"#TOCpatrons\" id=\"patrons\">Patronos</a> (US$ 5.000,00 ou mais)"
#. type: Content of: <ul><li>
+msgid "Adam Jung"
+msgstr ""
+
+#. type: Content of: <ul><li>
msgid "Anonymous Anonymous"
msgstr "Anonymous Anonymous"
@@ -134,6 +138,10 @@
msgstr "AskApache, em homenagem a RMS e Bill Joy"
#. type: Content of: <ul><li>
+msgid "Benjamin Smith"
+msgstr ""
+
+#. type: Content of: <ul><li>
msgid "Brett Sears"
msgstr "Brett Sears"
@@ -254,6 +262,10 @@
msgstr "Takeshi Nishimatsu"
#. type: Content of: <ul><li>
+msgid "The Huisking Foundation, Inc."
+msgstr ""
+
+#. type: Content of: <ul><li>
msgid "Yuchen Pei, in honor of RMS"
msgstr "Yuchen Pei, em homenagem a RMS"
@@ -450,6 +462,10 @@
msgstr "Martin Jässing"
#. type: Content of: <ul><li>
+msgid "Mathew Woodyard"
+msgstr "Mathew Woodyard"
+
+#. type: Content of: <ul><li>
msgid "Matomo.org"
msgstr "Matomo.org"
@@ -562,7 +578,9 @@
msgstr "Valerio Poggi"
#. type: Content of: <ul><li>
-msgid "WILLIAM Hill Jr."
+#, fuzzy
+#| msgid "WILLIAM Hill Jr."
+msgid "William Hill Jr."
msgstr "WILLIAM Hill Jr."
#. type: Content of: <ul><li>
@@ -643,9 +661,6 @@
msgid "Updated:"
msgstr "Ãltima atualização:"
-#~ msgid "Mathew Woodyard"
-#~ msgstr "Mathew Woodyard"
-
#~ msgid "Andrew Auernheimer, in honor of RMS"
#~ msgstr "Andrew Auernheimer, em homenagem a RMS"