www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po malware-edtech.pot malware-e...


From: GNUN
Subject: www/proprietary/po malware-edtech.pot malware-e...
Date: Sat, 20 Nov 2021 15:31:14 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     21/11/20 15:31:14

Added files:
        proprietary/po : malware-edtech.pot malware-edtech.translist 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-edtech.pot?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-edtech.translist?cvsroot=www&rev=1.1

Patches:
Index: malware-edtech.pot
===================================================================
RCS file: malware-edtech.pot
diff -N malware-edtech.pot
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ malware-edtech.pot  20 Nov 2021 20:31:14 -0000      1.1
@@ -0,0 +1,259 @@
+# LANGUAGE translation of https://www.gnu.org/proprietary/malware-edtech.html
+# Copyright (C) YEAR Free Software Foundation, Inc.
+# This file is distributed under the same license as the original article.
+# FIRST AUTHOR <EMAIL@ADDRESS>, YEAR.
+#
+#, fuzzy
+msgid ""
+msgstr ""
+"Project-Id-Version: malware-edtech.html\n"
+"POT-Creation-Date: 2021-11-20 20:25+0000\n"
+"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
+"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
+"Language-Team: LANGUAGE <LL@li.org>\n"
+"Language: \n"
+"MIME-Version: 1.0\n"
+"Content-Type: text/plain; charset=CHARSET\n"
+"Content-Transfer-Encoding: 8bit\n"
+
+#. type: Content of: <title>
+msgid "Malware in Educational Technology - GNU Project - Free Software 
Foundation"
+msgstr ""
+
+#. type: Content of: <div><a>
+msgid "<a id=\"side-menu-button\" class=\"switch\" href=\"#navlinks\">"
+msgstr ""
+
+#. type: Attribute 'title' of: <div><a><img>
+msgid "Section contents"
+msgstr ""
+
+#. type: Attribute 'alt' of: <div><a><img>
+msgid "&nbsp;[Section contents]&nbsp;"
+msgstr ""
+
+#. type: Content of: <div>
+msgid "</a>"
+msgstr ""
+
+#. type: Content of: <div><p><a>
+msgid "<a href=\"/\">"
+msgstr ""
+
+#. type: Attribute 'title' of: <div><p><a><img>
+msgid "GNU Home"
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
+"</a>&nbsp;/ <a href=\"/proprietary/proprietary.html\">Malware</a>&nbsp;/ By "
+"product&nbsp;/"
+msgstr ""
+
+#. type: Content of: <div><h2>
+msgid "Malware in Educational Technology"
+msgstr ""
+
+#. type: Content of: <div><div><p>
+msgid ""
+"Nonfree (proprietary) software is very often malware (designed to mistreat "
+"the user). Nonfree software is controlled by its developers, which puts them "
+"in a position of power over the users; <a "
+"href=\"/philosophy/free-software-even-more-important.html\">that is the "
+"basic injustice</a>. The developers and manufacturers often exercise that "
+"power to the detriment of the users they ought to serve."
+msgstr ""
+
+#. type: Content of: <div><div><p>
+msgid "This typically takes the form of malicious functionalities."
+msgstr ""
+
+#. type: Content of: <div><div><p>
+msgid ""
+"Tech corporations have invaded the education system introducing their "
+"proprietary products filled with malware. Education is a field that allows "
+"these companies to easily spread their unjust software in all directions, "
+"infecting deeply every area of society."
+msgstr ""
+
+#. type: Content of: <div><div><p>
+msgid ""
+"<a href=\"/education/edu-team.html\">Join us</a> in the fight against the "
+"use of nonfree software in schools."
+msgstr ""
+
+#. type: Content of: <div><div><p>
+msgid ""
+"This page lists malicious functionalities found in software used in "
+"educational environments."
+msgstr ""
+
+#. type: Content of: <div><div><div><p>
+msgid ""
+"If you know of an example that ought to be in this page but isn't here, "
+"please write to <a "
+"href=\"mailto:webmasters@gnu.org\";>&lt;webmasters@gnu.org&gt;</a> to inform "
+"us. Please include the URL of a trustworthy reference or two to serve as "
+"specific substantiation."
+msgstr ""
+
+#. type: Content of: <div><div><h4>
+msgid "Latest additions"
+msgstr ""
+
+#. type: Content of: <div><div><p>
+msgid ""
+"Entries are in reverse chronological order, based on the dates of "
+"publication of linked articles. The latest additions are listed on the <a "
+"href=\"/proprietary/proprietary.html#latest\">main page</a> of the Malware "
+"section."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Ed Tech companies use their surveillance power to manipulate students, and "
+"direct them into tracks towards various levels of knowledge, power and "
+"prestige. The article argues that <a "
+"href=\"https://blogs.lse.ac.uk/medialse/2021/10/25/algorithmic-injustice-in-education-why-tech-companies-should-require-a-license-to-operate-in-childrens-education/\";>these
 "
+"companies should obtain licenses to operate</a>. That wouldn't hurt, but it "
+"doesn't address the root of the problem. All data acquired in a school about "
+"any student, teacher, or employee must not leave the school, and must be "
+"kept in computers that belong to the school and run free (as in freedom) "
+"software. That way, the school district and/or parents can control what is "
+"done with those data."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"<a "
+"href=\"https://me2ba.org/me2ba-product-testing-spotlight-report-published-data-sharing-in-primary-secondary-school-mobile-apps-2/\";>60%
 "
+"of school apps are sending student data to potentially high-risk third "
+"parties</a>, putting students and possibly all other school workers under "
+"surveillance. This is made possible by using unsafe and proprietary programs "
+"made by data-hungry corporations."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"<small>Please note that whether students consent to this or not, doesn't "
+"justify the surveillance they're imposed to.</small>"
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"A zero-day vulnerability in Zoom which <a "
+"href=\"https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-code-execution-without-user-input/\";>can
 "
+"be used to launch remote code execution (RCE) attacks</a> has been disclosed "
+"by researchers. The researchers demonstrated a three-bug attack chain that "
+"caused an RCE on a target machine, all this without any form of user "
+"interaction."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-against-proctoring-surveillance-apps\";>tracks
 "
+"students and collects data</a> such as face, driving license, and network "
+"information, among others, in blatant violation of students' privacy."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"According to FTC, the company behind the Zoom conferencing software <a "
+"href=\"https://arstechnica.com/tech-policy/2020/11/zoom-lied-to-users-about-end-to-end-encryption-for-years-ftc-says/\";>has
 "
+"lied to users about its end-to-end encryption</a> for years, at least since "
+"2016."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"People can use free (as in freedom) programs such as <a "
+"href=\"https://directory.fsf.org/wiki/Jitsi\";>Jitsi</a> or BigBlueButton, "
+"better still if installed in a server controlled by the users."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Proprietary programs Google Meet, Microsoft Teams, and WebEx <a "
+"href=\"https://www.consumerreports.org/video-conferencing-services/videoconferencing-privacy-issues-google-microsoft-webex/\";>are
 "
+"collecting user's personal and identifiable data</a> including how long a "
+"call lasts, who's participating in the call, and the IP addresses of "
+"everyone taking part. From experience, this can even harm users physically "
+"if those companies hand over data to governments."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The Apple iOS version of Zoom <a "
+"href=\"https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account\";>is
 "
+"sending users' data to Facebook</a> even if the user doesn't have a Facebook "
+"account. According to the article, Zoom and Facebook don't even mention this "
+"surveillance on their privacy policy page, making this an obvious violation "
+"of people's privacy even in their own terms."
+msgstr ""
+
+#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
+#. type: Content of: <div><div>
+msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
+msgstr ""
+
+#. type: Content of: <div><div><p>
+msgid ""
+"Please send general FSF &amp; GNU inquiries to <a "
+"href=\"mailto:gnu@gnu.org\";>&lt;gnu@gnu.org&gt;</a>.  There are also <a "
+"href=\"/contact/\">other ways to contact</a> the FSF.  Broken links and "
+"other corrections or suggestions can be sent to <a "
+"href=\"mailto:webmasters@gnu.org\";>&lt;webmasters@gnu.org&gt;</a>."
+msgstr ""
+
+#.  TRANSLATORS: Ignore the original text in this paragraph,
+#.         replace it with the translation of these two:
+#
+#.         We work hard and do our best to provide accurate, good quality
+#.         translations.  However, we are not exempt from imperfection.
+#.         Please send your comments and general suggestions in this regard
+#.         to <a href="mailto:web-translators@gnu.org";>
+#
+#.         &lt;web-translators@gnu.org&gt;</a>.</p>
+#
+#.         <p>For information on coordinating and contributing translations of
+#.         our web pages, see <a
+#.         href="/server/standards/README.translations.html">Translations
+#.         README</a>. 
+#. type: Content of: <div><div><p>
+msgid ""
+"Please see the <a "
+"href=\"/server/standards/README.translations.html\">Translations README</a> "
+"for information on coordinating and contributing translations of this "
+"article."
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid "Copyright &copy; 2021 Free Software Foundation, Inc."
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
+"This page is licensed under a <a rel=\"license\" "
+"href=\"http://creativecommons.org/licenses/by/4.0/\";>Creative Commons "
+"Attribution 4.0 International License</a>."
+msgstr ""
+
+#. TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.
+#. type: Content of: <div><div>
+msgid "*GNUN-SLOT: TRANSLATOR'S CREDITS*"
+msgstr ""
+
+#.  timestamp start 
+#. type: Content of: <div><p>
+msgid "Updated:"
+msgstr ""

Index: malware-edtech.translist
===================================================================
RCS file: malware-edtech.translist
diff -N malware-edtech.translist
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ malware-edtech.translist    20 Nov 2021 20:31:14 -0000      1.1
@@ -0,0 +1,10 @@
+<!-- begin translist file -->
+<!--#set var="TRANSLATION_LIST"
+value='<div id="translations">
+<p>
+<span dir="ltr" class="original">[en]&nbsp;<a lang="en" hreflang="en" 
href="/proprietary/malware-edtech.en.html">English</a> &nbsp;</span>
+</p>
+</div>' -->
+<link rel="alternate" type="text/html" href="/proprietary/malware-edtech.html" 
hreflang="x-default" />
+<link rel="alternate" type="text/html" lang="en" hreflang="en" 
href="/proprietary/malware-edtech.en.html" title="English" />
+<!-- end translist file -->



reply via email to

[Prev in Thread] Current Thread [Next in Thread]