[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po all.fr.po all.pot all.pt-br-...
From: |
GNUN |
Subject: |
www/proprietary/po all.fr.po all.pot all.pt-br-... |
Date: |
Sun, 17 Apr 2022 04:38:56 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 22/04/17 04:38:54
Modified files:
proprietary/po : all.fr.po all.pot all.pt-br-diff.html
all.pt-br.po all.ru.po de.po es.po fr.po it.po
ja.po malware-apple.de-diff.html
malware-apple.de.po malware-apple.es.po
malware-apple.fr.po malware-apple.it-diff.html
malware-apple.it.po malware-apple.ja-diff.html
malware-apple.ja.po malware-apple.nl-diff.html
malware-apple.nl.po malware-apple.pot
malware-apple.pt-br-diff.html
malware-apple.pt-br.po malware-apple.ru.po
malware-mobiles.de-diff.html
malware-mobiles.de.po malware-mobiles.es.po
malware-mobiles.fr.po
malware-mobiles.it-diff.html
malware-mobiles.it.po
malware-mobiles.ja-diff.html
malware-mobiles.ja.po malware-mobiles.pot
malware-mobiles.pt-br-diff.html
malware-mobiles.pt-br.po malware-mobiles.ru.po
nl.po pl.po pot proprietary-addictions.es.po
proprietary-addictions.fr.po
proprietary-addictions.pot
proprietary-addictions.pt-br.po
proprietary-addictions.ru.po
proprietary-addictions.tr.po
proprietary-insecurity.de-diff.html
proprietary-insecurity.de.po
proprietary-insecurity.es.po
proprietary-insecurity.fr.po
proprietary-insecurity.it-diff.html
proprietary-insecurity.it.po
proprietary-insecurity.ja-diff.html
proprietary-insecurity.ja.po
proprietary-insecurity.pot
proprietary-insecurity.pt-br-diff.html
proprietary-insecurity.pt-br.po
proprietary-insecurity.ru.po
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.es.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.pt-br-diff.html
proprietary-surveillance.pt-br.po
proprietary-surveillance.ru.po pt-br.po ru.po
tr.po zh-cn.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.fr.po?cvsroot=www&r1=1.115&r2=1.116
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.pot?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.pt-br-diff.html?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.pt-br.po?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.ru.po?cvsroot=www&r1=1.107&r2=1.108
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.383&r2=1.384
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.548&r2=1.549
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.674&r2=1.675
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.383&r2=1.384
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.391&r2=1.392
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de-diff.html?cvsroot=www&r1=1.93&r2=1.94
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de.po?cvsroot=www&r1=1.184&r2=1.185
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.es.po?cvsroot=www&r1=1.257&r2=1.258
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.fr.po?cvsroot=www&r1=1.252&r2=1.253
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it-diff.html?cvsroot=www&r1=1.98&r2=1.99
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it.po?cvsroot=www&r1=1.177&r2=1.178
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja-diff.html?cvsroot=www&r1=1.113&r2=1.114
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja.po?cvsroot=www&r1=1.160&r2=1.161
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl-diff.html?cvsroot=www&r1=1.116&r2=1.117
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl.po?cvsroot=www&r1=1.114&r2=1.115
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.pot?cvsroot=www&r1=1.124&r2=1.125
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.pt-br-diff.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.pt-br.po?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ru.po?cvsroot=www&r1=1.298&r2=1.299
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.120&r2=1.121
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.170&r2=1.171
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.271&r2=1.272
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.270&r2=1.271
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.123&r2=1.124
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.170&r2=1.171
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.141&r2=1.142
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.160&r2=1.161
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pot?cvsroot=www&r1=1.135&r2=1.136
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pt-br-diff.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pt-br.po?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.302&r2=1.303
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.384&r2=1.385
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.383&r2=1.384
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.382&r2=1.383
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.es.po?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.fr.po?cvsroot=www&r1=1.84&r2=1.85
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.pot?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.pt-br.po?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.ru.po?cvsroot=www&r1=1.71&r2=1.72
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.tr.po?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de-diff.html?cvsroot=www&r1=1.102&r2=1.103
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.200&r2=1.201
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.es.po?cvsroot=www&r1=1.158&r2=1.159
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.299&r2=1.300
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-diff.html?cvsroot=www&r1=1.115&r2=1.116
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.217&r2=1.218
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja-diff.html?cvsroot=www&r1=1.136&r2=1.137
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja.po?cvsroot=www&r1=1.189&r2=1.190
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pot?cvsroot=www&r1=1.155&r2=1.156
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pt-br-diff.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pt-br.po?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.341&r2=1.342
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.229&r2=1.230
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.421&r2=1.422
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.267&r2=1.268
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.692&r2=1.693
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.293&r2=1.294
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.433&r2=1.434
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.311&r2=1.312
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.414&r2=1.415
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.353&r2=1.354
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pt-br-diff.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pt-br.po?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.764&r2=1.765
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.470&r2=1.471
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.804&r2=1.805
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.275&r2=1.276
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.277&r2=1.278
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.383&r2=1.384
Patches:
Index: all.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.fr.po,v
retrieving revision 1.115
retrieving revision 1.116
diff -u -b -r1.115 -r1.116
--- all.fr.po 13 Apr 2022 19:35:42 -0000 1.115
+++ all.fr.po 17 Apr 2022 08:38:49 -0000 1.116
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2022-04-13 12:56+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
"PO-Revision-Date: 2022-04-13 21:35+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2022-04-17 08:28+0000\n"
#. type: Content of: <title>
msgid ""
@@ -196,12 +197,26 @@
"regarder ailleurs pour éviter les pubs â et les traqueurs."
#. type: Content of: <div><ul><li><p>
+# | A critical bug in Apple's iOS makes it possible for attackers to alter a
+# | shutdown event, <a
+# |
href=\"https://blog.zecops.com/research/persistence-without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking
+# | the user into thinking that the phone has been powered off</a>. But in
+# | fact, it[-â-]{+'+}s still running, and the user can't feel any difference
+# | between a real shutdown and the fake shutdown.
+#, fuzzy
+#| msgid ""
+#| "A critical bug in Apple's iOS makes it possible for attackers to alter a "
+#| "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-"
+#| "without-persistence-meet-the-ultimate-persistence-bug-noreboot/"
+#| "\">tricking the user into thinking that the phone has been powered off</"
+#| "a>. But in fact, itâs still running, and the user can't feel any "
+#| "difference between a real shutdown and the fake shutdown."
msgid ""
"A critical bug in Apple's iOS makes it possible for attackers to alter a "
"shutdown event, <a href=\"https://blog.zecops.com/research/persistence-"
"without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
"the user into thinking that the phone has been powered off</a>. But in fact, "
-"itâs still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
"shutdown and the fake shutdown."
msgstr ""
"Une faille critique dans iOS permet à un attaquant de modifier une étape de
"
Index: all.pot
===================================================================
RCS file: /web/www/www/proprietary/po/all.pot,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- all.pot 13 Apr 2022 12:56:19 -0000 1.61
+++ all.pot 17 Apr 2022 08:38:49 -0000 1.62
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2022-04-13 12:56+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -151,7 +151,7 @@
"shutdown event, <a "
"href=\"https://blog.zecops.com/research/persistence-without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking
"
"the user into thinking that the phone has been powered off</a>. But in fact, "
-"itâs still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
"shutdown and the fake shutdown."
msgstr ""
Index: all.pt-br-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/all.pt-br-diff.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- all.pt-br-diff.html 13 Apr 2022 16:39:49 -0000 1.14
+++ all.pt-br-diff.html 17 Apr 2022 08:38:49 -0000 1.15
@@ -126,7 +126,7 @@
it possible for attackers to alter a shutdown event, <a
href="https://blog.zecops.com/research/persistence-without-persistence-meet-the-ultimate-persistence-bug-noreboot/">tricking
the user into thinking that the phone has been powered
- off</a>. But in fact, itâs still running, and the user can't feel
+ off</a>. But in fact, it's still running, and the user can't feel
any difference between a real shutdown and the fake shutdown.</p>
</li>
@@ -2694,7 +2694,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/04/13 16:39:49 $
+$Date: 2022/04/17 08:38:49 $
<!-- timestamp end -->
</p>
</div>
Index: all.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.pt-br.po,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- all.pt-br.po 13 Apr 2022 16:39:50 -0000 1.63
+++ all.pt-br.po 17 Apr 2022 08:38:49 -0000 1.64
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2022-04-13 12:56+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
"PO-Revision-Date: 2021-06-26 09:39-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -160,7 +160,7 @@
"shutdown event, <a href=\"https://blog.zecops.com/research/persistence-"
"without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
"the user into thinking that the phone has been powered off</a>. But in fact, "
-"itâs still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
"shutdown and the fake shutdown."
msgstr ""
Index: all.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.ru.po,v
retrieving revision 1.107
retrieving revision 1.108
diff -u -b -r1.107 -r1.108
--- all.ru.po 13 Apr 2022 17:34:58 -0000 1.107
+++ all.ru.po 17 Apr 2022 08:38:49 -0000 1.108
@@ -9,7 +9,7 @@
msgid ""
msgstr ""
"Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2022-04-13 12:56+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
"PO-Revision-Date: 2021-04-27 13:06+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -17,6 +17,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2022-04-17 08:28+0000\n"
#. type: Content of: <title>
msgid ""
@@ -205,12 +206,26 @@
"оÑÑлеживаÑÑиÑ
пÑогÑамм."
#. type: Content of: <div><ul><li><p>
+# | A critical bug in Apple's iOS makes it possible for attackers to alter a
+# | shutdown event, <a
+# |
href=\"https://blog.zecops.com/research/persistence-without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking
+# | the user into thinking that the phone has been powered off</a>. But in
+# | fact, it[-â-]{+'+}s still running, and the user can't feel any difference
+# | between a real shutdown and the fake shutdown.
+#, fuzzy
+#| msgid ""
+#| "A critical bug in Apple's iOS makes it possible for attackers to alter a "
+#| "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-"
+#| "without-persistence-meet-the-ultimate-persistence-bug-noreboot/"
+#| "\">tricking the user into thinking that the phone has been powered off</"
+#| "a>. But in fact, itâs still running, and the user can't feel any "
+#| "difference between a real shutdown and the fake shutdown."
msgid ""
"A critical bug in Apple's iOS makes it possible for attackers to alter a "
"shutdown event, <a href=\"https://blog.zecops.com/research/persistence-"
"without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
"the user into thinking that the phone has been powered off</a>. But in fact, "
-"itâs still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
"shutdown and the fake shutdown."
msgstr ""
"ÐÑиÑиÑÐ½Ð°Ñ Ð¾Ñибка в iOS компании Apple даеÑ
взломÑикам возможноÑÑÑ Ð¸Ð·Ð¼ÐµÐ½ÑÑÑ "
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.383
retrieving revision 1.384
diff -u -b -r1.383 -r1.384
--- de.po 13 Apr 2022 16:39:50 -0000 1.383
+++ de.po 17 Apr 2022 08:38:50 -0000 1.384
@@ -828,7 +828,7 @@
"shutdown event, <a href=\"https://blog.zecops.com/research/persistence-"
"without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
"the user into thinking that the phone has been powered off</a>. But in fact, "
-"itâs still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
"shutdown and the fake shutdown."
msgstr ""
@@ -8293,7 +8293,7 @@
msgid ""
"Many games are designed to keep gamers compulsively playing—and "
"spending money on the game. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
+"\"https://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
"research</a>:"
msgstr ""
@@ -9905,8 +9905,10 @@
"a>."
#. type: Content of: <div><div><p>
-# | The back door <a {+class=\"not-a-duplicate\"+}
-# |
href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\">
+# | The back door <a
+# |
[-href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\">-]
+# | {+class=\"not-a-duplicate\"
+# |
href=\"https://www.osnews.com/story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\">+}
# | may take the form of bugs that have gone 20 years unfixed</a>. The choice
# | to leave the security holes in place is morally equivalent to writing a
# | back door.
@@ -9917,8 +9919,8 @@
#| "form of bugs that have gone 20 years unfixed</a>. The choice to leave "
#| "the security holes in place is morally equivalent to writing a back door."
msgid ""
-"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/"
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"The back door <a class=\"not-a-duplicate\" href=\"https://www.osnews.com/"
+"story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\"> may "
"take the form of bugs that have gone 20 years unfixed</a>. The choice to "
"leave the security holes in place is morally equivalent to writing a back "
"door."
@@ -10945,19 +10947,28 @@
"Protokolle gespeichert und auf Wunsch an die britische Regierung übergeben."
#. type: Content of: <div><div><ul><li><p>
+# | Some portable phones <a
+# |
href=\"http{+s+}://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html\">are
+# | sold with spyware sending lots of data to China</a>.
+#, fuzzy
+#| msgid ""
+#| "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+#| "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#| "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#| "html\">are sold with spyware sending lots of data to China</a>."
msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/"
"kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
"identifiable-information-pii-without-user-consent-or-disclosure-300362844."
"html\">are sold with spyware sending lots of data to China</a>."
msgstr ""
-"Mehrere Mobilgeräte <a href=\"https://web.archive.org/web/20161116213010/"
-"http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-"
-"firmware-that-transmitted-personally-identifiable-information-pii-without-"
-"user-consent-or-disclosure-300362844.html\" title=\"Kryptowire Discovered "
-"Mobile Phone Firmware That Transmitted Personally Identifiable Information "
-"(PII) Without User Consent Or Disclosure, PRNewswire.com 2016 (Internet "
-"Archive).\">senden groÃe Datenmengen nach China</a>."
+"Mehrere Mobilgeräte <a href=\"https://web.archive.org/web/20161116213010///"
+"www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-"
+"that-transmitted-personally-identifiable-information-pii-without-user-"
+"consent-or-disclosure-300362844.html\" title=\"Kryptowire Discovered Mobile "
+"Phone Firmware That Transmitted Personally Identifiable Information (PII) "
+"Without User Consent Or Disclosure, PRNewswire.com 2016 (Internet Archive)."
+"\">senden groÃe Datenmengen nach China</a>."
#. type: Content of: <div><div><ul><li><p>
# | Facebook's new Magic Photo app <a
@@ -17097,6 +17108,42 @@
#, fuzzy
#~| msgid ""
+#~| "The back door <a href=\"http://www.osnews.com/story/27416/"
+#~| "The_second_operating_system_hiding_in_every_mobile_phone\"> may take the "
+#~| "form of bugs that have gone 20 years unfixed</a>. The choice to leave "
+#~| "the security holes in place is morally equivalent to writing a back door."
+#~ msgid ""
+#~ "The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/"
+#~ "story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> "
+#~ "may take the form of bugs that have gone 20 years unfixed</a>. The "
+#~ "choice to leave the security holes in place is morally equivalent to "
+#~ "writing a back door."
+#~ msgstr ""
+#~ "Die Hintertür <a href=\"https://www.osnews.com/story/27416/"
+#~ "The_second_operating_system_hiding_in_every_mobile_phone\" title=\"The "
+#~ "second operating system hiding in every mobile phone, unter: https://www."
+#~ "osnews.com/story/27416/"
+#~ "The_second_operating_system_hiding_in_every_mobile_phone, OSNews 2017."
+#~ "\">kann die Form von Programmfehlern haben, die 20 Jahre ungefixt "
+#~ "blieben</a>. Die Entscheidung, die Sicherheitslücken zu belassen, ist "
+#~ "moralisch gleichbedeutend mit dem Schreiben einer Hintertür."
+
+#~ msgid ""
+#~ "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+#~ "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#~ "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#~ "html\">are sold with spyware sending lots of data to China</a>."
+#~ msgstr ""
+#~ "Mehrere Mobilgeräte <a href=\"https://web.archive.org/web/20161116213010/"
+#~ "http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-"
+#~ "phone-firmware-that-transmitted-personally-identifiable-information-pii-"
+#~ "without-user-consent-or-disclosure-300362844.html\" title=\"Kryptowire "
+#~ "Discovered Mobile Phone Firmware That Transmitted Personally Identifiable "
+#~ "Information (PII) Without User Consent Or Disclosure, PRNewswire.com 2016 "
+#~ "(Internet Archive).\">senden groÃe Datenmengen nach China</a>."
+
+#, fuzzy
+#~| msgid ""
#~| "Many web sites <a href=\"http://gizmodo.com/before-you-hit-submit-this-"
#~| "company-has-already-logge-1795906081\"> snoop on information that users "
#~| "have typed into a form but not sent</a>."
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.548
retrieving revision 1.549
diff -u -b -r1.548 -r1.549
--- es.po 16 Apr 2022 09:10:11 -0000 1.548
+++ es.po 17 Apr 2022 08:38:50 -0000 1.549
@@ -678,12 +678,26 @@
"maliciosas diferentes</a>."
#. type: Content of: <div><ul><li><p>
+# | A critical bug in Apple's iOS makes it possible for attackers to alter a
+# | shutdown event, <a
+# |
href=\"https://blog.zecops.com/research/persistence-without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking
+# | the user into thinking that the phone has been powered off</a>. But in
+# | fact, it[-â-]{+'+}s still running, and the user can't feel any difference
+# | between a real shutdown and the fake shutdown.
+#, fuzzy
+#| msgid ""
+#| "A critical bug in Apple's iOS makes it possible for attackers to alter a "
+#| "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-"
+#| "without-persistence-meet-the-ultimate-persistence-bug-noreboot/"
+#| "\">tricking the user into thinking that the phone has been powered off</"
+#| "a>. But in fact, itâs still running, and the user can't feel any "
+#| "difference between a real shutdown and the fake shutdown."
msgid ""
"A critical bug in Apple's iOS makes it possible for attackers to alter a "
"shutdown event, <a href=\"https://blog.zecops.com/research/persistence-"
"without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
"the user into thinking that the phone has been powered off</a>. But in fact, "
-"itâs still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
"shutdown and the fake shutdown."
msgstr ""
"Un error crÃtico en el iOS de Apple permite que un atacante altere el "
@@ -6502,9 +6516,9 @@
msgstr ""
"Skype contiene <a href=\"https://web.archive.org/web/20130928235637/http://"
"www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-"
-"your-skype/\">programas espÃa</a>. Microsoft modificó Skype <a
href=\"https://"
-"www.theguardian.com/world/2013/jul/11/microsoft-nsa-collaboration-user-data\">
"
-"especÃficamente para espiar</a>."
+"your-skype/\">programas espÃa</a>. Microsoft modificó Skype <a href="
+"\"https://www.theguardian.com/world/2013/jul/11/microsoft-nsa-collaboration-"
+"user-data\"> especÃficamente para espiar</a>."
#. type: Content of: <div><div><ul><li><p>
msgid ""
@@ -8134,10 +8148,21 @@
msgstr "Juegos"
#. type: Content of: <div><div><p>
+# | Many games are designed to keep gamers compulsively playing—and
+# | spending money on the game. To achieve this result, developers use <a
+# |
href=\"http{+s+}://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html\">
+# | techniques that derive from behavioral and brain research</a>:
+#, fuzzy
+#| msgid ""
+#| "Many games are designed to keep gamers compulsively playing—and "
+#| "spending money on the game. To achieve this result, developers use <a "
+#| "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-"
+#| "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#| "and brain research</a>:"
msgid ""
"Many games are designed to keep gamers compulsively playing—and "
"spending money on the game. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
+"\"https://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
"research</a>:"
msgstr ""
@@ -9411,9 +9436,22 @@
"el teléfono transmita todas las conversaciones que escucha</a>."
#. type: Content of: <div><div><p>
+# | The back door <a class=\"not-a-duplicate\"
+# |
[-href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\">-]
+# |
{+href=\"https://www.osnews.com/story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\">+}
+# | may take the form of bugs that have gone 20 years unfixed</a>. The choice
+# | to leave the security holes in place is morally equivalent to writing a
+# | back door.
+#, fuzzy
+#| msgid ""
+#| "The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/"
+#| "story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> "
+#| "may take the form of bugs that have gone 20 years unfixed</a>. The "
+#| "choice to leave the security holes in place is morally equivalent to "
+#| "writing a back door."
msgid ""
-"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/"
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"The back door <a class=\"not-a-duplicate\" href=\"https://www.osnews.com/"
+"story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\"> may "
"take the form of bugs that have gone 20 years unfixed</a>. The choice to "
"leave the security holes in place is morally equivalent to writing a back "
"door."
@@ -10161,8 +10199,17 @@
"remitir al Gobierno británico si este lo solicita."
#. type: Content of: <div><div><ul><li><p>
+# | Some portable phones <a
+# |
href=\"http{+s+}://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html\">are
+# | sold with spyware sending lots of data to China</a>.
+#, fuzzy
+#| msgid ""
+#| "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+#| "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#| "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#| "html\">are sold with spyware sending lots of data to China</a>."
msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/"
"kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
"identifiable-information-pii-without-user-consent-or-disclosure-300362844."
"html\">are sold with spyware sending lots of data to China</a>."
@@ -14233,3 +14280,56 @@
#. type: Content of: <div><div><dl><dd><ul><li>
msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
+
+#~ msgid ""
+#~ "A critical bug in Apple's iOS makes it possible for attackers to alter a "
+#~ "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-"
+#~ "without-persistence-meet-the-ultimate-persistence-bug-noreboot/"
+#~ "\">tricking the user into thinking that the phone has been powered off</"
+#~ "a>. But in fact, itâs still running, and the user can't feel any "
+#~ "difference between a real shutdown and the fake shutdown."
+#~ msgstr ""
+#~ "Un error crÃtico en el iOS de Apple permite que un atacante altere el "
+#~ "proceso de desconexión, <a href=\"https://blog.zecops.com/research/"
+#~ "persistence-without-persistence-meet-the-ultimate-persistence-bug-"
+#~ "noreboot/\">haciendo creer al usuario que el teléfono se ha apagado</a>, "
+#~ "cuando en realidad sigue funcionando. El usuario no nota ninguna "
+#~ "diferencia entre un apagado real y uno falso."
+
+#~ msgid ""
+#~ "Many games are designed to keep gamers compulsively playing—and "
+#~ "spending money on the game. To achieve this result, developers use <a "
+#~ "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-"
+#~ "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#~ "and brain research</a>:"
+#~ msgstr ""
+#~ "Muchos juegos están diseñados para que los jugadores continúen jugando "
+#~ "compulsivamente y gasten dinero en el juego. Para conseguirlo, los "
+#~ "desarrolladores emplean <a href=\"http://www.cracked.com/article_18461_5-"
+#~ "creepy-ways-video-games-are-trying-to-get-you-addicted.html\">técnicas "
+#~ "derivadas de la investigación del cerebro y de la conducta</a>:"
+
+#~ msgid ""
+#~ "The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/"
+#~ "story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> "
+#~ "may take the form of bugs that have gone 20 years unfixed</a>. The "
+#~ "choice to leave the security holes in place is morally equivalent to "
+#~ "writing a back door."
+#~ msgstr ""
+#~ "La puerta trasera <a class=\"not-a-duplicate\" href=\"http://www.osnews."
+#~ "com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"
+#~ "\"> puede producirse en forma de fallos que han permanecido veinte años "
+#~ "sin corregirse</a>. La decisión de dejar esos agujeros de seguridad es "
+#~ "desde el punto de vista ético equivalente a colocar una puerta trasera."
+
+#~ msgid ""
+#~ "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+#~ "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#~ "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#~ "html\">are sold with spyware sending lots of data to China</a>."
+#~ msgstr ""
+#~ "Algunos teléfonos móviles <a href=\"http://www.prnewswire.com/news-"
+#~ "releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-"
+#~ "personally-identifiable-information-pii-without-user-consent-or-"
+#~ "disclosure-300362844.html\">se venden con programas espÃa que envÃan "
+#~ "cantidad de datos a China</a>."
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.674
retrieving revision 1.675
diff -u -b -r1.674 -r1.675
--- fr.po 13 Apr 2022 19:35:42 -0000 1.674
+++ fr.po 17 Apr 2022 08:38:50 -0000 1.675
@@ -664,12 +664,26 @@
"malveillantes."
#. type: Content of: <div><ul><li><p>
+# | A critical bug in Apple's iOS makes it possible for attackers to alter a
+# | shutdown event, <a
+# |
href=\"https://blog.zecops.com/research/persistence-without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking
+# | the user into thinking that the phone has been powered off</a>. But in
+# | fact, it[-â-]{+'+}s still running, and the user can't feel any difference
+# | between a real shutdown and the fake shutdown.
+#, fuzzy
+#| msgid ""
+#| "A critical bug in Apple's iOS makes it possible for attackers to alter a "
+#| "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-"
+#| "without-persistence-meet-the-ultimate-persistence-bug-noreboot/"
+#| "\">tricking the user into thinking that the phone has been powered off</"
+#| "a>. But in fact, itâs still running, and the user can't feel any "
+#| "difference between a real shutdown and the fake shutdown."
msgid ""
"A critical bug in Apple's iOS makes it possible for attackers to alter a "
"shutdown event, <a href=\"https://blog.zecops.com/research/persistence-"
"without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
"the user into thinking that the phone has been powered off</a>. But in fact, "
-"itâs still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
"shutdown and the fake shutdown."
msgstr ""
"Une faille critique dans iOS permet à un attaquant de modifier une étape de
"
@@ -8133,10 +8147,21 @@
msgstr "Jeux"
#. type: Content of: <div><div><p>
+# | Many games are designed to keep gamers compulsively playing—and
+# | spending money on the game. To achieve this result, developers use <a
+# |
href=\"http{+s+}://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html\">
+# | techniques that derive from behavioral and brain research</a>:
+#, fuzzy
+#| msgid ""
+#| "Many games are designed to keep gamers compulsively playing—and "
+#| "spending money on the game. To achieve this result, developers use <a "
+#| "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-"
+#| "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#| "and brain research</a>:"
msgid ""
"Many games are designed to keep gamers compulsively playing—and "
"spending money on the game. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
+"\"https://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
"research</a>:"
msgstr ""
@@ -9416,9 +9441,22 @@
"transmettre toutes les conversations qu'il entend</a>."
#. type: Content of: <div><div><p>
+# | The back door <a class=\"not-a-duplicate\"
+# |
[-href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\">-]
+# |
{+href=\"https://www.osnews.com/story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\">+}
+# | may take the form of bugs that have gone 20 years unfixed</a>. The choice
+# | to leave the security holes in place is morally equivalent to writing a
+# | back door.
+#, fuzzy
+#| msgid ""
+#| "The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/"
+#| "story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> "
+#| "may take the form of bugs that have gone 20 years unfixed</a>. The "
+#| "choice to leave the security holes in place is morally equivalent to "
+#| "writing a back door."
msgid ""
-"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/"
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"The back door <a class=\"not-a-duplicate\" href=\"https://www.osnews.com/"
+"story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\"> may "
"take the form of bugs that have gone 20 years unfixed</a>. The choice to "
"leave the security holes in place is morally equivalent to writing a back "
"door."
@@ -10169,8 +10207,17 @@
"détaillés et peut les transmettre au gouvernement britannique sur sa
demande."
#. type: Content of: <div><div><ul><li><p>
+# | Some portable phones <a
+# |
href=\"http{+s+}://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html\">are
+# | sold with spyware sending lots of data to China</a>.
+#, fuzzy
+#| msgid ""
+#| "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+#| "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#| "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#| "html\">are sold with spyware sending lots of data to China</a>."
msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/"
"kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
"identifiable-information-pii-without-user-consent-or-disclosure-300362844."
"html\">are sold with spyware sending lots of data to China</a>."
@@ -14250,3 +14297,57 @@
#. type: Content of: <div><div><dl><dd><ul><li>
msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
+
+#~ msgid ""
+#~ "A critical bug in Apple's iOS makes it possible for attackers to alter a "
+#~ "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-"
+#~ "without-persistence-meet-the-ultimate-persistence-bug-noreboot/"
+#~ "\">tricking the user into thinking that the phone has been powered off</"
+#~ "a>. But in fact, itâs still running, and the user can't feel any "
+#~ "difference between a real shutdown and the fake shutdown."
+#~ msgstr ""
+#~ "Une faille critique dans iOS permet à un attaquant de modifier une étape
"
+#~ "de l'arrêt du système en <a href=\"https://blog.zecops.com/research/"
+#~ "persistence-without-persistence-meet-the-ultimate-persistence-bug-"
+#~ "noreboot/\">faisant croire à l'utilisateur que le téléphone est
éteint</"
+#~ "a> alors qu'en fait il fonctionne toujours. L'utilisateur ne peut pas "
+#~ "faire la différence entre l'extinction réelle et l'extinction simulée."
+
+#~ msgid ""
+#~ "Many games are designed to keep gamers compulsively playing—and "
+#~ "spending money on the game. To achieve this result, developers use <a "
+#~ "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-"
+#~ "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#~ "and brain research</a>:"
+#~ msgstr ""
+#~ "Pas mal de jeux sont conçus pour que leurs utilisateurs deviennent des "
+#~ "joueurs compulsifs â et continuent à dépenser de l'argent pour jouer. "
+#~ "Pour obtenir ce résultat, les développeurs appliquent des <a href="
+#~ "\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-"
+#~ "trying-to-get-you-addicted.html\">techniques issues de recherches "
+#~ "comportementales et sur le cerveau</a>â¯:"
+
+#~ msgid ""
+#~ "The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/"
+#~ "story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> "
+#~ "may take the form of bugs that have gone 20 years unfixed</a>. The "
+#~ "choice to leave the security holes in place is morally equivalent to "
+#~ "writing a back door."
+#~ msgstr ""
+#~ "Cette porte dérobée <a class=\"not-a-duplicate\"
href=\"http://www.osnews."
+#~ "com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"
+#~ "\">peut prendre la forme de bogues qui sont restés non corrigés pendant "
+#~ "20 ans</a>. Le choix de laisser ces failles de sécurité en place est "
+#~ "l'équivalent moral de la création d'une porte dérobée."
+
+#~ msgid ""
+#~ "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+#~ "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#~ "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#~ "html\">are sold with spyware sending lots of data to China</a>."
+#~ msgstr ""
+#~ "Certains téléphones portables <a href=\"http://www.prnewswire.com/news-"
+#~ "releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-"
+#~ "personally-identifiable-information-pii-without-user-consent-or-"
+#~ "disclosure-300362844.html\">sont vendus avec un logiciel espion qui "
+#~ "envoie une masse de données en Chine</a>."
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.383
retrieving revision 1.384
diff -u -b -r1.383 -r1.384
--- it.po 13 Apr 2022 16:39:50 -0000 1.383
+++ it.po 17 Apr 2022 08:38:50 -0000 1.384
@@ -781,7 +781,7 @@
"shutdown event, <a href=\"https://blog.zecops.com/research/persistence-"
"without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
"the user into thinking that the phone has been powered off</a>. But in fact, "
-"itâs still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
"shutdown and the fake shutdown."
msgstr ""
@@ -7707,7 +7707,7 @@
msgid ""
"Many games are designed to keep gamers compulsively playing—and "
"spending money on the game. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
+"\"https://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
"research</a>:"
msgstr ""
@@ -9125,7 +9125,7 @@
# | [-More about-]{+The back door+} <a
# |
[-href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\">the
# | nature-] {+class=\"not-a-duplicate\"
-# |
href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\">
+# |
href=\"https://www.osnews.com/story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\">
# | may take the form+} of [-this problem</a>.-] {+bugs that have gone 20
# | years unfixed</a>. The choice to leave the security holes in place is
# | morally equivalent to writing a back door.+}
@@ -9135,8 +9135,8 @@
#| "The_second_operating_system_hiding_in_every_mobile_phone\">the nature of "
#| "this problem</a>."
msgid ""
-"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/"
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"The back door <a class=\"not-a-duplicate\" href=\"https://www.osnews.com/"
+"story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\"> may "
"take the form of bugs that have gone 20 years unfixed</a>. The choice to "
"leave the security holes in place is morally equivalent to writing a back "
"door."
@@ -9993,8 +9993,17 @@
"essere forniti al governo britannico se richiesto."
#. type: Content of: <div><div><ul><li><p>
+# | Some portable phones <a
+# |
href=\"http{+s+}://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html\">are
+# | sold with spyware sending lots of data to China</a>.
+#, fuzzy
+#| msgid ""
+#| "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+#| "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#| "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#| "html\">are sold with spyware sending lots of data to China</a>."
msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/"
"kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
"identifiable-information-pii-without-user-consent-or-disclosure-300362844."
"html\">are sold with spyware sending lots of data to China</a>."
@@ -15634,6 +15643,33 @@
#, fuzzy
#~| msgid ""
+#~| "More about <a href=\"http://www.osnews.com/story/27416/"
+#~| "The_second_operating_system_hiding_in_every_mobile_phone\">the nature of "
+#~| "this problem</a>."
+#~ msgid ""
+#~ "The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/"
+#~ "story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> "
+#~ "may take the form of bugs that have gone 20 years unfixed</a>. The "
+#~ "choice to leave the security holes in place is morally equivalent to "
+#~ "writing a back door."
+#~ msgstr ""
+#~ "Altre informazioni sulla <a href=\"http://www.osnews.com/story/27416/"
+#~ "The_second_operating_system_hiding_in_every_mobile_phone\">natura di "
+#~ "questo problema</a>."
+
+#~ msgid ""
+#~ "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+#~ "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#~ "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#~ "html\">are sold with spyware sending lots of data to China</a>."
+#~ msgstr ""
+#~ "Alcuni telefoni cellulari sono venduti con <a href=\"http://www."
+#~ "prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-"
+#~ "that-transmitted-personally-identifiable-information-pii-without-user-"
+#~ "consent-or-disclosure-300362844.html\">spyware che invia dati in Cina</a>."
+
+#, fuzzy
+#~| msgid ""
#~| "When a page uses Disqus for comments, <a href=\"https://blog.dantup."
#~| "com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-"
#~| "sends-the-url-to-facebook\">the proprietary Disqus software loads a "
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.391
retrieving revision 1.392
diff -u -b -r1.391 -r1.392
--- ja.po 13 Apr 2022 16:39:51 -0000 1.391
+++ ja.po 17 Apr 2022 08:38:50 -0000 1.392
@@ -612,7 +612,7 @@
"shutdown event, <a href=\"https://blog.zecops.com/research/persistence-"
"without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
"the user into thinking that the phone has been powered off</a>. But in fact, "
-"itâs still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
"shutdown and the fake shutdown."
msgstr ""
@@ -6557,7 +6557,7 @@
msgid ""
"Many games are designed to keep gamers compulsively playing—and "
"spending money on the game. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
+"\"https://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
"research</a>:"
msgstr ""
@@ -7702,8 +7702,8 @@
#. type: Content of: <div><div><p>
msgid ""
-"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/"
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"The back door <a class=\"not-a-duplicate\" href=\"https://www.osnews.com/"
+"story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\"> may "
"take the form of bugs that have gone 20 years unfixed</a>. The choice to "
"leave the security holes in place is morally equivalent to writing a back "
"door."
@@ -8310,8 +8310,14 @@
msgstr ""
#. type: Content of: <div><div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+#| "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#| "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#| "html\">are sold with spyware sending lots of data to China</a>."
msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/"
"kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
"identifiable-information-pii-without-user-consent-or-disclosure-300362844."
"html\">are sold with spyware sending lots of data to China</a>."
@@ -12584,6 +12590,18 @@
msgstr "<a
href=\"/proprietary/malware-microsoft.html\">ãã¤ã¯ãã½ãã</a>"
#~ msgid ""
+#~ "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+#~ "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#~ "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#~ "html\">are sold with spyware sending lots of data to China</a>."
+#~ msgstr ""
+#~ "ããæºå¸¯é»è©±ã¯<a href=\"http://www.prnewswire.com/news-releases/"
+#~ "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#~ "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#~
"html\">ããããã®ãã¼ã¿ãä¸å½ã«éä¿¡ããã¹ãã¤ã¦ã§ã¢ã¨ã¨ãã«è²©å£²ããã¦ãã¾"
+#~ "ã</a>ã"
+
+#~ msgid ""
#~ "E-books can contain JavaScript code, and <a href=\"http://www.theguardian."
#~ "com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-"
#~ "women-study-finds\"> sometimes this code snoops on readers</a>."
Index: malware-apple.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de-diff.html,v
retrieving revision 1.93
retrieving revision 1.94
diff -u -b -r1.93 -r1.94
--- malware-apple.de-diff.html 13 Apr 2022 16:39:52 -0000 1.93
+++ malware-apple.de-diff.html 17 Apr 2022 08:38:51 -0000 1.94
@@ -332,7 +332,7 @@
it possible for attackers to alter a shutdown event, <a
href="https://blog.zecops.com/research/persistence-without-persistence-meet-the-ultimate-persistence-bug-noreboot/">tricking
the user into thinking that the phone has been powered
- off</a>. But in fact, itâs still running, and the user can't feel
+ off</a>. But in fact, it's still running, and the user can't feel
any difference between a real shutdown and the fake shutdown.</p>
</li>
@@ -1612,7 +1612,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/04/13 16:39:52 $
+$Date: 2022/04/17 08:38:51 $
<!-- timestamp end -->
</p>
</div>
Index: malware-apple.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de.po,v
retrieving revision 1.184
retrieving revision 1.185
diff -u -b -r1.184 -r1.185
--- malware-apple.de.po 13 Apr 2022 16:39:52 -0000 1.184
+++ malware-apple.de.po 17 Apr 2022 08:38:51 -0000 1.185
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-apple.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2022-04-13 12:56+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -578,7 +578,7 @@
"shutdown event, <a href=\"https://blog.zecops.com/research/persistence-"
"without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
"the user into thinking that the phone has been powered off</a>. But in fact, "
-"itâs still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
"shutdown and the fake shutdown."
msgstr ""
Index: malware-apple.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.es.po,v
retrieving revision 1.257
retrieving revision 1.258
diff -u -b -r1.257 -r1.258
--- malware-apple.es.po 15 Apr 2022 18:01:38 -0000 1.257
+++ malware-apple.es.po 17 Apr 2022 08:38:51 -0000 1.258
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2022-04-13 12:56+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2022-04-17 08:28+0000\n"
"X-Generator: Poedit 2.4.2\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
@@ -434,12 +435,26 @@
"privativo de prestigio está libre de graves fallos."
#. type: Content of: <div><div><ul><li><p>
+# | A critical bug in Apple's iOS makes it possible for attackers to alter a
+# | shutdown event, <a
+# |
href=\"https://blog.zecops.com/research/persistence-without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking
+# | the user into thinking that the phone has been powered off</a>. But in
+# | fact, it[-â-]{+'+}s still running, and the user can't feel any difference
+# | between a real shutdown and the fake shutdown.
+#, fuzzy
+#| msgid ""
+#| "A critical bug in Apple's iOS makes it possible for attackers to alter a "
+#| "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-"
+#| "without-persistence-meet-the-ultimate-persistence-bug-noreboot/"
+#| "\">tricking the user into thinking that the phone has been powered off</"
+#| "a>. But in fact, itâs still running, and the user can't feel any "
+#| "difference between a real shutdown and the fake shutdown."
msgid ""
"A critical bug in Apple's iOS makes it possible for attackers to alter a "
"shutdown event, <a href=\"https://blog.zecops.com/research/persistence-"
"without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
"the user into thinking that the phone has been powered off</a>. But in fact, "
-"itâs still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
"shutdown and the fake shutdown."
msgstr ""
"Un error crÃtico en el iOS de Apple permite que un atacante altere el "
Index: malware-apple.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.fr.po,v
retrieving revision 1.252
retrieving revision 1.253
diff -u -b -r1.252 -r1.253
--- malware-apple.fr.po 13 Apr 2022 19:35:42 -0000 1.252
+++ malware-apple.fr.po 17 Apr 2022 08:38:51 -0000 1.253
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2022-04-13 12:56+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
"PO-Revision-Date: 2022-04-13 21:35+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2022-04-17 08:28+0000\n"
#. type: Content of: <title>
msgid ""
@@ -429,12 +430,26 @@
"que les logiciels privateurs prestigieux n'ont pas de bogue grave."
#. type: Content of: <div><div><ul><li><p>
+# | A critical bug in Apple's iOS makes it possible for attackers to alter a
+# | shutdown event, <a
+# |
href=\"https://blog.zecops.com/research/persistence-without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking
+# | the user into thinking that the phone has been powered off</a>. But in
+# | fact, it[-â-]{+'+}s still running, and the user can't feel any difference
+# | between a real shutdown and the fake shutdown.
+#, fuzzy
+#| msgid ""
+#| "A critical bug in Apple's iOS makes it possible for attackers to alter a "
+#| "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-"
+#| "without-persistence-meet-the-ultimate-persistence-bug-noreboot/"
+#| "\">tricking the user into thinking that the phone has been powered off</"
+#| "a>. But in fact, itâs still running, and the user can't feel any "
+#| "difference between a real shutdown and the fake shutdown."
msgid ""
"A critical bug in Apple's iOS makes it possible for attackers to alter a "
"shutdown event, <a href=\"https://blog.zecops.com/research/persistence-"
"without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
"the user into thinking that the phone has been powered off</a>. But in fact, "
-"itâs still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
"shutdown and the fake shutdown."
msgstr ""
"Une faille critique dans iOS permet à un attaquant de modifier une étape de
"
Index: malware-apple.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it-diff.html,v
retrieving revision 1.98
retrieving revision 1.99
diff -u -b -r1.98 -r1.99
--- malware-apple.it-diff.html 13 Apr 2022 16:39:52 -0000 1.98
+++ malware-apple.it-diff.html 17 Apr 2022 08:38:51 -0000 1.99
@@ -332,7 +332,7 @@
it possible for attackers to alter a shutdown event, <a
href="https://blog.zecops.com/research/persistence-without-persistence-meet-the-ultimate-persistence-bug-noreboot/">tricking
the user into thinking that the phone has been powered
- off</a>. But in fact, itâs still running, and the user can't feel
+ off</a>. But in fact, it's still running, and the user can't feel
any difference between a real shutdown and the fake shutdown.</p>
</li>
@@ -527,7 +527,7 @@
<p><a
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&oldid=835861046">
iOS, the operating system of the Apple iThings, is the prototype
of a jail</a>. It was Apple that introduced the practice of
- designing general purpose computers with</em></ins></span> censorship
<span class="inserted"><ins><em>of application
+ designing general purpose computers with censorship of application
programs.</p>
<p>Here is an article about the <a
@@ -544,7 +544,7 @@
</li>
</ul>
-<h4 id="jail-censorship">Examples of censorship by Apple jails</h4>
+<h4 id="jail-censorship">Examples of</em></ins></span> censorship <span
class="inserted"><ins><em>by Apple jails</h4>
<ul class="blurbs">
<li id="M202108200">
@@ -1549,7 +1549,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/04/13 16:39:52 $
+$Date: 2022/04/17 08:38:51 $
<!-- timestamp end -->
</p>
</div>
Index: malware-apple.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it.po,v
retrieving revision 1.177
retrieving revision 1.178
diff -u -b -r1.177 -r1.178
--- malware-apple.it.po 13 Apr 2022 16:39:53 -0000 1.177
+++ malware-apple.it.po 17 Apr 2022 08:38:51 -0000 1.178
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2022-04-13 12:56+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
"PO-Revision-Date: 2017-12-31 13:01+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -528,7 +528,7 @@
"shutdown event, <a href=\"https://blog.zecops.com/research/persistence-"
"without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
"the user into thinking that the phone has been powered off</a>. But in fact, "
-"itâs still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
"shutdown and the fake shutdown."
msgstr ""
Index: malware-apple.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja-diff.html,v
retrieving revision 1.113
retrieving revision 1.114
diff -u -b -r1.113 -r1.114
--- malware-apple.ja-diff.html 13 Apr 2022 16:39:53 -0000 1.113
+++ malware-apple.ja-diff.html 17 Apr 2022 08:38:51 -0000 1.114
@@ -355,7 +355,7 @@
banned</strong></del></span>
<span
class="inserted"><ins><em>href="https://blog.zecops.com/research/persistence-without-persistence-meet-the-ultimate-persistence-bug-noreboot/">tricking
the user into thinking that the phone has been powered
- off</a>. But in fact, itâs still running, and the user can't feel
+ off</a>. But in fact, it's still running, and the user can't feel
any difference between</em></ins></span> a <span
class="removed"><del><strong>program from</strong></del></span> <span
class="inserted"><ins><em>real shutdown and</em></ins></span> the <span
class="removed"><del><strong>App Store</a> because its developers
committed</strong></del></span> <span class="inserted"><ins><em>fake
shutdown.</p>
</li>
@@ -1073,8 +1073,8 @@
<!--#set var="DATE" value='<small
class="date-tag">2019-10</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The Chinese Communist Party's “Study
- the Great Nation” app requires users to grant it</em></ins></span>
<a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
+ the Great Nation” app requires users to grant it <a
+
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
access to the phone's microphone, photos, text messages, contacts, and
internet history</a>, and the Android version was found to contain a
back-door allowing developers to run any code they wish in the users'
@@ -1141,8 +1141,8 @@
<li id="M201702150">
<!--#set var="DATE" value='<small
class="date-tag">2017-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Apple proposes <a
-
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
+ <p>Apple proposes</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>—which would mean no way
to use it without having your fingerprints taken. Users would have
no way to tell whether the phone is snooping on them.</p>
@@ -1517,7 +1517,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/04/13 16:39:53 $
+$Date: 2022/04/17 08:38:51 $
<!-- timestamp end -->
</p>
</div>
Index: malware-apple.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja.po,v
retrieving revision 1.160
retrieving revision 1.161
diff -u -b -r1.160 -r1.161
--- malware-apple.ja.po 13 Apr 2022 16:39:54 -0000 1.160
+++ malware-apple.ja.po 17 Apr 2022 08:38:51 -0000 1.161
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2022-04-13 12:56+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
"PO-Revision-Date: 2016-12-20 14:42+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -443,7 +443,7 @@
"shutdown event, <a href=\"https://blog.zecops.com/research/persistence-"
"without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
"the user into thinking that the phone has been powered off</a>. But in fact, "
-"itâs still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
"shutdown and the fake shutdown."
msgstr ""
Index: malware-apple.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl-diff.html,v
retrieving revision 1.116
retrieving revision 1.117
diff -u -b -r1.116 -r1.117
--- malware-apple.nl-diff.html 13 Apr 2022 16:39:54 -0000 1.116
+++ malware-apple.nl-diff.html 17 Apr 2022 08:38:51 -0000 1.117
@@ -355,7 +355,7 @@
banned</strong></del></span>
<span
class="inserted"><ins><em>href="https://blog.zecops.com/research/persistence-without-persistence-meet-the-ultimate-persistence-bug-noreboot/">tricking
the user into thinking that the phone has been powered
- off</a>. But in fact, itâs still running, and the user can't feel
+ off</a>. But in fact, it's still running, and the user can't feel
any difference between</em></ins></span> a <span
class="removed"><del><strong>program from</strong></del></span> <span
class="inserted"><ins><em>real shutdown and</em></ins></span> the <span
class="removed"><del><strong>App Store</a> because its developers
committed</strong></del></span> <span class="inserted"><ins><em>fake
shutdown.</p>
</li>
@@ -1073,8 +1073,8 @@
<!--#set var="DATE" value='<small
class="date-tag">2019-10</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The Chinese Communist Party's “Study
- the Great Nation” app requires users to grant it</em></ins></span>
<a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
+ the Great Nation” app requires users to grant it <a
+
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
access to the phone's microphone, photos, text messages, contacts, and
internet history</a>, and the Android version was found to contain a
back-door allowing developers to run any code they wish in the users'
@@ -1141,8 +1141,8 @@
<li id="M201702150">
<!--#set var="DATE" value='<small
class="date-tag">2017-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Apple proposes <a
-
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
+ <p>Apple proposes</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>—which would mean no way
to use it without having your fingerprints taken. Users would have
no way to tell whether the phone is snooping on them.</p>
@@ -1517,7 +1517,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/04/13 16:39:54 $
+$Date: 2022/04/17 08:38:51 $
<!-- timestamp end -->
</p>
</div>
Index: malware-apple.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl.po,v
retrieving revision 1.114
retrieving revision 1.115
diff -u -b -r1.114 -r1.115
--- malware-apple.nl.po 13 Apr 2022 16:39:54 -0000 1.114
+++ malware-apple.nl.po 17 Apr 2022 08:38:51 -0000 1.115
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2022-04-13 12:56+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
"PO-Revision-Date: 2017-01-10 22:15+0100\n"
"Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
"Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -474,7 +474,7 @@
"shutdown event, <a href=\"https://blog.zecops.com/research/persistence-"
"without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
"the user into thinking that the phone has been powered off</a>. But in fact, "
-"itâs still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
"shutdown and the fake shutdown."
msgstr ""
Index: malware-apple.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.pot,v
retrieving revision 1.124
retrieving revision 1.125
diff -u -b -r1.124 -r1.125
--- malware-apple.pot 13 Apr 2022 12:56:19 -0000 1.124
+++ malware-apple.pot 17 Apr 2022 08:38:51 -0000 1.125
@@ -7,13 +7,13 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2022-04-13 12:56+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
"Language: \n"
"MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=UTF-8\n"
+"Content-Type: text/plain; charset=CHARSET\n"
"Content-Transfer-Encoding: 8bit\n"
#. type: Content of: <title>
@@ -333,7 +333,7 @@
"shutdown event, <a "
"href=\"https://blog.zecops.com/research/persistence-without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking
"
"the user into thinking that the phone has been powered off</a>. But in fact, "
-"itâs still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
"shutdown and the fake shutdown."
msgstr ""
Index: malware-apple.pt-br-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.pt-br-diff.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- malware-apple.pt-br-diff.html 13 Apr 2022 16:39:54 -0000 1.5
+++ malware-apple.pt-br-diff.html 17 Apr 2022 08:38:51 -0000 1.6
@@ -292,7 +292,7 @@
it possible for attackers to alter a shutdown event, <a
href="https://blog.zecops.com/research/persistence-without-persistence-meet-the-ultimate-persistence-bug-noreboot/">tricking
the user into thinking that the phone has been powered
- off</a>. But in fact, itâs still running, and the user can't feel
+ off</a>. But in fact, it's still running, and the user can't feel
any difference between a real shutdown and the fake shutdown.</p>
</li>
@@ -1307,7 +1307,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/04/13 16:39:54 $
+$Date: 2022/04/17 08:38:51 $
<!-- timestamp end -->
</p>
</div>
Index: malware-apple.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.pt-br.po,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- malware-apple.pt-br.po 13 Apr 2022 16:39:54 -0000 1.26
+++ malware-apple.pt-br.po 17 Apr 2022 08:38:51 -0000 1.27
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2022-04-13 12:56+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
"PO-Revision-Date: 2021-06-26 09:40-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -446,7 +446,7 @@
"shutdown event, <a href=\"https://blog.zecops.com/research/persistence-"
"without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
"the user into thinking that the phone has been powered off</a>. But in fact, "
-"itâs still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
"shutdown and the fake shutdown."
msgstr ""
Index: malware-apple.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ru.po,v
retrieving revision 1.298
retrieving revision 1.299
diff -u -b -r1.298 -r1.299
--- malware-apple.ru.po 13 Apr 2022 17:34:58 -0000 1.298
+++ malware-apple.ru.po 17 Apr 2022 08:38:51 -0000 1.299
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2022-04-13 12:56+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2022-04-17 08:28+0000\n"
#. type: Content of: <title>
msgid ""
@@ -429,12 +430,26 @@
"пÑедположение, ÑÑо в пÑеÑÑижнÑÑ
неÑвободнÑÑ
пÑогÑаммаÑ
Ð½ÐµÑ ÑеÑÑезнÑÑ
оÑибок."
#. type: Content of: <div><div><ul><li><p>
+# | A critical bug in Apple's iOS makes it possible for attackers to alter a
+# | shutdown event, <a
+# |
href=\"https://blog.zecops.com/research/persistence-without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking
+# | the user into thinking that the phone has been powered off</a>. But in
+# | fact, it[-â-]{+'+}s still running, and the user can't feel any difference
+# | between a real shutdown and the fake shutdown.
+#, fuzzy
+#| msgid ""
+#| "A critical bug in Apple's iOS makes it possible for attackers to alter a "
+#| "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-"
+#| "without-persistence-meet-the-ultimate-persistence-bug-noreboot/"
+#| "\">tricking the user into thinking that the phone has been powered off</"
+#| "a>. But in fact, itâs still running, and the user can't feel any "
+#| "difference between a real shutdown and the fake shutdown."
msgid ""
"A critical bug in Apple's iOS makes it possible for attackers to alter a "
"shutdown event, <a href=\"https://blog.zecops.com/research/persistence-"
"without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
"the user into thinking that the phone has been powered off</a>. But in fact, "
-"itâs still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
"shutdown and the fake shutdown."
msgstr ""
"ÐÑиÑиÑÐ½Ð°Ñ Ð¾Ñибка в iOS компании Apple даеÑ
взломÑикам возможноÑÑÑ Ð¸Ð·Ð¼ÐµÐ½ÑÑÑ "
Index: malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.120
retrieving revision 1.121
diff -u -b -r1.120 -r1.121
--- malware-mobiles.de-diff.html 13 Apr 2022 16:39:59 -0000 1.120
+++ malware-mobiles.de-diff.html 17 Apr 2022 08:38:51 -0000 1.121
@@ -192,8 +192,8 @@
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
often used to make a phone transmit all conversations it
hears</a>.</p>
- <p>The back door <a <span
class="inserted"><ins><em>class="not-a-duplicate"</em></ins></span>
-
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
+ <p>The back door <a <span
class="removed"><del><strong>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"></strong></del></span>
<span class="inserted"><ins><em>class="not-a-duplicate"
+
href="https://www.osnews.com/story/27416/the-second-operating-system-hiding-in-every-mobile-phone/"></em></ins></span>
may take the form of bugs that have gone 20 years unfixed</a>.
The choice to leave the security holes in place is morally
equivalent to writing a back door.</p>
@@ -547,10 +547,12 @@
the worse aspect of these apps is that <a
href="/philosophy/surveillance-vs-democracy.html">payment is not <span
class="removed"><del><strong>anonymous</a>.
</p></strong></del></span>
- <span class="inserted"><ins><em>anonymous</a>.</p>
+ <span
class="inserted"><ins><em>anonymous</a>.</p></em></ins></span>
</li>
- <li id="M201505294">
+ <span class="removed"><del><strong><li><p><a
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201505294">
<!--#set var="DATE" value='<small
class="date-tag">2015-05</small>'
--><!--#echo encoding="none" var="DATE" -->
<p><a
@@ -575,12 +577,10 @@
data from third parties in general, but it can't protect that data
from the state. Quite the contrary: confiding your data to someone
else's server, if not first encrypted by you with free software,
- undermines your rights.</p></em></ins></span>
+ undermines your rights.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201402210">
+ <li id="M201402210">
<!--#set var="DATE" value='<small
class="date-tag">2014-02</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The <a
@@ -1425,7 +1425,7 @@
<li>
<p>Faceapp appears to do</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ <span
class="inserted"><ins><em>href="https://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
sold with spyware sending</em></ins></span> lots of <span
class="removed"><del><strong>surveillance, judging by
<a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
how much access it demands to personal</strong></del></span>
data <span class="removed"><del><strong>in the device</a>.
@@ -1899,7 +1899,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/04/13 16:39:59 $
+$Date: 2022/04/17 08:38:51 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.170
retrieving revision 1.171
diff -u -b -r1.170 -r1.171
--- malware-mobiles.de.po 13 Apr 2022 16:39:59 -0000 1.170
+++ malware-mobiles.de.po 17 Apr 2022 08:38:51 -0000 1.171
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -328,8 +328,10 @@
"a>."
#. type: Content of: <div><div><p>
-# | The back door <a {+class=\"not-a-duplicate\"+}
-# |
href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\">
+# | The back door <a
+# |
[-href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\">-]
+# | {+class=\"not-a-duplicate\"
+# |
href=\"https://www.osnews.com/story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\">+}
# | may take the form of bugs that have gone 20 years unfixed</a>. The choice
# | to leave the security holes in place is morally equivalent to writing a
# | back door.
@@ -340,8 +342,8 @@
#| "form of bugs that have gone 20 years unfixed</a>. The choice to leave "
#| "the security holes in place is morally equivalent to writing a back door."
msgid ""
-"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/"
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"The back door <a class=\"not-a-duplicate\" href=\"https://www.osnews.com/"
+"story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\"> may "
"take the form of bugs that have gone 20 years unfixed</a>. The choice to "
"leave the security holes in place is morally equivalent to writing a back "
"door."
@@ -2222,8 +2224,17 @@
"App JavaScript-Injektion für Tracking und Anzeigen von Werbung darstellt."
#. type: Content of: <div><div><ul><li><p>
+# | Some portable phones <a
+# |
href=\"http{+s+}://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html\">are
+# | sold with spyware sending lots of data to China</a>.
+#, fuzzy
+#| msgid ""
+#| "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+#| "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#| "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#| "html\">are sold with spyware sending lots of data to China</a>."
msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/"
"kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
"identifiable-information-pii-without-user-consent-or-disclosure-300362844."
"html\">are sold with spyware sending lots of data to China</a>."
Index: malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.271
retrieving revision 1.272
diff -u -b -r1.271 -r1.272
--- malware-mobiles.es.po 15 Apr 2022 18:01:38 -0000 1.271
+++ malware-mobiles.es.po 17 Apr 2022 08:38:51 -0000 1.272
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2022-04-17 08:28+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.4.2\n"
@@ -260,9 +261,22 @@
"el teléfono transmita todas las conversaciones que escucha</a>."
#. type: Content of: <div><div><p>
+# | The back door <a class=\"not-a-duplicate\"
+# |
[-href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\">-]
+# |
{+href=\"https://www.osnews.com/story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\">+}
+# | may take the form of bugs that have gone 20 years unfixed</a>. The choice
+# | to leave the security holes in place is morally equivalent to writing a
+# | back door.
+#, fuzzy
+#| msgid ""
+#| "The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/"
+#| "story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> "
+#| "may take the form of bugs that have gone 20 years unfixed</a>. The "
+#| "choice to leave the security holes in place is morally equivalent to "
+#| "writing a back door."
msgid ""
-"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/"
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"The back door <a class=\"not-a-duplicate\" href=\"https://www.osnews.com/"
+"story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\"> may "
"take the form of bugs that have gone 20 years unfixed</a>. The choice to "
"leave the security holes in place is morally equivalent to writing a back "
"door."
@@ -2109,8 +2123,17 @@
"JavaScript para rastrear a los usuarios y mostrarles anuncios."
#. type: Content of: <div><div><ul><li><p>
+# | Some portable phones <a
+# |
href=\"http{+s+}://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html\">are
+# | sold with spyware sending lots of data to China</a>.
+#, fuzzy
+#| msgid ""
+#| "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+#| "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#| "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#| "html\">are sold with spyware sending lots of data to China</a>."
msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/"
"kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
"identifiable-information-pii-without-user-consent-or-disclosure-300362844."
"html\">are sold with spyware sending lots of data to China</a>."
Index: malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.270
retrieving revision 1.271
diff -u -b -r1.270 -r1.271
--- malware-mobiles.fr.po 13 Apr 2022 19:35:43 -0000 1.270
+++ malware-mobiles.fr.po 17 Apr 2022 08:38:51 -0000 1.271
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
"PO-Revision-Date: 2022-04-13 21:35+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2022-04-17 08:28+0000\n"
#. type: Content of: <title>
msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -256,9 +257,22 @@
"transmettre toutes les conversations qu'il entend</a>."
#. type: Content of: <div><div><p>
+# | The back door <a class=\"not-a-duplicate\"
+# |
[-href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\">-]
+# |
{+href=\"https://www.osnews.com/story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\">+}
+# | may take the form of bugs that have gone 20 years unfixed</a>. The choice
+# | to leave the security holes in place is morally equivalent to writing a
+# | back door.
+#, fuzzy
+#| msgid ""
+#| "The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/"
+#| "story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> "
+#| "may take the form of bugs that have gone 20 years unfixed</a>. The "
+#| "choice to leave the security holes in place is morally equivalent to "
+#| "writing a back door."
msgid ""
-"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/"
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"The back door <a class=\"not-a-duplicate\" href=\"https://www.osnews.com/"
+"story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\"> may "
"take the form of bugs that have gone 20 years unfixed</a>. The choice to "
"leave the security holes in place is morally equivalent to writing a back "
"door."
@@ -2105,8 +2119,17 @@
"utilisateurs et à l'affichage de pubs."
#. type: Content of: <div><div><ul><li><p>
+# | Some portable phones <a
+# |
href=\"http{+s+}://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html\">are
+# | sold with spyware sending lots of data to China</a>.
+#, fuzzy
+#| msgid ""
+#| "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+#| "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#| "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#| "html\">are sold with spyware sending lots of data to China</a>."
msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/"
"kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
"identifiable-information-pii-without-user-consent-or-disclosure-300362844."
"html\">are sold with spyware sending lots of data to China</a>."
Index: malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.123
retrieving revision 1.124
diff -u -b -r1.123 -r1.124
--- malware-mobiles.it-diff.html 13 Apr 2022 16:39:59 -0000 1.123
+++ malware-mobiles.it-diff.html 17 Apr 2022 08:38:51 -0000 1.124
@@ -206,7 +206,7 @@
<span class="inserted"><ins><em>often used to make a phone transmit all
conversations it hears</a>.</p>
<p>The back door <a class="not-a-duplicate"
-
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
+
href="https://www.osnews.com/story/27416/the-second-operating-system-hiding-in-every-mobile-phone/">
may take the form of bugs that have gone 20 years unfixed</a>.
The choice to leave the security holes in place</em></ins></span> is <span
class="removed"><del><strong>employed</strong></del></span> <span
class="inserted"><ins><em>morally
equivalent</em></ins></span> to <span class="removed"><del><strong>listen
through their microphones</a>.</p>
@@ -235,15 +235,15 @@
<li id="M202001090">
<!--#set var="DATE" value='<small
class="date-tag">2020-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Android phones subsidized by the US government come
with</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">the
nature</strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/">
- preinstalled adware and a back door for forcing
installation</em></ins></span> of
- <span class="inserted"><ins><em>apps</a>.</p>
+ <p>Android phones subsidized by the US government come with <a
+
href="https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/">
+ preinstalled adware and a back door for forcing installation of
+ apps</a>.</p>
<p>The adware is in a modified version of an
essential system configuration app. The back door is a
- surreptitious addition to a program whose stated purpose is to be a <a
-
href="https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/">
+ surreptitious addition to a program whose stated purpose is to be
a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">the
nature</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/">
universal back door for firmware</a>.</p>
<p>In other words, a program whose raison d'être is malicious has
@@ -296,7 +296,7 @@
<p><a
href="https://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
A Chinese version of Android has a universal back door</a>. Nearly
- all models of mobile phones have a <a
href="#universal-back-door-phone-modem">
+ all models</em></ins></span> of <span class="inserted"><ins><em>mobile
phones have a <a href="#universal-back-door-phone-modem">
universal back door in the modem chip</a>. So why did Coolpad bother
to introduce another? Because</em></ins></span> this <span
class="removed"><del><strong>problem</a>.</p></strong></del></span>
<span class="inserted"><ins><em>one is controlled by
Coolpad.</p></em></ins></span>
</li>
@@ -529,12 +529,10 @@
the worse aspect of these apps is that <a
href="/philosophy/surveillance-vs-democracy.html">payment is not <span
class="removed"><del><strong>anonymous</a>.
</p></strong></del></span>
- <span
class="inserted"><ins><em>anonymous</a>.</p></em></ins></span>
+ <span class="inserted"><ins><em>anonymous</a>.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201505294">
+ <li id="M201505294">
<!--#set var="DATE" value='<small
class="date-tag">2015-05</small>'
--><!--#echo encoding="none" var="DATE" -->
<p><a
@@ -559,10 +557,12 @@
data from third parties in general, but it can't protect that data
from the state. Quite the contrary: confiding your data to someone
else's server, if not first encrypted by you with free software,
- undermines your rights.</p>
+ undermines your rights.</p></em></ins></span>
</li>
- <li id="M201402210">
+ <span class="removed"><del><strong><li><p><a
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201402210">
<!--#set var="DATE" value='<small
class="date-tag">2014-02</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The <a
@@ -1407,7 +1407,7 @@
<li>
<p>Faceapp appears to do</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ <span
class="inserted"><ins><em>href="https://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
sold with spyware sending</em></ins></span> lots of <span
class="removed"><del><strong>surveillance, judging by
<a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
how much access it demands to personal data in the
device</a>.
@@ -1880,7 +1880,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/04/13 16:39:59 $
+$Date: 2022/04/17 08:38:51 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.170
retrieving revision 1.171
diff -u -b -r1.170 -r1.171
--- malware-mobiles.it.po 13 Apr 2022 16:39:59 -0000 1.170
+++ malware-mobiles.it.po 17 Apr 2022 08:38:51 -0000 1.171
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
"PO-Revision-Date: 2017-12-31 13:12+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -305,7 +305,7 @@
# | [-More about-]{+The back door+} <a
# |
[-href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\">the
# | nature-] {+class=\"not-a-duplicate\"
-# |
href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\">
+# |
href=\"https://www.osnews.com/story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\">
# | may take the form+} of [-this problem</a>.-] {+bugs that have gone 20
# | years unfixed</a>. The choice to leave the security holes in place is
# | morally equivalent to writing a back door.+}
@@ -315,8 +315,8 @@
#| "The_second_operating_system_hiding_in_every_mobile_phone\">the nature of "
#| "this problem</a>."
msgid ""
-"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/"
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"The back door <a class=\"not-a-duplicate\" href=\"https://www.osnews.com/"
+"story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\"> may "
"take the form of bugs that have gone 20 years unfixed</a>. The choice to "
"leave the security holes in place is morally equivalent to writing a back "
"door."
@@ -2007,8 +2007,17 @@
"versione non-premium usa JavaScript a scopi pubblicitari."
#. type: Content of: <div><div><ul><li><p>
+# | Some portable phones <a
+# |
href=\"http{+s+}://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html\">are
+# | sold with spyware sending lots of data to China</a>.
+#, fuzzy
+#| msgid ""
+#| "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+#| "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#| "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#| "html\">are sold with spyware sending lots of data to China</a>."
msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/"
"kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
"identifiable-information-pii-without-user-consent-or-disclosure-300362844."
"html\">are sold with spyware sending lots of data to China</a>."
Index: malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.141
retrieving revision 1.142
diff -u -b -r1.141 -r1.142
--- malware-mobiles.ja-diff.html 13 Apr 2022 16:39:59 -0000 1.141
+++ malware-mobiles.ja-diff.html 17 Apr 2022 08:38:51 -0000 1.142
@@ -202,7 +202,7 @@
often used</em></ins></span> to <span
class="removed"><del><strong>restrict what users can do</strong></del></span>
<span class="inserted"><ins><em>make a phone transmit all conversations it
hears</a>.</p>
<p>The back door <a class="not-a-duplicate"
-
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
+
href="https://www.osnews.com/story/27416/the-second-operating-system-hiding-in-every-mobile-phone/">
may take the form of bugs that have gone 20 years unfixed</a>.
The choice to leave the security holes in place is morally
equivalent to writing a back door.</p>
@@ -677,10 +677,10 @@
href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/">
pushing unwanted and often malicious ads on users, and redirecting them
to phishing sites</a> that stole their credentials. Furthermore, the
- user interface of most of them was designed to make uninstallation
+ user interface of most</em></ins></span> of <span
class="inserted"><ins><em>them was designed to make uninstallation
difficult.</p>
- <p>Users should</em></ins></span> of <span
class="inserted"><ins><em>course uninstall these dangerous apps if they
+ <p>Users should of course uninstall these dangerous apps if they
haven't yet, but they should also stay away from nonfree apps in
general. <em>All</em> nonfree apps carry</em></ins></span> a
<span class="inserted"><ins><em>potential risk because
there is no easy way of knowing what they really do.</p>
@@ -741,10 +741,10 @@
companies for various organizations, do <a
href="https://www.expressvpn.com/digital-security-lab/investigation-xoth">
location tracking unknown to those companies and those
- organizations</a>. It's actually some widely used libraries that do
+ organizations</a>. It's actually some widely used
libraries</em></ins></span> that <span class="inserted"><ins><em>do
the tracking.</p>
- <p>What's unusual here is</em></ins></span> that <span
class="inserted"><ins><em>proprietary software developer A tricks
+ <p>What's unusual here is that proprietary software developer A
tricks
proprietary software developers B1 … B50 into making platforms for
A to mistreat the end user.</p>
</li>
@@ -940,7 +940,7 @@
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
available to employers and insurance companies</a>. Even though the
data is “anonymized and aggregated,” it can easily be
- traced back to the woman who uses</em></ins></span> the <span
class="inserted"><ins><em>app.</p>
+ traced back to</em></ins></span> the <span class="inserted"><ins><em>woman
who uses the app.</p>
<p>This has harmful implications for women's rights to equal
employment
and freedom to make their own pregnancy choices. Don't use
@@ -960,8 +960,8 @@
preinstalled nonfree apps that have access to sensitive data without
users' knowledge</a>. These hidden apps may either call home with
the data, or pass it on to user-installed apps that have access to
- the network but no direct access to</em></ins></span> the <span
class="inserted"><ins><em>data. This results in massive
- surveillance on which the user has absolutely no control.</p>
+ the network but no direct access to the data. This results in massive
+ surveillance on which</em></ins></span> the <span
class="inserted"><ins><em>user has absolutely no control.</p>
</li>
<li id="M201903211">
@@ -1376,7 +1376,7 @@
<!--#set var="DATE" value='<small
class="date-tag">2016-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Some portable phones <a
-
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+
href="https://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
sold with spyware sending lots of data to China</a>.</p>
</li>
@@ -1772,7 +1772,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/04/13 16:39:59 $
+$Date: 2022/04/17 08:38:51 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.160
retrieving revision 1.161
diff -u -b -r1.160 -r1.161
--- malware-mobiles.ja.po 13 Apr 2022 16:39:59 -0000 1.160
+++ malware-mobiles.ja.po 17 Apr 2022 08:38:51 -0000 1.161
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
"PO-Revision-Date: 2016-12-20 14:59+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -262,8 +262,8 @@
#. type: Content of: <div><div><p>
msgid ""
-"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/"
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"The back door <a class=\"not-a-duplicate\" href=\"https://www.osnews.com/"
+"story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\"> may "
"take the form of bugs that have gone 20 years unfixed</a>. The choice to "
"leave the security holes in place is morally equivalent to writing a back "
"door."
@@ -1615,8 +1615,14 @@
msgstr ""
#. type: Content of: <div><div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+#| "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#| "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#| "html\">are sold with spyware sending lots of data to China</a>."
msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/"
"kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
"identifiable-information-pii-without-user-consent-or-disclosure-300362844."
"html\">are sold with spyware sending lots of data to China</a>."
Index: malware-mobiles.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pot,v
retrieving revision 1.135
retrieving revision 1.136
diff -u -b -r1.135 -r1.136
--- malware-mobiles.pot 13 Apr 2022 16:39:59 -0000 1.135
+++ malware-mobiles.pot 17 Apr 2022 08:38:51 -0000 1.136
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -210,7 +210,7 @@
#. type: Content of: <div><div><p>
msgid ""
"The back door <a class=\"not-a-duplicate\" "
-"href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\">
"
+"href=\"https://www.osnews.com/story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\">
"
"may take the form of bugs that have gone 20 years unfixed</a>. The choice "
"to leave the security holes in place is morally equivalent to writing a back "
"door."
@@ -1399,7 +1399,7 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
"Some portable phones <a "
-"href=\"http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html\">are
"
+"href=\"https://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html\">are
"
"sold with spyware sending lots of data to China</a>."
msgstr ""
Index: malware-mobiles.pt-br-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pt-br-diff.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- malware-mobiles.pt-br-diff.html 13 Apr 2022 16:39:59 -0000 1.5
+++ malware-mobiles.pt-br-diff.html 17 Apr 2022 08:38:51 -0000 1.6
@@ -170,7 +170,8 @@
often used to make a phone transmit all conversations it
hears</a>.</p>
<p>The back door <a class="not-a-duplicate"
-
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
+ <span
class="removed"><del><strong>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.osnews.com/story/27416/the-second-operating-system-hiding-in-every-mobile-phone/"></em></ins></span>
may take the form of bugs that have gone 20 years unfixed</a>.
The choice to leave the security holes in place is morally
equivalent to writing a back door.</p>
@@ -1305,7 +1306,8 @@
<!--#set var="DATE" value='<small
class="date-tag">2016-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Some portable phones <a
-
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ <span
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are</em></ins></span>
sold with spyware sending lots of data to China</a>.</p>
</li>
@@ -1660,7 +1662,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/04/13 16:39:59 $
+$Date: 2022/04/17 08:38:51 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pt-br.po,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- malware-mobiles.pt-br.po 13 Apr 2022 16:39:59 -0000 1.14
+++ malware-mobiles.pt-br.po 17 Apr 2022 08:38:51 -0000 1.15
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
"PO-Revision-Date: 2021-06-26 09:39-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -259,9 +259,16 @@
"transmitir todas as conversas que ele ouve</a>."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/"
+#| "story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> "
+#| "may take the form of bugs that have gone 20 years unfixed</a>. The "
+#| "choice to leave the security holes in place is morally equivalent to "
+#| "writing a back door."
msgid ""
-"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/"
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"The back door <a class=\"not-a-duplicate\" href=\"https://www.osnews.com/"
+"story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\"> may "
"take the form of bugs that have gone 20 years unfixed</a>. The choice to "
"leave the security holes in place is morally equivalent to writing a back "
"door."
@@ -2202,8 +2209,14 @@
"usuário e exibir anúncios."
#. type: Content of: <div><div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+#| "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#| "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#| "html\">are sold with spyware sending lots of data to China</a>."
msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/"
"kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
"identifiable-information-pii-without-user-consent-or-disclosure-300362844."
"html\">are sold with spyware sending lots of data to China</a>."
Index: malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.302
retrieving revision 1.303
diff -u -b -r1.302 -r1.303
--- malware-mobiles.ru.po 13 Apr 2022 17:34:58 -0000 1.302
+++ malware-mobiles.ru.po 17 Apr 2022 08:38:51 -0000 1.303
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2022-04-17 08:28+0000\n"
#. type: Content of: <title>
msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -255,9 +256,22 @@
"пеÑедаваÑÑ Ð²Ñе ÑазговоÑÑ, коÑоÑÑе он
ÑлÑÑиÑ</a>."
#. type: Content of: <div><div><p>
+# | The back door <a class=\"not-a-duplicate\"
+# |
[-href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\">-]
+# |
{+href=\"https://www.osnews.com/story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\">+}
+# | may take the form of bugs that have gone 20 years unfixed</a>. The choice
+# | to leave the security holes in place is morally equivalent to writing a
+# | back door.
+#, fuzzy
+#| msgid ""
+#| "The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/"
+#| "story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> "
+#| "may take the form of bugs that have gone 20 years unfixed</a>. The "
+#| "choice to leave the security holes in place is morally equivalent to "
+#| "writing a back door."
msgid ""
-"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/"
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"The back door <a class=\"not-a-duplicate\" href=\"https://www.osnews.com/"
+"story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\"> may "
"take the form of bugs that have gone 20 years unfixed</a>. The choice to "
"leave the security holes in place is morally equivalent to writing a back "
"door."
@@ -2086,8 +2100,17 @@
"полÑзоваÑелем и показа ÑекламÑ."
#. type: Content of: <div><div><ul><li><p>
+# | Some portable phones <a
+# |
href=\"http{+s+}://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html\">are
+# | sold with spyware sending lots of data to China</a>.
+#, fuzzy
+#| msgid ""
+#| "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+#| "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#| "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#| "html\">are sold with spyware sending lots of data to China</a>."
msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/"
"kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
"identifiable-information-pii-without-user-consent-or-disclosure-300362844."
"html\">are sold with spyware sending lots of data to China</a>."
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.384
retrieving revision 1.385
diff -u -b -r1.384 -r1.385
--- nl.po 13 Apr 2022 16:39:59 -0000 1.384
+++ nl.po 17 Apr 2022 08:38:51 -0000 1.385
@@ -584,7 +584,7 @@
"shutdown event, <a href=\"https://blog.zecops.com/research/persistence-"
"without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
"the user into thinking that the phone has been powered off</a>. But in fact, "
-"itâs still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
"shutdown and the fake shutdown."
msgstr ""
@@ -5937,7 +5937,7 @@
msgid ""
"Many games are designed to keep gamers compulsively playing—and "
"spending money on the game. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
+"\"https://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
"research</a>:"
msgstr ""
@@ -6938,8 +6938,8 @@
#. type: Content of: <div><div><p>
msgid ""
-"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/"
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"The back door <a class=\"not-a-duplicate\" href=\"https://www.osnews.com/"
+"story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\"> may "
"take the form of bugs that have gone 20 years unfixed</a>. The choice to "
"leave the security holes in place is morally equivalent to writing a back "
"door."
@@ -7458,7 +7458,7 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/"
"kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
"identifiable-information-pii-without-user-consent-or-disclosure-300362844."
"html\">are sold with spyware sending lots of data to China</a>."
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.383
retrieving revision 1.384
diff -u -b -r1.383 -r1.384
--- pl.po 13 Apr 2022 16:40:00 -0000 1.383
+++ pl.po 17 Apr 2022 08:38:52 -0000 1.384
@@ -570,7 +570,7 @@
"shutdown event, <a href=\"https://blog.zecops.com/research/persistence-"
"without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
"the user into thinking that the phone has been powered off</a>. But in fact, "
-"itâs still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
"shutdown and the fake shutdown."
msgstr ""
@@ -5641,7 +5641,7 @@
msgid ""
"Many games are designed to keep gamers compulsively playing—and "
"spending money on the game. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
+"\"https://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
"research</a>:"
msgstr ""
@@ -6551,8 +6551,8 @@
#. type: Content of: <div><div><p>
msgid ""
-"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/"
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"The back door <a class=\"not-a-duplicate\" href=\"https://www.osnews.com/"
+"story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\"> may "
"take the form of bugs that have gone 20 years unfixed</a>. The choice to "
"leave the security holes in place is morally equivalent to writing a back "
"door."
@@ -7048,7 +7048,7 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/"
"kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
"identifiable-information-pii-without-user-consent-or-disclosure-300362844."
"html\">are sold with spyware sending lots of data to China</a>."
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.382
retrieving revision 1.383
diff -u -b -r1.382 -r1.383
--- pot 13 Apr 2022 16:40:00 -0000 1.382
+++ pot 17 Apr 2022 08:38:52 -0000 1.383
@@ -483,7 +483,7 @@
"shutdown event, <a href=\"https://blog.zecops.com/research/persistence-"
"without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
"the user into thinking that the phone has been powered off</a>. But in fact, "
-"itâs still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
"shutdown and the fake shutdown."
msgstr ""
@@ -5333,7 +5333,7 @@
msgid ""
"Many games are designed to keep gamers compulsively playing—and "
"spending money on the game. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
+"\"https://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
"research</a>:"
msgstr ""
@@ -6188,8 +6188,8 @@
#. type: Content of: <div><div><p>
msgid ""
-"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/"
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"The back door <a class=\"not-a-duplicate\" href=\"https://www.osnews.com/"
+"story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\"> may "
"take the form of bugs that have gone 20 years unfixed</a>. The choice to "
"leave the security holes in place is morally equivalent to writing a back "
"door."
@@ -6685,7 +6685,7 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/"
"kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
"identifiable-information-pii-without-user-consent-or-disclosure-300362844."
"html\">are sold with spyware sending lots of data to China</a>."
Index: proprietary-addictions.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.es.po,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- proprietary-addictions.es.po 15 Apr 2022 18:01:40 -0000 1.76
+++ proprietary-addictions.es.po 17 Apr 2022 08:38:52 -0000 1.77
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-addictions.html\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2022-04-17 08:28+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -114,10 +115,21 @@
msgstr "Juegos"
#. type: Content of: <div><div><p>
+# | Many games are designed to keep gamers compulsively playing—and
+# | spending money on the game. To achieve this result, developers use <a
+# |
href=\"http{+s+}://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html\">
+# | techniques that derive from behavioral and brain research</a>:
+#, fuzzy
+#| msgid ""
+#| "Many games are designed to keep gamers compulsively playing—and "
+#| "spending money on the game. To achieve this result, developers use <a "
+#| "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-"
+#| "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#| "and brain research</a>:"
msgid ""
"Many games are designed to keep gamers compulsively playing—and "
"spending money on the game. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
+"\"https://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
"research</a>:"
msgstr ""
Index: proprietary-addictions.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.fr.po,v
retrieving revision 1.84
retrieving revision 1.85
diff -u -b -r1.84 -r1.85
--- proprietary-addictions.fr.po 13 Apr 2022 20:22:03 -0000 1.84
+++ proprietary-addictions.fr.po 17 Apr 2022 08:38:52 -0000 1.85
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-addictions.html\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
"PO-Revision-Date: 2022-04-13 21:35+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2022-04-17 08:28+0000\n"
#. type: Content of: <title>
msgid "Proprietary Addictions - GNU Project - Free Software Foundation"
@@ -109,10 +110,21 @@
msgstr "Jeux"
#. type: Content of: <div><div><p>
+# | Many games are designed to keep gamers compulsively playing—and
+# | spending money on the game. To achieve this result, developers use <a
+# |
href=\"http{+s+}://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html\">
+# | techniques that derive from behavioral and brain research</a>:
+#, fuzzy
+#| msgid ""
+#| "Many games are designed to keep gamers compulsively playing—and "
+#| "spending money on the game. To achieve this result, developers use <a "
+#| "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-"
+#| "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#| "and brain research</a>:"
msgid ""
"Many games are designed to keep gamers compulsively playing—and "
"spending money on the game. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
+"\"https://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
"research</a>:"
msgstr ""
Index: proprietary-addictions.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.pot,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- proprietary-addictions.pot 13 Apr 2022 16:40:00 -0000 1.38
+++ proprietary-addictions.pot 17 Apr 2022 08:38:52 -0000 1.39
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-addictions.html\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -96,7 +96,7 @@
msgid ""
"Many games are designed to keep gamers compulsively playing—and "
"spending money on the game. To achieve this result, developers use <a "
-"href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html\">
"
+"href=\"https://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html\">
"
"techniques that derive from behavioral and brain research</a>:"
msgstr ""
Index: proprietary-addictions.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.pt-br.po,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary-addictions.pt-br.po 13 Apr 2022 16:40:00 -0000 1.7
+++ proprietary-addictions.pt-br.po 17 Apr 2022 08:38:52 -0000 1.8
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-addictions.html\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
"PO-Revision-Date: 2021-06-26 09:40-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -108,10 +108,17 @@
msgstr "Jogos"
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Many games are designed to keep gamers compulsively playing—and "
+#| "spending money on the game. To achieve this result, developers use <a "
+#| "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-"
+#| "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#| "and brain research</a>:"
msgid ""
"Many games are designed to keep gamers compulsively playing—and "
"spending money on the game. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
+"\"https://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
"research</a>:"
msgstr ""
Index: proprietary-addictions.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.ru.po,v
retrieving revision 1.71
retrieving revision 1.72
diff -u -b -r1.71 -r1.72
--- proprietary-addictions.ru.po 13 Apr 2022 17:34:58 -0000 1.71
+++ proprietary-addictions.ru.po 17 Apr 2022 08:38:52 -0000 1.72
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2022-04-17 08:28+0000\n"
#. type: Content of: <title>
msgid "Proprietary Addictions - GNU Project - Free Software Foundation"
@@ -111,10 +112,21 @@
msgstr "ÐгÑÑ"
#. type: Content of: <div><div><p>
+# | Many games are designed to keep gamers compulsively playing—and
+# | spending money on the game. To achieve this result, developers use <a
+# |
href=\"http{+s+}://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html\">
+# | techniques that derive from behavioral and brain research</a>:
+#, fuzzy
+#| msgid ""
+#| "Many games are designed to keep gamers compulsively playing—and "
+#| "spending money on the game. To achieve this result, developers use <a "
+#| "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-"
+#| "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#| "and brain research</a>:"
msgid ""
"Many games are designed to keep gamers compulsively playing—and "
"spending money on the game. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
+"\"https://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
"research</a>:"
msgstr ""
Index: proprietary-addictions.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.tr.po,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- proprietary-addictions.tr.po 16 Apr 2022 13:02:34 -0000 1.40
+++ proprietary-addictions.tr.po 17 Apr 2022 08:38:52 -0000 1.41
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-addictions.html\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
"PO-Revision-Date: 2022-04-16 14:01+0200\n"
"Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
"Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2022-04-17 08:28+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"X-Generator: Poedit 3.0.1\n"
@@ -107,10 +108,17 @@
msgstr "Oyunlar"
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Many games are designed to keep gamers compulsively playing—and "
+#| "spending money on the game. To achieve this result, developers use <a "
+#| "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-"
+#| "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#| "and brain research</a>:"
msgid ""
"Many games are designed to keep gamers compulsively playing—and "
"spending money on the game. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
+"\"https://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
"research</a>:"
msgstr ""
Index: proprietary-insecurity.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de-diff.html,v
retrieving revision 1.102
retrieving revision 1.103
diff -u -b -r1.102 -r1.103
--- proprietary-insecurity.de-diff.html 13 Apr 2022 16:40:01 -0000 1.102
+++ proprietary-insecurity.de-diff.html 17 Apr 2022 08:38:52 -0000 1.103
@@ -113,7 +113,7 @@
it possible for attackers to alter a shutdown event, <a
href="https://blog.zecops.com/research/persistence-without-persistence-meet-the-ultimate-persistence-bug-noreboot/">tricking
the user into thinking that the phone has been powered
- off</a>. But in fact, itâs still running, and the user can't feel
+ off</a>. But in fact, it's still running, and the user can't feel
any difference between a real shutdown and the fake shutdown.</p>
</li>
@@ -1567,7 +1567,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/04/13 16:40:01 $
+$Date: 2022/04/17 08:38:52 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.200
retrieving revision 1.201
diff -u -b -r1.200 -r1.201
--- proprietary-insecurity.de.po 13 Apr 2022 16:40:01 -0000 1.200
+++ proprietary-insecurity.de.po 17 Apr 2022 08:38:52 -0000 1.201
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
"PO-Revision-Date: 2018-08-29 02:41+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -187,7 +187,7 @@
"shutdown event, <a href=\"https://blog.zecops.com/research/persistence-"
"without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
"the user into thinking that the phone has been powered off</a>. But in fact, "
-"itâs still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
"shutdown and the fake shutdown."
msgstr ""
Index: proprietary-insecurity.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.es.po,v
retrieving revision 1.158
retrieving revision 1.159
diff -u -b -r1.158 -r1.159
--- proprietary-insecurity.es.po 15 Apr 2022 18:01:41 -0000 1.158
+++ proprietary-insecurity.es.po 17 Apr 2022 08:38:52 -0000 1.159
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: \n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2022-04-17 08:28+0000\n"
"X-Generator: Poedit 2.4.2\n"
#. type: Content of: <title>
@@ -153,12 +154,26 @@
"de actualizaciones fraudulento de Windows 11."
#. type: Content of: <div><div><ul><li><p>
+# | A critical bug in Apple's iOS makes it possible for attackers to alter a
+# | shutdown event, <a
+# |
href=\"https://blog.zecops.com/research/persistence-without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking
+# | the user into thinking that the phone has been powered off</a>. But in
+# | fact, it[-â-]{+'+}s still running, and the user can't feel any difference
+# | between a real shutdown and the fake shutdown.
+#, fuzzy
+#| msgid ""
+#| "A critical bug in Apple's iOS makes it possible for attackers to alter a "
+#| "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-"
+#| "without-persistence-meet-the-ultimate-persistence-bug-noreboot/"
+#| "\">tricking the user into thinking that the phone has been powered off</"
+#| "a>. But in fact, itâs still running, and the user can't feel any "
+#| "difference between a real shutdown and the fake shutdown."
msgid ""
"A critical bug in Apple's iOS makes it possible for attackers to alter a "
"shutdown event, <a href=\"https://blog.zecops.com/research/persistence-"
"without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
"the user into thinking that the phone has been powered off</a>. But in fact, "
-"itâs still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
"shutdown and the fake shutdown."
msgstr ""
"Un error crÃtico en el iOS de Apple permite que un atacante altere el "
Index: proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.299
retrieving revision 1.300
diff -u -b -r1.299 -r1.300
--- proprietary-insecurity.fr.po 13 Apr 2022 19:35:44 -0000 1.299
+++ proprietary-insecurity.fr.po 17 Apr 2022 08:38:52 -0000 1.300
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
"PO-Revision-Date: 2022-04-13 21:35+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2022-04-17 08:28+0000\n"
#. type: Content of: <title>
msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -151,12 +152,26 @@
"de mises à jour pour Windows 11."
#. type: Content of: <div><div><ul><li><p>
+# | A critical bug in Apple's iOS makes it possible for attackers to alter a
+# | shutdown event, <a
+# |
href=\"https://blog.zecops.com/research/persistence-without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking
+# | the user into thinking that the phone has been powered off</a>. But in
+# | fact, it[-â-]{+'+}s still running, and the user can't feel any difference
+# | between a real shutdown and the fake shutdown.
+#, fuzzy
+#| msgid ""
+#| "A critical bug in Apple's iOS makes it possible for attackers to alter a "
+#| "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-"
+#| "without-persistence-meet-the-ultimate-persistence-bug-noreboot/"
+#| "\">tricking the user into thinking that the phone has been powered off</"
+#| "a>. But in fact, itâs still running, and the user can't feel any "
+#| "difference between a real shutdown and the fake shutdown."
msgid ""
"A critical bug in Apple's iOS makes it possible for attackers to alter a "
"shutdown event, <a href=\"https://blog.zecops.com/research/persistence-"
"without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
"the user into thinking that the phone has been powered off</a>. But in fact, "
-"itâs still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
"shutdown and the fake shutdown."
msgstr ""
"Une faille critique dans iOS permet à un attaquant de modifier une étape de
"
Index: proprietary-insecurity.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it-diff.html,v
retrieving revision 1.115
retrieving revision 1.116
diff -u -b -r1.115 -r1.116
--- proprietary-insecurity.it-diff.html 13 Apr 2022 16:40:01 -0000 1.115
+++ proprietary-insecurity.it-diff.html 17 Apr 2022 08:38:52 -0000 1.116
@@ -113,7 +113,7 @@
it possible for attackers to alter a shutdown event, <a
href="https://blog.zecops.com/research/persistence-without-persistence-meet-the-ultimate-persistence-bug-noreboot/">tricking
the user into thinking that the phone has been powered
- off</a>. But in fact, itâs still running, and the user can't feel
+ off</a>. But in fact, it's still running, and the user can't feel
any difference between a real shutdown and the fake shutdown.</p>
</li>
@@ -1538,7 +1538,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/04/13 16:40:01 $
+$Date: 2022/04/17 08:38:52 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.217
retrieving revision 1.218
diff -u -b -r1.217 -r1.218
--- proprietary-insecurity.it.po 13 Apr 2022 16:40:01 -0000 1.217
+++ proprietary-insecurity.it.po 17 Apr 2022 08:38:52 -0000 1.218
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
"PO-Revision-Date: 2017-12-31 13:13+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -177,7 +177,7 @@
"shutdown event, <a href=\"https://blog.zecops.com/research/persistence-"
"without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
"the user into thinking that the phone has been powered off</a>. But in fact, "
-"itâs still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
"shutdown and the fake shutdown."
msgstr ""
Index: proprietary-insecurity.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja-diff.html,v
retrieving revision 1.136
retrieving revision 1.137
diff -u -b -r1.136 -r1.137
--- proprietary-insecurity.ja-diff.html 13 Apr 2022 16:40:01 -0000 1.136
+++ proprietary-insecurity.ja-diff.html 17 Apr 2022 08:38:52 -0000 1.137
@@ -113,7 +113,7 @@
it possible for attackers to alter a shutdown event, <a
href="https://blog.zecops.com/research/persistence-without-persistence-meet-the-ultimate-persistence-bug-noreboot/">tricking
the user into thinking that the phone</em></ins></span> has <span
class="removed"><del><strong>bugs,</strong></del></span> <span
class="inserted"><ins><em>been powered
- off</a>. But in fact, itâs still running,</em></ins></span> and
<span class="inserted"><ins><em>the user can't feel</em></ins></span>
+ off</a>. But in fact, it's still running,</em></ins></span> and
<span class="inserted"><ins><em>the user can't feel</em></ins></span>
any <span class="removed"><del><strong>system,</strong></del></span> <span
class="inserted"><ins><em>difference between a real shutdown and the fake
shutdown.</p>
</li>
@@ -1466,7 +1466,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/04/13 16:40:01 $
+$Date: 2022/04/17 08:38:52 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja.po,v
retrieving revision 1.189
retrieving revision 1.190
diff -u -b -r1.189 -r1.190
--- proprietary-insecurity.ja.po 13 Apr 2022 16:40:01 -0000 1.189
+++ proprietary-insecurity.ja.po 17 Apr 2022 08:38:52 -0000 1.190
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
"PO-Revision-Date: 2016-10-31 12:56+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -153,7 +153,7 @@
"shutdown event, <a href=\"https://blog.zecops.com/research/persistence-"
"without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
"the user into thinking that the phone has been powered off</a>. But in fact, "
-"itâs still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
"shutdown and the fake shutdown."
msgstr ""
Index: proprietary-insecurity.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pot,v
retrieving revision 1.155
retrieving revision 1.156
diff -u -b -r1.155 -r1.156
--- proprietary-insecurity.pot 13 Apr 2022 16:40:01 -0000 1.155
+++ proprietary-insecurity.pot 17 Apr 2022 08:38:52 -0000 1.156
@@ -7,13 +7,13 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
"Language: \n"
"MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=UTF-8\n"
+"Content-Type: text/plain; charset=CHARSET\n"
"Content-Transfer-Encoding: 8bit\n"
#. type: Content of: <title>
@@ -118,7 +118,7 @@
"shutdown event, <a "
"href=\"https://blog.zecops.com/research/persistence-without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking
"
"the user into thinking that the phone has been powered off</a>. But in fact, "
-"itâs still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
"shutdown and the fake shutdown."
msgstr ""
Index: proprietary-insecurity.pt-br-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pt-br-diff.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary-insecurity.pt-br-diff.html 13 Apr 2022 16:40:01 -0000
1.6
+++ proprietary-insecurity.pt-br-diff.html 17 Apr 2022 08:38:52 -0000
1.7
@@ -107,7 +107,7 @@
it possible for attackers to alter a shutdown event, <a
href="https://blog.zecops.com/research/persistence-without-persistence-meet-the-ultimate-persistence-bug-noreboot/">tricking
the user into thinking that the phone has been powered
- off</a>. But in fact, itâs still running, and the user can't feel
+ off</a>. But in fact, it's still running, and the user can't feel
any difference between a real shutdown and the fake shutdown.</p>
</li>
@@ -1304,7 +1304,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/04/13 16:40:01 $
+$Date: 2022/04/17 08:38:52 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pt-br.po,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary-insecurity.pt-br.po 13 Apr 2022 16:40:01 -0000 1.32
+++ proprietary-insecurity.pt-br.po 17 Apr 2022 08:38:52 -0000 1.33
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
"PO-Revision-Date: 2021-06-26 09:40-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -147,7 +147,7 @@
"shutdown event, <a href=\"https://blog.zecops.com/research/persistence-"
"without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
"the user into thinking that the phone has been powered off</a>. But in fact, "
-"itâs still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
"shutdown and the fake shutdown."
msgstr ""
Index: proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.341
retrieving revision 1.342
diff -u -b -r1.341 -r1.342
--- proprietary-insecurity.ru.po 13 Apr 2022 17:34:59 -0000 1.341
+++ proprietary-insecurity.ru.po 17 Apr 2022 08:38:52 -0000 1.342
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2022-04-17 08:28+0000\n"
#. type: Content of: <title>
msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -150,12 +151,26 @@
"Windows 11."
#. type: Content of: <div><div><ul><li><p>
+# | A critical bug in Apple's iOS makes it possible for attackers to alter a
+# | shutdown event, <a
+# |
href=\"https://blog.zecops.com/research/persistence-without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking
+# | the user into thinking that the phone has been powered off</a>. But in
+# | fact, it[-â-]{+'+}s still running, and the user can't feel any difference
+# | between a real shutdown and the fake shutdown.
+#, fuzzy
+#| msgid ""
+#| "A critical bug in Apple's iOS makes it possible for attackers to alter a "
+#| "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-"
+#| "without-persistence-meet-the-ultimate-persistence-bug-noreboot/"
+#| "\">tricking the user into thinking that the phone has been powered off</"
+#| "a>. But in fact, itâs still running, and the user can't feel any "
+#| "difference between a real shutdown and the fake shutdown."
msgid ""
"A critical bug in Apple's iOS makes it possible for attackers to alter a "
"shutdown event, <a href=\"https://blog.zecops.com/research/persistence-"
"without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
"the user into thinking that the phone has been powered off</a>. But in fact, "
-"itâs still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
"shutdown and the fake shutdown."
msgstr ""
"ÐÑиÑиÑÐ½Ð°Ñ Ð¾Ñибка в iOS компании Apple даеÑ
взломÑикам возможноÑÑÑ Ð¸Ð·Ð¼ÐµÐ½ÑÑÑ "
Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.229
retrieving revision 1.230
diff -u -b -r1.229 -r1.230
--- proprietary-surveillance.de-diff.html 13 Apr 2022 16:40:02 -0000
1.229
+++ proprietary-surveillance.de-diff.html 17 Apr 2022 08:38:52 -0000
1.230
@@ -1343,8 +1343,8 @@
<li id="M201611150">
<!--#set var="DATE" value='<small
class="date-tag">2016-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Some</em></ins></span> portable phones <a
-
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ <p>Some</em></ins></span> portable phones <a <span
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are</em></ins></span>
sold with spyware sending lots of data to <span
class="removed"><del><strong>China</a>.</p></li>
<li><p>According to Edward Snowden,</strong></del></span> <span
class="inserted"><ins><em>China</a>.</p>
@@ -4603,7 +4603,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/04/13 16:40:02 $
+$Date: 2022/04/17 08:38:52 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.421
retrieving revision 1.422
diff -u -b -r1.421 -r1.422
--- proprietary-surveillance.de.po 13 Apr 2022 16:40:03 -0000 1.421
+++ proprietary-surveillance.de.po 17 Apr 2022 08:38:52 -0000 1.422
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -2125,8 +2125,17 @@
"selbst wenn das Telefon keine SIM-Karte hat</a>."
#. type: Content of: <div><div><ul><li><p>
+# | Some portable phones <a
+# |
href=\"http{+s+}://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html\">are
+# | sold with spyware sending lots of data to China</a>.
+#, fuzzy
+#| msgid ""
+#| "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+#| "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#| "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#| "html\">are sold with spyware sending lots of data to China</a>."
msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/"
"kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
"identifiable-information-pii-without-user-consent-or-disclosure-300362844."
"html\">are sold with spyware sending lots of data to China</a>."
Index: proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.267
retrieving revision 1.268
diff -u -b -r1.267 -r1.268
--- proprietary-surveillance.es.po 16 Apr 2022 11:10:18 -0000 1.267
+++ proprietary-surveillance.es.po 17 Apr 2022 08:38:53 -0000 1.268
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
"PO-Revision-Date: 2022-04-06 12:14+0200\n"
"Last-Translator: Dora Scilipoti\n"
"Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2022-04-17 08:28+0000\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
"X-Generator: Poedit 2.4.2\n"
@@ -1578,8 +1579,17 @@
"están desactivados, e incluso cuando el teléfono no tiene tarjeta SIM</a>."
#. type: Content of: <div><div><ul><li><p>
+# | Some portable phones <a
+# |
href=\"http{+s+}://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html\">are
+# | sold with spyware sending lots of data to China</a>.
+#, fuzzy
+#| msgid ""
+#| "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+#| "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#| "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#| "html\">are sold with spyware sending lots of data to China</a>."
msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/"
"kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
"identifiable-information-pii-without-user-consent-or-disclosure-300362844."
"html\">are sold with spyware sending lots of data to China</a>."
Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.692
retrieving revision 1.693
diff -u -b -r1.692 -r1.693
--- proprietary-surveillance.fr.po 13 Apr 2022 19:35:45 -0000 1.692
+++ proprietary-surveillance.fr.po 17 Apr 2022 08:38:53 -0000 1.693
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
"PO-Revision-Date: 2022-04-13 21:35+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2022-04-17 08:28+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -1571,8 +1572,17 @@
"SIM</a>."
#. type: Content of: <div><div><ul><li><p>
+# | Some portable phones <a
+# |
href=\"http{+s+}://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html\">are
+# | sold with spyware sending lots of data to China</a>.
+#, fuzzy
+#| msgid ""
+#| "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+#| "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#| "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#| "html\">are sold with spyware sending lots of data to China</a>."
msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/"
"kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
"identifiable-information-pii-without-user-consent-or-disclosure-300362844."
"html\">are sold with spyware sending lots of data to China</a>."
Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.293
retrieving revision 1.294
diff -u -b -r1.293 -r1.294
--- proprietary-surveillance.it-diff.html 13 Apr 2022 16:40:03 -0000
1.293
+++ proprietary-surveillance.it-diff.html 17 Apr 2022 08:38:53 -0000
1.294
@@ -1243,7 +1243,7 @@
<!--#set var="DATE" value='<small
class="date-tag">2016-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Some portable phones <a
-
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+
href="https://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
sold with spyware sending lots of data to China</a>.</p>
</li>
@@ -3958,16 +3958,16 @@
<li id="M201712300">
<!--#set var="DATE" value='<small
class="date-tag">2017-12</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
- <span class="inserted"><ins><em><p>Some JavaScript malware <a
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Some JavaScript malware <a
href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research">
swipes usernames from browser-based password managers</a>.</p>
</li>
<li id="M201711150">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Some websites send
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+ <span class="inserted"><ins><em><p>Some websites send
JavaScript code to collect all the user's input, <a
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/">which
can then be used to reproduce the whole session</a>.</p>
@@ -4393,7 +4393,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/04/13 16:40:03 $
+$Date: 2022/04/17 08:38:53 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.433
retrieving revision 1.434
diff -u -b -r1.433 -r1.434
--- proprietary-surveillance.it.po 13 Apr 2022 16:40:03 -0000 1.433
+++ proprietary-surveillance.it.po 17 Apr 2022 08:38:53 -0000 1.434
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -2022,8 +2022,17 @@
msgstr ""
#. type: Content of: <div><div><ul><li><p>
+# | Some portable phones <a
+# |
href=\"http{+s+}://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html\">are
+# | sold with spyware sending lots of data to China</a>.
+#, fuzzy
+#| msgid ""
+#| "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+#| "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#| "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#| "html\">are sold with spyware sending lots of data to China</a>."
msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/"
"kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
"identifiable-information-pii-without-user-consent-or-disclosure-300362844."
"html\">are sold with spyware sending lots of data to China</a>."
Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.311
retrieving revision 1.312
diff -u -b -r1.311 -r1.312
--- proprietary-surveillance.ja-diff.html 13 Apr 2022 16:40:03 -0000
1.311
+++ proprietary-surveillance.ja-diff.html 17 Apr 2022 08:38:53 -0000
1.312
@@ -1150,15 +1150,15 @@
<p>Facebook's app got “consent” to <a
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
upload call logs automatically</em></ins></span> from <span
class="inserted"><ins><em>Android phones</a> while disguising
- what the “consent” was for.</p>
+ what</em></ins></span> the
+ <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call,</strong></del></span> <span
class="inserted"><ins><em>“consent” was for.</p>
</li>
<li id="M201811230">
<!--#set var="DATE" value='<small
class="date-tag">2018-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>An Android phone was observed to track location even while
- in airplane mode. It didn't send</em></ins></span> the
- <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call,</strong></del></span> location <span
class="inserted"><ins><em>data while in
+ <p>An Android phone was observed to track</em></ins></span> location
<span class="inserted"><ins><em>even while
+ in airplane mode. It didn't send the location data while in
airplane mode. Instead, <a
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/">
it saved up the data,</em></ins></span> and <span
class="removed"><del><strong>web
@@ -1178,7 +1178,7 @@
<!--#set var="DATE" value='<small
class="date-tag">2016-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Some portable phones <a
-
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+
href="https://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
sold with spyware sending lots of data to China</a>.</p>
</li>
@@ -1411,12 +1411,12 @@
<li id="M202011260">
<!--#set var="DATE" value='<small
class="date-tag">2020-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Microsoft's Office 365 suite enables employers <a
-
href="https://www.theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-criticised-workplace-surveillance">to
- snoop on each employee</a>. After
- a public outburst, Microsoft stated that</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+ <p>Microsoft's Office 365 suite enables employers</em></ins></span>
<a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/dec/02/microsoft-apologises-productivity-score-critics-derided-workplace-surveillance">it
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-criticised-workplace-surveillance">to
+ snoop on each employee</a>. After
+ a public outburst, Microsoft stated that <a
+
href="https://www.theguardian.com/technology/2020/dec/02/microsoft-apologises-productivity-score-critics-derided-workplace-surveillance">it
would remove this capability</a>. Let's hope
so.</p></em></ins></span>
</li>
@@ -1951,44 +1951,44 @@
href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
sent personal data to Facebook</a>. Lots</em></ins></span> of <span
class="removed"><del><strong>privacy,</strong></del></span> <span
class="inserted"><ins><em>companies built apps that
way</em></ins></span> and <span class="removed"><del><strong>should be
replaced with anonymous
- payment systems, but the invasion isn't done by malware. The other
- cases mentioned are done by proprietary malware in the
car.</p></li>
+ payment systems, but</strong></del></span> <span
class="inserted"><ins><em>released them, apparently not realizing that
all</em></ins></span> the <span class="removed"><del><strong>invasion isn't
done by malware. The other
+ cases mentioned are done by proprietary malware in</strong></del></span>
<span class="inserted"><ins><em>personal
+ data they collected would go to Facebook as well.</p>
- <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>released them, apparently not realizing that
all</em></ins></span> the <span class="removed"><del><strong>company to
extract</strong></del></span> <span
class="inserted"><ins><em>personal</em></ins></span>
- data <span class="removed"><del><strong>remotely and
- determine</strong></del></span> <span class="inserted"><ins><em>they
collected would go to Facebook as well.</p>
+ <p>It shows that no one can trust a nonfree program, not
even</em></ins></span> the <span
class="removed"><del><strong>car.</p></li>
- <p>It shows that no one can trust a nonfree program, not
even</em></ins></span> the <span class="removed"><del><strong>car's location at
any time. (See</strong></del></span>
+ <li><p>Tesla cars allow</strong></del></span>
<span class="inserted"><ins><em>developers of other nonfree
programs.</p>
</li>
<li id="M201902140">
<!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The AppCensus database gives information on</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b</strong></del></span>
- <span class="inserted"><ins><em>href="https://www.appcensus.io/"> how
Android apps use</em></ins></span> and <span
class="removed"><del><strong>c.</a>).</strong></del></span>
- <span class="inserted"><ins><em>misuse users' personal data</a>. As
of March 2019, nearly
- 78,000 have been analyzed, of which 24,000 (31%) transmit the <a
+ <p>The AppCensus database gives information on <a
+ href="https://www.appcensus.io/"> how Android apps use and
+ misuse users' personal data</a>. As of March 2019, nearly
+ 78,000 have been analyzed, of which 24,000 (31%)
transmit</em></ins></span> the <span
class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em><a
href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a> to other companies, and <a
+ Advertising ID</a></em></ins></span> to <span
class="removed"><del><strong>extract data remotely</strong></del></span> <span
class="inserted"><ins><em>other companies,</em></ins></span> and
+ <span class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em><a
href="https://blog.appcensus.io/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23% of the total) link this ID to hardware identifiers</a>,
+ 18,000 (23% of</em></ins></span> the <span
class="removed"><del><strong>car's location</strong></del></span> <span
class="inserted"><ins><em>total) link this ID to hardware identifiers</a>,
so that users cannot escape tracking by resetting it.</p>
<p>Collecting hardware identifiers is in apparent violation of
Google's policies. But it seems that Google wasn't aware of it,
and, once informed, was in no hurry to take action. This proves
- that the policies of a development platform are ineffective at
- preventing nonfree software developers from including malware in
+ that the policies of a development platform are
ineffective</em></ins></span> at <span class="removed"><del><strong>any time.
(See</strong></del></span>
+ <span class="inserted"><ins><em>preventing nonfree software developers
from including malware in
their programs.</p>
</li>
<li id="M201902060">
<!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Many nonfree apps have a surveillance feature for <a
-
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
+ <p>Many nonfree apps have a surveillance feature
for</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
recording all the users' actions</a> in interacting with the
app.</p>
</li>
@@ -1999,7 +1999,7 @@
be on Google Play had one or more malicious functionalities, such as <a
href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/">
stealing users' photos</a> instead of “beautifying” them,
- pushing unwanted and often malicious ads on users, and redirecting
+ pushing unwanted and often malicious ads on users,</em></ins></span> and
<span class="removed"><del><strong>c.</a>).</strong></del></span> <span
class="inserted"><ins><em>redirecting
them to phishing sites that stole their credentials. Furthermore,
the user interface of most of them was designed to make uninstallation
difficult.</p>
@@ -2120,7 +2120,7 @@
their users. To protect their privacy and freedom, Android users
need</em></ins></span> to get <span class="inserted"><ins><em>rid of the
proprietary software—both proprietary
Android by <a href="https://replicant.us">switching to
Replicant</a>,
- and the proprietary apps by getting apps from the free software
+ and</em></ins></span> the <span class="inserted"><ins><em>proprietary apps
by getting apps from the free software
only <a href="https://f-droid.org/">F-Droid store</a> that
<a
href="https://f-droid.org/docs/Anti-Features/"> prominently warns
the user if an app contains anti-features</a>.</p>
@@ -2136,7 +2136,7 @@
<p>Grindr should not have so much information about its users.
It could be designed so that users communicate such info to each
- other but not to</em></ins></span> the <span
class="inserted"><ins><em>server's database.</p>
+ other but not to the server's database.</p>
</li>
<li id="M201803050">
@@ -2429,8 +2429,8 @@
<li id="M201511190">
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
- <span class="inserted"><ins><em><p>“Cryptic
communication,”
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>“Cryptic communication,”
unrelated to the app's functionality, was <a
href="https://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
found in the 500 most popular gratis Android apps</a>.</p>
@@ -2524,8 +2524,8 @@
<li id="M201401150.1">
<!--#set var="DATE" value='<small
class="date-tag">2014-01</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>The Simeji keyboard is a smartphone version of Baidu's <a
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+ <span class="inserted"><ins><em><p>The Simeji keyboard is a
smartphone version of Baidu's <a
href="/proprietary/proprietary-surveillance.html#baidu-ime">spying
<abbr
title="Input Method Editor">IME</abbr></a>.</p>
</li>
@@ -3155,7 +3155,7 @@
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
leak childrens' conversations to the manufacturer</a>. Guess what?
<a
href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found a way to access the data</a> collected by the
+ Crackers found</em></ins></span> a <span class="inserted"><ins><em>way to
access the data</a> collected by the
manufacturer's snooping.</p>
<p>That the manufacturer and the FBI could listen to these
@@ -3172,7 +3172,7 @@
<p>Those toys also contain major security vulnerabilities; crackers
can remotely control the toys with a mobile phone. This would enable
- crackers to listen in on</em></ins></span> a <span
class="inserted"><ins><em>child's speech, and even speak into the
+ crackers to listen in on a child's speech, and even speak into the
toys themselves.</p>
</li>
@@ -3237,7 +3237,7 @@
out prematurely</em></ins></span> and <span
class="removed"><del><strong>associates</a>.</p>
<p>Even nastier, they do</strong></del></span> <span
class="inserted"><ins><em>on accident and Google was planning on disclosing
- this new feature and offering it to customers who pay for it.</p>
+ this new feature and offering</em></ins></span> it <span
class="inserted"><ins><em>to customers who pay for it.</p>
</li>
<li id="M202006300">
@@ -3252,7 +3252,7 @@
an adequate basis for protecting digital privacy. The boss can coerce
most workers into consenting to almost anything, even probable exposure
to contagious disease that can be fatal. Software like this should
- be illegal and bosses that demand</em></ins></span> it <span
class="inserted"><ins><em>should be prosecuted for it.</p>
+ be illegal and bosses that demand it should be prosecuted for it.</p>
</li>
<li id="M201911190">
@@ -3285,7 +3285,7 @@
<p>Rather than trying to better control the use of recordings, Google
should not record or listen to the person's voice. It should only
- get commands</em></ins></span> that <span
class="removed"><del><strong>merge</strong></del></span> the <span
class="inserted"><ins><em>user wants to send to some Google service.</p>
+ get commands</em></ins></span> that <span
class="removed"><del><strong>merge</strong></del></span> <span
class="inserted"><ins><em>the user wants to send to some Google
service.</p>
</li>
<li id="M201905061">
@@ -3296,9 +3296,9 @@
recordings made without a legitimate prompt), and sends
it to Amazon's servers, which store it indefinitely. Even
worse, Amazon forwards it to third-party companies. Thus,
- even if users request deletion of their</em></ins></span> data <span
class="inserted"><ins><em>from Amazon's servers, <a
-
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php">
- the data remain on other servers</a>, where they can be accessed by
+ even if users request deletion of their data from Amazon's servers, <a
+
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"></em></ins></span>
+ the data <span class="inserted"><ins><em>remain on other
servers</a>, where they can be accessed by
advertising companies and government agencies. In other words,
deleting the collected information doesn't cancel the wrong of
collecting it.</p>
@@ -3647,8 +3647,8 @@
<ul class="blurbs">
<li id="M202008182">
<!--#set var="DATE" value='<small
class="date-tag">2020-08</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
- <span class="inserted"><ins><em><p>Oculus headsets <a
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Oculus headsets <a
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october">require
users to identify themselves to Facebook</a>. This will give Facebook
free rein to pervasively snoop on Oculus users.</p>
@@ -3656,8 +3656,8 @@
<li id="M201612230">
<!--#set var="DATE" value='<small
class="date-tag">2016-12</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>VR equipment, measuring every slight motion,
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+ <span class="inserted"><ins><em><p>VR equipment, measuring every
slight motion,
creates the potential for the most intimate
surveillance ever. All it takes to make this potential real <a
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/">is
@@ -3905,14 +3905,14 @@
<p>Google's proprietary Chrome web browser <a
href="https://www.techrepublic.com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/">
added a surveillance API (idle detection API)</a> which lets
- websites ask Chrome to report when a user with a web page
open</em></ins></span> is <span class="removed"><del><strong>also
used</strong></del></span>
- <span class="inserted"><ins><em>idle.</p>
+ websites ask Chrome to report when a user with a web page open is
+ idle.</p>
</li>
<li id="M201906220">
<!--#set var="DATE" value='<small
class="date-tag">2019-06</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Google Chrome is an <a
+ <p>Google Chrome</em></ins></span> is <span
class="removed"><del><strong>also used</strong></del></span> <span
class="inserted"><ins><em>an <a
href="https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/">
instrument of surveillance</a>. It lets thousands of trackers invade
users' computers and report the sites they visit to advertising and
@@ -4261,7 +4261,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/04/13 16:40:03 $
+$Date: 2022/04/17 08:38:53 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.414
retrieving revision 1.415
diff -u -b -r1.414 -r1.415
--- proprietary-surveillance.ja.po 13 Apr 2022 16:40:03 -0000 1.414
+++ proprietary-surveillance.ja.po 17 Apr 2022 08:38:53 -0000 1.415
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -1561,8 +1561,14 @@
msgstr ""
#. type: Content of: <div><div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+#| "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#| "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#| "html\">are sold with spyware sending lots of data to China</a>."
msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/"
"kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
"identifiable-information-pii-without-user-consent-or-disclosure-300362844."
"html\">are sold with spyware sending lots of data to China</a>."
Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.353
retrieving revision 1.354
diff -u -b -r1.353 -r1.354
--- proprietary-surveillance.pot 13 Apr 2022 16:40:03 -0000 1.353
+++ proprietary-surveillance.pot 17 Apr 2022 08:38:53 -0000 1.354
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -1099,7 +1099,7 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
"Some portable phones <a "
-"href=\"http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html\">are
"
+"href=\"https://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html\">are
"
"sold with spyware sending lots of data to China</a>."
msgstr ""
Index: proprietary-surveillance.pt-br-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pt-br-diff.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary-surveillance.pt-br-diff.html 13 Apr 2022 16:40:04 -0000
1.6
+++ proprietary-surveillance.pt-br-diff.html 17 Apr 2022 08:38:53 -0000
1.7
@@ -1000,7 +1000,8 @@
<!--#set var="DATE" value='<small
class="date-tag">2016-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Some portable phones <a
-
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ <span
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are</em></ins></span>
sold with spyware sending lots of data to China</a>.</p>
</li>
@@ -3714,7 +3715,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/04/13 16:40:04 $
+$Date: 2022/04/17 08:38:53 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pt-br.po,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- proprietary-surveillance.pt-br.po 13 Apr 2022 16:40:04 -0000 1.27
+++ proprietary-surveillance.pt-br.po 17 Apr 2022 08:38:53 -0000 1.28
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
"PO-Revision-Date: 2021-06-26 09:40-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -1731,8 +1731,14 @@
"telefone não tem cartão SIM</a>."
#. type: Content of: <div><div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+#| "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#| "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#| "html\">are sold with spyware sending lots of data to China</a>."
msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/"
"kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
"identifiable-information-pii-without-user-consent-or-disclosure-300362844."
"html\">are sold with spyware sending lots of data to China</a>."
Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.764
retrieving revision 1.765
diff -u -b -r1.764 -r1.765
--- proprietary-surveillance.ru.po 13 Apr 2022 17:34:59 -0000 1.764
+++ proprietary-surveillance.ru.po 17 Apr 2022 08:38:53 -0000 1.765
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2022-04-13 16:26+0000\n"
+"POT-Creation-Date: 2022-04-17 08:28+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2022-04-17 08:28+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -1554,8 +1555,17 @@
"меÑÑоположениє вÑклÑÑенÑ, даже когда
в ÑелеÑоне Ð½ÐµÑ SIM-каÑÑÑ</a>."
#. type: Content of: <div><div><ul><li><p>
+# | Some portable phones <a
+# |
href=\"http{+s+}://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html\">are
+# | sold with spyware sending lots of data to China</a>.
+#, fuzzy
+#| msgid ""
+#| "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+#| "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#| "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#| "html\">are sold with spyware sending lots of data to China</a>."
msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/"
"kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
"identifiable-information-pii-without-user-consent-or-disclosure-300362844."
"html\">are sold with spyware sending lots of data to China</a>."
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.470
retrieving revision 1.471
diff -u -b -r1.470 -r1.471
--- pt-br.po 13 Apr 2022 16:40:04 -0000 1.470
+++ pt-br.po 17 Apr 2022 08:38:53 -0000 1.471
@@ -684,7 +684,7 @@
"shutdown event, <a href=\"https://blog.zecops.com/research/persistence-"
"without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
"the user into thinking that the phone has been powered off</a>. But in fact, "
-"itâs still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
"shutdown and the fake shutdown."
msgstr ""
@@ -8601,10 +8601,17 @@
msgstr "Jogos"
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Many games are designed to keep gamers compulsively playing—and "
+#| "spending money on the game. To achieve this result, developers use <a "
+#| "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-"
+#| "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#| "and brain research</a>:"
msgid ""
"Many games are designed to keep gamers compulsively playing—and "
"spending money on the game. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
+"\"https://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
"research</a>:"
msgstr ""
@@ -9971,9 +9978,16 @@
"transmitir todas as conversas que ele ouve</a>."
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/"
+#| "story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> "
+#| "may take the form of bugs that have gone 20 years unfixed</a>. The "
+#| "choice to leave the security holes in place is morally equivalent to "
+#| "writing a back door."
msgid ""
-"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/"
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"The back door <a class=\"not-a-duplicate\" href=\"https://www.osnews.com/"
+"story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\"> may "
"take the form of bugs that have gone 20 years unfixed</a>. The choice to "
"leave the security holes in place is morally equivalent to writing a back "
"door."
@@ -10782,8 +10796,14 @@
"e pode entregá-los ao governo do Reino Unido, se solicitado."
#. type: Content of: <div><div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+#| "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#| "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#| "html\">are sold with spyware sending lots of data to China</a>."
msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/"
"kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
"identifiable-information-pii-without-user-consent-or-disclosure-300362844."
"html\">are sold with spyware sending lots of data to China</a>."
@@ -15347,6 +15367,45 @@
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
#~ msgid ""
+#~ "Many games are designed to keep gamers compulsively playing—and "
+#~ "spending money on the game. To achieve this result, developers use <a "
+#~ "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-"
+#~ "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#~ "and brain research</a>:"
+#~ msgstr ""
+#~ "Muitos jogos são projetados para manter os jogadores jogando "
+#~ "compulsivamente – e renovando suas assinaturas no jogo. Para "
+#~ "alcançar esse resultado, os desenvolvedores usam <a href=\"http://www."
+#~ "cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-"
+#~ "addicted.html\"> técnicas que derivam de pesquisa comportamental e "
+#~ "cerebral</a>:"
+
+#~ msgid ""
+#~ "The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/"
+#~ "story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> "
+#~ "may take the form of bugs that have gone 20 years unfixed</a>. The "
+#~ "choice to leave the security holes in place is morally equivalent to "
+#~ "writing a back door."
+#~ msgstr ""
+#~ "O <em>backdoor</em> <a class=\"not-a-duplicate\" href=\"http://www.osnews."
+#~ "com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"
+#~ "\"> pode assumir a forma de bugs que não foram corrigidos por 20 anos</"
+#~ "a>. A escolha de deixar as brechas de segurança no lugar é moralmente "
+#~ "equivalente a escrever uma <em>backdoor</em>."
+
+#~ msgid ""
+#~ "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+#~ "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#~ "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#~ "html\">are sold with spyware sending lots of data to China</a>."
+#~ msgstr ""
+#~ "Alguns telefones portáteis <a href=\"http://www.prnewswire.com/news-"
+#~ "releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-"
+#~ "personally-identifiable-information-pii-without-user-consent-or-"
+#~ "disclosure-300362844.html\">são vendidos com <i lang=\"en\">spyware</i> "
+#~ "enviando muitos dados para a China</a>."
+
+#~ msgid ""
#~ "Many web sites use JavaScript code <a href=\"http://gizmodo.com/before-"
#~ "you-hit-submit-this-company-has-already-logge-1795906081\"> to snoop on "
#~ "information that users have typed into a form but not sent</a>, in order "
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.804
retrieving revision 1.805
diff -u -b -r1.804 -r1.805
--- ru.po 13 Apr 2022 18:03:03 -0000 1.804
+++ ru.po 17 Apr 2022 08:38:53 -0000 1.805
@@ -677,12 +677,26 @@
"пÑиложений</a>."
#. type: Content of: <div><ul><li><p>
+# | A critical bug in Apple's iOS makes it possible for attackers to alter a
+# | shutdown event, <a
+# |
href=\"https://blog.zecops.com/research/persistence-without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking
+# | the user into thinking that the phone has been powered off</a>. But in
+# | fact, it[-â-]{+'+}s still running, and the user can't feel any difference
+# | between a real shutdown and the fake shutdown.
+#, fuzzy
+#| msgid ""
+#| "A critical bug in Apple's iOS makes it possible for attackers to alter a "
+#| "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-"
+#| "without-persistence-meet-the-ultimate-persistence-bug-noreboot/"
+#| "\">tricking the user into thinking that the phone has been powered off</"
+#| "a>. But in fact, itâs still running, and the user can't feel any "
+#| "difference between a real shutdown and the fake shutdown."
msgid ""
"A critical bug in Apple's iOS makes it possible for attackers to alter a "
"shutdown event, <a href=\"https://blog.zecops.com/research/persistence-"
"without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
"the user into thinking that the phone has been powered off</a>. But in fact, "
-"itâs still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
"shutdown and the fake shutdown."
msgstr ""
"ÐÑиÑиÑÐ½Ð°Ñ Ð¾Ñибка в iOS компании Apple даеÑ
взломÑикам возможноÑÑÑ Ð¸Ð·Ð¼ÐµÐ½ÑÑÑ "
@@ -8102,10 +8116,21 @@
msgstr "ÐгÑÑ"
#. type: Content of: <div><div><p>
+# | Many games are designed to keep gamers compulsively playing—and
+# | spending money on the game. To achieve this result, developers use <a
+# |
href=\"http{+s+}://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html\">
+# | techniques that derive from behavioral and brain research</a>:
+#, fuzzy
+#| msgid ""
+#| "Many games are designed to keep gamers compulsively playing—and "
+#| "spending money on the game. To achieve this result, developers use <a "
+#| "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-"
+#| "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#| "and brain research</a>:"
msgid ""
"Many games are designed to keep gamers compulsively playing—and "
"spending money on the game. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
+"\"https://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
"research</a>:"
msgstr ""
@@ -9369,9 +9394,22 @@
"пеÑедаваÑÑ Ð²Ñе ÑазговоÑÑ, коÑоÑÑе он
ÑлÑÑиÑ</a>."
#. type: Content of: <div><div><p>
+# | The back door <a class=\"not-a-duplicate\"
+# |
[-href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\">-]
+# |
{+href=\"https://www.osnews.com/story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\">+}
+# | may take the form of bugs that have gone 20 years unfixed</a>. The choice
+# | to leave the security holes in place is morally equivalent to writing a
+# | back door.
+#, fuzzy
+#| msgid ""
+#| "The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/"
+#| "story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> "
+#| "may take the form of bugs that have gone 20 years unfixed</a>. The "
+#| "choice to leave the security holes in place is morally equivalent to "
+#| "writing a back door."
msgid ""
-"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/"
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"The back door <a class=\"not-a-duplicate\" href=\"https://www.osnews.com/"
+"story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\"> may "
"take the form of bugs that have gone 20 years unfixed</a>. The choice to "
"leave the security holes in place is morally equivalent to writing a back "
"door."
@@ -10113,8 +10151,17 @@
"по ÑÑÐµÐ±Ð¾Ð²Ð°Ð½Ð¸Ñ Ð¿ÐµÑедаваÑÑ ÐµÐ³Ð¾
гоÑÑдаÑÑÑвеннÑм оÑганам ÐеликобÑиÑании."
#. type: Content of: <div><div><ul><li><p>
+# | Some portable phones <a
+# |
href=\"http{+s+}://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html\">are
+# | sold with spyware sending lots of data to China</a>.
+#, fuzzy
+#| msgid ""
+#| "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+#| "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#| "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#| "html\">are sold with spyware sending lots of data to China</a>."
msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/"
"kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
"identifiable-information-pii-without-user-consent-or-disclosure-300362844."
"html\">are sold with spyware sending lots of data to China</a>."
@@ -14173,6 +14220,59 @@
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
#~ msgid ""
+#~ "A critical bug in Apple's iOS makes it possible for attackers to alter a "
+#~ "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-"
+#~ "without-persistence-meet-the-ultimate-persistence-bug-noreboot/"
+#~ "\">tricking the user into thinking that the phone has been powered off</"
+#~ "a>. But in fact, itâs still running, and the user can't feel any "
+#~ "difference between a real shutdown and the fake shutdown."
+#~ msgstr ""
+#~ "ÐÑиÑиÑÐ½Ð°Ñ Ð¾Ñибка в iOS компании Apple даеÑ
взломÑикам возможноÑÑÑ "
+#~ "изменÑÑÑ ÑобÑÑие вÑклÑÑÐµÐ½Ð¸Ñ ÑиÑÑемÑ, <a
href=\"https://blog.zecops.com/"
+#~ "research/persistence-without-persistence-meet-the-ultimate-persistence-"
+#~ "bug-noreboot/\">заÑÑавлÑÑ Ð¿Ð¾Ð»ÑзоваÑÐµÐ»Ñ Ð´ÑмаÑÑ,
ÑÑо ÑелеÑон вÑклÑÑен</a>. "
+#~ "Ðо на Ñамом деле оно ÑабоÑаеÑ, и длÑ
полÑзоваÑÐµÐ»Ñ Ð½ÐµÐ²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾ оÑлиÑиÑÑ "
+#~ "наÑÑоÑÑее вÑклÑÑение Ð¾Ñ ÑалÑÑивого."
+
+#~ msgid ""
+#~ "Many games are designed to keep gamers compulsively playing—and "
+#~ "spending money on the game. To achieve this result, developers use <a "
+#~ "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-"
+#~ "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#~ "and brain research</a>:"
+#~ msgstr ""
+#~ "Ðногие игÑÑ Ð¿ÑоекÑиÑÑÑÑÑÑ Ñак, ÑÑобÑ
игÑоки пÑинÑждалиÑÑ Ð¿ÑодолжаÑÑ "
+#~ "игÑÑ — и ÑÑаÑиÑÑ Ð½Ð° игÑÑ Ð´ÐµÐ½Ñги.
ЧÑÐ¾Ð±Ñ Ð´Ð¾ÑÑиÑÑ ÑÑого, "
+#~ "ÑазÑабоÑÑики полÑзÑÑÑÑÑ <a
href=\"http://www.cracked.com/article_18461_5-"
+#~ "creepy-ways-video-games-are-trying-to-get-you-addicted.html\">
пÑиемами, "
+#~ "вÑÑекаÑÑими из иÑÑледований Ð¿Ð¾Ð²ÐµÐ´ÐµÐ½Ð¸Ñ Ð¸
мозга</a>:"
+
+#~ msgid ""
+#~ "The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/"
+#~ "story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> "
+#~ "may take the form of bugs that have gone 20 years unfixed</a>. The "
+#~ "choice to leave the security holes in place is morally equivalent to "
+#~ "writing a back door."
+#~ msgstr ""
+#~ "Ðазейка <a href=\"http://www.osnews.com/story/27416/"
+#~ "The_second_operating_system_hiding_in_every_mobile_phone\">Ð¼Ð¾Ð¶ÐµÑ "
+#~ "пÑинимаÑÑ ÑоÑÐ¼Ñ Ð¾Ñибок, коÑоÑÑе
оÑÑаÑÑÑÑ Ð½ÐµÐ¸ÑпÑавленнÑми по 20 леÑ</a>. "
+#~ "РеÑение оÑÑавиÑÑ Ð¿ÑоÑеÑ
и в заÑиÑе
незаделаннÑми нÑавÑÑвенно ÑквиваленÑно "
+#~ "напиÑÐ°Ð½Ð¸Ñ Ð»Ð°Ð·ÐµÐ¹ÐºÐ¸."
+
+#~ msgid ""
+#~ "Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+#~ "kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
+#~ "identifiable-information-pii-without-user-consent-or-disclosure-300362844."
+#~ "html\">are sold with spyware sending lots of data to China</a>."
+#~ msgstr ""
+#~ "ÐекоÑоÑÑе поÑÑаÑивнÑе ÑелеÑÐ¾Ð½Ñ <a
href=\"http://www.prnewswire.com/news-"
+#~ "releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-"
+#~ "personally-identifiable-information-pii-without-user-consent-or-"
+#~ "disclosure-300362844.html\">пÑодаÑÑÑÑ Ñ
пÑогÑаммами-Ñпионами, "
+#~ "оÑпÑавлÑÑÑими маÑÑÑ Ð´Ð°Ð½Ð½ÑÑ
в ÐиÑай</a>."
+
+#~ msgid ""
#~ "Many web sites use JavaScript code <a href=\"http://gizmodo.com/before-"
#~ "you-hit-submit-this-company-has-already-logge-1795906081\"> to snoop on "
#~ "information that users have typed into a form but not sent</a>, in order "
Index: tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.275
retrieving revision 1.276
diff -u -b -r1.275 -r1.276
--- tr.po 16 Apr 2022 13:02:34 -0000 1.275
+++ tr.po 17 Apr 2022 08:38:54 -0000 1.276
@@ -572,12 +572,20 @@
msgstr ""
#. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "A critical bug in Apple's iOS makes it possible for attackers to alter a "
+#| "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-"
+#| "without-persistence-meet-the-ultimate-persistence-bug-noreboot/"
+#| "\">tricking the user into thinking that the phone has been powered off</"
+#| "a>. But in fact, itâs still running, and the user can't feel any "
+#| "difference between a real shutdown and the fake shutdown."
msgid ""
"A critical bug in Apple's iOS makes it possible for attackers to alter a "
"shutdown event, <a href=\"https://blog.zecops.com/research/persistence-"
"without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
"the user into thinking that the phone has been powered off</a>. But in fact, "
-"itâs still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
"shutdown and the fake shutdown."
msgstr ""
"Aplle iOS'taki kritik bir hata saldırganların bilgisayar kapatma eylemini "
@@ -6623,19 +6631,19 @@
#, fuzzy
#| msgid ""
#| "Many games are designed to keep gamers compulsively playing—and "
-#| "renewing their subscription. To achieve this result, developers use <a "
+#| "spending money on the game. To achieve this result, developers use <a "
#| "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-"
#| "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
#| "and brain research</a>:"
msgid ""
"Many games are designed to keep gamers compulsively playing—and "
"spending money on the game. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
+"\"https://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
"research</a>:"
msgstr ""
"Birçok oyun; oyuncuların takıntılı bir Åekilde oynamasını
saÄlamak—ve "
-"aboneliklerinin yenilenmesi için tasarlanmıÅtır. Bu sonucu elde etmek
için "
+"oyunda para harcamaları için tasarlanmıÅtır. Bu sonucu elde etmek için "
"geliÅtiriciler, <a
href=\"http://www.cracked.com/article_18461_5-creepy-ways-"
"video-games-are-trying-to-get-you-addicted.html\">davranıŠve beyin "
"araÅtırmalarından elde edilen yöntemleri</a> kullanırlar:"
@@ -7647,8 +7655,8 @@
#. type: Content of: <div><div><p>
msgid ""
-"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/"
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"The back door <a class=\"not-a-duplicate\" href=\"https://www.osnews.com/"
+"story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\"> may "
"take the form of bugs that have gone 20 years unfixed</a>. The choice to "
"leave the security holes in place is morally equivalent to writing a back "
"door."
@@ -8150,7 +8158,7 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/"
"kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
"identifiable-information-pii-without-user-consent-or-disclosure-300362844."
"html\">are sold with spyware sending lots of data to China</a>."
@@ -11239,6 +11247,26 @@
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
#, fuzzy
+#~| msgid ""
+#~| "Many games are designed to keep gamers compulsively playing—and "
+#~| "renewing their subscription. To achieve this result, developers use <a "
+#~| "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-"
+#~| "are-trying-to-get-you-addicted.html\"> techniques that derive from "
+#~| "behavioral and brain research</a>:"
+#~ msgid ""
+#~ "Many games are designed to keep gamers compulsively playing—and "
+#~ "spending money on the game. To achieve this result, developers use <a "
+#~ "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-"
+#~ "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#~ "and brain research</a>:"
+#~ msgstr ""
+#~ "Birçok oyun; oyuncuların takıntılı bir Åekilde oynamasını
saÄlamak—"
+#~ "ve aboneliklerinin yenilenmesi için tasarlanmıÅtır. Bu sonucu elde
etmek "
+#~ "için geliÅtiriciler, <a href=\"http://www.cracked.com/article_18461_5-"
+#~ "creepy-ways-video-games-are-trying-to-get-you-addicted.html\">davranıÅ
ve "
+#~ "beyin araÅtırmalarından elde edilen yöntemleri</a> kullanırlar:"
+
+#, fuzzy
#~| msgid "Copyright © 2019, 2020 Free Software Foundation, Inc."
#~ msgid "Copyright © 2017-2021 Free Software Foundation, Inc."
#~ msgstr "Copyright © 2019, 2020 Free Software Foundation, Inc."
Index: zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.277
retrieving revision 1.278
diff -u -b -r1.277 -r1.278
--- zh-cn.po 13 Apr 2022 16:40:05 -0000 1.277
+++ zh-cn.po 17 Apr 2022 08:38:54 -0000 1.278
@@ -580,12 +580,20 @@
"æ°æ®</a>ã"
#. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "A critical bug in Apple's iOS makes it possible for attackers to alter a "
+#| "shutdown event, <a href=\"https://blog.zecops.com/research/persistence-"
+#| "without-persistence-meet-the-ultimate-persistence-bug-noreboot/"
+#| "\">tricking the user into thinking that the phone has been powered off</"
+#| "a>. But in fact, itâs still running, and the user can't feel any "
+#| "difference between a real shutdown and the fake shutdown."
msgid ""
"A critical bug in Apple's iOS makes it possible for attackers to alter a "
"shutdown event, <a href=\"https://blog.zecops.com/research/persistence-"
"without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
"the user into thinking that the phone has been powered off</a>. But in fact, "
-"itâs still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
"shutdown and the fake shutdown."
msgstr ""
"Apple ç iOS ç³»ç»æä¸ä¸ªä¸¥éç缺é·ï¼æ»å»è
è½å¤å©ç¨å®æ¥æ¹åå
³æºäºä»¶ï¼<a href="
@@ -6384,7 +6392,7 @@
msgid ""
"Many games are designed to keep gamers compulsively playing—and "
"spending money on the game. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
+"\"https://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
"research</a>:"
msgstr ""
@@ -7280,8 +7288,8 @@
#. type: Content of: <div><div><p>
msgid ""
-"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/"
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"The back door <a class=\"not-a-duplicate\" href=\"https://www.osnews.com/"
+"story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\"> may "
"take the form of bugs that have gone 20 years unfixed</a>. The choice to "
"leave the security holes in place is morally equivalent to writing a back "
"door."
@@ -7781,7 +7789,7 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/"
"kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
"identifiable-information-pii-without-user-consent-or-disclosure-300362844."
"html\">are sold with spyware sending lots of data to China</a>."
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.383
retrieving revision 1.384
diff -u -b -r1.383 -r1.384
--- zh-tw.po 13 Apr 2022 16:40:05 -0000 1.383
+++ zh-tw.po 17 Apr 2022 08:38:54 -0000 1.384
@@ -576,7 +576,7 @@
"shutdown event, <a href=\"https://blog.zecops.com/research/persistence-"
"without-persistence-meet-the-ultimate-persistence-bug-noreboot/\">tricking "
"the user into thinking that the phone has been powered off</a>. But in fact, "
-"itâs still running, and the user can't feel any difference between a real "
+"it's still running, and the user can't feel any difference between a real "
"shutdown and the fake shutdown."
msgstr ""
@@ -5652,7 +5652,7 @@
msgid ""
"Many games are designed to keep gamers compulsively playing—and "
"spending money on the game. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
+"\"https://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
"research</a>:"
msgstr ""
@@ -6570,8 +6570,8 @@
#. type: Content of: <div><div><p>
msgid ""
-"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/"
-"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"The back door <a class=\"not-a-duplicate\" href=\"https://www.osnews.com/"
+"story/27416/the-second-operating-system-hiding-in-every-mobile-phone/\"> may "
"take the form of bugs that have gone 20 years unfixed</a>. The choice to "
"leave the security holes in place is morally equivalent to writing a back "
"door."
@@ -7067,7 +7067,7 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
-"Some portable phones <a href=\"http://www.prnewswire.com/news-releases/"
+"Some portable phones <a href=\"https://www.prnewswire.com/news-releases/"
"kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-"
"identifiable-information-pii-without-user-consent-or-disclosure-300362844."
"html\">are sold with spyware sending lots of data to China</a>."
- www/proprietary/po all.fr.po all.pot all.pt-br-...,
GNUN <=