www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po all.fr.po all.pot all.pt-br-...


From: GNUN
Subject: www/proprietary/po all.fr.po all.pot all.pt-br-...
Date: Sun, 17 Apr 2022 04:38:56 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     22/04/17 04:38:54

Modified files:
        proprietary/po : all.fr.po all.pot all.pt-br-diff.html 
                         all.pt-br.po all.ru.po de.po es.po fr.po it.po 
                         ja.po malware-apple.de-diff.html 
                         malware-apple.de.po malware-apple.es.po 
                         malware-apple.fr.po malware-apple.it-diff.html 
                         malware-apple.it.po malware-apple.ja-diff.html 
                         malware-apple.ja.po malware-apple.nl-diff.html 
                         malware-apple.nl.po malware-apple.pot 
                         malware-apple.pt-br-diff.html 
                         malware-apple.pt-br.po malware-apple.ru.po 
                         malware-mobiles.de-diff.html 
                         malware-mobiles.de.po malware-mobiles.es.po 
                         malware-mobiles.fr.po 
                         malware-mobiles.it-diff.html 
                         malware-mobiles.it.po 
                         malware-mobiles.ja-diff.html 
                         malware-mobiles.ja.po malware-mobiles.pot 
                         malware-mobiles.pt-br-diff.html 
                         malware-mobiles.pt-br.po malware-mobiles.ru.po 
                         nl.po pl.po pot proprietary-addictions.es.po 
                         proprietary-addictions.fr.po 
                         proprietary-addictions.pot 
                         proprietary-addictions.pt-br.po 
                         proprietary-addictions.ru.po 
                         proprietary-addictions.tr.po 
                         proprietary-insecurity.de-diff.html 
                         proprietary-insecurity.de.po 
                         proprietary-insecurity.es.po 
                         proprietary-insecurity.fr.po 
                         proprietary-insecurity.it-diff.html 
                         proprietary-insecurity.it.po 
                         proprietary-insecurity.ja-diff.html 
                         proprietary-insecurity.ja.po 
                         proprietary-insecurity.pot 
                         proprietary-insecurity.pt-br-diff.html 
                         proprietary-insecurity.pt-br.po 
                         proprietary-insecurity.ru.po 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.es.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.pt-br-diff.html 
                         proprietary-surveillance.pt-br.po 
                         proprietary-surveillance.ru.po pt-br.po ru.po 
                         tr.po zh-cn.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.fr.po?cvsroot=www&r1=1.115&r2=1.116
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.pot?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.pt-br-diff.html?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.pt-br.po?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.ru.po?cvsroot=www&r1=1.107&r2=1.108
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.383&r2=1.384
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.548&r2=1.549
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.674&r2=1.675
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.383&r2=1.384
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.391&r2=1.392
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de-diff.html?cvsroot=www&r1=1.93&r2=1.94
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de.po?cvsroot=www&r1=1.184&r2=1.185
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.es.po?cvsroot=www&r1=1.257&r2=1.258
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.fr.po?cvsroot=www&r1=1.252&r2=1.253
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it-diff.html?cvsroot=www&r1=1.98&r2=1.99
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it.po?cvsroot=www&r1=1.177&r2=1.178
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja-diff.html?cvsroot=www&r1=1.113&r2=1.114
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja.po?cvsroot=www&r1=1.160&r2=1.161
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl-diff.html?cvsroot=www&r1=1.116&r2=1.117
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl.po?cvsroot=www&r1=1.114&r2=1.115
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.pot?cvsroot=www&r1=1.124&r2=1.125
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.pt-br-diff.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.pt-br.po?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ru.po?cvsroot=www&r1=1.298&r2=1.299
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.120&r2=1.121
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.170&r2=1.171
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.271&r2=1.272
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.270&r2=1.271
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.123&r2=1.124
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.170&r2=1.171
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.141&r2=1.142
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.160&r2=1.161
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pot?cvsroot=www&r1=1.135&r2=1.136
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pt-br-diff.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pt-br.po?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.302&r2=1.303
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.384&r2=1.385
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.383&r2=1.384
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.382&r2=1.383
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.es.po?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.fr.po?cvsroot=www&r1=1.84&r2=1.85
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.pot?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.pt-br.po?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.ru.po?cvsroot=www&r1=1.71&r2=1.72
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.tr.po?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de-diff.html?cvsroot=www&r1=1.102&r2=1.103
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.200&r2=1.201
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.es.po?cvsroot=www&r1=1.158&r2=1.159
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.299&r2=1.300
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-diff.html?cvsroot=www&r1=1.115&r2=1.116
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.217&r2=1.218
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja-diff.html?cvsroot=www&r1=1.136&r2=1.137
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja.po?cvsroot=www&r1=1.189&r2=1.190
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pot?cvsroot=www&r1=1.155&r2=1.156
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pt-br-diff.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pt-br.po?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.341&r2=1.342
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.229&r2=1.230
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.421&r2=1.422
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.267&r2=1.268
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.692&r2=1.693
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.293&r2=1.294
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.433&r2=1.434
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.311&r2=1.312
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.414&r2=1.415
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.353&r2=1.354
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pt-br-diff.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pt-br.po?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.764&r2=1.765
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.470&r2=1.471
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.804&r2=1.805
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.275&r2=1.276
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.277&r2=1.278
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.383&r2=1.384

Patches:
Index: all.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.fr.po,v
retrieving revision 1.115
retrieving revision 1.116
diff -u -b -r1.115 -r1.116
--- all.fr.po   13 Apr 2022 19:35:42 -0000      1.115
+++ all.fr.po   17 Apr 2022 08:38:49 -0000      1.116
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2022-04-13 12:56+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
 "PO-Revision-Date: 2022-04-13 21:35+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2022-04-17 08:28+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -196,12 +197,26 @@
 "regarder ailleurs pour éviter les pubs – et les traqueurs."
 
 #. type: Content of: <div><ul><li><p>
+# | A critical bug in Apple's iOS makes it possible for attackers to alter a
+# | shutdown event, <a
+# | 
href=\"https://blog.zecops.com/research/persistence-without-persistence-meet-the-ultimate-persistence-bug-noreboot/\";>tricking
+# | the user into thinking that the phone has been powered off</a>. But in
+# | fact, it[-’-]{+'+}s still running, and the user can't feel any difference
+# | between a real shutdown and the fake shutdown.
+#, fuzzy
+#| msgid ""
+#| "A critical bug in Apple's iOS makes it possible for attackers to alter a "
+#| "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-";
+#| "without-persistence-meet-the-ultimate-persistence-bug-noreboot/"
+#| "\">tricking the user into thinking that the phone has been powered off</"
+#| "a>. But in fact, it’s still running, and the user can't feel any "
+#| "difference between a real shutdown and the fake shutdown."
 msgid ""
 "A critical bug in Apple's iOS makes it possible for attackers to alter a "
 "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-";
 "without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
 "the user into thinking that the phone has been powered off</a>. But in fact, "
-"it’s still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
 "shutdown and the fake shutdown."
 msgstr ""
 "Une faille critique dans iOS permet à un attaquant de modifier une étape de 
"

Index: all.pot
===================================================================
RCS file: /web/www/www/proprietary/po/all.pot,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- all.pot     13 Apr 2022 12:56:19 -0000      1.61
+++ all.pot     17 Apr 2022 08:38:49 -0000      1.62
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2022-04-13 12:56+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -151,7 +151,7 @@
 "shutdown event, <a "
 
"href=\"https://blog.zecops.com/research/persistence-without-persistence-meet-the-ultimate-persistence-bug-noreboot/\";>tricking
 "
 "the user into thinking that the phone has been powered off</a>. But in fact, "
-"it’s still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
 "shutdown and the fake shutdown."
 msgstr ""
 

Index: all.pt-br-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/all.pt-br-diff.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- all.pt-br-diff.html 13 Apr 2022 16:39:49 -0000      1.14
+++ all.pt-br-diff.html 17 Apr 2022 08:38:49 -0000      1.15
@@ -126,7 +126,7 @@
     it possible for attackers to alter a shutdown event, &lt;a
     
href="https://blog.zecops.com/research/persistence-without-persistence-meet-the-ultimate-persistence-bug-noreboot/"&gt;tricking
     the user into thinking that the phone has been powered
-    off&lt;/a&gt;. But in fact, it’s still running, and the user can't feel
+    off&lt;/a&gt;. But in fact, it's still running, and the user can't feel
     any difference between a real shutdown and the fake shutdown.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2694,7 +2694,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2022/04/13 16:39:49 $
+$Date: 2022/04/17 08:38:49 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: all.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.pt-br.po,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- all.pt-br.po        13 Apr 2022 16:39:50 -0000      1.63
+++ all.pt-br.po        17 Apr 2022 08:38:49 -0000      1.64
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2022-04-13 12:56+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
 "PO-Revision-Date: 2021-06-26 09:39-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -160,7 +160,7 @@
 "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-";
 "without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
 "the user into thinking that the phone has been powered off</a>. But in fact, "
-"it’s still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
 "shutdown and the fake shutdown."
 msgstr ""
 

Index: all.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.ru.po,v
retrieving revision 1.107
retrieving revision 1.108
diff -u -b -r1.107 -r1.108
--- all.ru.po   13 Apr 2022 17:34:58 -0000      1.107
+++ all.ru.po   17 Apr 2022 08:38:49 -0000      1.108
@@ -9,7 +9,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2022-04-13 12:56+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
 "PO-Revision-Date: 2021-04-27 13:06+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -17,6 +17,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2022-04-17 08:28+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -205,12 +206,26 @@
 "отслеживающих программ."
 
 #. type: Content of: <div><ul><li><p>
+# | A critical bug in Apple's iOS makes it possible for attackers to alter a
+# | shutdown event, <a
+# | 
href=\"https://blog.zecops.com/research/persistence-without-persistence-meet-the-ultimate-persistence-bug-noreboot/\";>tricking
+# | the user into thinking that the phone has been powered off</a>. But in
+# | fact, it[-’-]{+'+}s still running, and the user can't feel any difference
+# | between a real shutdown and the fake shutdown.
+#, fuzzy
+#| msgid ""
+#| "A critical bug in Apple's iOS makes it possible for attackers to alter a "
+#| "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-";
+#| "without-persistence-meet-the-ultimate-persistence-bug-noreboot/"
+#| "\">tricking the user into thinking that the phone has been powered off</"
+#| "a>. But in fact, it’s still running, and the user can't feel any "
+#| "difference between a real shutdown and the fake shutdown."
 msgid ""
 "A critical bug in Apple's iOS makes it possible for attackers to alter a "
 "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-";
 "without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
 "the user into thinking that the phone has been powered off</a>. But in fact, "
-"it’s still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
 "shutdown and the fake shutdown."
 msgstr ""
 "Критичная ошибка в iOS компании Apple дает 
взломщикам возможность изменять "

Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.383
retrieving revision 1.384
diff -u -b -r1.383 -r1.384
--- de.po       13 Apr 2022 16:39:50 -0000      1.383
+++ de.po       17 Apr 2022 08:38:50 -0000      1.384
@@ -828,7 +828,7 @@
 "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-";
 "without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
 "the user into thinking that the phone has been powered off</a>. But in fact, "
-"it’s still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
 "shutdown and the fake shutdown."
 msgstr ""
 
@@ -8293,7 +8293,7 @@
 msgid ""
 "Many games are designed to keep gamers compulsively playing&mdash;and "
 "spending money on the game. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
+"\"https://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
 "to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
 "research</a>:"
 msgstr ""
@@ -9905,8 +9905,10 @@
 "a>."
 
 #. type: Content of: <div><div><p>
-# | The back door <a {+class=\"not-a-duplicate\"+}
-# | 
href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\";>
+# | The back door <a
+# | 
[-href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\";>-]
+# | {+class=\"not-a-duplicate\"
+# | 
href=\"https://www.osnews.com/story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\";>+}
 # | may take the form of bugs that have gone 20 years unfixed</a>.  The choice
 # | to leave the security holes in place is morally equivalent to writing a
 # | back door.
@@ -9917,8 +9919,8 @@
 #| "form of bugs that have gone 20 years unfixed</a>.  The choice to leave "
 #| "the security holes in place is morally equivalent to writing a back door."
 msgid ""
-"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"The back door <a class=\"not-a-duplicate\" href=\"https://www.osnews.com/";
+"story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\"> may "
 "take the form of bugs that have gone 20 years unfixed</a>.  The choice to "
 "leave the security holes in place is morally equivalent to writing a back "
 "door."
@@ -10945,19 +10947,28 @@
 "Protokolle gespeichert und auf Wunsch an die britische Regierung übergeben."
 
 #. type: Content of: <div><div><ul><li><p>
+# | Some portable phones <a
+# | 
href=\"http{+s+}://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html\">are
+# | sold with spyware sending lots of data to China</a>.
+#, fuzzy
+#| msgid ""
+#| "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+#| "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#| "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#| "html\">are sold with spyware sending lots of data to China</a>."
 msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/";
 "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
 "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
 "html\">are sold with spyware sending lots of data to China</a>."
 msgstr ""
-"Mehrere Mobilgeräte <a href=\"https://web.archive.org/web/20161116213010/";
-"http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-";
-"firmware-that-transmitted-personally-identifiable-information-pii-without-"
-"user-consent-or-disclosure-300362844.html\" title=\"Kryptowire Discovered "
-"Mobile Phone Firmware That Transmitted Personally Identifiable Information "
-"(PII) Without User Consent Or Disclosure, PRNewswire.com 2016 (Internet "
-"Archive).\">senden große Datenmengen nach China</a>."
+"Mehrere Mobilgeräte <a href=\"https://web.archive.org/web/20161116213010///";
+"www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-"
+"that-transmitted-personally-identifiable-information-pii-without-user-"
+"consent-or-disclosure-300362844.html\" title=\"Kryptowire Discovered Mobile "
+"Phone Firmware That Transmitted Personally Identifiable Information (PII) "
+"Without User Consent Or Disclosure, PRNewswire.com 2016 (Internet Archive)."
+"\">senden große Datenmengen nach China</a>."
 
 #. type: Content of: <div><div><ul><li><p>
 # | Facebook's new Magic Photo app <a
@@ -17097,6 +17108,42 @@
 
 #, fuzzy
 #~| msgid ""
+#~| "The back door <a href=\"http://www.osnews.com/story/27416/";
+#~| "The_second_operating_system_hiding_in_every_mobile_phone\"> may take the "
+#~| "form of bugs that have gone 20 years unfixed</a>.  The choice to leave "
+#~| "the security holes in place is morally equivalent to writing a back door."
+#~ msgid ""
+#~ "The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
+#~ "story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> "
+#~ "may take the form of bugs that have gone 20 years unfixed</a>.  The "
+#~ "choice to leave the security holes in place is morally equivalent to "
+#~ "writing a back door."
+#~ msgstr ""
+#~ "Die Hintertür <a href=\"https://www.osnews.com/story/27416/";
+#~ "The_second_operating_system_hiding_in_every_mobile_phone\" title=\"The "
+#~ "second operating system hiding in every mobile phone, unter: https://www.";
+#~ "osnews.com/story/27416/"
+#~ "The_second_operating_system_hiding_in_every_mobile_phone, OSNews 2017."
+#~ "\">kann die Form von Programmfehlern haben, die 20 Jahre ungefixt "
+#~ "blieben</a>. Die Entscheidung, die Sicherheitslücken zu belassen, ist "
+#~ "moralisch gleichbedeutend mit dem Schreiben einer Hintertür."
+
+#~ msgid ""
+#~ "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+#~ "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#~ "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#~ "html\">are sold with spyware sending lots of data to China</a>."
+#~ msgstr ""
+#~ "Mehrere Mobilgeräte <a href=\"https://web.archive.org/web/20161116213010/";
+#~ "http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-";
+#~ "phone-firmware-that-transmitted-personally-identifiable-information-pii-"
+#~ "without-user-consent-or-disclosure-300362844.html\" title=\"Kryptowire "
+#~ "Discovered Mobile Phone Firmware That Transmitted Personally Identifiable "
+#~ "Information (PII) Without User Consent Or Disclosure, PRNewswire.com 2016 "
+#~ "(Internet Archive).\">senden große Datenmengen nach China</a>."
+
+#, fuzzy
+#~| msgid ""
 #~| "Many web sites <a href=\"http://gizmodo.com/before-you-hit-submit-this-";
 #~| "company-has-already-logge-1795906081\"> snoop on information that users "
 #~| "have typed into a form but not sent</a>."

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.548
retrieving revision 1.549
diff -u -b -r1.548 -r1.549
--- es.po       16 Apr 2022 09:10:11 -0000      1.548
+++ es.po       17 Apr 2022 08:38:50 -0000      1.549
@@ -678,12 +678,26 @@
 "maliciosas diferentes</a>."
 
 #. type: Content of: <div><ul><li><p>
+# | A critical bug in Apple's iOS makes it possible for attackers to alter a
+# | shutdown event, <a
+# | 
href=\"https://blog.zecops.com/research/persistence-without-persistence-meet-the-ultimate-persistence-bug-noreboot/\";>tricking
+# | the user into thinking that the phone has been powered off</a>. But in
+# | fact, it[-’-]{+'+}s still running, and the user can't feel any difference
+# | between a real shutdown and the fake shutdown.
+#, fuzzy
+#| msgid ""
+#| "A critical bug in Apple's iOS makes it possible for attackers to alter a "
+#| "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-";
+#| "without-persistence-meet-the-ultimate-persistence-bug-noreboot/"
+#| "\">tricking the user into thinking that the phone has been powered off</"
+#| "a>. But in fact, it’s still running, and the user can't feel any "
+#| "difference between a real shutdown and the fake shutdown."
 msgid ""
 "A critical bug in Apple's iOS makes it possible for attackers to alter a "
 "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-";
 "without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
 "the user into thinking that the phone has been powered off</a>. But in fact, "
-"it’s still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
 "shutdown and the fake shutdown."
 msgstr ""
 "Un error crítico en el iOS de Apple permite que un atacante altere el "
@@ -6502,9 +6516,9 @@
 msgstr ""
 "Skype contiene <a href=\"https://web.archive.org/web/20130928235637/http://";
 "www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-"
-"your-skype/\">programas espía</a>. Microsoft modificó Skype <a 
href=\"https://";
-"www.theguardian.com/world/2013/jul/11/microsoft-nsa-collaboration-user-data\">
 "
-"específicamente para espiar</a>."
+"your-skype/\">programas espía</a>. Microsoft modificó Skype <a href="
+"\"https://www.theguardian.com/world/2013/jul/11/microsoft-nsa-collaboration-";
+"user-data\"> específicamente para espiar</a>."
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
@@ -8134,10 +8148,21 @@
 msgstr "Juegos"
 
 #. type: Content of: <div><div><p>
+# | Many games are designed to keep gamers compulsively playing&mdash;and
+# | spending money on the game. To achieve this result, developers use <a
+# | 
href=\"http{+s+}://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html\">
+# | techniques that derive from behavioral and brain research</a>:
+#, fuzzy
+#| msgid ""
+#| "Many games are designed to keep gamers compulsively playing&mdash;and "
+#| "spending money on the game. To achieve this result, developers use <a "
+#| "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-";
+#| "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#| "and brain research</a>:"
 msgid ""
 "Many games are designed to keep gamers compulsively playing&mdash;and "
 "spending money on the game. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
+"\"https://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
 "to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
 "research</a>:"
 msgstr ""
@@ -9411,9 +9436,22 @@
 "el teléfono transmita todas las conversaciones que escucha</a>."
 
 #. type: Content of: <div><div><p>
+# | The back door <a class=\"not-a-duplicate\"
+# | 
[-href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\";>-]
+# | 
{+href=\"https://www.osnews.com/story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\";>+}
+# | may take the form of bugs that have gone 20 years unfixed</a>.  The choice
+# | to leave the security holes in place is morally equivalent to writing a
+# | back door.
+#, fuzzy
+#| msgid ""
+#| "The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
+#| "story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> "
+#| "may take the form of bugs that have gone 20 years unfixed</a>.  The "
+#| "choice to leave the security holes in place is morally equivalent to "
+#| "writing a back door."
 msgid ""
-"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"The back door <a class=\"not-a-duplicate\" href=\"https://www.osnews.com/";
+"story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\"> may "
 "take the form of bugs that have gone 20 years unfixed</a>.  The choice to "
 "leave the security holes in place is morally equivalent to writing a back "
 "door."
@@ -10161,8 +10199,17 @@
 "remitir al Gobierno británico si este lo solicita."
 
 #. type: Content of: <div><div><ul><li><p>
+# | Some portable phones <a
+# | 
href=\"http{+s+}://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html\">are
+# | sold with spyware sending lots of data to China</a>.
+#, fuzzy
+#| msgid ""
+#| "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+#| "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#| "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#| "html\">are sold with spyware sending lots of data to China</a>."
 msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/";
 "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
 "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
 "html\">are sold with spyware sending lots of data to China</a>."
@@ -14233,3 +14280,56 @@
 #. type: Content of: <div><div><dl><dd><ul><li>
 msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
+
+#~ msgid ""
+#~ "A critical bug in Apple's iOS makes it possible for attackers to alter a "
+#~ "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-";
+#~ "without-persistence-meet-the-ultimate-persistence-bug-noreboot/"
+#~ "\">tricking the user into thinking that the phone has been powered off</"
+#~ "a>. But in fact, it’s still running, and the user can't feel any "
+#~ "difference between a real shutdown and the fake shutdown."
+#~ msgstr ""
+#~ "Un error crítico en el iOS de Apple permite que un atacante altere el "
+#~ "proceso de desconexión, <a href=\"https://blog.zecops.com/research/";
+#~ "persistence-without-persistence-meet-the-ultimate-persistence-bug-"
+#~ "noreboot/\">haciendo creer al usuario que el teléfono se ha apagado</a>, "
+#~ "cuando en realidad sigue funcionando. El usuario no nota ninguna "
+#~ "diferencia entre un apagado real y uno falso."
+
+#~ msgid ""
+#~ "Many games are designed to keep gamers compulsively playing&mdash;and "
+#~ "spending money on the game. To achieve this result, developers use <a "
+#~ "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-";
+#~ "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#~ "and brain research</a>:"
+#~ msgstr ""
+#~ "Muchos juegos están diseñados para que los jugadores continúen jugando "
+#~ "compulsivamente y gasten dinero en el juego. Para conseguirlo, los "
+#~ "desarrolladores emplean <a href=\"http://www.cracked.com/article_18461_5-";
+#~ "creepy-ways-video-games-are-trying-to-get-you-addicted.html\">técnicas "
+#~ "derivadas de la investigación del cerebro y de la conducta</a>:"
+
+#~ msgid ""
+#~ "The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
+#~ "story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> "
+#~ "may take the form of bugs that have gone 20 years unfixed</a>.  The "
+#~ "choice to leave the security holes in place is morally equivalent to "
+#~ "writing a back door."
+#~ msgstr ""
+#~ "La puerta trasera <a class=\"not-a-duplicate\" href=\"http://www.osnews.";
+#~ "com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"
+#~ "\"> puede producirse en forma de fallos que han permanecido veinte años "
+#~ "sin corregirse</a>. La decisión de dejar esos agujeros de seguridad es "
+#~ "desde el punto de vista ético equivalente a colocar una puerta trasera."
+
+#~ msgid ""
+#~ "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+#~ "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#~ "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#~ "html\">are sold with spyware sending lots of data to China</a>."
+#~ msgstr ""
+#~ "Algunos teléfonos móviles <a href=\"http://www.prnewswire.com/news-";
+#~ "releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-"
+#~ "personally-identifiable-information-pii-without-user-consent-or-"
+#~ "disclosure-300362844.html\">se venden con programas espía que envían "
+#~ "cantidad de datos a China</a>."

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.674
retrieving revision 1.675
diff -u -b -r1.674 -r1.675
--- fr.po       13 Apr 2022 19:35:42 -0000      1.674
+++ fr.po       17 Apr 2022 08:38:50 -0000      1.675
@@ -664,12 +664,26 @@
 "malveillantes."
 
 #. type: Content of: <div><ul><li><p>
+# | A critical bug in Apple's iOS makes it possible for attackers to alter a
+# | shutdown event, <a
+# | 
href=\"https://blog.zecops.com/research/persistence-without-persistence-meet-the-ultimate-persistence-bug-noreboot/\";>tricking
+# | the user into thinking that the phone has been powered off</a>. But in
+# | fact, it[-’-]{+'+}s still running, and the user can't feel any difference
+# | between a real shutdown and the fake shutdown.
+#, fuzzy
+#| msgid ""
+#| "A critical bug in Apple's iOS makes it possible for attackers to alter a "
+#| "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-";
+#| "without-persistence-meet-the-ultimate-persistence-bug-noreboot/"
+#| "\">tricking the user into thinking that the phone has been powered off</"
+#| "a>. But in fact, it’s still running, and the user can't feel any "
+#| "difference between a real shutdown and the fake shutdown."
 msgid ""
 "A critical bug in Apple's iOS makes it possible for attackers to alter a "
 "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-";
 "without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
 "the user into thinking that the phone has been powered off</a>. But in fact, "
-"it’s still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
 "shutdown and the fake shutdown."
 msgstr ""
 "Une faille critique dans iOS permet à un attaquant de modifier une étape de 
"
@@ -8133,10 +8147,21 @@
 msgstr "Jeux"
 
 #. type: Content of: <div><div><p>
+# | Many games are designed to keep gamers compulsively playing&mdash;and
+# | spending money on the game. To achieve this result, developers use <a
+# | 
href=\"http{+s+}://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html\">
+# | techniques that derive from behavioral and brain research</a>:
+#, fuzzy
+#| msgid ""
+#| "Many games are designed to keep gamers compulsively playing&mdash;and "
+#| "spending money on the game. To achieve this result, developers use <a "
+#| "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-";
+#| "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#| "and brain research</a>:"
 msgid ""
 "Many games are designed to keep gamers compulsively playing&mdash;and "
 "spending money on the game. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
+"\"https://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
 "to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
 "research</a>:"
 msgstr ""
@@ -9416,9 +9441,22 @@
 "transmettre toutes les conversations qu'il entend</a>."
 
 #. type: Content of: <div><div><p>
+# | The back door <a class=\"not-a-duplicate\"
+# | 
[-href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\";>-]
+# | 
{+href=\"https://www.osnews.com/story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\";>+}
+# | may take the form of bugs that have gone 20 years unfixed</a>.  The choice
+# | to leave the security holes in place is morally equivalent to writing a
+# | back door.
+#, fuzzy
+#| msgid ""
+#| "The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
+#| "story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> "
+#| "may take the form of bugs that have gone 20 years unfixed</a>.  The "
+#| "choice to leave the security holes in place is morally equivalent to "
+#| "writing a back door."
 msgid ""
-"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"The back door <a class=\"not-a-duplicate\" href=\"https://www.osnews.com/";
+"story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\"> may "
 "take the form of bugs that have gone 20 years unfixed</a>.  The choice to "
 "leave the security holes in place is morally equivalent to writing a back "
 "door."
@@ -10169,8 +10207,17 @@
 "détaillés et peut les transmettre au gouvernement britannique sur sa 
demande."
 
 #. type: Content of: <div><div><ul><li><p>
+# | Some portable phones <a
+# | 
href=\"http{+s+}://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html\">are
+# | sold with spyware sending lots of data to China</a>.
+#, fuzzy
+#| msgid ""
+#| "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+#| "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#| "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#| "html\">are sold with spyware sending lots of data to China</a>."
 msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/";
 "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
 "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
 "html\">are sold with spyware sending lots of data to China</a>."
@@ -14250,3 +14297,57 @@
 #. type: Content of: <div><div><dl><dd><ul><li>
 msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
+
+#~ msgid ""
+#~ "A critical bug in Apple's iOS makes it possible for attackers to alter a "
+#~ "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-";
+#~ "without-persistence-meet-the-ultimate-persistence-bug-noreboot/"
+#~ "\">tricking the user into thinking that the phone has been powered off</"
+#~ "a>. But in fact, it’s still running, and the user can't feel any "
+#~ "difference between a real shutdown and the fake shutdown."
+#~ msgstr ""
+#~ "Une faille critique dans iOS permet à un attaquant de modifier une étape 
"
+#~ "de l'arrêt du système en <a href=\"https://blog.zecops.com/research/";
+#~ "persistence-without-persistence-meet-the-ultimate-persistence-bug-"
+#~ "noreboot/\">faisant croire à l'utilisateur que le téléphone est 
éteint</"
+#~ "a> alors qu'en fait il fonctionne toujours. L'utilisateur ne peut pas "
+#~ "faire la différence entre l'extinction réelle et l'extinction simulée."
+
+#~ msgid ""
+#~ "Many games are designed to keep gamers compulsively playing&mdash;and "
+#~ "spending money on the game. To achieve this result, developers use <a "
+#~ "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-";
+#~ "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#~ "and brain research</a>:"
+#~ msgstr ""
+#~ "Pas mal de jeux sont conçus pour que leurs utilisateurs deviennent des "
+#~ "joueurs compulsifs – et continuent à dépenser de l'argent pour jouer. "
+#~ "Pour obtenir ce résultat, les développeurs appliquent des <a href="
+#~ "\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-";
+#~ "trying-to-get-you-addicted.html\">techniques issues de recherches "
+#~ "comportementales et sur le cerveau</a> :"
+
+#~ msgid ""
+#~ "The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
+#~ "story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> "
+#~ "may take the form of bugs that have gone 20 years unfixed</a>.  The "
+#~ "choice to leave the security holes in place is morally equivalent to "
+#~ "writing a back door."
+#~ msgstr ""
+#~ "Cette porte dérobée <a class=\"not-a-duplicate\" 
href=\"http://www.osnews.";
+#~ "com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"
+#~ "\">peut prendre la forme de bogues qui sont restés non corrigés pendant "
+#~ "20 ans</a>. Le choix de laisser ces failles de sécurité en place est "
+#~ "l'équivalent moral de la création d'une porte dérobée."
+
+#~ msgid ""
+#~ "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+#~ "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#~ "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#~ "html\">are sold with spyware sending lots of data to China</a>."
+#~ msgstr ""
+#~ "Certains téléphones portables <a href=\"http://www.prnewswire.com/news-";
+#~ "releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-"
+#~ "personally-identifiable-information-pii-without-user-consent-or-"
+#~ "disclosure-300362844.html\">sont vendus avec un logiciel espion qui "
+#~ "envoie une masse de données en Chine</a>."

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.383
retrieving revision 1.384
diff -u -b -r1.383 -r1.384
--- it.po       13 Apr 2022 16:39:50 -0000      1.383
+++ it.po       17 Apr 2022 08:38:50 -0000      1.384
@@ -781,7 +781,7 @@
 "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-";
 "without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
 "the user into thinking that the phone has been powered off</a>. But in fact, "
-"it’s still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
 "shutdown and the fake shutdown."
 msgstr ""
 
@@ -7707,7 +7707,7 @@
 msgid ""
 "Many games are designed to keep gamers compulsively playing&mdash;and "
 "spending money on the game. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
+"\"https://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
 "to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
 "research</a>:"
 msgstr ""
@@ -9125,7 +9125,7 @@
 # | [-More about-]{+The back door+} <a
 # | 
[-href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\";>the
 # | nature-] {+class=\"not-a-duplicate\"
-# | 
href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\";>
+# | 
href=\"https://www.osnews.com/story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\";>
 # | may take the form+} of [-this problem</a>.-] {+bugs that have gone 20
 # | years unfixed</a>.  The choice to leave the security holes in place is
 # | morally equivalent to writing a back door.+}
@@ -9135,8 +9135,8 @@
 #| "The_second_operating_system_hiding_in_every_mobile_phone\">the nature of "
 #| "this problem</a>."
 msgid ""
-"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"The back door <a class=\"not-a-duplicate\" href=\"https://www.osnews.com/";
+"story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\"> may "
 "take the form of bugs that have gone 20 years unfixed</a>.  The choice to "
 "leave the security holes in place is morally equivalent to writing a back "
 "door."
@@ -9993,8 +9993,17 @@
 "essere forniti al governo britannico se richiesto."
 
 #. type: Content of: <div><div><ul><li><p>
+# | Some portable phones <a
+# | 
href=\"http{+s+}://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html\">are
+# | sold with spyware sending lots of data to China</a>.
+#, fuzzy
+#| msgid ""
+#| "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+#| "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#| "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#| "html\">are sold with spyware sending lots of data to China</a>."
 msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/";
 "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
 "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
 "html\">are sold with spyware sending lots of data to China</a>."
@@ -15634,6 +15643,33 @@
 
 #, fuzzy
 #~| msgid ""
+#~| "More about <a href=\"http://www.osnews.com/story/27416/";
+#~| "The_second_operating_system_hiding_in_every_mobile_phone\">the nature of "
+#~| "this problem</a>."
+#~ msgid ""
+#~ "The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
+#~ "story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> "
+#~ "may take the form of bugs that have gone 20 years unfixed</a>.  The "
+#~ "choice to leave the security holes in place is morally equivalent to "
+#~ "writing a back door."
+#~ msgstr ""
+#~ "Altre informazioni sulla <a href=\"http://www.osnews.com/story/27416/";
+#~ "The_second_operating_system_hiding_in_every_mobile_phone\">natura di "
+#~ "questo problema</a>."
+
+#~ msgid ""
+#~ "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+#~ "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#~ "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#~ "html\">are sold with spyware sending lots of data to China</a>."
+#~ msgstr ""
+#~ "Alcuni telefoni cellulari sono venduti con <a href=\"http://www.";
+#~ "prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-"
+#~ "that-transmitted-personally-identifiable-information-pii-without-user-"
+#~ "consent-or-disclosure-300362844.html\">spyware che invia dati in Cina</a>."
+
+#, fuzzy
+#~| msgid ""
 #~| "When a page uses Disqus for comments, <a href=\"https://blog.dantup.";
 #~| "com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-"
 #~| "sends-the-url-to-facebook\">the proprietary Disqus software loads a "

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.391
retrieving revision 1.392
diff -u -b -r1.391 -r1.392
--- ja.po       13 Apr 2022 16:39:51 -0000      1.391
+++ ja.po       17 Apr 2022 08:38:50 -0000      1.392
@@ -612,7 +612,7 @@
 "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-";
 "without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
 "the user into thinking that the phone has been powered off</a>. But in fact, "
-"it’s still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
 "shutdown and the fake shutdown."
 msgstr ""
 
@@ -6557,7 +6557,7 @@
 msgid ""
 "Many games are designed to keep gamers compulsively playing&mdash;and "
 "spending money on the game. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
+"\"https://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
 "to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
 "research</a>:"
 msgstr ""
@@ -7702,8 +7702,8 @@
 
 #. type: Content of: <div><div><p>
 msgid ""
-"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"The back door <a class=\"not-a-duplicate\" href=\"https://www.osnews.com/";
+"story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\"> may "
 "take the form of bugs that have gone 20 years unfixed</a>.  The choice to "
 "leave the security holes in place is morally equivalent to writing a back "
 "door."
@@ -8310,8 +8310,14 @@
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+#| "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#| "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#| "html\">are sold with spyware sending lots of data to China</a>."
 msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/";
 "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
 "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
 "html\">are sold with spyware sending lots of data to China</a>."
@@ -12584,6 +12590,18 @@
 msgstr "<a 
href=\"/proprietary/malware-microsoft.html\">マイクロソフト</a>"
 
 #~ msgid ""
+#~ "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+#~ "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#~ "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#~ "html\">are sold with spyware sending lots of data to China</a>."
+#~ msgstr ""
+#~ "ある携帯電話は<a href=\"http://www.prnewswire.com/news-releases/";
+#~ "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#~ "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#~ 
"html\">たくさんのデータを中国に送信するスパイウェアとともに販売されていま"
+#~ "す</a>。"
+
+#~ msgid ""
 #~ "E-books can contain JavaScript code, and <a href=\"http://www.theguardian.";
 #~ "com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-"
 #~ "women-study-finds\"> sometimes this code snoops on readers</a>."

Index: malware-apple.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de-diff.html,v
retrieving revision 1.93
retrieving revision 1.94
diff -u -b -r1.93 -r1.94
--- malware-apple.de-diff.html  13 Apr 2022 16:39:52 -0000      1.93
+++ malware-apple.de-diff.html  17 Apr 2022 08:38:51 -0000      1.94
@@ -332,7 +332,7 @@
     it possible for attackers to alter a shutdown event, &lt;a
     
href="https://blog.zecops.com/research/persistence-without-persistence-meet-the-ultimate-persistence-bug-noreboot/"&gt;tricking
     the user into thinking that the phone has been powered
-    off&lt;/a&gt;. But in fact, it’s still running, and the user can't feel
+    off&lt;/a&gt;. But in fact, it's still running, and the user can't feel
     any difference between a real shutdown and the fake shutdown.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1612,7 +1612,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2022/04/13 16:39:52 $
+$Date: 2022/04/17 08:38:51 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-apple.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de.po,v
retrieving revision 1.184
retrieving revision 1.185
diff -u -b -r1.184 -r1.185
--- malware-apple.de.po 13 Apr 2022 16:39:52 -0000      1.184
+++ malware-apple.de.po 17 Apr 2022 08:38:51 -0000      1.185
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2022-04-13 12:56+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -578,7 +578,7 @@
 "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-";
 "without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
 "the user into thinking that the phone has been powered off</a>. But in fact, "
-"it’s still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
 "shutdown and the fake shutdown."
 msgstr ""
 

Index: malware-apple.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.es.po,v
retrieving revision 1.257
retrieving revision 1.258
diff -u -b -r1.257 -r1.258
--- malware-apple.es.po 15 Apr 2022 18:01:38 -0000      1.257
+++ malware-apple.es.po 17 Apr 2022 08:38:51 -0000      1.258
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2022-04-13 12:56+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2022-04-17 08:28+0000\n"
 "X-Generator: Poedit 2.4.2\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 
@@ -434,12 +435,26 @@
 "privativo de prestigio está libre de graves fallos."
 
 #. type: Content of: <div><div><ul><li><p>
+# | A critical bug in Apple's iOS makes it possible for attackers to alter a
+# | shutdown event, <a
+# | 
href=\"https://blog.zecops.com/research/persistence-without-persistence-meet-the-ultimate-persistence-bug-noreboot/\";>tricking
+# | the user into thinking that the phone has been powered off</a>. But in
+# | fact, it[-’-]{+'+}s still running, and the user can't feel any difference
+# | between a real shutdown and the fake shutdown.
+#, fuzzy
+#| msgid ""
+#| "A critical bug in Apple's iOS makes it possible for attackers to alter a "
+#| "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-";
+#| "without-persistence-meet-the-ultimate-persistence-bug-noreboot/"
+#| "\">tricking the user into thinking that the phone has been powered off</"
+#| "a>. But in fact, it’s still running, and the user can't feel any "
+#| "difference between a real shutdown and the fake shutdown."
 msgid ""
 "A critical bug in Apple's iOS makes it possible for attackers to alter a "
 "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-";
 "without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
 "the user into thinking that the phone has been powered off</a>. But in fact, "
-"it’s still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
 "shutdown and the fake shutdown."
 msgstr ""
 "Un error crítico en el iOS de Apple permite que un atacante altere el "

Index: malware-apple.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.fr.po,v
retrieving revision 1.252
retrieving revision 1.253
diff -u -b -r1.252 -r1.253
--- malware-apple.fr.po 13 Apr 2022 19:35:42 -0000      1.252
+++ malware-apple.fr.po 17 Apr 2022 08:38:51 -0000      1.253
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2022-04-13 12:56+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
 "PO-Revision-Date: 2022-04-13 21:35+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2022-04-17 08:28+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -429,12 +430,26 @@
 "que les logiciels privateurs prestigieux n'ont pas de bogue grave."
 
 #. type: Content of: <div><div><ul><li><p>
+# | A critical bug in Apple's iOS makes it possible for attackers to alter a
+# | shutdown event, <a
+# | 
href=\"https://blog.zecops.com/research/persistence-without-persistence-meet-the-ultimate-persistence-bug-noreboot/\";>tricking
+# | the user into thinking that the phone has been powered off</a>. But in
+# | fact, it[-’-]{+'+}s still running, and the user can't feel any difference
+# | between a real shutdown and the fake shutdown.
+#, fuzzy
+#| msgid ""
+#| "A critical bug in Apple's iOS makes it possible for attackers to alter a "
+#| "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-";
+#| "without-persistence-meet-the-ultimate-persistence-bug-noreboot/"
+#| "\">tricking the user into thinking that the phone has been powered off</"
+#| "a>. But in fact, it’s still running, and the user can't feel any "
+#| "difference between a real shutdown and the fake shutdown."
 msgid ""
 "A critical bug in Apple's iOS makes it possible for attackers to alter a "
 "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-";
 "without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
 "the user into thinking that the phone has been powered off</a>. But in fact, "
-"it’s still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
 "shutdown and the fake shutdown."
 msgstr ""
 "Une faille critique dans iOS permet à un attaquant de modifier une étape de 
"

Index: malware-apple.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it-diff.html,v
retrieving revision 1.98
retrieving revision 1.99
diff -u -b -r1.98 -r1.99
--- malware-apple.it-diff.html  13 Apr 2022 16:39:52 -0000      1.98
+++ malware-apple.it-diff.html  17 Apr 2022 08:38:51 -0000      1.99
@@ -332,7 +332,7 @@
     it possible for attackers to alter a shutdown event, &lt;a
     
href="https://blog.zecops.com/research/persistence-without-persistence-meet-the-ultimate-persistence-bug-noreboot/"&gt;tricking
     the user into thinking that the phone has been powered
-    off&lt;/a&gt;. But in fact, it’s still running, and the user can't feel
+    off&lt;/a&gt;. But in fact, it's still running, and the user can't feel
     any difference between a real shutdown and the fake shutdown.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -527,7 +527,7 @@
     &lt;p&gt;&lt;a 
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&amp;oldid=835861046"&gt;
     iOS, the operating system of the Apple iThings, is the prototype
     of a jail&lt;/a&gt;.  It was Apple that introduced the practice of
-    designing general purpose computers with</em></ins></span> censorship 
<span class="inserted"><ins><em>of application
+    designing general purpose computers with censorship of application
     programs.&lt;/p&gt;
 
     &lt;p&gt;Here is an article about the &lt;a
@@ -544,7 +544,7 @@
   &lt;/li&gt;
 &lt;/ul&gt;
 
-&lt;h4 id="jail-censorship"&gt;Examples of censorship by Apple jails&lt;/h4&gt;
+&lt;h4 id="jail-censorship"&gt;Examples of</em></ins></span> censorship <span 
class="inserted"><ins><em>by Apple jails&lt;/h4&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M202108200"&gt;
@@ -1549,7 +1549,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2022/04/13 16:39:52 $
+$Date: 2022/04/17 08:38:51 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-apple.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it.po,v
retrieving revision 1.177
retrieving revision 1.178
diff -u -b -r1.177 -r1.178
--- malware-apple.it.po 13 Apr 2022 16:39:53 -0000      1.177
+++ malware-apple.it.po 17 Apr 2022 08:38:51 -0000      1.178
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2022-04-13 12:56+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
 "PO-Revision-Date: 2017-12-31 13:01+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -528,7 +528,7 @@
 "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-";
 "without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
 "the user into thinking that the phone has been powered off</a>. But in fact, "
-"it’s still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
 "shutdown and the fake shutdown."
 msgstr ""
 

Index: malware-apple.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja-diff.html,v
retrieving revision 1.113
retrieving revision 1.114
diff -u -b -r1.113 -r1.114
--- malware-apple.ja-diff.html  13 Apr 2022 16:39:53 -0000      1.113
+++ malware-apple.ja-diff.html  17 Apr 2022 08:38:51 -0000      1.114
@@ -355,7 +355,7 @@
 banned</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://blog.zecops.com/research/persistence-without-persistence-meet-the-ultimate-persistence-bug-noreboot/"&gt;tricking
     the user into thinking that the phone has been powered
-    off&lt;/a&gt;. But in fact, it’s still running, and the user can't feel
+    off&lt;/a&gt;. But in fact, it's still running, and the user can't feel
     any difference between</em></ins></span> a <span 
class="removed"><del><strong>program from</strong></del></span> <span 
class="inserted"><ins><em>real shutdown and</em></ins></span> the <span 
class="removed"><del><strong>App Store&lt;/a&gt; because its developers
 committed</strong></del></span> <span class="inserted"><ins><em>fake 
shutdown.&lt;/p&gt;
   &lt;/li&gt;
@@ -1073,8 +1073,8 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The Chinese Communist Party's &ldquo;Study
-    the Great Nation&rdquo; app requires users to grant it</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
+    the Great Nation&rdquo; app requires users to grant it &lt;a
+    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
     access to the phone's microphone, photos, text messages, contacts, and
     internet history&lt;/a&gt;, and the Android version was found to contain a
     back-door allowing developers to run any code they wish in the users'
@@ -1141,8 +1141,8 @@
   &lt;li id="M201702150"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Apple proposes &lt;a
-    
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
+    &lt;p&gt;Apple proposes</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
     fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no way
     to use it without having your fingerprints taken. Users would have
     no way to tell whether the phone is snooping on them.&lt;/p&gt;
@@ -1517,7 +1517,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2022/04/13 16:39:53 $
+$Date: 2022/04/17 08:38:51 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-apple.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja.po,v
retrieving revision 1.160
retrieving revision 1.161
diff -u -b -r1.160 -r1.161
--- malware-apple.ja.po 13 Apr 2022 16:39:54 -0000      1.160
+++ malware-apple.ja.po 17 Apr 2022 08:38:51 -0000      1.161
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2022-04-13 12:56+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
 "PO-Revision-Date: 2016-12-20 14:42+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -443,7 +443,7 @@
 "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-";
 "without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
 "the user into thinking that the phone has been powered off</a>. But in fact, "
-"it’s still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
 "shutdown and the fake shutdown."
 msgstr ""
 

Index: malware-apple.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl-diff.html,v
retrieving revision 1.116
retrieving revision 1.117
diff -u -b -r1.116 -r1.117
--- malware-apple.nl-diff.html  13 Apr 2022 16:39:54 -0000      1.116
+++ malware-apple.nl-diff.html  17 Apr 2022 08:38:51 -0000      1.117
@@ -355,7 +355,7 @@
 banned</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://blog.zecops.com/research/persistence-without-persistence-meet-the-ultimate-persistence-bug-noreboot/"&gt;tricking
     the user into thinking that the phone has been powered
-    off&lt;/a&gt;. But in fact, it’s still running, and the user can't feel
+    off&lt;/a&gt;. But in fact, it's still running, and the user can't feel
     any difference between</em></ins></span> a <span 
class="removed"><del><strong>program from</strong></del></span> <span 
class="inserted"><ins><em>real shutdown and</em></ins></span> the <span 
class="removed"><del><strong>App Store&lt;/a&gt; because its developers
 committed</strong></del></span> <span class="inserted"><ins><em>fake 
shutdown.&lt;/p&gt;
   &lt;/li&gt;
@@ -1073,8 +1073,8 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The Chinese Communist Party's &ldquo;Study
-    the Great Nation&rdquo; app requires users to grant it</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
+    the Great Nation&rdquo; app requires users to grant it &lt;a
+    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
     access to the phone's microphone, photos, text messages, contacts, and
     internet history&lt;/a&gt;, and the Android version was found to contain a
     back-door allowing developers to run any code they wish in the users'
@@ -1141,8 +1141,8 @@
   &lt;li id="M201702150"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Apple proposes &lt;a
-    
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
+    &lt;p&gt;Apple proposes</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
     fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no way
     to use it without having your fingerprints taken. Users would have
     no way to tell whether the phone is snooping on them.&lt;/p&gt;
@@ -1517,7 +1517,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2022/04/13 16:39:54 $
+$Date: 2022/04/17 08:38:51 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-apple.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl.po,v
retrieving revision 1.114
retrieving revision 1.115
diff -u -b -r1.114 -r1.115
--- malware-apple.nl.po 13 Apr 2022 16:39:54 -0000      1.114
+++ malware-apple.nl.po 17 Apr 2022 08:38:51 -0000      1.115
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2022-04-13 12:56+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
 "PO-Revision-Date: 2017-01-10 22:15+0100\n"
 "Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
 "Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -474,7 +474,7 @@
 "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-";
 "without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
 "the user into thinking that the phone has been powered off</a>. But in fact, "
-"it’s still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
 "shutdown and the fake shutdown."
 msgstr ""
 

Index: malware-apple.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.pot,v
retrieving revision 1.124
retrieving revision 1.125
diff -u -b -r1.124 -r1.125
--- malware-apple.pot   13 Apr 2022 12:56:19 -0000      1.124
+++ malware-apple.pot   17 Apr 2022 08:38:51 -0000      1.125
@@ -7,13 +7,13 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2022-04-13 12:56+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
 "Language: \n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=UTF-8\n"
+"Content-Type: text/plain; charset=CHARSET\n"
 "Content-Transfer-Encoding: 8bit\n"
 
 #. type: Content of: <title>
@@ -333,7 +333,7 @@
 "shutdown event, <a "
 
"href=\"https://blog.zecops.com/research/persistence-without-persistence-meet-the-ultimate-persistence-bug-noreboot/\";>tricking
 "
 "the user into thinking that the phone has been powered off</a>. But in fact, "
-"it’s still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
 "shutdown and the fake shutdown."
 msgstr ""
 

Index: malware-apple.pt-br-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.pt-br-diff.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- malware-apple.pt-br-diff.html       13 Apr 2022 16:39:54 -0000      1.5
+++ malware-apple.pt-br-diff.html       17 Apr 2022 08:38:51 -0000      1.6
@@ -292,7 +292,7 @@
     it possible for attackers to alter a shutdown event, &lt;a
     
href="https://blog.zecops.com/research/persistence-without-persistence-meet-the-ultimate-persistence-bug-noreboot/"&gt;tricking
     the user into thinking that the phone has been powered
-    off&lt;/a&gt;. But in fact, it’s still running, and the user can't feel
+    off&lt;/a&gt;. But in fact, it's still running, and the user can't feel
     any difference between a real shutdown and the fake shutdown.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1307,7 +1307,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2022/04/13 16:39:54 $
+$Date: 2022/04/17 08:38:51 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-apple.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.pt-br.po,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- malware-apple.pt-br.po      13 Apr 2022 16:39:54 -0000      1.26
+++ malware-apple.pt-br.po      17 Apr 2022 08:38:51 -0000      1.27
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2022-04-13 12:56+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
 "PO-Revision-Date: 2021-06-26 09:40-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -446,7 +446,7 @@
 "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-";
 "without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
 "the user into thinking that the phone has been powered off</a>. But in fact, "
-"it’s still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
 "shutdown and the fake shutdown."
 msgstr ""
 

Index: malware-apple.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ru.po,v
retrieving revision 1.298
retrieving revision 1.299
diff -u -b -r1.298 -r1.299
--- malware-apple.ru.po 13 Apr 2022 17:34:58 -0000      1.298
+++ malware-apple.ru.po 17 Apr 2022 08:38:51 -0000      1.299
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2022-04-13 12:56+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2022-04-17 08:28+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -429,12 +430,26 @@
 "предположение, что в престижных 
несвободных программах нет серьезных 
ошибок."
 
 #. type: Content of: <div><div><ul><li><p>
+# | A critical bug in Apple's iOS makes it possible for attackers to alter a
+# | shutdown event, <a
+# | 
href=\"https://blog.zecops.com/research/persistence-without-persistence-meet-the-ultimate-persistence-bug-noreboot/\";>tricking
+# | the user into thinking that the phone has been powered off</a>. But in
+# | fact, it[-’-]{+'+}s still running, and the user can't feel any difference
+# | between a real shutdown and the fake shutdown.
+#, fuzzy
+#| msgid ""
+#| "A critical bug in Apple's iOS makes it possible for attackers to alter a "
+#| "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-";
+#| "without-persistence-meet-the-ultimate-persistence-bug-noreboot/"
+#| "\">tricking the user into thinking that the phone has been powered off</"
+#| "a>. But in fact, it’s still running, and the user can't feel any "
+#| "difference between a real shutdown and the fake shutdown."
 msgid ""
 "A critical bug in Apple's iOS makes it possible for attackers to alter a "
 "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-";
 "without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
 "the user into thinking that the phone has been powered off</a>. But in fact, "
-"it’s still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
 "shutdown and the fake shutdown."
 msgstr ""
 "Критичная ошибка в iOS компании Apple дает 
взломщикам возможность изменять "

Index: malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.120
retrieving revision 1.121
diff -u -b -r1.120 -r1.121
--- malware-mobiles.de-diff.html        13 Apr 2022 16:39:59 -0000      1.120
+++ malware-mobiles.de-diff.html        17 Apr 2022 08:38:51 -0000      1.121
@@ -192,8 +192,8 @@
     
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;
     often used to make a phone transmit all conversations it 
hears&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The back door &lt;a <span 
class="inserted"><ins><em>class="not-a-duplicate"</em></ins></span>
-    
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
+    &lt;p&gt;The back door &lt;a <span 
class="removed"><del><strong>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;</strong></del></span>
 <span class="inserted"><ins><em>class="not-a-duplicate"
+    
href="https://www.osnews.com/story/27416/the-second-operating-system-hiding-in-every-mobile-phone/"&gt;</em></ins></span>
     may take the form of bugs that have gone 20 years unfixed&lt;/a&gt;.
     The choice to leave the security holes in place is morally
     equivalent to writing a back door.&lt;/p&gt;
@@ -547,10 +547,12 @@
     the worse aspect of these apps is that &lt;a
     href="/philosophy/surveillance-vs-democracy.html"&gt;payment is not <span 
class="removed"><del><strong>anonymous&lt;/a&gt;.
 &lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>anonymous&lt;/a&gt;.&lt;/p&gt;
+    <span 
class="inserted"><ins><em>anonymous&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201505294"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201505294"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
@@ -575,12 +577,10 @@
     data from third parties in general, but it can't protect that data
     from the state.  Quite the contrary: confiding your data to someone
     else's server, if not first encrypted by you with free software,
-    undermines your rights.&lt;/p&gt;</em></ins></span>
+    undermines your rights.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201402210"&gt;
+  &lt;li id="M201402210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The &lt;a
@@ -1425,7 +1425,7 @@
 
 &lt;li&gt;
                &lt;p&gt;Faceapp appears to do</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+    <span 
class="inserted"><ins><em>href="https://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
     sold with spyware sending</em></ins></span> lots of <span 
class="removed"><del><strong>surveillance, judging by 
     &lt;a 
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
                how much access it demands to personal</strong></del></span> 
data <span class="removed"><del><strong>in the device&lt;/a&gt;.
@@ -1899,7 +1899,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2022/04/13 16:39:59 $
+$Date: 2022/04/17 08:38:51 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.170
retrieving revision 1.171
diff -u -b -r1.170 -r1.171
--- malware-mobiles.de.po       13 Apr 2022 16:39:59 -0000      1.170
+++ malware-mobiles.de.po       17 Apr 2022 08:38:51 -0000      1.171
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -328,8 +328,10 @@
 "a>."
 
 #. type: Content of: <div><div><p>
-# | The back door <a {+class=\"not-a-duplicate\"+}
-# | 
href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\";>
+# | The back door <a
+# | 
[-href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\";>-]
+# | {+class=\"not-a-duplicate\"
+# | 
href=\"https://www.osnews.com/story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\";>+}
 # | may take the form of bugs that have gone 20 years unfixed</a>.  The choice
 # | to leave the security holes in place is morally equivalent to writing a
 # | back door.
@@ -340,8 +342,8 @@
 #| "form of bugs that have gone 20 years unfixed</a>.  The choice to leave "
 #| "the security holes in place is morally equivalent to writing a back door."
 msgid ""
-"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"The back door <a class=\"not-a-duplicate\" href=\"https://www.osnews.com/";
+"story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\"> may "
 "take the form of bugs that have gone 20 years unfixed</a>.  The choice to "
 "leave the security holes in place is morally equivalent to writing a back "
 "door."
@@ -2222,8 +2224,17 @@
 "App JavaScript-Injektion für Tracking und Anzeigen von Werbung darstellt."
 
 #. type: Content of: <div><div><ul><li><p>
+# | Some portable phones <a
+# | 
href=\"http{+s+}://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html\">are
+# | sold with spyware sending lots of data to China</a>.
+#, fuzzy
+#| msgid ""
+#| "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+#| "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#| "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#| "html\">are sold with spyware sending lots of data to China</a>."
 msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/";
 "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
 "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
 "html\">are sold with spyware sending lots of data to China</a>."

Index: malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.271
retrieving revision 1.272
diff -u -b -r1.271 -r1.272
--- malware-mobiles.es.po       15 Apr 2022 18:01:38 -0000      1.271
+++ malware-mobiles.es.po       17 Apr 2022 08:38:51 -0000      1.272
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2022-04-17 08:28+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.4.2\n"
 
@@ -260,9 +261,22 @@
 "el teléfono transmita todas las conversaciones que escucha</a>."
 
 #. type: Content of: <div><div><p>
+# | The back door <a class=\"not-a-duplicate\"
+# | 
[-href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\";>-]
+# | 
{+href=\"https://www.osnews.com/story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\";>+}
+# | may take the form of bugs that have gone 20 years unfixed</a>.  The choice
+# | to leave the security holes in place is morally equivalent to writing a
+# | back door.
+#, fuzzy
+#| msgid ""
+#| "The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
+#| "story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> "
+#| "may take the form of bugs that have gone 20 years unfixed</a>.  The "
+#| "choice to leave the security holes in place is morally equivalent to "
+#| "writing a back door."
 msgid ""
-"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"The back door <a class=\"not-a-duplicate\" href=\"https://www.osnews.com/";
+"story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\"> may "
 "take the form of bugs that have gone 20 years unfixed</a>.  The choice to "
 "leave the security holes in place is morally equivalent to writing a back "
 "door."
@@ -2109,8 +2123,17 @@
 "JavaScript para rastrear a los usuarios y mostrarles anuncios."
 
 #. type: Content of: <div><div><ul><li><p>
+# | Some portable phones <a
+# | 
href=\"http{+s+}://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html\">are
+# | sold with spyware sending lots of data to China</a>.
+#, fuzzy
+#| msgid ""
+#| "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+#| "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#| "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#| "html\">are sold with spyware sending lots of data to China</a>."
 msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/";
 "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
 "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
 "html\">are sold with spyware sending lots of data to China</a>."

Index: malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.270
retrieving revision 1.271
diff -u -b -r1.270 -r1.271
--- malware-mobiles.fr.po       13 Apr 2022 19:35:43 -0000      1.270
+++ malware-mobiles.fr.po       17 Apr 2022 08:38:51 -0000      1.271
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
 "PO-Revision-Date: 2022-04-13 21:35+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2022-04-17 08:28+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -256,9 +257,22 @@
 "transmettre toutes les conversations qu'il entend</a>."
 
 #. type: Content of: <div><div><p>
+# | The back door <a class=\"not-a-duplicate\"
+# | 
[-href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\";>-]
+# | 
{+href=\"https://www.osnews.com/story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\";>+}
+# | may take the form of bugs that have gone 20 years unfixed</a>.  The choice
+# | to leave the security holes in place is morally equivalent to writing a
+# | back door.
+#, fuzzy
+#| msgid ""
+#| "The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
+#| "story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> "
+#| "may take the form of bugs that have gone 20 years unfixed</a>.  The "
+#| "choice to leave the security holes in place is morally equivalent to "
+#| "writing a back door."
 msgid ""
-"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"The back door <a class=\"not-a-duplicate\" href=\"https://www.osnews.com/";
+"story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\"> may "
 "take the form of bugs that have gone 20 years unfixed</a>.  The choice to "
 "leave the security holes in place is morally equivalent to writing a back "
 "door."
@@ -2105,8 +2119,17 @@
 "utilisateurs et à l'affichage de pubs."
 
 #. type: Content of: <div><div><ul><li><p>
+# | Some portable phones <a
+# | 
href=\"http{+s+}://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html\">are
+# | sold with spyware sending lots of data to China</a>.
+#, fuzzy
+#| msgid ""
+#| "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+#| "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#| "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#| "html\">are sold with spyware sending lots of data to China</a>."
 msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/";
 "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
 "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
 "html\">are sold with spyware sending lots of data to China</a>."

Index: malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.123
retrieving revision 1.124
diff -u -b -r1.123 -r1.124
--- malware-mobiles.it-diff.html        13 Apr 2022 16:39:59 -0000      1.123
+++ malware-mobiles.it-diff.html        17 Apr 2022 08:38:51 -0000      1.124
@@ -206,7 +206,7 @@
     <span class="inserted"><ins><em>often used to make a phone transmit all 
conversations it hears&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The back door &lt;a class="not-a-duplicate"
-    
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
+    
href="https://www.osnews.com/story/27416/the-second-operating-system-hiding-in-every-mobile-phone/"&gt;
     may take the form of bugs that have gone 20 years unfixed&lt;/a&gt;.
     The choice to leave the security holes in place</em></ins></span> is <span 
class="removed"><del><strong>employed</strong></del></span> <span 
class="inserted"><ins><em>morally
     equivalent</em></ins></span> to <span class="removed"><del><strong>listen 
through their microphones&lt;/a&gt;.&lt;/p&gt;
@@ -235,15 +235,15 @@
   &lt;li id="M202001090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Android phones subsidized by the US government come 
with</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;the
 nature</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/"&gt;
-    preinstalled adware and a back door for forcing 
installation</em></ins></span> of
-    <span class="inserted"><ins><em>apps&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Android phones subsidized by the US government come with &lt;a
+    
href="https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/"&gt;
+    preinstalled adware and a back door for forcing installation of
+    apps&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The adware is in a modified version of an
     essential system configuration app. The back door is a
-    surreptitious addition to a program whose stated purpose is to be a &lt;a
-    
href="https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/"&gt;
+    surreptitious addition to a program whose stated purpose is to be 
a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;the
 nature</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/"&gt;
     universal back door for firmware&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;In other words, a program whose raison d'être is malicious has
@@ -296,7 +296,7 @@
     &lt;p&gt;&lt;a
     
href="https://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;
     A Chinese version of Android has a universal back door&lt;/a&gt;. Nearly
-    all models of mobile phones have a &lt;a 
href="#universal-back-door-phone-modem"&gt;
+    all models</em></ins></span> of <span class="inserted"><ins><em>mobile 
phones have a &lt;a href="#universal-back-door-phone-modem"&gt;
     universal back door in the modem chip&lt;/a&gt;. So why did Coolpad bother
     to introduce another? Because</em></ins></span> this <span 
class="removed"><del><strong>problem&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>one is controlled by 
Coolpad.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
@@ -529,12 +529,10 @@
     the worse aspect of these apps is that &lt;a
     href="/philosophy/surveillance-vs-democracy.html"&gt;payment is not <span 
class="removed"><del><strong>anonymous&lt;/a&gt;.
 &lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>anonymous&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    <span class="inserted"><ins><em>anonymous&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201505294"&gt;
+  &lt;li id="M201505294"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
@@ -559,10 +557,12 @@
     data from third parties in general, but it can't protect that data
     from the state.  Quite the contrary: confiding your data to someone
     else's server, if not first encrypted by you with free software,
-    undermines your rights.&lt;/p&gt;
+    undermines your rights.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201402210"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201402210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The &lt;a
@@ -1407,7 +1407,7 @@
 
 &lt;li&gt;
                &lt;p&gt;Faceapp appears to do</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+    <span 
class="inserted"><ins><em>href="https://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
     sold with spyware sending</em></ins></span> lots of <span 
class="removed"><del><strong>surveillance, judging by 
     &lt;a 
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
                how much access it demands to personal data in the 
device&lt;/a&gt;.
@@ -1880,7 +1880,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2022/04/13 16:39:59 $
+$Date: 2022/04/17 08:38:51 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.170
retrieving revision 1.171
diff -u -b -r1.170 -r1.171
--- malware-mobiles.it.po       13 Apr 2022 16:39:59 -0000      1.170
+++ malware-mobiles.it.po       17 Apr 2022 08:38:51 -0000      1.171
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
 "PO-Revision-Date: 2017-12-31 13:12+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -305,7 +305,7 @@
 # | [-More about-]{+The back door+} <a
 # | 
[-href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\";>the
 # | nature-] {+class=\"not-a-duplicate\"
-# | 
href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\";>
+# | 
href=\"https://www.osnews.com/story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\";>
 # | may take the form+} of [-this problem</a>.-] {+bugs that have gone 20
 # | years unfixed</a>.  The choice to leave the security holes in place is
 # | morally equivalent to writing a back door.+}
@@ -315,8 +315,8 @@
 #| "The_second_operating_system_hiding_in_every_mobile_phone\">the nature of "
 #| "this problem</a>."
 msgid ""
-"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"The back door <a class=\"not-a-duplicate\" href=\"https://www.osnews.com/";
+"story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\"> may "
 "take the form of bugs that have gone 20 years unfixed</a>.  The choice to "
 "leave the security holes in place is morally equivalent to writing a back "
 "door."
@@ -2007,8 +2007,17 @@
 "versione non-premium usa JavaScript a scopi pubblicitari."
 
 #. type: Content of: <div><div><ul><li><p>
+# | Some portable phones <a
+# | 
href=\"http{+s+}://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html\">are
+# | sold with spyware sending lots of data to China</a>.
+#, fuzzy
+#| msgid ""
+#| "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+#| "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#| "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#| "html\">are sold with spyware sending lots of data to China</a>."
 msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/";
 "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
 "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
 "html\">are sold with spyware sending lots of data to China</a>."

Index: malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.141
retrieving revision 1.142
diff -u -b -r1.141 -r1.142
--- malware-mobiles.ja-diff.html        13 Apr 2022 16:39:59 -0000      1.141
+++ malware-mobiles.ja-diff.html        17 Apr 2022 08:38:51 -0000      1.142
@@ -202,7 +202,7 @@
     often used</em></ins></span> to <span 
class="removed"><del><strong>restrict what users can do</strong></del></span> 
<span class="inserted"><ins><em>make a phone transmit all conversations it 
hears&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The back door &lt;a class="not-a-duplicate"
-    
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
+    
href="https://www.osnews.com/story/27416/the-second-operating-system-hiding-in-every-mobile-phone/"&gt;
     may take the form of bugs that have gone 20 years unfixed&lt;/a&gt;.
     The choice to leave the security holes in place is morally
     equivalent to writing a back door.&lt;/p&gt;
@@ -677,10 +677,10 @@
     
href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/"&gt;
     pushing unwanted and often malicious ads on users, and redirecting them
     to phishing sites&lt;/a&gt; that stole their credentials. Furthermore, the
-    user interface of most of them was designed to make uninstallation
+    user interface of most</em></ins></span> of <span 
class="inserted"><ins><em>them was designed to make uninstallation
     difficult.&lt;/p&gt;
 
-    &lt;p&gt;Users should</em></ins></span> of <span 
class="inserted"><ins><em>course uninstall these dangerous apps if they
+    &lt;p&gt;Users should of course uninstall these dangerous apps if they
     haven't yet, but they should also stay away from nonfree apps in
     general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry</em></ins></span> a 
<span class="inserted"><ins><em>potential risk because
     there is no easy way of knowing what they really do.&lt;/p&gt;
@@ -741,10 +741,10 @@
     companies for various organizations, do &lt;a
     
href="https://www.expressvpn.com/digital-security-lab/investigation-xoth"&gt;
     location tracking unknown to those companies and those
-    organizations&lt;/a&gt;.  It's actually some widely used libraries that do
+    organizations&lt;/a&gt;.  It's actually some widely used 
libraries</em></ins></span> that <span class="inserted"><ins><em>do
     the tracking.&lt;/p&gt;
 
-    &lt;p&gt;What's unusual here is</em></ins></span> that <span 
class="inserted"><ins><em>proprietary software developer A tricks
+    &lt;p&gt;What's unusual here is that proprietary software developer A 
tricks
     proprietary software developers B1 &hellip; B50 into making platforms for
     A to mistreat the end user.&lt;/p&gt;
   &lt;/li&gt;
@@ -940,7 +940,7 @@
     
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
     available to employers and insurance companies&lt;/a&gt;. Even though the
     data is &ldquo;anonymized and aggregated,&rdquo; it can easily be
-    traced back to the woman who uses</em></ins></span> the <span 
class="inserted"><ins><em>app.&lt;/p&gt;
+    traced back to</em></ins></span> the <span class="inserted"><ins><em>woman 
who uses the app.&lt;/p&gt;
 
     &lt;p&gt;This has harmful implications for women's rights to equal 
employment
     and freedom to make their own pregnancy choices. Don't use
@@ -960,8 +960,8 @@
     preinstalled nonfree apps that have access to sensitive data without
     users' knowledge&lt;/a&gt;. These hidden apps may either call home with
     the data, or pass it on to user-installed apps that have access to
-    the network but no direct access to</em></ins></span> the <span 
class="inserted"><ins><em>data. This results in massive
-    surveillance on which the user has absolutely no control.&lt;/p&gt;
+    the network but no direct access to the data. This results in massive
+    surveillance on which</em></ins></span> the <span 
class="inserted"><ins><em>user has absolutely no control.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903211"&gt;
@@ -1376,7 +1376,7 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Some portable phones &lt;a
-    
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+    
href="https://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
     sold with spyware sending lots of data to China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1772,7 +1772,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2022/04/13 16:39:59 $
+$Date: 2022/04/17 08:38:51 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.160
retrieving revision 1.161
diff -u -b -r1.160 -r1.161
--- malware-mobiles.ja.po       13 Apr 2022 16:39:59 -0000      1.160
+++ malware-mobiles.ja.po       17 Apr 2022 08:38:51 -0000      1.161
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
 "PO-Revision-Date: 2016-12-20 14:59+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -262,8 +262,8 @@
 
 #. type: Content of: <div><div><p>
 msgid ""
-"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"The back door <a class=\"not-a-duplicate\" href=\"https://www.osnews.com/";
+"story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\"> may "
 "take the form of bugs that have gone 20 years unfixed</a>.  The choice to "
 "leave the security holes in place is morally equivalent to writing a back "
 "door."
@@ -1615,8 +1615,14 @@
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+#| "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#| "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#| "html\">are sold with spyware sending lots of data to China</a>."
 msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/";
 "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
 "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
 "html\">are sold with spyware sending lots of data to China</a>."

Index: malware-mobiles.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pot,v
retrieving revision 1.135
retrieving revision 1.136
diff -u -b -r1.135 -r1.136
--- malware-mobiles.pot 13 Apr 2022 16:39:59 -0000      1.135
+++ malware-mobiles.pot 17 Apr 2022 08:38:51 -0000      1.136
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -210,7 +210,7 @@
 #. type: Content of: <div><div><p>
 msgid ""
 "The back door <a class=\"not-a-duplicate\" "
-"href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\";>
 "
+"href=\"https://www.osnews.com/story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\";>
 "
 "may take the form of bugs that have gone 20 years unfixed</a>.  The choice "
 "to leave the security holes in place is morally equivalent to writing a back "
 "door."
@@ -1399,7 +1399,7 @@
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "Some portable phones <a "
-"href=\"http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html\";>are
 "
+"href=\"https://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html\";>are
 "
 "sold with spyware sending lots of data to China</a>."
 msgstr ""
 

Index: malware-mobiles.pt-br-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pt-br-diff.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- malware-mobiles.pt-br-diff.html     13 Apr 2022 16:39:59 -0000      1.5
+++ malware-mobiles.pt-br-diff.html     17 Apr 2022 08:38:51 -0000      1.6
@@ -170,7 +170,8 @@
     often used to make a phone transmit all conversations it 
hears&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The back door &lt;a class="not-a-duplicate"
-    
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
+    <span 
class="removed"><del><strong>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.osnews.com/story/27416/the-second-operating-system-hiding-in-every-mobile-phone/"&gt;</em></ins></span>
     may take the form of bugs that have gone 20 years unfixed&lt;/a&gt;.
     The choice to leave the security holes in place is morally
     equivalent to writing a back door.&lt;/p&gt;
@@ -1305,7 +1306,8 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Some portable phones &lt;a
-    
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+    <span 
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are</em></ins></span>
     sold with spyware sending lots of data to China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1660,7 +1662,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2022/04/13 16:39:59 $
+$Date: 2022/04/17 08:38:51 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-mobiles.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pt-br.po,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- malware-mobiles.pt-br.po    13 Apr 2022 16:39:59 -0000      1.14
+++ malware-mobiles.pt-br.po    17 Apr 2022 08:38:51 -0000      1.15
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
 "PO-Revision-Date: 2021-06-26 09:39-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -259,9 +259,16 @@
 "transmitir todas as conversas que ele ouve</a>."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
+#| "story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> "
+#| "may take the form of bugs that have gone 20 years unfixed</a>.  The "
+#| "choice to leave the security holes in place is morally equivalent to "
+#| "writing a back door."
 msgid ""
-"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"The back door <a class=\"not-a-duplicate\" href=\"https://www.osnews.com/";
+"story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\"> may "
 "take the form of bugs that have gone 20 years unfixed</a>.  The choice to "
 "leave the security holes in place is morally equivalent to writing a back "
 "door."
@@ -2202,8 +2209,14 @@
 "usuário e exibir anúncios."
 
 #. type: Content of: <div><div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+#| "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#| "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#| "html\">are sold with spyware sending lots of data to China</a>."
 msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/";
 "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
 "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
 "html\">are sold with spyware sending lots of data to China</a>."

Index: malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.302
retrieving revision 1.303
diff -u -b -r1.302 -r1.303
--- malware-mobiles.ru.po       13 Apr 2022 17:34:58 -0000      1.302
+++ malware-mobiles.ru.po       17 Apr 2022 08:38:51 -0000      1.303
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2022-04-17 08:28+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -255,9 +256,22 @@
 "передавать все разговоры, которые он 
слышит</a>."
 
 #. type: Content of: <div><div><p>
+# | The back door <a class=\"not-a-duplicate\"
+# | 
[-href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\";>-]
+# | 
{+href=\"https://www.osnews.com/story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\";>+}
+# | may take the form of bugs that have gone 20 years unfixed</a>.  The choice
+# | to leave the security holes in place is morally equivalent to writing a
+# | back door.
+#, fuzzy
+#| msgid ""
+#| "The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
+#| "story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> "
+#| "may take the form of bugs that have gone 20 years unfixed</a>.  The "
+#| "choice to leave the security holes in place is morally equivalent to "
+#| "writing a back door."
 msgid ""
-"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"The back door <a class=\"not-a-duplicate\" href=\"https://www.osnews.com/";
+"story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\"> may "
 "take the form of bugs that have gone 20 years unfixed</a>.  The choice to "
 "leave the security holes in place is morally equivalent to writing a back "
 "door."
@@ -2086,8 +2100,17 @@
 "пользователем и показа рекламы."
 
 #. type: Content of: <div><div><ul><li><p>
+# | Some portable phones <a
+# | 
href=\"http{+s+}://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html\">are
+# | sold with spyware sending lots of data to China</a>.
+#, fuzzy
+#| msgid ""
+#| "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+#| "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#| "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#| "html\">are sold with spyware sending lots of data to China</a>."
 msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/";
 "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
 "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
 "html\">are sold with spyware sending lots of data to China</a>."

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.384
retrieving revision 1.385
diff -u -b -r1.384 -r1.385
--- nl.po       13 Apr 2022 16:39:59 -0000      1.384
+++ nl.po       17 Apr 2022 08:38:51 -0000      1.385
@@ -584,7 +584,7 @@
 "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-";
 "without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
 "the user into thinking that the phone has been powered off</a>. But in fact, "
-"it’s still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
 "shutdown and the fake shutdown."
 msgstr ""
 
@@ -5937,7 +5937,7 @@
 msgid ""
 "Many games are designed to keep gamers compulsively playing&mdash;and "
 "spending money on the game. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
+"\"https://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
 "to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
 "research</a>:"
 msgstr ""
@@ -6938,8 +6938,8 @@
 
 #. type: Content of: <div><div><p>
 msgid ""
-"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"The back door <a class=\"not-a-duplicate\" href=\"https://www.osnews.com/";
+"story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\"> may "
 "take the form of bugs that have gone 20 years unfixed</a>.  The choice to "
 "leave the security holes in place is morally equivalent to writing a back "
 "door."
@@ -7458,7 +7458,7 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/";
 "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
 "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
 "html\">are sold with spyware sending lots of data to China</a>."

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.383
retrieving revision 1.384
diff -u -b -r1.383 -r1.384
--- pl.po       13 Apr 2022 16:40:00 -0000      1.383
+++ pl.po       17 Apr 2022 08:38:52 -0000      1.384
@@ -570,7 +570,7 @@
 "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-";
 "without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
 "the user into thinking that the phone has been powered off</a>. But in fact, "
-"it’s still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
 "shutdown and the fake shutdown."
 msgstr ""
 
@@ -5641,7 +5641,7 @@
 msgid ""
 "Many games are designed to keep gamers compulsively playing&mdash;and "
 "spending money on the game. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
+"\"https://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
 "to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
 "research</a>:"
 msgstr ""
@@ -6551,8 +6551,8 @@
 
 #. type: Content of: <div><div><p>
 msgid ""
-"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"The back door <a class=\"not-a-duplicate\" href=\"https://www.osnews.com/";
+"story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\"> may "
 "take the form of bugs that have gone 20 years unfixed</a>.  The choice to "
 "leave the security holes in place is morally equivalent to writing a back "
 "door."
@@ -7048,7 +7048,7 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/";
 "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
 "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
 "html\">are sold with spyware sending lots of data to China</a>."

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.382
retrieving revision 1.383
diff -u -b -r1.382 -r1.383
--- pot 13 Apr 2022 16:40:00 -0000      1.382
+++ pot 17 Apr 2022 08:38:52 -0000      1.383
@@ -483,7 +483,7 @@
 "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-";
 "without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
 "the user into thinking that the phone has been powered off</a>. But in fact, "
-"it’s still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
 "shutdown and the fake shutdown."
 msgstr ""
 
@@ -5333,7 +5333,7 @@
 msgid ""
 "Many games are designed to keep gamers compulsively playing&mdash;and "
 "spending money on the game. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
+"\"https://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
 "to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
 "research</a>:"
 msgstr ""
@@ -6188,8 +6188,8 @@
 
 #. type: Content of: <div><div><p>
 msgid ""
-"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"The back door <a class=\"not-a-duplicate\" href=\"https://www.osnews.com/";
+"story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\"> may "
 "take the form of bugs that have gone 20 years unfixed</a>.  The choice to "
 "leave the security holes in place is morally equivalent to writing a back "
 "door."
@@ -6685,7 +6685,7 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/";
 "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
 "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
 "html\">are sold with spyware sending lots of data to China</a>."

Index: proprietary-addictions.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.es.po,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- proprietary-addictions.es.po        15 Apr 2022 18:01:40 -0000      1.76
+++ proprietary-addictions.es.po        17 Apr 2022 08:38:52 -0000      1.77
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-addictions.html\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2022-04-17 08:28+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -114,10 +115,21 @@
 msgstr "Juegos"
 
 #. type: Content of: <div><div><p>
+# | Many games are designed to keep gamers compulsively playing&mdash;and
+# | spending money on the game. To achieve this result, developers use <a
+# | 
href=\"http{+s+}://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html\">
+# | techniques that derive from behavioral and brain research</a>:
+#, fuzzy
+#| msgid ""
+#| "Many games are designed to keep gamers compulsively playing&mdash;and "
+#| "spending money on the game. To achieve this result, developers use <a "
+#| "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-";
+#| "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#| "and brain research</a>:"
 msgid ""
 "Many games are designed to keep gamers compulsively playing&mdash;and "
 "spending money on the game. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
+"\"https://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
 "to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
 "research</a>:"
 msgstr ""

Index: proprietary-addictions.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.fr.po,v
retrieving revision 1.84
retrieving revision 1.85
diff -u -b -r1.84 -r1.85
--- proprietary-addictions.fr.po        13 Apr 2022 20:22:03 -0000      1.84
+++ proprietary-addictions.fr.po        17 Apr 2022 08:38:52 -0000      1.85
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-addictions.html\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
 "PO-Revision-Date: 2022-04-13 21:35+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2022-04-17 08:28+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Addictions - GNU Project - Free Software Foundation"
@@ -109,10 +110,21 @@
 msgstr "Jeux"
 
 #. type: Content of: <div><div><p>
+# | Many games are designed to keep gamers compulsively playing&mdash;and
+# | spending money on the game. To achieve this result, developers use <a
+# | 
href=\"http{+s+}://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html\">
+# | techniques that derive from behavioral and brain research</a>:
+#, fuzzy
+#| msgid ""
+#| "Many games are designed to keep gamers compulsively playing&mdash;and "
+#| "spending money on the game. To achieve this result, developers use <a "
+#| "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-";
+#| "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#| "and brain research</a>:"
 msgid ""
 "Many games are designed to keep gamers compulsively playing&mdash;and "
 "spending money on the game. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
+"\"https://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
 "to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
 "research</a>:"
 msgstr ""

Index: proprietary-addictions.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.pot,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- proprietary-addictions.pot  13 Apr 2022 16:40:00 -0000      1.38
+++ proprietary-addictions.pot  17 Apr 2022 08:38:52 -0000      1.39
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-addictions.html\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -96,7 +96,7 @@
 msgid ""
 "Many games are designed to keep gamers compulsively playing&mdash;and "
 "spending money on the game. To achieve this result, developers use <a "
-"href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html\";>
 "
+"href=\"https://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html\";>
 "
 "techniques that derive from behavioral and brain research</a>:"
 msgstr ""
 

Index: proprietary-addictions.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.pt-br.po,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary-addictions.pt-br.po     13 Apr 2022 16:40:00 -0000      1.7
+++ proprietary-addictions.pt-br.po     17 Apr 2022 08:38:52 -0000      1.8
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-addictions.html\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
 "PO-Revision-Date: 2021-06-26 09:40-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -108,10 +108,17 @@
 msgstr "Jogos"
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Many games are designed to keep gamers compulsively playing&mdash;and "
+#| "spending money on the game. To achieve this result, developers use <a "
+#| "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-";
+#| "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#| "and brain research</a>:"
 msgid ""
 "Many games are designed to keep gamers compulsively playing&mdash;and "
 "spending money on the game. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
+"\"https://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
 "to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
 "research</a>:"
 msgstr ""

Index: proprietary-addictions.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.ru.po,v
retrieving revision 1.71
retrieving revision 1.72
diff -u -b -r1.71 -r1.72
--- proprietary-addictions.ru.po        13 Apr 2022 17:34:58 -0000      1.71
+++ proprietary-addictions.ru.po        17 Apr 2022 08:38:52 -0000      1.72
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2022-04-17 08:28+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Addictions - GNU Project - Free Software Foundation"
@@ -111,10 +112,21 @@
 msgstr "Игры"
 
 #. type: Content of: <div><div><p>
+# | Many games are designed to keep gamers compulsively playing&mdash;and
+# | spending money on the game. To achieve this result, developers use <a
+# | 
href=\"http{+s+}://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html\">
+# | techniques that derive from behavioral and brain research</a>:
+#, fuzzy
+#| msgid ""
+#| "Many games are designed to keep gamers compulsively playing&mdash;and "
+#| "spending money on the game. To achieve this result, developers use <a "
+#| "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-";
+#| "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#| "and brain research</a>:"
 msgid ""
 "Many games are designed to keep gamers compulsively playing&mdash;and "
 "spending money on the game. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
+"\"https://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
 "to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
 "research</a>:"
 msgstr ""

Index: proprietary-addictions.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.tr.po,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- proprietary-addictions.tr.po        16 Apr 2022 13:02:34 -0000      1.40
+++ proprietary-addictions.tr.po        17 Apr 2022 08:38:52 -0000      1.41
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-addictions.html\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
 "PO-Revision-Date: 2022-04-16 14:01+0200\n"
 "Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
 "Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2022-04-17 08:28+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 "X-Generator: Poedit 3.0.1\n"
 
@@ -107,10 +108,17 @@
 msgstr "Oyunlar"
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Many games are designed to keep gamers compulsively playing&mdash;and "
+#| "spending money on the game. To achieve this result, developers use <a "
+#| "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-";
+#| "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#| "and brain research</a>:"
 msgid ""
 "Many games are designed to keep gamers compulsively playing&mdash;and "
 "spending money on the game. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
+"\"https://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
 "to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
 "research</a>:"
 msgstr ""

Index: proprietary-insecurity.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de-diff.html,v
retrieving revision 1.102
retrieving revision 1.103
diff -u -b -r1.102 -r1.103
--- proprietary-insecurity.de-diff.html 13 Apr 2022 16:40:01 -0000      1.102
+++ proprietary-insecurity.de-diff.html 17 Apr 2022 08:38:52 -0000      1.103
@@ -113,7 +113,7 @@
     it possible for attackers to alter a shutdown event, &lt;a
     
href="https://blog.zecops.com/research/persistence-without-persistence-meet-the-ultimate-persistence-bug-noreboot/"&gt;tricking
     the user into thinking that the phone has been powered
-    off&lt;/a&gt;. But in fact, it’s still running, and the user can't feel
+    off&lt;/a&gt;. But in fact, it's still running, and the user can't feel
     any difference between a real shutdown and the fake shutdown.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1567,7 +1567,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2022/04/13 16:40:01 $
+$Date: 2022/04/17 08:38:52 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.200
retrieving revision 1.201
diff -u -b -r1.200 -r1.201
--- proprietary-insecurity.de.po        13 Apr 2022 16:40:01 -0000      1.200
+++ proprietary-insecurity.de.po        17 Apr 2022 08:38:52 -0000      1.201
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
 "PO-Revision-Date: 2018-08-29 02:41+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -187,7 +187,7 @@
 "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-";
 "without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
 "the user into thinking that the phone has been powered off</a>. But in fact, "
-"it’s still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
 "shutdown and the fake shutdown."
 msgstr ""
 

Index: proprietary-insecurity.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.es.po,v
retrieving revision 1.158
retrieving revision 1.159
diff -u -b -r1.158 -r1.159
--- proprietary-insecurity.es.po        15 Apr 2022 18:01:41 -0000      1.158
+++ proprietary-insecurity.es.po        17 Apr 2022 08:38:52 -0000      1.159
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: \n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2022-04-17 08:28+0000\n"
 "X-Generator: Poedit 2.4.2\n"
 
 #. type: Content of: <title>
@@ -153,12 +154,26 @@
 "de actualizaciones fraudulento de Windows 11."
 
 #. type: Content of: <div><div><ul><li><p>
+# | A critical bug in Apple's iOS makes it possible for attackers to alter a
+# | shutdown event, <a
+# | 
href=\"https://blog.zecops.com/research/persistence-without-persistence-meet-the-ultimate-persistence-bug-noreboot/\";>tricking
+# | the user into thinking that the phone has been powered off</a>. But in
+# | fact, it[-’-]{+'+}s still running, and the user can't feel any difference
+# | between a real shutdown and the fake shutdown.
+#, fuzzy
+#| msgid ""
+#| "A critical bug in Apple's iOS makes it possible for attackers to alter a "
+#| "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-";
+#| "without-persistence-meet-the-ultimate-persistence-bug-noreboot/"
+#| "\">tricking the user into thinking that the phone has been powered off</"
+#| "a>. But in fact, it’s still running, and the user can't feel any "
+#| "difference between a real shutdown and the fake shutdown."
 msgid ""
 "A critical bug in Apple's iOS makes it possible for attackers to alter a "
 "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-";
 "without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
 "the user into thinking that the phone has been powered off</a>. But in fact, "
-"it’s still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
 "shutdown and the fake shutdown."
 msgstr ""
 "Un error crítico en el iOS de Apple permite que un atacante altere el "

Index: proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.299
retrieving revision 1.300
diff -u -b -r1.299 -r1.300
--- proprietary-insecurity.fr.po        13 Apr 2022 19:35:44 -0000      1.299
+++ proprietary-insecurity.fr.po        17 Apr 2022 08:38:52 -0000      1.300
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
 "PO-Revision-Date: 2022-04-13 21:35+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2022-04-17 08:28+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -151,12 +152,26 @@
 "de mises à jour pour Windows 11."
 
 #. type: Content of: <div><div><ul><li><p>
+# | A critical bug in Apple's iOS makes it possible for attackers to alter a
+# | shutdown event, <a
+# | 
href=\"https://blog.zecops.com/research/persistence-without-persistence-meet-the-ultimate-persistence-bug-noreboot/\";>tricking
+# | the user into thinking that the phone has been powered off</a>. But in
+# | fact, it[-’-]{+'+}s still running, and the user can't feel any difference
+# | between a real shutdown and the fake shutdown.
+#, fuzzy
+#| msgid ""
+#| "A critical bug in Apple's iOS makes it possible for attackers to alter a "
+#| "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-";
+#| "without-persistence-meet-the-ultimate-persistence-bug-noreboot/"
+#| "\">tricking the user into thinking that the phone has been powered off</"
+#| "a>. But in fact, it’s still running, and the user can't feel any "
+#| "difference between a real shutdown and the fake shutdown."
 msgid ""
 "A critical bug in Apple's iOS makes it possible for attackers to alter a "
 "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-";
 "without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
 "the user into thinking that the phone has been powered off</a>. But in fact, "
-"it’s still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
 "shutdown and the fake shutdown."
 msgstr ""
 "Une faille critique dans iOS permet à un attaquant de modifier une étape de 
"

Index: proprietary-insecurity.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it-diff.html,v
retrieving revision 1.115
retrieving revision 1.116
diff -u -b -r1.115 -r1.116
--- proprietary-insecurity.it-diff.html 13 Apr 2022 16:40:01 -0000      1.115
+++ proprietary-insecurity.it-diff.html 17 Apr 2022 08:38:52 -0000      1.116
@@ -113,7 +113,7 @@
     it possible for attackers to alter a shutdown event, &lt;a
     
href="https://blog.zecops.com/research/persistence-without-persistence-meet-the-ultimate-persistence-bug-noreboot/"&gt;tricking
     the user into thinking that the phone has been powered
-    off&lt;/a&gt;. But in fact, it’s still running, and the user can't feel
+    off&lt;/a&gt;. But in fact, it's still running, and the user can't feel
     any difference between a real shutdown and the fake shutdown.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1538,7 +1538,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2022/04/13 16:40:01 $
+$Date: 2022/04/17 08:38:52 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.217
retrieving revision 1.218
diff -u -b -r1.217 -r1.218
--- proprietary-insecurity.it.po        13 Apr 2022 16:40:01 -0000      1.217
+++ proprietary-insecurity.it.po        17 Apr 2022 08:38:52 -0000      1.218
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
 "PO-Revision-Date: 2017-12-31 13:13+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -177,7 +177,7 @@
 "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-";
 "without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
 "the user into thinking that the phone has been powered off</a>. But in fact, "
-"it’s still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
 "shutdown and the fake shutdown."
 msgstr ""
 

Index: proprietary-insecurity.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja-diff.html,v
retrieving revision 1.136
retrieving revision 1.137
diff -u -b -r1.136 -r1.137
--- proprietary-insecurity.ja-diff.html 13 Apr 2022 16:40:01 -0000      1.136
+++ proprietary-insecurity.ja-diff.html 17 Apr 2022 08:38:52 -0000      1.137
@@ -113,7 +113,7 @@
     it possible for attackers to alter a shutdown event, &lt;a
     
href="https://blog.zecops.com/research/persistence-without-persistence-meet-the-ultimate-persistence-bug-noreboot/"&gt;tricking
     the user into thinking that the phone</em></ins></span> has <span 
class="removed"><del><strong>bugs,</strong></del></span> <span 
class="inserted"><ins><em>been powered
-    off&lt;/a&gt;. But in fact, it’s still running,</em></ins></span> and 
<span class="inserted"><ins><em>the user can't feel</em></ins></span>
+    off&lt;/a&gt;. But in fact, it's still running,</em></ins></span> and 
<span class="inserted"><ins><em>the user can't feel</em></ins></span>
     any <span class="removed"><del><strong>system,</strong></del></span> <span 
class="inserted"><ins><em>difference between a real shutdown and the fake 
shutdown.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1466,7 +1466,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2022/04/13 16:40:01 $
+$Date: 2022/04/17 08:38:52 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-insecurity.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja.po,v
retrieving revision 1.189
retrieving revision 1.190
diff -u -b -r1.189 -r1.190
--- proprietary-insecurity.ja.po        13 Apr 2022 16:40:01 -0000      1.189
+++ proprietary-insecurity.ja.po        17 Apr 2022 08:38:52 -0000      1.190
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
 "PO-Revision-Date: 2016-10-31 12:56+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -153,7 +153,7 @@
 "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-";
 "without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
 "the user into thinking that the phone has been powered off</a>. But in fact, "
-"it’s still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
 "shutdown and the fake shutdown."
 msgstr ""
 

Index: proprietary-insecurity.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pot,v
retrieving revision 1.155
retrieving revision 1.156
diff -u -b -r1.155 -r1.156
--- proprietary-insecurity.pot  13 Apr 2022 16:40:01 -0000      1.155
+++ proprietary-insecurity.pot  17 Apr 2022 08:38:52 -0000      1.156
@@ -7,13 +7,13 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
 "Language: \n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=UTF-8\n"
+"Content-Type: text/plain; charset=CHARSET\n"
 "Content-Transfer-Encoding: 8bit\n"
 
 #. type: Content of: <title>
@@ -118,7 +118,7 @@
 "shutdown event, <a "
 
"href=\"https://blog.zecops.com/research/persistence-without-persistence-meet-the-ultimate-persistence-bug-noreboot/\";>tricking
 "
 "the user into thinking that the phone has been powered off</a>. But in fact, "
-"it’s still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
 "shutdown and the fake shutdown."
 msgstr ""
 

Index: proprietary-insecurity.pt-br-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pt-br-diff.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary-insecurity.pt-br-diff.html      13 Apr 2022 16:40:01 -0000      
1.6
+++ proprietary-insecurity.pt-br-diff.html      17 Apr 2022 08:38:52 -0000      
1.7
@@ -107,7 +107,7 @@
     it possible for attackers to alter a shutdown event, &lt;a
     
href="https://blog.zecops.com/research/persistence-without-persistence-meet-the-ultimate-persistence-bug-noreboot/"&gt;tricking
     the user into thinking that the phone has been powered
-    off&lt;/a&gt;. But in fact, it’s still running, and the user can't feel
+    off&lt;/a&gt;. But in fact, it's still running, and the user can't feel
     any difference between a real shutdown and the fake shutdown.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1304,7 +1304,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2022/04/13 16:40:01 $
+$Date: 2022/04/17 08:38:52 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-insecurity.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pt-br.po,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary-insecurity.pt-br.po     13 Apr 2022 16:40:01 -0000      1.32
+++ proprietary-insecurity.pt-br.po     17 Apr 2022 08:38:52 -0000      1.33
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
 "PO-Revision-Date: 2021-06-26 09:40-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -147,7 +147,7 @@
 "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-";
 "without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
 "the user into thinking that the phone has been powered off</a>. But in fact, "
-"it’s still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
 "shutdown and the fake shutdown."
 msgstr ""
 

Index: proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.341
retrieving revision 1.342
diff -u -b -r1.341 -r1.342
--- proprietary-insecurity.ru.po        13 Apr 2022 17:34:59 -0000      1.341
+++ proprietary-insecurity.ru.po        17 Apr 2022 08:38:52 -0000      1.342
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2022-04-17 08:28+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -150,12 +151,26 @@
 "Windows&nbsp;11."
 
 #. type: Content of: <div><div><ul><li><p>
+# | A critical bug in Apple's iOS makes it possible for attackers to alter a
+# | shutdown event, <a
+# | 
href=\"https://blog.zecops.com/research/persistence-without-persistence-meet-the-ultimate-persistence-bug-noreboot/\";>tricking
+# | the user into thinking that the phone has been powered off</a>. But in
+# | fact, it[-’-]{+'+}s still running, and the user can't feel any difference
+# | between a real shutdown and the fake shutdown.
+#, fuzzy
+#| msgid ""
+#| "A critical bug in Apple's iOS makes it possible for attackers to alter a "
+#| "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-";
+#| "without-persistence-meet-the-ultimate-persistence-bug-noreboot/"
+#| "\">tricking the user into thinking that the phone has been powered off</"
+#| "a>. But in fact, it’s still running, and the user can't feel any "
+#| "difference between a real shutdown and the fake shutdown."
 msgid ""
 "A critical bug in Apple's iOS makes it possible for attackers to alter a "
 "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-";
 "without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
 "the user into thinking that the phone has been powered off</a>. But in fact, "
-"it’s still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
 "shutdown and the fake shutdown."
 msgstr ""
 "Критичная ошибка в iOS компании Apple дает 
взломщикам возможность изменять "

Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.229
retrieving revision 1.230
diff -u -b -r1.229 -r1.230
--- proprietary-surveillance.de-diff.html       13 Apr 2022 16:40:02 -0000      
1.229
+++ proprietary-surveillance.de-diff.html       17 Apr 2022 08:38:52 -0000      
1.230
@@ -1343,8 +1343,8 @@
   &lt;li id="M201611150"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Some</em></ins></span> portable phones &lt;a
-    
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+    &lt;p&gt;Some</em></ins></span> portable phones &lt;a <span 
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are</em></ins></span>
     sold with spyware sending lots of data to <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;According to Edward Snowden,</strong></del></span> <span 
class="inserted"><ins><em>China&lt;/a&gt;.&lt;/p&gt;
@@ -4603,7 +4603,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2022/04/13 16:40:02 $
+$Date: 2022/04/17 08:38:52 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.421
retrieving revision 1.422
diff -u -b -r1.421 -r1.422
--- proprietary-surveillance.de.po      13 Apr 2022 16:40:03 -0000      1.421
+++ proprietary-surveillance.de.po      17 Apr 2022 08:38:52 -0000      1.422
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -2125,8 +2125,17 @@
 "selbst wenn das Telefon keine SIM-Karte hat</a>."
 
 #. type: Content of: <div><div><ul><li><p>
+# | Some portable phones <a
+# | 
href=\"http{+s+}://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html\">are
+# | sold with spyware sending lots of data to China</a>.
+#, fuzzy
+#| msgid ""
+#| "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+#| "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#| "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#| "html\">are sold with spyware sending lots of data to China</a>."
 msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/";
 "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
 "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
 "html\">are sold with spyware sending lots of data to China</a>."

Index: proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.267
retrieving revision 1.268
diff -u -b -r1.267 -r1.268
--- proprietary-surveillance.es.po      16 Apr 2022 11:10:18 -0000      1.267
+++ proprietary-surveillance.es.po      17 Apr 2022 08:38:53 -0000      1.268
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
 "PO-Revision-Date: 2022-04-06 12:14+0200\n"
 "Last-Translator: Dora Scilipoti\n"
 "Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2022-04-17 08:28+0000\n"
 "Plural-Forms: nplurals=2; plural=(n != 1);\n"
 "X-Generator: Poedit 2.4.2\n"
 
@@ -1578,8 +1579,17 @@
 "están desactivados, e incluso cuando el teléfono no tiene tarjeta SIM</a>."
 
 #. type: Content of: <div><div><ul><li><p>
+# | Some portable phones <a
+# | 
href=\"http{+s+}://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html\">are
+# | sold with spyware sending lots of data to China</a>.
+#, fuzzy
+#| msgid ""
+#| "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+#| "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#| "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#| "html\">are sold with spyware sending lots of data to China</a>."
 msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/";
 "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
 "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
 "html\">are sold with spyware sending lots of data to China</a>."

Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.692
retrieving revision 1.693
diff -u -b -r1.692 -r1.693
--- proprietary-surveillance.fr.po      13 Apr 2022 19:35:45 -0000      1.692
+++ proprietary-surveillance.fr.po      17 Apr 2022 08:38:53 -0000      1.693
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
 "PO-Revision-Date: 2022-04-13 21:35+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2022-04-17 08:28+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -1571,8 +1572,17 @@
 "SIM</a>."
 
 #. type: Content of: <div><div><ul><li><p>
+# | Some portable phones <a
+# | 
href=\"http{+s+}://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html\">are
+# | sold with spyware sending lots of data to China</a>.
+#, fuzzy
+#| msgid ""
+#| "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+#| "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#| "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#| "html\">are sold with spyware sending lots of data to China</a>."
 msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/";
 "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
 "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
 "html\">are sold with spyware sending lots of data to China</a>."

Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.293
retrieving revision 1.294
diff -u -b -r1.293 -r1.294
--- proprietary-surveillance.it-diff.html       13 Apr 2022 16:40:03 -0000      
1.293
+++ proprietary-surveillance.it-diff.html       17 Apr 2022 08:38:53 -0000      
1.294
@@ -1243,7 +1243,7 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Some portable phones &lt;a
-    
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+    
href="https://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
     sold with spyware sending lots of data to China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -3958,16 +3958,16 @@
 
   &lt;li id="M201712300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-12&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-    <span class="inserted"><ins><em>&lt;p&gt;Some JavaScript malware &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Some JavaScript malware &lt;a
     
href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"&gt;
     swipes usernames from browser-based password managers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711150"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Some websites send
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+    <span class="inserted"><ins><em>&lt;p&gt;Some websites send
     JavaScript code to collect all the user's input, &lt;a
     
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/"&gt;which
     can then be used to reproduce the whole session&lt;/a&gt;.&lt;/p&gt;
@@ -4393,7 +4393,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2022/04/13 16:40:03 $
+$Date: 2022/04/17 08:38:53 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.433
retrieving revision 1.434
diff -u -b -r1.433 -r1.434
--- proprietary-surveillance.it.po      13 Apr 2022 16:40:03 -0000      1.433
+++ proprietary-surveillance.it.po      17 Apr 2022 08:38:53 -0000      1.434
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -2022,8 +2022,17 @@
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
+# | Some portable phones <a
+# | 
href=\"http{+s+}://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html\">are
+# | sold with spyware sending lots of data to China</a>.
+#, fuzzy
+#| msgid ""
+#| "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+#| "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#| "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#| "html\">are sold with spyware sending lots of data to China</a>."
 msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/";
 "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
 "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
 "html\">are sold with spyware sending lots of data to China</a>."

Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.311
retrieving revision 1.312
diff -u -b -r1.311 -r1.312
--- proprietary-surveillance.ja-diff.html       13 Apr 2022 16:40:03 -0000      
1.311
+++ proprietary-surveillance.ja-diff.html       17 Apr 2022 08:38:53 -0000      
1.312
@@ -1150,15 +1150,15 @@
     &lt;p&gt;Facebook's app got &ldquo;consent&rdquo; to &lt;a
     
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
     upload call logs automatically</em></ins></span> from <span 
class="inserted"><ins><em>Android phones&lt;/a&gt; while disguising
-    what the &ldquo;consent&rdquo; was for.&lt;/p&gt;
+    what</em></ins></span> the
+      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call,</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;consent&rdquo; was for.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201811230"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;An Android phone was observed to track location even while
-    in airplane mode. It didn't send</em></ins></span> the
-      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call,</strong></del></span> location <span 
class="inserted"><ins><em>data while in
+    &lt;p&gt;An Android phone was observed to track</em></ins></span> location 
<span class="inserted"><ins><em>even while
+    in airplane mode. It didn't send the location data while in
     airplane mode.  Instead, &lt;a
     
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;
     it saved up the data,</em></ins></span> and <span 
class="removed"><del><strong>web
@@ -1178,7 +1178,7 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Some portable phones &lt;a
-    
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+    
href="https://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
     sold with spyware sending lots of data to China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1411,12 +1411,12 @@
   &lt;li id="M202011260"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Microsoft's Office 365 suite enables employers &lt;a
-    
href="https://www.theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-criticised-workplace-surveillance"&gt;to
-    snoop on each employee&lt;/a&gt;. After
-    a public outburst, Microsoft stated that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+    &lt;p&gt;Microsoft's Office 365 suite enables employers</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
       
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/dec/02/microsoft-apologises-productivity-score-critics-derided-workplace-surveillance"&gt;it
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-criticised-workplace-surveillance"&gt;to
+    snoop on each employee&lt;/a&gt;. After
+    a public outburst, Microsoft stated that &lt;a
+    
href="https://www.theguardian.com/technology/2020/dec/02/microsoft-apologises-productivity-score-critics-derided-workplace-surveillance"&gt;it
     would remove this capability&lt;/a&gt;. Let's hope 
so.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
@@ -1951,44 +1951,44 @@
     href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
     sent personal data to Facebook&lt;/a&gt;. Lots</em></ins></span> of <span 
class="removed"><del><strong>privacy,</strong></del></span> <span 
class="inserted"><ins><em>companies built apps that
     way</em></ins></span> and <span class="removed"><del><strong>should be 
replaced with anonymous
-      payment systems, but the invasion isn't done by malware. The other
-      cases mentioned are done by proprietary malware in the 
car.&lt;/p&gt;&lt;/li&gt;
+      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>released them, apparently not realizing that 
all</em></ins></span> the <span class="removed"><del><strong>invasion isn't 
done by malware. The other
+      cases mentioned are done by proprietary malware in</strong></del></span> 
<span class="inserted"><ins><em>personal
+    data they collected would go to Facebook as well.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>released them, apparently not realizing that 
all</em></ins></span> the <span class="removed"><del><strong>company to 
extract</strong></del></span> <span 
class="inserted"><ins><em>personal</em></ins></span>
-    data <span class="removed"><del><strong>remotely and
-      determine</strong></del></span> <span class="inserted"><ins><em>they 
collected would go to Facebook as well.&lt;/p&gt;
+    &lt;p&gt;It shows that no one can trust a nonfree program, not 
even</em></ins></span> the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
 
-    &lt;p&gt;It shows that no one can trust a nonfree program, not 
even</em></ins></span> the <span class="removed"><del><strong>car's location at 
any time. (See</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span>
     <span class="inserted"><ins><em>developers of other nonfree 
programs.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902140"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The AppCensus database gives information on</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b</strong></del></span>
-    <span class="inserted"><ins><em>href="https://www.appcensus.io/"&gt; how 
Android apps use</em></ins></span> and <span 
class="removed"><del><strong>c.&lt;/a&gt;).</strong></del></span>
-    <span class="inserted"><ins><em>misuse users' personal data&lt;/a&gt;. As 
of March 2019, nearly
-    78,000 have been analyzed, of which 24,000 (31%) transmit the &lt;a
+    &lt;p&gt;The AppCensus database gives information on &lt;a
+    href="https://www.appcensus.io/"&gt; how Android apps use and
+    misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
+    78,000 have been analyzed, of which 24,000 (31%) 
transmit</em></ins></span> the <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
-    Advertising ID&lt;/a&gt; to other companies, and &lt;a
+    Advertising ID&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>extract data remotely</strong></del></span> <span 
class="inserted"><ins><em>other companies,</em></ins></span> and
+      <span class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     href="https://blog.appcensus.io/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23% of the total) link this ID to hardware identifiers&lt;/a&gt;,
+    18,000 (23% of</em></ins></span> the <span 
class="removed"><del><strong>car's location</strong></del></span> <span 
class="inserted"><ins><em>total) link this ID to hardware identifiers&lt;/a&gt;,
     so that users cannot escape tracking by resetting it.&lt;/p&gt;
 
     &lt;p&gt;Collecting hardware identifiers is in apparent violation of
     Google's policies. But it seems that Google wasn't aware of it,
     and, once informed, was in no hurry to take action. This proves
-    that the policies of a development platform are ineffective at
-    preventing nonfree software developers from including malware in
+    that the policies of a development platform are 
ineffective</em></ins></span> at <span class="removed"><del><strong>any time. 
(See</strong></del></span>
+    <span class="inserted"><ins><em>preventing nonfree software developers 
from including malware in
     their programs.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
-    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
+    &lt;p&gt;Many nonfree apps have a surveillance feature 
for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
     recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1999,7 +1999,7 @@
     be on Google Play had one or more malicious functionalities, such as &lt;a
     
href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/"&gt;
     stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
-    pushing unwanted and often malicious ads on users, and redirecting
+    pushing unwanted and often malicious ads on users,</em></ins></span> and 
<span class="removed"><del><strong>c.&lt;/a&gt;).</strong></del></span> <span 
class="inserted"><ins><em>redirecting
     them to phishing sites that stole their credentials. Furthermore,
     the user interface of most of them was designed to make uninstallation
     difficult.&lt;/p&gt;
@@ -2120,7 +2120,7 @@
     their users.  To protect their privacy and freedom, Android users
     need</em></ins></span> to get <span class="inserted"><ins><em>rid of the 
proprietary software&mdash;both proprietary
     Android by &lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
-    and the proprietary apps by getting apps from the free software
+    and</em></ins></span> the <span class="inserted"><ins><em>proprietary apps 
by getting apps from the free software
     only &lt;a href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt; that 
&lt;a
     href="https://f-droid.org/docs/Anti-Features/"&gt; prominently warns
     the user if an app contains anti-features&lt;/a&gt;.&lt;/p&gt;
@@ -2136,7 +2136,7 @@
 
     &lt;p&gt;Grindr should not have so much information about its users.
     It could be designed so that users communicate such info to each
-    other but not to</em></ins></span> the <span 
class="inserted"><ins><em>server's database.&lt;/p&gt;
+    other but not to the server's database.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201803050"&gt;
@@ -2429,8 +2429,8 @@
 
   &lt;li id="M201511190"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-    <span class="inserted"><ins><em>&lt;p&gt;&ldquo;Cryptic 
communication,&rdquo;
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&ldquo;Cryptic communication,&rdquo;
     unrelated to the app's functionality, was &lt;a
     
href="https://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
     found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
@@ -2524,8 +2524,8 @@
 
   &lt;li id="M201401150.1"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-01&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Simeji keyboard is a smartphone version of Baidu's &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+    <span class="inserted"><ins><em>&lt;p&gt;The Simeji keyboard is a 
smartphone version of Baidu's &lt;a
     href="/proprietary/proprietary-surveillance.html#baidu-ime"&gt;spying 
&lt;abbr
     title="Input Method Editor"&gt;IME&lt;/abbr&gt;&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -3155,7 +3155,7 @@
     
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
     leak childrens' conversations to the manufacturer&lt;/a&gt;. Guess what? 
&lt;a
     
href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found a way to access the data&lt;/a&gt; collected by the
+    Crackers found</em></ins></span> a <span class="inserted"><ins><em>way to 
access the data&lt;/a&gt; collected by the
     manufacturer's snooping.&lt;/p&gt;
 
     &lt;p&gt;That the manufacturer and the FBI could listen to these
@@ -3172,7 +3172,7 @@
 
     &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
     can remotely control the toys with a mobile phone. This would enable
-    crackers to listen in on</em></ins></span> a <span 
class="inserted"><ins><em>child's speech, and even speak into the
+    crackers to listen in on a child's speech, and even speak into the
     toys themselves.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -3237,7 +3237,7 @@
     out prematurely</em></ins></span> and <span 
class="removed"><del><strong>associates&lt;/a&gt;.&lt;/p&gt;
 
       &lt;p&gt;Even nastier, they do</strong></del></span> <span 
class="inserted"><ins><em>on accident and Google was planning on disclosing
-    this new feature and offering it to customers who pay for it.&lt;/p&gt;
+    this new feature and offering</em></ins></span> it <span 
class="inserted"><ins><em>to customers who pay for it.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202006300"&gt;
@@ -3252,7 +3252,7 @@
     an adequate basis for protecting digital privacy.  The boss can coerce
     most workers into consenting to almost anything, even probable exposure
     to contagious disease that can be fatal.  Software like this should
-    be illegal and bosses that demand</em></ins></span> it <span 
class="inserted"><ins><em>should be prosecuted for it.&lt;/p&gt;
+    be illegal and bosses that demand it should be prosecuted for it.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201911190"&gt;
@@ -3285,7 +3285,7 @@
 
     &lt;p&gt;Rather than trying to better control the use of recordings, Google
     should not record or listen to the person's voice.  It should only
-    get commands</em></ins></span> that <span 
class="removed"><del><strong>merge</strong></del></span> the <span 
class="inserted"><ins><em>user wants to send to some Google service.&lt;/p&gt;
+    get commands</em></ins></span> that <span 
class="removed"><del><strong>merge</strong></del></span> <span 
class="inserted"><ins><em>the user wants to send to some Google 
service.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201905061"&gt;
@@ -3296,9 +3296,9 @@
     recordings made without a legitimate prompt), and sends
     it to Amazon's servers, which store it indefinitely. Even
     worse, Amazon forwards it to third-party companies. Thus,
-    even if users request deletion of their</em></ins></span> data <span 
class="inserted"><ins><em>from Amazon's servers, &lt;a
-    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;
-    the data remain on other servers&lt;/a&gt;, where they can be accessed by
+    even if users request deletion of their data from Amazon's servers, &lt;a
+    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;</em></ins></span>
+    the data <span class="inserted"><ins><em>remain on other 
servers&lt;/a&gt;, where they can be accessed by
     advertising companies and government agencies. In other words,
     deleting the collected information doesn't cancel the wrong of
     collecting it.&lt;/p&gt;
@@ -3647,8 +3647,8 @@
 &lt;ul class="blurbs"&gt;
   &lt;li id="M202008182"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-08&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-    <span class="inserted"><ins><em>&lt;p&gt;Oculus headsets &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Oculus headsets &lt;a
     
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october"&gt;require
     users to identify themselves to Facebook&lt;/a&gt;. This will give Facebook
     free rein to pervasively snoop on Oculus users.&lt;/p&gt;
@@ -3656,8 +3656,8 @@
 
   &lt;li id="M201612230"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-12&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;VR equipment, measuring every slight motion,
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+    <span class="inserted"><ins><em>&lt;p&gt;VR equipment, measuring every 
slight motion,
     creates the potential for the most intimate
     surveillance ever. All it takes to make this potential real &lt;a
     
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/"&gt;is
@@ -3905,14 +3905,14 @@
     &lt;p&gt;Google's proprietary Chrome web browser &lt;a
     
href="https://www.techrepublic.com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"&gt;
     added a surveillance API (idle detection API)&lt;/a&gt; which lets
-    websites ask Chrome to report when a user with a web page 
open</em></ins></span> is <span class="removed"><del><strong>also 
used</strong></del></span>
-    <span class="inserted"><ins><em>idle.&lt;/p&gt;
+    websites ask Chrome to report when a user with a web page open is
+    idle.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201906220"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Google Chrome is an &lt;a
+    &lt;p&gt;Google Chrome</em></ins></span> is <span 
class="removed"><del><strong>also used</strong></del></span> <span 
class="inserted"><ins><em>an &lt;a
     
href="https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/"&gt;
     instrument of surveillance&lt;/a&gt;. It lets thousands of trackers invade
     users' computers and report the sites they visit to advertising and
@@ -4261,7 +4261,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2022/04/13 16:40:03 $
+$Date: 2022/04/17 08:38:53 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.414
retrieving revision 1.415
diff -u -b -r1.414 -r1.415
--- proprietary-surveillance.ja.po      13 Apr 2022 16:40:03 -0000      1.414
+++ proprietary-surveillance.ja.po      17 Apr 2022 08:38:53 -0000      1.415
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -1561,8 +1561,14 @@
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+#| "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#| "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#| "html\">are sold with spyware sending lots of data to China</a>."
 msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/";
 "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
 "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
 "html\">are sold with spyware sending lots of data to China</a>."

Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.353
retrieving revision 1.354
diff -u -b -r1.353 -r1.354
--- proprietary-surveillance.pot        13 Apr 2022 16:40:03 -0000      1.353
+++ proprietary-surveillance.pot        17 Apr 2022 08:38:53 -0000      1.354
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -1099,7 +1099,7 @@
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "Some portable phones <a "
-"href=\"http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html\";>are
 "
+"href=\"https://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html\";>are
 "
 "sold with spyware sending lots of data to China</a>."
 msgstr ""
 

Index: proprietary-surveillance.pt-br-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pt-br-diff.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary-surveillance.pt-br-diff.html    13 Apr 2022 16:40:04 -0000      
1.6
+++ proprietary-surveillance.pt-br-diff.html    17 Apr 2022 08:38:53 -0000      
1.7
@@ -1000,7 +1000,8 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Some portable phones &lt;a
-    
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+    <span 
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are</em></ins></span>
     sold with spyware sending lots of data to China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -3714,7 +3715,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2022/04/13 16:40:04 $
+$Date: 2022/04/17 08:38:53 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pt-br.po,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- proprietary-surveillance.pt-br.po   13 Apr 2022 16:40:04 -0000      1.27
+++ proprietary-surveillance.pt-br.po   17 Apr 2022 08:38:53 -0000      1.28
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
 "PO-Revision-Date: 2021-06-26 09:40-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -1731,8 +1731,14 @@
 "telefone não tem cartão SIM</a>."
 
 #. type: Content of: <div><div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+#| "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#| "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#| "html\">are sold with spyware sending lots of data to China</a>."
 msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/";
 "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
 "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
 "html\">are sold with spyware sending lots of data to China</a>."

Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.764
retrieving revision 1.765
diff -u -b -r1.764 -r1.765
--- proprietary-surveillance.ru.po      13 Apr 2022 17:34:59 -0000      1.764
+++ proprietary-surveillance.ru.po      17 Apr 2022 08:38:53 -0000      1.765
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2022-04-17 08:28+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -1554,8 +1555,17 @@
 "местоположения&rdquo; выключены, даже когда 
в телефоне нет SIM-карты</a>."
 
 #. type: Content of: <div><div><ul><li><p>
+# | Some portable phones <a
+# | 
href=\"http{+s+}://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html\">are
+# | sold with spyware sending lots of data to China</a>.
+#, fuzzy
+#| msgid ""
+#| "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+#| "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#| "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#| "html\">are sold with spyware sending lots of data to China</a>."
 msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/";
 "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
 "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
 "html\">are sold with spyware sending lots of data to China</a>."

Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.470
retrieving revision 1.471
diff -u -b -r1.470 -r1.471
--- pt-br.po    13 Apr 2022 16:40:04 -0000      1.470
+++ pt-br.po    17 Apr 2022 08:38:53 -0000      1.471
@@ -684,7 +684,7 @@
 "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-";
 "without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
 "the user into thinking that the phone has been powered off</a>. But in fact, "
-"it’s still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
 "shutdown and the fake shutdown."
 msgstr ""
 
@@ -8601,10 +8601,17 @@
 msgstr "Jogos"
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Many games are designed to keep gamers compulsively playing&mdash;and "
+#| "spending money on the game. To achieve this result, developers use <a "
+#| "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-";
+#| "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#| "and brain research</a>:"
 msgid ""
 "Many games are designed to keep gamers compulsively playing&mdash;and "
 "spending money on the game. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
+"\"https://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
 "to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
 "research</a>:"
 msgstr ""
@@ -9971,9 +9978,16 @@
 "transmitir todas as conversas que ele ouve</a>."
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
+#| "story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> "
+#| "may take the form of bugs that have gone 20 years unfixed</a>.  The "
+#| "choice to leave the security holes in place is morally equivalent to "
+#| "writing a back door."
 msgid ""
-"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"The back door <a class=\"not-a-duplicate\" href=\"https://www.osnews.com/";
+"story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\"> may "
 "take the form of bugs that have gone 20 years unfixed</a>.  The choice to "
 "leave the security holes in place is morally equivalent to writing a back "
 "door."
@@ -10782,8 +10796,14 @@
 "e pode entregá-los ao governo do Reino Unido, se solicitado."
 
 #. type: Content of: <div><div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+#| "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#| "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#| "html\">are sold with spyware sending lots of data to China</a>."
 msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/";
 "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
 "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
 "html\">are sold with spyware sending lots of data to China</a>."
@@ -15347,6 +15367,45 @@
 msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 
 #~ msgid ""
+#~ "Many games are designed to keep gamers compulsively playing&mdash;and "
+#~ "spending money on the game. To achieve this result, developers use <a "
+#~ "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-";
+#~ "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#~ "and brain research</a>:"
+#~ msgstr ""
+#~ "Muitos jogos são projetados para manter os jogadores jogando "
+#~ "compulsivamente &ndash; e renovando suas assinaturas no jogo. Para "
+#~ "alcançar esse resultado, os desenvolvedores usam <a href=\"http://www.";
+#~ "cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-"
+#~ "addicted.html\"> técnicas que derivam de pesquisa comportamental e "
+#~ "cerebral</a>:"
+
+#~ msgid ""
+#~ "The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
+#~ "story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> "
+#~ "may take the form of bugs that have gone 20 years unfixed</a>.  The "
+#~ "choice to leave the security holes in place is morally equivalent to "
+#~ "writing a back door."
+#~ msgstr ""
+#~ "O <em>backdoor</em> <a class=\"not-a-duplicate\" href=\"http://www.osnews.";
+#~ "com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"
+#~ "\"> pode assumir a forma de bugs que não foram corrigidos por 20 anos</"
+#~ "a>. A escolha de deixar as brechas de segurança no lugar é moralmente "
+#~ "equivalente a escrever uma <em>backdoor</em>."
+
+#~ msgid ""
+#~ "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+#~ "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#~ "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#~ "html\">are sold with spyware sending lots of data to China</a>."
+#~ msgstr ""
+#~ "Alguns telefones portáteis <a href=\"http://www.prnewswire.com/news-";
+#~ "releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-"
+#~ "personally-identifiable-information-pii-without-user-consent-or-"
+#~ "disclosure-300362844.html\">são vendidos com <i lang=\"en\">spyware</i> "
+#~ "enviando muitos dados para a China</a>."
+
+#~ msgid ""
 #~ "Many web sites use JavaScript code <a href=\"http://gizmodo.com/before-";
 #~ "you-hit-submit-this-company-has-already-logge-1795906081\"> to snoop on "
 #~ "information that users have typed into a form but not sent</a>, in order "

Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.804
retrieving revision 1.805
diff -u -b -r1.804 -r1.805
--- ru.po       13 Apr 2022 18:03:03 -0000      1.804
+++ ru.po       17 Apr 2022 08:38:53 -0000      1.805
@@ -677,12 +677,26 @@
 "приложений</a>."
 
 #. type: Content of: <div><ul><li><p>
+# | A critical bug in Apple's iOS makes it possible for attackers to alter a
+# | shutdown event, <a
+# | 
href=\"https://blog.zecops.com/research/persistence-without-persistence-meet-the-ultimate-persistence-bug-noreboot/\";>tricking
+# | the user into thinking that the phone has been powered off</a>. But in
+# | fact, it[-’-]{+'+}s still running, and the user can't feel any difference
+# | between a real shutdown and the fake shutdown.
+#, fuzzy
+#| msgid ""
+#| "A critical bug in Apple's iOS makes it possible for attackers to alter a "
+#| "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-";
+#| "without-persistence-meet-the-ultimate-persistence-bug-noreboot/"
+#| "\">tricking the user into thinking that the phone has been powered off</"
+#| "a>. But in fact, it’s still running, and the user can't feel any "
+#| "difference between a real shutdown and the fake shutdown."
 msgid ""
 "A critical bug in Apple's iOS makes it possible for attackers to alter a "
 "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-";
 "without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
 "the user into thinking that the phone has been powered off</a>. But in fact, "
-"it’s still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
 "shutdown and the fake shutdown."
 msgstr ""
 "Критичная ошибка в iOS компании Apple дает 
взломщикам возможность изменять "
@@ -8102,10 +8116,21 @@
 msgstr "Игры"
 
 #. type: Content of: <div><div><p>
+# | Many games are designed to keep gamers compulsively playing&mdash;and
+# | spending money on the game. To achieve this result, developers use <a
+# | 
href=\"http{+s+}://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html\">
+# | techniques that derive from behavioral and brain research</a>:
+#, fuzzy
+#| msgid ""
+#| "Many games are designed to keep gamers compulsively playing&mdash;and "
+#| "spending money on the game. To achieve this result, developers use <a "
+#| "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-";
+#| "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#| "and brain research</a>:"
 msgid ""
 "Many games are designed to keep gamers compulsively playing&mdash;and "
 "spending money on the game. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
+"\"https://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
 "to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
 "research</a>:"
 msgstr ""
@@ -9369,9 +9394,22 @@
 "передавать все разговоры, которые он 
слышит</a>."
 
 #. type: Content of: <div><div><p>
+# | The back door <a class=\"not-a-duplicate\"
+# | 
[-href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\";>-]
+# | 
{+href=\"https://www.osnews.com/story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\";>+}
+# | may take the form of bugs that have gone 20 years unfixed</a>.  The choice
+# | to leave the security holes in place is morally equivalent to writing a
+# | back door.
+#, fuzzy
+#| msgid ""
+#| "The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
+#| "story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> "
+#| "may take the form of bugs that have gone 20 years unfixed</a>.  The "
+#| "choice to leave the security holes in place is morally equivalent to "
+#| "writing a back door."
 msgid ""
-"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"The back door <a class=\"not-a-duplicate\" href=\"https://www.osnews.com/";
+"story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\"> may "
 "take the form of bugs that have gone 20 years unfixed</a>.  The choice to "
 "leave the security holes in place is morally equivalent to writing a back "
 "door."
@@ -10113,8 +10151,17 @@
 "по требованию передавать его 
государственным органам Великобритании."
 
 #. type: Content of: <div><div><ul><li><p>
+# | Some portable phones <a
+# | 
href=\"http{+s+}://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html\">are
+# | sold with spyware sending lots of data to China</a>.
+#, fuzzy
+#| msgid ""
+#| "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+#| "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#| "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#| "html\">are sold with spyware sending lots of data to China</a>."
 msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/";
 "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
 "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
 "html\">are sold with spyware sending lots of data to China</a>."
@@ -14173,6 +14220,59 @@
 msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 
 #~ msgid ""
+#~ "A critical bug in Apple's iOS makes it possible for attackers to alter a "
+#~ "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-";
+#~ "without-persistence-meet-the-ultimate-persistence-bug-noreboot/"
+#~ "\">tricking the user into thinking that the phone has been powered off</"
+#~ "a>. But in fact, it’s still running, and the user can't feel any "
+#~ "difference between a real shutdown and the fake shutdown."
+#~ msgstr ""
+#~ "Критичная ошибка в iOS компании Apple дает 
взломщикам возможность "
+#~ "изменять событие выключения системы, <a 
href=\"https://blog.zecops.com/";
+#~ "research/persistence-without-persistence-meet-the-ultimate-persistence-"
+#~ "bug-noreboot/\">заставляя пользователя думать, 
что телефон выключен</a>. "
+#~ "Но на самом деле оно работает, и для 
пользователя невозможно отличить "
+#~ "настоящее выключение от фальшивого."
+
+#~ msgid ""
+#~ "Many games are designed to keep gamers compulsively playing&mdash;and "
+#~ "spending money on the game. To achieve this result, developers use <a "
+#~ "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-";
+#~ "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#~ "and brain research</a>:"
+#~ msgstr ""
+#~ "Многие игры проектируются так, чтобы 
игроки принуждались продолжать "
+#~ "игру&nbsp;&mdash; и тратить на игру деньги. 
Чтобы достичь этого, "
+#~ "разработчики пользуются <a 
href=\"http://www.cracked.com/article_18461_5-";
+#~ "creepy-ways-video-games-are-trying-to-get-you-addicted.html\"> 
приемами, "
+#~ "вытекающими из исследований поведения и 
мозга</a>:"
+
+#~ msgid ""
+#~ "The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
+#~ "story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> "
+#~ "may take the form of bugs that have gone 20 years unfixed</a>.  The "
+#~ "choice to leave the security holes in place is morally equivalent to "
+#~ "writing a back door."
+#~ msgstr ""
+#~ "Лазейка <a href=\"http://www.osnews.com/story/27416/";
+#~ "The_second_operating_system_hiding_in_every_mobile_phone\">может "
+#~ "принимать форму ошибок, которые 
остаются неисправленными по 20 лет</a>. "
+#~ "Решение оставить прорехи в защите 
незаделанными нравственно эквивалентно "
+#~ "написанию лазейки."
+
+#~ msgid ""
+#~ "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+#~ "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#~ "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#~ "html\">are sold with spyware sending lots of data to China</a>."
+#~ msgstr ""
+#~ "Некоторые портативные телефоны <a 
href=\"http://www.prnewswire.com/news-";
+#~ "releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-"
+#~ "personally-identifiable-information-pii-without-user-consent-or-"
+#~ "disclosure-300362844.html\">продаются с 
программами-шпионами, "
+#~ "отправляющими массу данных в Китай</a>."
+
+#~ msgid ""
 #~ "Many web sites use JavaScript code <a href=\"http://gizmodo.com/before-";
 #~ "you-hit-submit-this-company-has-already-logge-1795906081\"> to snoop on "
 #~ "information that users have typed into a form but not sent</a>, in order "

Index: tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.275
retrieving revision 1.276
diff -u -b -r1.275 -r1.276
--- tr.po       16 Apr 2022 13:02:34 -0000      1.275
+++ tr.po       17 Apr 2022 08:38:54 -0000      1.276
@@ -572,12 +572,20 @@
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "A critical bug in Apple's iOS makes it possible for attackers to alter a "
+#| "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-";
+#| "without-persistence-meet-the-ultimate-persistence-bug-noreboot/"
+#| "\">tricking the user into thinking that the phone has been powered off</"
+#| "a>. But in fact, it’s still running, and the user can't feel any "
+#| "difference between a real shutdown and the fake shutdown."
 msgid ""
 "A critical bug in Apple's iOS makes it possible for attackers to alter a "
 "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-";
 "without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
 "the user into thinking that the phone has been powered off</a>. But in fact, "
-"it’s still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
 "shutdown and the fake shutdown."
 msgstr ""
 "Aplle iOS'taki kritik bir hata saldırganların bilgisayar kapatma eylemini "
@@ -6623,19 +6631,19 @@
 #, fuzzy
 #| msgid ""
 #| "Many games are designed to keep gamers compulsively playing&mdash;and "
-#| "renewing their subscription. To achieve this result, developers use <a "
+#| "spending money on the game. To achieve this result, developers use <a "
 #| "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-";
 #| "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
 #| "and brain research</a>:"
 msgid ""
 "Many games are designed to keep gamers compulsively playing&mdash;and "
 "spending money on the game. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
+"\"https://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
 "to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
 "research</a>:"
 msgstr ""
 "Birçok oyun; oyuncuların takıntılı bir şekilde oynamasını 
sağlamak&mdash;ve "
-"aboneliklerinin yenilenmesi için tasarlanmıştır. Bu sonucu elde etmek 
için "
+"oyunda para harcamaları için tasarlanmıştır. Bu sonucu elde etmek için "
 "geliştiriciler, <a 
href=\"http://www.cracked.com/article_18461_5-creepy-ways-";
 "video-games-are-trying-to-get-you-addicted.html\">davranış ve beyin "
 "araştırmalarından elde edilen yöntemleri</a> kullanırlar:"
@@ -7647,8 +7655,8 @@
 
 #. type: Content of: <div><div><p>
 msgid ""
-"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"The back door <a class=\"not-a-duplicate\" href=\"https://www.osnews.com/";
+"story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\"> may "
 "take the form of bugs that have gone 20 years unfixed</a>.  The choice to "
 "leave the security holes in place is morally equivalent to writing a back "
 "door."
@@ -8150,7 +8158,7 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/";
 "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
 "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
 "html\">are sold with spyware sending lots of data to China</a>."
@@ -11239,6 +11247,26 @@
 msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 
 #, fuzzy
+#~| msgid ""
+#~| "Many games are designed to keep gamers compulsively playing&mdash;and "
+#~| "renewing their subscription. To achieve this result, developers use <a "
+#~| "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-";
+#~| "are-trying-to-get-you-addicted.html\"> techniques that derive from "
+#~| "behavioral and brain research</a>:"
+#~ msgid ""
+#~ "Many games are designed to keep gamers compulsively playing&mdash;and "
+#~ "spending money on the game. To achieve this result, developers use <a "
+#~ "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-";
+#~ "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#~ "and brain research</a>:"
+#~ msgstr ""
+#~ "Birçok oyun; oyuncuların takıntılı bir şekilde oynamasını 
sağlamak&mdash;"
+#~ "ve aboneliklerinin yenilenmesi için tasarlanmıştır. Bu sonucu elde 
etmek "
+#~ "için geliştiriciler, <a href=\"http://www.cracked.com/article_18461_5-";
+#~ "creepy-ways-video-games-are-trying-to-get-you-addicted.html\">davranış 
ve "
+#~ "beyin araştırmalarından elde edilen yöntemleri</a> kullanırlar:"
+
+#, fuzzy
 #~| msgid "Copyright &copy; 2019, 2020 Free Software Foundation, Inc."
 #~ msgid "Copyright &copy; 2017-2021 Free Software Foundation, Inc."
 #~ msgstr "Copyright &copy; 2019, 2020 Free Software Foundation, Inc."

Index: zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.277
retrieving revision 1.278
diff -u -b -r1.277 -r1.278
--- zh-cn.po    13 Apr 2022 16:40:05 -0000      1.277
+++ zh-cn.po    17 Apr 2022 08:38:54 -0000      1.278
@@ -580,12 +580,20 @@
 "数据</a>。"
 
 #. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "A critical bug in Apple's iOS makes it possible for attackers to alter a "
+#| "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-";
+#| "without-persistence-meet-the-ultimate-persistence-bug-noreboot/"
+#| "\">tricking the user into thinking that the phone has been powered off</"
+#| "a>. But in fact, it’s still running, and the user can't feel any "
+#| "difference between a real shutdown and the fake shutdown."
 msgid ""
 "A critical bug in Apple's iOS makes it possible for attackers to alter a "
 "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-";
 "without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
 "the user into thinking that the phone has been powered off</a>. But in fact, "
-"it’s still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
 "shutdown and the fake shutdown."
 msgstr ""
 "Apple 的 iOS 系统有一个严重的缺陷,攻击者
能够利用它来改变关机事件,<a href="
@@ -6384,7 +6392,7 @@
 msgid ""
 "Many games are designed to keep gamers compulsively playing&mdash;and "
 "spending money on the game. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
+"\"https://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
 "to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
 "research</a>:"
 msgstr ""
@@ -7280,8 +7288,8 @@
 
 #. type: Content of: <div><div><p>
 msgid ""
-"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"The back door <a class=\"not-a-duplicate\" href=\"https://www.osnews.com/";
+"story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\"> may "
 "take the form of bugs that have gone 20 years unfixed</a>.  The choice to "
 "leave the security holes in place is morally equivalent to writing a back "
 "door."
@@ -7781,7 +7789,7 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/";
 "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
 "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
 "html\">are sold with spyware sending lots of data to China</a>."

Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.383
retrieving revision 1.384
diff -u -b -r1.383 -r1.384
--- zh-tw.po    13 Apr 2022 16:40:05 -0000      1.383
+++ zh-tw.po    17 Apr 2022 08:38:54 -0000      1.384
@@ -576,7 +576,7 @@
 "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-";
 "without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
 "the user into thinking that the phone has been powered off</a>. But in fact, "
-"it’s still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
 "shutdown and the fake shutdown."
 msgstr ""
 
@@ -5652,7 +5652,7 @@
 msgid ""
 "Many games are designed to keep gamers compulsively playing&mdash;and "
 "spending money on the game. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
+"\"https://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
 "to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
 "research</a>:"
 msgstr ""
@@ -6570,8 +6570,8 @@
 
 #. type: Content of: <div><div><p>
 msgid ""
-"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"The back door <a class=\"not-a-duplicate\" href=\"https://www.osnews.com/";
+"story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\"> may "
 "take the form of bugs that have gone 20 years unfixed</a>.  The choice to "
 "leave the security holes in place is morally equivalent to writing a back "
 "door."
@@ -7067,7 +7067,7 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/";
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/";
 "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
 "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
 "html\">are sold with spyware sending lots of data to China</a>."



reply via email to

[Prev in Thread] Current Thread [Next in Thread]