[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www education/po/governments-let-companies-snoo...
From: |
GNUN |
Subject: |
www education/po/governments-let-companies-snoo... |
Date: |
Mon, 5 Dec 2022 11:31:00 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 22/12/05 11:30:59
Modified files:
education/po :
governments-let-companies-snoop-on-students.translist
proprietary : all.ru.html malware-microsoft.ru.html
proprietary-insecurity.ru.html
proprietary.ru.html
proprietary/po : all.ru-en.html all.ru.po
malware-microsoft.ru-en.html
malware-microsoft.ru.po
proprietary-insecurity.ru-en.html
proprietary-insecurity.ru.po
proprietary.ru-en.html proprietary.ru.po
server : sitemap.fr.html
Added files:
education :
governments-let-companies-snoop-on-students.fr.html
education/po :
governments-let-companies-snoop-on-students.fr-en.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/education/governments-let-companies-snoop-on-students.fr.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/governments-let-companies-snoop-on-students.translist?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/governments-let-companies-snoop-on-students.fr-en.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/all.ru.html?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.ru.html?cvsroot=www&r1=1.115&r2=1.116
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.ru.html?cvsroot=www&r1=1.139&r2=1.140
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.ru.html?cvsroot=www&r1=1.276&r2=1.277
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.ru-en.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.ru.po?cvsroot=www&r1=1.166&r2=1.167
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ru-en.html?cvsroot=www&r1=1.114&r2=1.115
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ru.po?cvsroot=www&r1=1.293&r2=1.294
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru-en.html?cvsroot=www&r1=1.138&r2=1.139
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.356&r2=1.357
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru-en.html?cvsroot=www&r1=1.274&r2=1.275
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.655&r2=1.656
http://web.cvs.savannah.gnu.org/viewcvs/www/server/sitemap.fr.html?cvsroot=www&r1=1.589&r2=1.590
Patches:
Index: education/po/governments-let-companies-snoop-on-students.translist
===================================================================
RCS file:
/web/www/www/education/po/governments-let-companies-snoop-on-students.translist,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- education/po/governments-let-companies-snoop-on-students.translist 18 Jul
2022 09:02:56 -0000 1.2
+++ education/po/governments-let-companies-snoop-on-students.translist 5 Dec
2022 16:30:58 -0000 1.3
@@ -3,10 +3,12 @@
value='<div id="translations">
<p>
<span dir="ltr" class="original">[en] <a lang="en" hreflang="en"
href="/education/governments-let-companies-snoop-on-students.en.html">English</a>
</span>
+<span dir="ltr">[fr] <a lang="fr" hreflang="fr"
href="/education/governments-let-companies-snoop-on-students.fr.html">français</a>
</span>
<span dir="ltr">[zh-cn] <a lang="zh-cn" hreflang="zh-cn"
href="/education/governments-let-companies-snoop-on-students.zh-cn.html">ç®ä½ä¸æ</a>
</span>
</p>
</div>' -->
<link rel="alternate" type="text/html"
href="/education/governments-let-companies-snoop-on-students.html"
hreflang="x-default" />
<link rel="alternate" type="text/html" lang="en" hreflang="en"
href="/education/governments-let-companies-snoop-on-students.en.html"
title="English" />
+<link rel="alternate" type="text/html" lang="fr" hreflang="fr"
href="/education/governments-let-companies-snoop-on-students.fr.html"
title="français" />
<link rel="alternate" type="text/html" lang="zh-cn" hreflang="zh-cn"
href="/education/governments-let-companies-snoop-on-students.zh-cn.html"
title="ç®ä½ä¸æ" />
<!-- end translist file -->
Index: proprietary/all.ru.html
===================================================================
RCS file: /web/www/www/proprietary/all.ru.html,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- proprietary/all.ru.html 5 Dec 2022 10:03:34 -0000 1.68
+++ proprietary/all.ru.html 5 Dec 2022 16:30:58 -0000 1.69
@@ -60,6 +60,20 @@
коÑоÑÑе поÑÑи невозможно обнаÑÑжиÑÑ
впоÑледÑÑвии...</a></strong></p>
<ul class="blurbs">
+<!--#set var='ADD' value='2022-12-05' -->
+<!--#set var='PUB' value='2022-10-14' -->
+<li><small class='date-tag'>Ðобавлено: <!--#echo encoding='none'
var='ADD' -->
+ — ÐоÑледнÑÑ ÑÑÑлка: <!--#echo encoding='none' var='PUB'
-->
+</small>
+ <p><a
+href="https://www.bleepingcomputer.com/news/security/microsoft-office-365-email-encryption-could-expose-message-content/">
+ШиÑÑование в Microsoft Office Ñлабо</a> и плоÑ
о
пÑоÑивоÑÑÐ¾Ð¸Ñ Ð²Ð·Ð»Ð¾Ð¼Ñ.</p>
+
+ <p>ШиÑÑование — пÑÐµÐ´Ð¼ÐµÑ ÐºÐ°Ð¿ÑизнÑй, в
нем легко наломаÑÑ Ð´Ñов. ÐÑдÑÑе
+лÑди наÑÑаиваÑÑ Ð½Ð° пÑогÑаммаÑ
ÑиÑÑованиÑ,
коÑоÑÑе (1) ÑÐ²Ð¾Ð±Ð¾Ð´Ð½Ñ Ð¸ (2)
+иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ñ ÑкÑпеÑÑами.</p>
+ </li>
+
<!--#set var='ADD' value='2022-12-03' -->
<!--#set var='PUB' value='2022-11-30' -->
<li><small class='date-tag'>Ðобавлено: <!--#echo encoding='none'
var='ADD' -->
@@ -4022,7 +4036,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2022/12/05 10:03:34 $
+$Date: 2022/12/05 16:30:58 $
<!-- timestamp end -->
</p>
Index: proprietary/malware-microsoft.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.ru.html,v
retrieving revision 1.115
retrieving revision 1.116
diff -u -b -r1.115 -r1.116
--- proprietary/malware-microsoft.ru.html 30 Nov 2022 13:31:29 -0000
1.115
+++ proprietary/malware-microsoft.ru.html 5 Dec 2022 16:30:58 -0000
1.116
@@ -266,6 +266,21 @@
пÑедположение, ÑÑо в пÑеÑÑижнÑÑ
неÑвободнÑÑ
пÑогÑаммаÑ
Ð½ÐµÑ ÑеÑÑезнÑÑ
оÑибок.</p>
<ul class="blurbs">
+ <li id="M202210140">
+
+ <!--#set var="DATE" value='<small class="date-tag">
+2022-10</small>'
+ -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://www.bleepingcomputer.com/news/security/microsoft-office-365-email-encryption-could-expose-message-content/">
+ШиÑÑование в Microsoft Office Ñлабо</a> и плоÑ
о
пÑоÑивоÑÑÐ¾Ð¸Ñ Ð²Ð·Ð»Ð¾Ð¼Ñ.</p>
+
+ <p>ШиÑÑование — пÑÐµÐ´Ð¼ÐµÑ ÐºÐ°Ð¿ÑизнÑй, в
нем легко наломаÑÑ Ð´Ñов. ÐÑдÑÑе
+лÑди наÑÑаиваÑÑ Ð½Ð° пÑогÑаммаÑ
ÑиÑÑованиÑ,
коÑоÑÑе (1) ÑÐ²Ð¾Ð±Ð¾Ð´Ð½Ñ Ð¸ (2)
+иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ñ ÑкÑпеÑÑами.</p>
+ </li>
+
<li id="M202202090">
<!--#set var="DATE" value='<small class="date-tag">
@@ -1252,7 +1267,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2022/11/30 13:31:29 $
+$Date: 2022/12/05 16:30:58 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-insecurity.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.ru.html,v
retrieving revision 1.139
retrieving revision 1.140
diff -u -b -r1.139 -r1.140
--- proprietary/proprietary-insecurity.ru.html 30 Nov 2022 13:31:31 -0000
1.139
+++ proprietary/proprietary-insecurity.ru.html 5 Dec 2022 16:30:58 -0000
1.140
@@ -122,6 +122,21 @@
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
+ <li id="M202210140">
+
+ <!--#set var="DATE" value='<small class="date-tag">
+2022-10</small>'
+ -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://www.bleepingcomputer.com/news/security/microsoft-office-365-email-encryption-could-expose-message-content/">
+ШиÑÑование в Microsoft Office Ñлабо</a> и плоÑ
о
пÑоÑивоÑÑÐ¾Ð¸Ñ Ð²Ð·Ð»Ð¾Ð¼Ñ.</p>
+
+ <p>ШиÑÑование — пÑÐµÐ´Ð¼ÐµÑ ÐºÐ°Ð¿ÑизнÑй, в
нем легко наломаÑÑ Ð´Ñов. ÐÑдÑÑе
+лÑди наÑÑаиваÑÑ Ð½Ð° пÑогÑаммаÑ
ÑиÑÑованиÑ,
коÑоÑÑе (1) ÑÐ²Ð¾Ð±Ð¾Ð´Ð½Ñ Ð¸ (2)
+иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ñ ÑкÑпеÑÑами.</p>
+ </li>
+
<li id="M202208240">
<!--#set var="DATE" value='<small class="date-tag">
@@ -1638,7 +1653,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2022/11/30 13:31:31 $
+$Date: 2022/12/05 16:30:58 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.ru.html,v
retrieving revision 1.276
retrieving revision 1.277
diff -u -b -r1.276 -r1.277
--- proprietary/proprietary.ru.html 5 Dec 2022 10:03:34 -0000 1.276
+++ proprietary/proprietary.ru.html 5 Dec 2022 16:30:59 -0000 1.277
@@ -244,6 +244,21 @@
коÑоÑÑе поÑÑи невозможно обнаÑÑжиÑÑ
впоÑледÑÑвии...</a></strong></p>
<ul class="blurbs">
+ <li id="M202210140">
+
+ <!--#set var="DATE" value='<small class="date-tag">
+2022-10</small>'
+ -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://www.bleepingcomputer.com/news/security/microsoft-office-365-email-encryption-could-expose-message-content/">
+ШиÑÑование в Microsoft Office Ñлабо</a> и плоÑ
о
пÑоÑивоÑÑÐ¾Ð¸Ñ Ð²Ð·Ð»Ð¾Ð¼Ñ.</p>
+
+ <p>ШиÑÑование — пÑÐµÐ´Ð¼ÐµÑ ÐºÐ°Ð¿ÑизнÑй, в
нем легко наломаÑÑ Ð´Ñов. ÐÑдÑÑе
+лÑди наÑÑаиваÑÑ Ð½Ð° пÑогÑаммаÑ
ÑиÑÑованиÑ,
коÑоÑÑе (1) ÑÐ²Ð¾Ð±Ð¾Ð´Ð½Ñ Ð¸ (2)
+иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ñ ÑкÑпеÑÑами.</p>
+ </li>
+
<li id="M202211300">
<!--#set var="DATE" value='<small class="date-tag">
@@ -389,22 +404,6 @@
<p><small>ÐамеÑÑÑе, ÑÑо в ÑÑаÑÑе ÑеÑмин “Ñ
акеÑÑ” невеÑно
иÑполÑзÑеÑÑÑ Ð´Ð»Ñ Ð¾Ð±Ð¾Ð·Ð½Ð°ÑениÑ
взломÑиков.</small></p>
</li>
-
- <li id="M202208070">
-
- <!--#set var="DATE" value='<small class="date-tag">
-2022-08</small>'
- -->
-<!--#echo encoding="none" var="DATE" -->
-<p>ÐекоÑоÑÑе пÑинÑеÑÑ Epson
запÑогÑаммиÑованÑ, ÑÑÐ¾Ð±Ñ <a
-href="https://hardware.slashdot.org/story/22/08/07/0350244/epson-programs-some-printers-to-stop-operating-claiming-danger-of-ink-spills">
-пÑекÑаÑаÑÑ ÑабоÑÑ Ð¿Ð¾Ñле Ñого, как
напеÑаÑали заÑанее опÑеделенное ÑиÑло
-ÑÑÑаниÑ</a>, на оÑновании Ñого, ÑÑо
ÑеÑнилÑнÑе плоÑадки забиваÑÑÑÑ
-ÑеÑнилами. ÐÑо ÑоÑÑавлÑÐµÑ Ð½ÐµÐ´Ð¾Ð¿ÑÑÑимое
наÑÑÑение ÑÐ²Ð¾Ð±Ð¾Ð´Ñ Ð¿Ð¾Ð»ÑзоваÑелей
-полÑзоваÑÑÑÑ Ñвоими пÑинÑеÑами, как им
Ñгодно и иÑ
<a
-href="https://fighttorepair.substack.com/p/citing-danger-of-ink-spills-epson">
-пÑава ÑиниÑÑ Ð¸Ñ
</a>.</p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">Ðалее...</a></p>
@@ -486,7 +485,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2022/12/05 10:03:34 $
+$Date: 2022/12/05 16:30:59 $
<!-- timestamp end -->
</p>
Index: proprietary/po/all.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/all.ru-en.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- proprietary/po/all.ru-en.html 5 Dec 2022 10:03:34 -0000 1.70
+++ proprietary/po/all.ru-en.html 5 Dec 2022 16:30:59 -0000 1.71
@@ -50,6 +50,17 @@
to detect once installed...</a></strong></p>
<ul class="blurbs">
+<!--#set var='ADD' value='2022-12-05' --><!--#set var='PUB' value='2022-10-14'
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small>
+ <p><a
+
href="https://www.bleepingcomputer.com/news/security/microsoft-office-365-email-encryption-could-expose-message-content/">
+ The Microsoft Office encryption is weak</a>, and susceptible to
+ attack.</p>
+
+ <p>Encryption is a tricky field, and easy to mess up. It is wise
+ to insist on encryption software that is (1) free software and (2)
+ studied by experts.</p>
+ </li>
+
<!--#set var='ADD' value='2022-12-03' --><!--#set var='PUB' value='2022-11-30'
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small>
<p><a href="https://www.techarp.com/mobile/apple-china-limit-airdrop/">
Obeying a demand by the Chinese government, Apple restricted the
@@ -2963,7 +2974,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/12/05 10:03:34 $
+$Date: 2022/12/05 16:30:59 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/all.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.ru.po,v
retrieving revision 1.166
retrieving revision 1.167
diff -u -b -r1.166 -r1.167
--- proprietary/po/all.ru.po 5 Dec 2022 11:33:36 -0000 1.166
+++ proprietary/po/all.ru.po 5 Dec 2022 16:30:59 -0000 1.167
@@ -17,7 +17,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2022-12-05 11:25+0000\n"
#. type: Content of: <title>
msgid ""
@@ -100,12 +99,18 @@
"office-365-email-encryption-could-expose-message-content/\"> The Microsoft "
"Office encryption is weak</a>, and susceptible to attack."
msgstr ""
+"<a href=\"https://www.bleepingcomputer.com/news/security/microsoft-"
+"office-365-email-encryption-could-expose-message-content/\">
ШиÑÑование в "
+"Microsoft Office Ñлабо</a> и плоÑ
о пÑоÑивоÑÑоиÑ
взломÑ."
#. type: Content of: <div><ul><li><p>
msgid ""
"Encryption is a tricky field, and easy to mess up. It is wise to insist on "
"encryption software that is (1) free software and (2) studied by experts."
msgstr ""
+"ШиÑÑование — пÑÐµÐ´Ð¼ÐµÑ ÐºÐ°Ð¿ÑизнÑй, в
нем легко наломаÑÑ Ð´Ñов. ÐÑдÑÑе "
+"лÑди наÑÑаиваÑÑ Ð½Ð° пÑогÑаммаÑ
ÑиÑÑованиÑ,
коÑоÑÑе (1) ÑÐ²Ð¾Ð±Ð¾Ð´Ð½Ñ Ð¸ (2) "
+"иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ñ ÑкÑпеÑÑами."
#. type: Content of: <div><ul><li><p>
msgid ""
Index: proprietary/po/malware-microsoft.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ru-en.html,v
retrieving revision 1.114
retrieving revision 1.115
diff -u -b -r1.114 -r1.115
--- proprietary/po/malware-microsoft.ru-en.html 30 Nov 2022 13:31:36 -0000
1.114
+++ proprietary/po/malware-microsoft.ru-en.html 5 Dec 2022 16:30:59 -0000
1.115
@@ -234,6 +234,19 @@
bugs.</p>
<ul class="blurbs">
+ <li id="M202210140">
+ <!--#set var="DATE" value='<small class="date-tag">2022-10</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.bleepingcomputer.com/news/security/microsoft-office-365-email-encryption-could-expose-message-content/">
+ The Microsoft Office encryption is weak</a>, and susceptible to
+ attack.</p>
+
+ <p>Encryption is a tricky field, and easy to mess up. It is wise
+ to insist on encryption software that is (1) free software and (2)
+ studied by experts.</p>
+ </li>
+
<li id="M202202090">
<!--#set var="DATE" value='<small class="date-tag">2022-02</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -1027,7 +1040,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/11/30 13:31:36 $
+$Date: 2022/12/05 16:30:59 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-microsoft.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ru.po,v
retrieving revision 1.293
retrieving revision 1.294
diff -u -b -r1.293 -r1.294
--- proprietary/po/malware-microsoft.ru.po 5 Dec 2022 11:33:44 -0000
1.293
+++ proprietary/po/malware-microsoft.ru.po 5 Dec 2022 16:30:59 -0000
1.294
@@ -16,7 +16,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2022-12-05 11:25+0000\n"
#. type: Content of: <title>
msgid ""
@@ -398,12 +397,18 @@
"office-365-email-encryption-could-expose-message-content/\"> The Microsoft "
"Office encryption is weak</a>, and susceptible to attack."
msgstr ""
+"<a href=\"https://www.bleepingcomputer.com/news/security/microsoft-"
+"office-365-email-encryption-could-expose-message-content/\">
ШиÑÑование в "
+"Microsoft Office Ñлабо</a> и плоÑ
о пÑоÑивоÑÑоиÑ
взломÑ."
#. type: Content of: <div><div><ul><li><p>
msgid ""
"Encryption is a tricky field, and easy to mess up. It is wise to insist on "
"encryption software that is (1) free software and (2) studied by experts."
msgstr ""
+"ШиÑÑование — пÑÐµÐ´Ð¼ÐµÑ ÐºÐ°Ð¿ÑизнÑй, в
нем легко наломаÑÑ Ð´Ñов. ÐÑдÑÑе "
+"лÑди наÑÑаиваÑÑ Ð½Ð° пÑогÑаммаÑ
ÑиÑÑованиÑ,
коÑоÑÑе (1) ÑÐ²Ð¾Ð±Ð¾Ð´Ð½Ñ Ð¸ (2) "
+"иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ñ ÑкÑпеÑÑами."
#. type: Content of: <div><div><ul><li><p>
msgid ""
Index: proprietary/po/proprietary-insecurity.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru-en.html,v
retrieving revision 1.138
retrieving revision 1.139
diff -u -b -r1.138 -r1.139
--- proprietary/po/proprietary-insecurity.ru-en.html 30 Nov 2022 13:31:38
-0000 1.138
+++ proprietary/po/proprietary-insecurity.ru-en.html 5 Dec 2022 16:30:59
-0000 1.139
@@ -113,6 +113,19 @@
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
+ <li id="M202210140">
+ <!--#set var="DATE" value='<small class="date-tag">2022-10</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.bleepingcomputer.com/news/security/microsoft-office-365-email-encryption-could-expose-message-content/">
+ The Microsoft Office encryption is weak</a>, and susceptible to
+ attack.</p>
+
+ <p>Encryption is a tricky field, and easy to mess up. It is wise
+ to insist on encryption software that is (1) free software and (2)
+ studied by experts.</p>
+ </li>
+
<li id="M202208240">
<!--#set var="DATE" value='<small class="date-tag">2022-08</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -1317,7 +1330,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/11/30 13:31:38 $
+$Date: 2022/12/05 16:30:59 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.356
retrieving revision 1.357
diff -u -b -r1.356 -r1.357
--- proprietary/po/proprietary-insecurity.ru.po 5 Dec 2022 11:33:47 -0000
1.356
+++ proprietary/po/proprietary-insecurity.ru.po 5 Dec 2022 16:30:59 -0000
1.357
@@ -16,7 +16,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2022-12-05 11:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -200,12 +199,18 @@
"office-365-email-encryption-could-expose-message-content/\"> The Microsoft "
"Office encryption is weak</a>, and susceptible to attack."
msgstr ""
+"<a href=\"https://www.bleepingcomputer.com/news/security/microsoft-"
+"office-365-email-encryption-could-expose-message-content/\">
ШиÑÑование в "
+"Microsoft Office Ñлабо</a> и плоÑ
о пÑоÑивоÑÑоиÑ
взломÑ."
#. type: Content of: <div><div><ul><li><p>
msgid ""
"Encryption is a tricky field, and easy to mess up. It is wise to insist on "
"encryption software that is (1) free software and (2) studied by experts."
msgstr ""
+"ШиÑÑование — пÑÐµÐ´Ð¼ÐµÑ ÐºÐ°Ð¿ÑизнÑй, в
нем легко наломаÑÑ Ð´Ñов. ÐÑдÑÑе "
+"лÑди наÑÑаиваÑÑ Ð½Ð° пÑогÑаммаÑ
ÑиÑÑованиÑ,
коÑоÑÑе (1) ÑÐ²Ð¾Ð±Ð¾Ð´Ð½Ñ Ð¸ (2) "
+"иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ñ ÑкÑпеÑÑами."
#. type: Content of: <div><div><ul><li><p>
msgid ""
Index: proprietary/po/proprietary.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru-en.html,v
retrieving revision 1.274
retrieving revision 1.275
diff -u -b -r1.274 -r1.275
--- proprietary/po/proprietary.ru-en.html 5 Dec 2022 10:03:35 -0000
1.274
+++ proprietary/po/proprietary.ru-en.html 5 Dec 2022 16:30:59 -0000
1.275
@@ -225,6 +225,19 @@
to detect once installed...</a></strong></p>
<ul class="blurbs">
+ <li id="M202210140">
+ <!--#set var="DATE" value='<small class="date-tag">2022-10</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.bleepingcomputer.com/news/security/microsoft-office-365-email-encryption-could-expose-message-content/">
+ The Microsoft Office encryption is weak</a>, and susceptible to
+ attack.</p>
+
+ <p>Encryption is a tricky field, and easy to mess up. It is wise
+ to insist on encryption software that is (1) free software and (2)
+ studied by experts.</p>
+ </li>
+
<li id="M202211300">
<!--#set var="DATE" value='<small class="date-tag">2022-11</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -354,19 +367,6 @@
<p><small>Please note that the article wrongly refers
to crackers as “hackers.”</small></p>
</li>
-
- <li id="M202208070">
- <!--#set var="DATE" value='<small class="date-tag">2022-08</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Some Epson printers are programmed to <a
-
href="https://hardware.slashdot.org/story/22/08/07/0350244/epson-programs-some-printers-to-stop-operating-claiming-danger-of-ink-spills">
- stop working after they have printed a predetermined number
- of pages</a>, on the pretext that ink pads become saturated
- with ink. This constitutes an unacceptable infringement on
- users' freedom to use their printers as they wish, and on their <a
-
href="https://fighttorepair.substack.com/p/citing-danger-of-ink-spills-epson">
- right to repair them</a>.</p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -429,7 +429,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/12/05 10:03:35 $
+$Date: 2022/12/05 16:30:59 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.655
retrieving revision 1.656
diff -u -b -r1.655 -r1.656
--- proprietary/po/proprietary.ru.po 5 Dec 2022 11:33:51 -0000 1.655
+++ proprietary/po/proprietary.ru.po 5 Dec 2022 16:30:59 -0000 1.656
@@ -17,7 +17,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2022-12-05 11:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -431,12 +430,18 @@
"office-365-email-encryption-could-expose-message-content/\"> The Microsoft "
"Office encryption is weak</a>, and susceptible to attack."
msgstr ""
+"<a href=\"https://www.bleepingcomputer.com/news/security/microsoft-"
+"office-365-email-encryption-could-expose-message-content/\">
ШиÑÑование в "
+"Microsoft Office Ñлабо</a> и плоÑ
о пÑоÑивоÑÑоиÑ
взломÑ."
#. type: Content of: <div><ul><li><p>
msgid ""
"Encryption is a tricky field, and easy to mess up. It is wise to insist on "
"encryption software that is (1) free software and (2) studied by experts."
msgstr ""
+"ШиÑÑование — пÑÐµÐ´Ð¼ÐµÑ ÐºÐ°Ð¿ÑизнÑй, в
нем легко наломаÑÑ Ð´Ñов. ÐÑдÑÑе "
+"лÑди наÑÑаиваÑÑ Ð½Ð° пÑогÑаммаÑ
ÑиÑÑованиÑ,
коÑоÑÑе (1) ÑÐ²Ð¾Ð±Ð¾Ð´Ð½Ñ Ð¸ (2) "
+"иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ñ ÑкÑпеÑÑами."
#. type: Content of: <div><ul><li><p>
msgid ""
Index: server/sitemap.fr.html
===================================================================
RCS file: /web/www/www/server/sitemap.fr.html,v
retrieving revision 1.589
retrieving revision 1.590
diff -u -b -r1.589 -r1.590
--- server/sitemap.fr.html 3 Dec 2022 16:00:36 -0000 1.589
+++ server/sitemap.fr.html 5 Dec 2022 16:30:59 -0000 1.590
@@ -345,7 +345,8 @@
<dd>Educational Malware App “Along”</dd>
<dt><a
href="/education/governments-let-companies-snoop-on-students.html">governments-let-companies-snoop-on-students.html</a></dt>
- <dd>Many Governments Encourage Schools to Let Companies Snoop on
Students</dd>
+ <dd>De nombreux gouvernements encouragent les écoles à laisser les
entreprises
+espionner les élèves</dd>
<dt><a
href="/education/how-i-fought-to-graduate-without-using-non-free-software.html">how-i-fought-to-graduate-without-using-non-free-software.html</a></dt>
<dd>How I Fought To Graduate Without Using Nonfree Software</dd>
@@ -2340,7 +2341,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2022/12/03 16:00:36 $
+$Date: 2022/12/05 16:30:59 $
<!-- timestamp end -->
</p>
Index: education/governments-let-companies-snoop-on-students.fr.html
===================================================================
RCS file: education/governments-let-companies-snoop-on-students.fr.html
diff -N education/governments-let-companies-snoop-on-students.fr.html
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ education/governments-let-companies-snoop-on-students.fr.html 5 Dec
2022 16:30:57 -0000 1.1
@@ -0,0 +1,177 @@
+<!--#set var="ENGLISH_PAGE"
value="/education/governments-let-companies-snoop-on-students.en.html" -->
+
+<!--#include virtual="/server/header.fr.html" -->
+<!-- Parent-Version: 1.97 -->
+<!-- This page is derived from /server/standards/boilerplate.html -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="yes" -->
+
+<!-- This file is automatically generated by GNUnited Nations! -->
+<title>De nombreux gouvernements encouragent les écoles à laisser les
entreprises
+espionner les élèves - Projet GNU - Free Software Foundation</title>
+
+<link rel="stylesheet" type="text/css" href="/side-menu.css" media="screen" />
+
+<!--#include
virtual="/education/po/governments-let-companies-snoop-on-students.translist"
-->
+<!--#include virtual="/server/banner.fr.html" -->
+<div class="nav">
+<a id="side-menu-button" class="switch" href="#navlinks">
+ <img id="side-menu-icon" height="32"
+ src="/graphics/icons/side-menu.png"
+ title="Menu Ãducation"
+ alt=" [Menu Ãducation] " />
+</a>
+
+<p class="breadcrumb">
+ <a href="/"><img src="/graphics/icons/home.png" height="24"
+ alt="Accueil GNU" title="Accueil GNU" /></a> / <a
href="/education/education.html">Education</a> / <a
+href="/education/bigtech-threats-to-education-and-society.html">Menaces desÂ
géants
+de la tech</a> /</p>
+</div>
+
+<!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/top-addendum.fr.html" -->
+<div style="clear: both"></div>
+<div id="last-div" class="reduced-width">
+
+<div class="announcement comment" role="complementary">
+<p>
+Autres exemples de la <a
+href="/proprietary/malware-edtech.html#content">malveillance de
+l'Edtech</a>.
+</p>
+</div>
+
+<h2>De nombreux gouvernements encouragent les écoles à laisser les
entreprises
+espionner les élèves</h2>
+
+<address class="byline">par Richard Stallman</address>
+<hr class="thin" />
+<div class="article">
+
+<p><i>Human Rights Watch</i> a étudié 164 logiciels et sites Internet
+recommandés par divers gouvernements pour l'enseignement scolaire. Ils ont
+trouvé que 146 d'entre eux <a
+href="https://www.hrw.org/report/2022/05/25/how-dare-they-peep-my-private-life/childrens-rights-violations-governments">envoyaient
+des données à des annonceurs et à des entreprises de pistage</a>.</p>
+
+<p>Les chercheurs ont fait un travail approfondi et se sont intéressés aux
+différentes méthodes d'espionnage, entre autres à l'identification des
+utilisateurs grâce à l'empreinte digitale de leur appareil. L'étude n'avait
+pas seulement pour cible des programmes et sites «â¯spécifiques Ã
+l'éducationâ¯Â», mais concernait aussi, par exemple, Zoom et Microsoft
Teams.</p>
+
+<p>Je m'attends à ce que chaque programme collecte des données personnelles
+pour son développeur. Je ne suis pas sûr que les résultats en tiennent
+compte, mais ils devraient. Dès lors que le développeur du logiciel
récupère
+des données personnelles, il peut les fournir aussi bien à des profileurs
+publicitaires qu'Ã d'autres entreprises et gouvernements, et peut aussi se
+livrer directement à la manipulation des élèves et enseignants.</p>
+
+<p>Les recommandations de <i>Human Rights Watch</i> suivent l'approche
+habituelle consistant à réglementer l'utilisation des données une fois
+qu'elles ont été collectées. Ceci est foncièrement insuffisantâ¯; <a
+href="/philosophy/surveillance-vs-democracy.html">les données personnelles,
+une fois collectées, seront certainement utilisées à de mauvaises
fins</a>.</p>
+
+<p>La seule approche qui rende possible la fin de la surveillance de masse
+exige tout d'abord que les logiciels soient libres. Ainsi les utilisateurs
+peuvent les modifier afin d'éviter qu'ils ne donnent de vraies données aux
+entreprises.</p>
+<div class="column-limit"></div>
+
+<p>Pour approfondirâ¯:</p>
+
+<div class="important">
+<p>
+<a href="/education/resisting-proprietary-software.html#content">Résister
+aux logiciels privateurs</a> <br />
+<a
+href="/education/dangers-of-proprietary-systems-in-online-teaching.html#content">Les
+dangers des systèmes privateurs dans l'enseignement en ligne</a>
+</p>
+</div>
+</div>
+<div class="translators-notes">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
+ </div>
+</div>
+
+<!--#include virtual="/education/education-menu.fr.html" -->
+<!--#include virtual="/server/footer.fr.html" -->
+<div id="footer" role="contentinfo">
+<div class="unprintable">
+
+<p>Veuillez envoyer les requêtes concernant la FSF et GNU à <<a
+href="mailto:gnu@gnu.org">gnu@gnu.org</a>>. Il existe aussi <a
+href="/contact/">d'autres moyens de contacter</a> la FSF. Les liens
+orphelins et autres corrections ou suggestions peuvent être signalés Ã
+<<a href="mailto:webmasters@gnu.org">webmasters@gnu.org</a>>.</p>
+
+<p>
+<!-- TRANSLATORS: Ignore the original text in this paragraph,
+ replace it with the translation of these two:
+
+ We work hard and do our best to provide accurate, good quality
+ translations. However, we are not exempt from imperfection.
+ Please send your comments and general suggestions in this regard
+ to <a href="mailto:web-translators@gnu.org">
+
+ <web-translators@gnu.org></a>.</p>
+
+ <p>For information on coordinating and contributing translations of
+ our web pages, see <a
+ href="/server/standards/README.translations.html">Translations
+ README</a>. -->
+Merci d'adresser vos commentaires sur les pages en français à <<a
+href="mailto:trad-gnu@april.org">trad-gnu@april.org</a>>, et sur les
+traductions en général à <<a
+href="mailto:web-translators@gnu.org">web-translators@gnu.org</a>>. Si
+vous souhaitez y contribuer, vous trouverez dans le <a
+href="/server/standards/README.translations.html">guide de traduction</a>
+les infos nécessaires.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+ files generated as part of manuals) on the GNU web server should
+ be under CC BY-ND 4.0. Please do NOT change or remove this
+ without talking with the webmasters or licensing team first.
+ Please make sure the copyright date is consistent with the
+ document. For web pages, it is ok to list just the latest year the
+ document was modified, or published.
+
+ If you wish to list earlier years, that is ok too.
+ Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+ years, as long as each year in the range is in fact a copyrightable
+ year, i.e., a year in which the document was published (including
+ being publicly visible on the web or in a revision control system).
+
+ There is more detail about copyright years in the GNU Maintainers
+ Information document, www.gnu.org/prep/maintain. -->
+<p>Copyright © 2022 Richard Stallman</p>
+
+<p>Cette page peut être utilisée suivant les conditions de la licence <a
+rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/deed.fr">Creative
+Commons attribution, pas de modification, 4.0Â internationale (CCÂ BY-ND
+4.0)</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.fr.html" -->
+<div class="translators-credits">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.-->
+Traductionâ¯: Nicolas Joubert<br /> Révisionâ¯: <a
+href="mailto:trad-gnu@april.org">trad-gnu@april.org</a></div>
+
+<p class="unprintable"><!-- timestamp start -->
+Dernière mise à jour :
+
+$Date: 2022/12/05 16:30:57 $
+
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+<!-- for class="inner", starts in the banner include -->
+</body>
+</html>
Index: education/po/governments-let-companies-snoop-on-students.fr-en.html
===================================================================
RCS file: education/po/governments-let-companies-snoop-on-students.fr-en.html
diff -N education/po/governments-let-companies-snoop-on-students.fr-en.html
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ education/po/governments-let-companies-snoop-on-students.fr-en.html 5 Dec
2022 16:30:58 -0000 1.1
@@ -0,0 +1,152 @@
+<!--#include virtual="/server/header.html" -->
+<!-- Parent-Version: 1.97 -->
+<!-- This page is derived from /server/standards/boilerplate.html -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="yes" -->
+<title>Many Governments Encourage Schools to Let Companies Snoop on
+Students - GNU Project - Free Software Foundation</title>
+
+<link rel="stylesheet" type="text/css" href="/side-menu.css" media="screen" />
+ <!--#include
virtual="/education/po/governments-let-companies-snoop-on-students.translist"
-->
+<!--#include virtual="/server/banner.html" -->
+
+<div class="nav">
+<a id="side-menu-button" class="switch" href="#navlinks">
+ <img id="side-menu-icon" height="32"
+ src="/graphics/icons/side-menu.png"
+ title="Education Contents"
+ alt=" [Education Contents] " />
+</a>
+
+<p class="breadcrumb">
+ <a href="/"><img src="/graphics/icons/home.png" height="24"
+ alt="GNU Home" title="GNU Home" /></a> /
+ <a href="/education/education.html">Education</a> /
+ <a
href="/education/bigtech-threats-to-education-and-society.html">Big Tech Threats</a> /</p>
+</div>
+
+<!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/top-addendum.html" -->
+
+<div style="clear: both"></div>
+<div id="last-div" class="reduced-width">
+
+<div class="announcement comment" role="complementary">
+<p>
+More examples of
+<a href="/proprietary/malware-edtech.html#content">malware in
+educational proprietary technologies</a>.
+</p>
+</div>
+
+<h2>Many Governments Encourage Schools to Let Companies Snoop on
+Students</h2>
+
+<address class="byline">by Richard Stallman</address>
+<hr class="thin" />
+<div class="article">
+
+<p>Human Rights Watch studied 164 software programs and web sites
+recommended by various governments for schools to make students use. It
+found that 146 of them <a
+href="https://www.hrw.org/report/2022/05/25/how-dare-they-peep-my-private-life/childrens-rights-violations-governments">
+gave data to advertising and tracking companies</a>.</p>
+
+<p>The researchers were thorough and checked for various snooping methods,
+including fingerprinting of devices to identify users. The targets of the
+investigation were not limited to programs and sites specifically
+“for education;” they included, for instance, Zoom and
+Microsoft Teams.</p>
+
+<p>I expect that each program collected personal data for its developer.
+I'm not sure whether the results counted that, but they should. Once
+the developer company gets personal data, it can provide that data to
+advertising profilers, as well as to other companies and governments, and
+it can engage directly in manipulation of students and teachers.</p>
+
+<p>The recommendations Human Rights Watch makes follow the usual approach
+of regulating the use of data once collected. This is fundamentally
+inadequate; <a
+href="/philosophy/surveillance-vs-democracy.html">personal data, once
+collected, will surely be misused</a>.</p>
+
+<p>The only approach that makes it possible to end massive surveillance
+starts with demanding that the software be free. Then users will be
+able to modify the software to avoid giving real data to companies.</p>
+<div class="column-limit"></div>
+
+<p>To learn more:</p>
+
+<div class="important">
+<p>
+<a href="/education/resisting-proprietary-software.html#content">
+Resisting Proprietary Software</a> <br />
+<a
href="/education/dangers-of-proprietary-systems-in-online-teaching.html#content">
+The Dangers of Proprietary Systems in Online Teaching</a>
+</p>
+</div>
+</div>
+</div>
+<!--#include virtual="/education/education-menu.html" -->
+<!--#include virtual="/server/footer.html" -->
+<div id="footer" role="contentinfo">
+<div class="unprintable">
+
+<p>Please send general FSF & GNU inquiries to
+<a href="mailto:gnu@gnu.org"><gnu@gnu.org></a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF. Broken links and other corrections or suggestions can be sent
+to <a href="mailto:webmasters@gnu.org"><webmasters@gnu.org></a>.</p>
+
+<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
+ replace it with the translation of these two:
+
+ We work hard and do our best to provide accurate, good quality
+ translations. However, we are not exempt from imperfection.
+ Please send your comments and general suggestions in this regard
+ to <a href="mailto:web-translators@gnu.org">
+ <web-translators@gnu.org></a>.</p>
+
+ <p>For information on coordinating and contributing translations of
+ our web pages, see <a
+ href="/server/standards/README.translations.html">Translations
+ README</a>. -->
+Please see the <a
+href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and contributing translations
+of this article.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+ files generated as part of manuals) on the GNU web server should
+ be under CC BY-ND 4.0. Please do NOT change or remove this
+ without talking with the webmasters or licensing team first.
+ Please make sure the copyright date is consistent with the
+ document. For web pages, it is ok to list just the latest year the
+ document was modified, or published.
+
+ If you wish to list earlier years, that is ok too.
+ Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+ years, as long as each year in the range is in fact a copyrightable
+ year, i.e., a year in which the document was published (including
+ being publicly visible on the web or in a revision control system).
+
+ There is more detail about copyright years in the GNU Maintainers
+ Information document, www.gnu.org/prep/maintain. -->
+
+<p>Copyright © 2022 Richard Stallman</p>
+
+<p>This page is licensed under a <a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
+Commons Attribution-NoDerivatives 4.0 International License</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.html" -->
+
+<p class="unprintable">Updated:
+<!-- timestamp start -->
+$Date: 2022/12/05 16:30:58 $
+<!-- timestamp end -->
+</p>
+</div>
+</div><!-- for class="inner", starts in the banner include -->
+</body>
+</html>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www education/po/governments-let-companies-snoo...,
GNUN <=