www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www education/po/governments-let-companies-snoo...


From: GNUN
Subject: www education/po/governments-let-companies-snoo...
Date: Mon, 5 Dec 2022 11:31:00 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     22/12/05 11:30:59

Modified files:
        education/po   : 
                         governments-let-companies-snoop-on-students.translist 
        proprietary    : all.ru.html malware-microsoft.ru.html 
                         proprietary-insecurity.ru.html 
                         proprietary.ru.html 
        proprietary/po : all.ru-en.html all.ru.po 
                         malware-microsoft.ru-en.html 
                         malware-microsoft.ru.po 
                         proprietary-insecurity.ru-en.html 
                         proprietary-insecurity.ru.po 
                         proprietary.ru-en.html proprietary.ru.po 
        server         : sitemap.fr.html 
Added files:
        education      : 
                         governments-let-companies-snoop-on-students.fr.html 
        education/po   : 
                         governments-let-companies-snoop-on-students.fr-en.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/education/governments-let-companies-snoop-on-students.fr.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/governments-let-companies-snoop-on-students.translist?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/governments-let-companies-snoop-on-students.fr-en.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/all.ru.html?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.ru.html?cvsroot=www&r1=1.115&r2=1.116
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.ru.html?cvsroot=www&r1=1.139&r2=1.140
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.ru.html?cvsroot=www&r1=1.276&r2=1.277
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.ru-en.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.ru.po?cvsroot=www&r1=1.166&r2=1.167
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ru-en.html?cvsroot=www&r1=1.114&r2=1.115
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ru.po?cvsroot=www&r1=1.293&r2=1.294
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru-en.html?cvsroot=www&r1=1.138&r2=1.139
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.356&r2=1.357
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru-en.html?cvsroot=www&r1=1.274&r2=1.275
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.655&r2=1.656
http://web.cvs.savannah.gnu.org/viewcvs/www/server/sitemap.fr.html?cvsroot=www&r1=1.589&r2=1.590

Patches:
Index: education/po/governments-let-companies-snoop-on-students.translist
===================================================================
RCS file: 
/web/www/www/education/po/governments-let-companies-snoop-on-students.translist,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- education/po/governments-let-companies-snoop-on-students.translist  18 Jul 
2022 09:02:56 -0000      1.2
+++ education/po/governments-let-companies-snoop-on-students.translist  5 Dec 
2022 16:30:58 -0000       1.3
@@ -3,10 +3,12 @@
 value='<div id="translations">
 <p>
 <span dir="ltr" class="original">[en]&nbsp;<a lang="en" hreflang="en" 
href="/education/governments-let-companies-snoop-on-students.en.html">English</a>
 &nbsp;</span>
+<span dir="ltr">[fr]&nbsp;<a lang="fr" hreflang="fr" 
href="/education/governments-let-companies-snoop-on-students.fr.html">français</a>
 &nbsp;</span>
 <span dir="ltr">[zh-cn]&nbsp;<a lang="zh-cn" hreflang="zh-cn" 
href="/education/governments-let-companies-snoop-on-students.zh-cn.html">简体中文</a>
 &nbsp;</span>
 </p>
 </div>' -->
 <link rel="alternate" type="text/html" 
href="/education/governments-let-companies-snoop-on-students.html" 
hreflang="x-default" />
 <link rel="alternate" type="text/html" lang="en" hreflang="en" 
href="/education/governments-let-companies-snoop-on-students.en.html" 
title="English" />
+<link rel="alternate" type="text/html" lang="fr" hreflang="fr" 
href="/education/governments-let-companies-snoop-on-students.fr.html" 
title="français" />
 <link rel="alternate" type="text/html" lang="zh-cn" hreflang="zh-cn" 
href="/education/governments-let-companies-snoop-on-students.zh-cn.html" 
title="简体中文" />
 <!-- end translist file -->

Index: proprietary/all.ru.html
===================================================================
RCS file: /web/www/www/proprietary/all.ru.html,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- proprietary/all.ru.html     5 Dec 2022 10:03:34 -0000       1.68
+++ proprietary/all.ru.html     5 Dec 2022 16:30:58 -0000       1.69
@@ -60,6 +60,20 @@
 которые почти невозможно обнаружить 
впоследствии...</a></strong></p>
 
 <ul class="blurbs">
+<!--#set var='ADD' value='2022-12-05' -->
+<!--#set var='PUB' value='2022-10-14' -->
+<li><small class='date-tag'>Добавлено: <!--#echo encoding='none' 
var='ADD' -->
+ &mdash; Последняя ссылка: <!--#echo encoding='none' var='PUB' 
-->
+</small>
+    <p><a
+href="https://www.bleepingcomputer.com/news/security/microsoft-office-365-email-encryption-could-expose-message-content/";>
+Шифрование в Microsoft Office слабо</a> и плохо 
противостоит взлому.</p>
+
+    <p>Шифрование&nbsp;&mdash; предмет капризный, в 
нем легко наломать дров. Мудрые
+люди настаивают на программах шифрования, 
которые (1) свободны и (2)
+исследованы экспертами.</p>
+  </li>
+
 <!--#set var='ADD' value='2022-12-03' -->
 <!--#set var='PUB' value='2022-11-30' -->
 <li><small class='date-tag'>Добавлено: <!--#echo encoding='none' 
var='ADD' -->
@@ -4022,7 +4036,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2022/12/05 10:03:34 $
+$Date: 2022/12/05 16:30:58 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/malware-microsoft.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.ru.html,v
retrieving revision 1.115
retrieving revision 1.116
diff -u -b -r1.115 -r1.116
--- proprietary/malware-microsoft.ru.html       30 Nov 2022 13:31:29 -0000      
1.115
+++ proprietary/malware-microsoft.ru.html       5 Dec 2022 16:30:58 -0000       
1.116
@@ -266,6 +266,21 @@
 предположение, что в престижных 
несвободных программах нет серьезных 
ошибок.</p>
 
 <ul class="blurbs">
+  <li id="M202210140">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2022-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://www.bleepingcomputer.com/news/security/microsoft-office-365-email-encryption-could-expose-message-content/";>
+Шифрование в Microsoft Office слабо</a> и плохо 
противостоит взлому.</p>
+
+    <p>Шифрование&nbsp;&mdash; предмет капризный, в 
нем легко наломать дров. Мудрые
+люди настаивают на программах шифрования, 
которые (1) свободны и (2)
+исследованы экспертами.</p>
+  </li>
+
   <li id="M202202090">
     
     <!--#set var="DATE" value='<small class="date-tag">
@@ -1252,7 +1267,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2022/11/30 13:31:29 $
+$Date: 2022/12/05 16:30:58 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-insecurity.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.ru.html,v
retrieving revision 1.139
retrieving revision 1.140
diff -u -b -r1.139 -r1.140
--- proprietary/proprietary-insecurity.ru.html  30 Nov 2022 13:31:31 -0000      
1.139
+++ proprietary/proprietary-insecurity.ru.html  5 Dec 2022 16:30:58 -0000       
1.140
@@ -122,6 +122,21 @@
 <div class="column-limit" id="proprietary-insecurity"></div>
 
 <ul class="blurbs">
+  <li id="M202210140">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2022-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://www.bleepingcomputer.com/news/security/microsoft-office-365-email-encryption-could-expose-message-content/";>
+Шифрование в Microsoft Office слабо</a> и плохо 
противостоит взлому.</p>
+
+    <p>Шифрование&nbsp;&mdash; предмет капризный, в 
нем легко наломать дров. Мудрые
+люди настаивают на программах шифрования, 
которые (1) свободны и (2)
+исследованы экспертами.</p>
+  </li>
+
   <li id="M202208240">
     
     <!--#set var="DATE" value='<small class="date-tag">
@@ -1638,7 +1653,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2022/11/30 13:31:31 $
+$Date: 2022/12/05 16:30:58 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.ru.html,v
retrieving revision 1.276
retrieving revision 1.277
diff -u -b -r1.276 -r1.277
--- proprietary/proprietary.ru.html     5 Dec 2022 10:03:34 -0000       1.276
+++ proprietary/proprietary.ru.html     5 Dec 2022 16:30:59 -0000       1.277
@@ -244,6 +244,21 @@
 которые почти невозможно обнаружить 
впоследствии...</a></strong></p>
 
 <ul class="blurbs">
+  <li id="M202210140">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2022-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://www.bleepingcomputer.com/news/security/microsoft-office-365-email-encryption-could-expose-message-content/";>
+Шифрование в Microsoft Office слабо</a> и плохо 
противостоит взлому.</p>
+
+    <p>Шифрование&nbsp;&mdash; предмет капризный, в 
нем легко наломать дров. Мудрые
+люди настаивают на программах шифрования, 
которые (1) свободны и (2)
+исследованы экспертами.</p>
+  </li>
+
   <li id="M202211300">
     
     <!--#set var="DATE" value='<small class="date-tag">
@@ -389,22 +404,6 @@
     <p><small>Заметьте, что в статье термин &ldquo;х
акеры&rdquo; неверно
 используется для обозначения 
взломщиков.</small></p>
   </li>
-
-  <li id="M202208070">
-    
-    <!--#set var="DATE" value='<small class="date-tag">
-2022-08</small>'
-    -->
-<!--#echo encoding="none" var="DATE" -->
-<p>Некоторые принтеры Epson 
запрограммированы, чтобы <a
-href="https://hardware.slashdot.org/story/22/08/07/0350244/epson-programs-some-printers-to-stop-operating-claiming-danger-of-ink-spills";>
-прекращать работу после того, как 
напечатали заранее определенное число
-страниц</a>, на основании того, что 
чернильные площадки забиваются
-чернилами. Это составляет недопустимое 
нарушение свободы пользователей
-пользоваться своими принтерами, как им 
угодно и их <a
-href="https://fighttorepair.substack.com/p/citing-danger-of-ink-spills-epson";>
-права чинить их</a>.</p>
-  </li>
 </ul>
 <p class="button right-align">
 <a href="/proprietary/all.html">Далее...</a></p>
@@ -486,7 +485,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2022/12/05 10:03:34 $
+$Date: 2022/12/05 16:30:59 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/po/all.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/all.ru-en.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- proprietary/po/all.ru-en.html       5 Dec 2022 10:03:34 -0000       1.70
+++ proprietary/po/all.ru-en.html       5 Dec 2022 16:30:59 -0000       1.71
@@ -50,6 +50,17 @@
   to detect once installed...</a></strong></p>
 
 <ul class="blurbs">
+<!--#set var='ADD' value='2022-12-05' --><!--#set var='PUB' value='2022-10-14' 
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo 
encoding='none' var='ADD' --><span class="gnun-split"></span> &mdash; Latest 
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB' 
--></small>
+    <p><a
+    
href="https://www.bleepingcomputer.com/news/security/microsoft-office-365-email-encryption-could-expose-message-content/";>
+    The Microsoft Office encryption is weak</a>, and susceptible to
+    attack.</p>
+
+    <p>Encryption is a tricky field, and easy to mess up. It is wise
+    to insist on encryption software that is (1) free software and (2)
+    studied by experts.</p>
+  </li>
+
 <!--#set var='ADD' value='2022-12-03' --><!--#set var='PUB' value='2022-11-30' 
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo 
encoding='none' var='ADD' --><span class="gnun-split"></span> &mdash; Latest 
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB' 
--></small>
     <p><a href="https://www.techarp.com/mobile/apple-china-limit-airdrop/";>
     Obeying a demand by the Chinese government, Apple restricted the
@@ -2963,7 +2974,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2022/12/05 10:03:34 $
+$Date: 2022/12/05 16:30:59 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/all.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.ru.po,v
retrieving revision 1.166
retrieving revision 1.167
diff -u -b -r1.166 -r1.167
--- proprietary/po/all.ru.po    5 Dec 2022 11:33:36 -0000       1.166
+++ proprietary/po/all.ru.po    5 Dec 2022 16:30:59 -0000       1.167
@@ -17,7 +17,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2022-12-05 11:25+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -100,12 +99,18 @@
 "office-365-email-encryption-could-expose-message-content/\"> The Microsoft "
 "Office encryption is weak</a>, and susceptible to attack."
 msgstr ""
+"<a href=\"https://www.bleepingcomputer.com/news/security/microsoft-";
+"office-365-email-encryption-could-expose-message-content/\"> 
Шифрование в "
+"Microsoft Office слабо</a> и плохо противостоит 
взлому."
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "Encryption is a tricky field, and easy to mess up. It is wise to insist on "
 "encryption software that is (1) free software and (2)  studied by experts."
 msgstr ""
+"Шифрование&nbsp;&mdash; предмет капризный, в 
нем легко наломать дров. Мудрые "
+"люди настаивают на программах шифрования, 
которые (1) свободны и (2) "
+"исследованы экспертами."
 
 #. type: Content of: <div><ul><li><p>
 msgid ""

Index: proprietary/po/malware-microsoft.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ru-en.html,v
retrieving revision 1.114
retrieving revision 1.115
diff -u -b -r1.114 -r1.115
--- proprietary/po/malware-microsoft.ru-en.html 30 Nov 2022 13:31:36 -0000      
1.114
+++ proprietary/po/malware-microsoft.ru-en.html 5 Dec 2022 16:30:59 -0000       
1.115
@@ -234,6 +234,19 @@
   bugs.</p>
 
 <ul class="blurbs">
+  <li id="M202210140">
+    <!--#set var="DATE" value='<small class="date-tag">2022-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://www.bleepingcomputer.com/news/security/microsoft-office-365-email-encryption-could-expose-message-content/";>
+    The Microsoft Office encryption is weak</a>, and susceptible to
+    attack.</p>
+
+    <p>Encryption is a tricky field, and easy to mess up. It is wise
+    to insist on encryption software that is (1) free software and (2)
+    studied by experts.</p>
+  </li>
+
   <li id="M202202090">
     <!--#set var="DATE" value='<small class="date-tag">2022-02</small>'
     --><!--#echo encoding="none" var="DATE" -->
@@ -1027,7 +1040,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2022/11/30 13:31:36 $
+$Date: 2022/12/05 16:30:59 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-microsoft.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ru.po,v
retrieving revision 1.293
retrieving revision 1.294
diff -u -b -r1.293 -r1.294
--- proprietary/po/malware-microsoft.ru.po      5 Dec 2022 11:33:44 -0000       
1.293
+++ proprietary/po/malware-microsoft.ru.po      5 Dec 2022 16:30:59 -0000       
1.294
@@ -16,7 +16,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2022-12-05 11:25+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -398,12 +397,18 @@
 "office-365-email-encryption-could-expose-message-content/\"> The Microsoft "
 "Office encryption is weak</a>, and susceptible to attack."
 msgstr ""
+"<a href=\"https://www.bleepingcomputer.com/news/security/microsoft-";
+"office-365-email-encryption-could-expose-message-content/\"> 
Шифрование в "
+"Microsoft Office слабо</a> и плохо противостоит 
взлому."
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "Encryption is a tricky field, and easy to mess up. It is wise to insist on "
 "encryption software that is (1) free software and (2)  studied by experts."
 msgstr ""
+"Шифрование&nbsp;&mdash; предмет капризный, в 
нем легко наломать дров. Мудрые "
+"люди настаивают на программах шифрования, 
которые (1) свободны и (2) "
+"исследованы экспертами."
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""

Index: proprietary/po/proprietary-insecurity.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru-en.html,v
retrieving revision 1.138
retrieving revision 1.139
diff -u -b -r1.138 -r1.139
--- proprietary/po/proprietary-insecurity.ru-en.html    30 Nov 2022 13:31:38 
-0000      1.138
+++ proprietary/po/proprietary-insecurity.ru-en.html    5 Dec 2022 16:30:59 
-0000       1.139
@@ -113,6 +113,19 @@
 <div class="column-limit" id="proprietary-insecurity"></div>
 
 <ul class="blurbs">
+  <li id="M202210140">
+    <!--#set var="DATE" value='<small class="date-tag">2022-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://www.bleepingcomputer.com/news/security/microsoft-office-365-email-encryption-could-expose-message-content/";>
+    The Microsoft Office encryption is weak</a>, and susceptible to
+    attack.</p>
+
+    <p>Encryption is a tricky field, and easy to mess up. It is wise
+    to insist on encryption software that is (1) free software and (2)
+    studied by experts.</p>
+  </li>
+
   <li id="M202208240">
     <!--#set var="DATE" value='<small class="date-tag">2022-08</small>'
     --><!--#echo encoding="none" var="DATE" -->
@@ -1317,7 +1330,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2022/11/30 13:31:38 $
+$Date: 2022/12/05 16:30:59 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.356
retrieving revision 1.357
diff -u -b -r1.356 -r1.357
--- proprietary/po/proprietary-insecurity.ru.po 5 Dec 2022 11:33:47 -0000       
1.356
+++ proprietary/po/proprietary-insecurity.ru.po 5 Dec 2022 16:30:59 -0000       
1.357
@@ -16,7 +16,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2022-12-05 11:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -200,12 +199,18 @@
 "office-365-email-encryption-could-expose-message-content/\"> The Microsoft "
 "Office encryption is weak</a>, and susceptible to attack."
 msgstr ""
+"<a href=\"https://www.bleepingcomputer.com/news/security/microsoft-";
+"office-365-email-encryption-could-expose-message-content/\"> 
Шифрование в "
+"Microsoft Office слабо</a> и плохо противостоит 
взлому."
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "Encryption is a tricky field, and easy to mess up. It is wise to insist on "
 "encryption software that is (1) free software and (2)  studied by experts."
 msgstr ""
+"Шифрование&nbsp;&mdash; предмет капризный, в 
нем легко наломать дров. Мудрые "
+"люди настаивают на программах шифрования, 
которые (1) свободны и (2) "
+"исследованы экспертами."
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""

Index: proprietary/po/proprietary.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru-en.html,v
retrieving revision 1.274
retrieving revision 1.275
diff -u -b -r1.274 -r1.275
--- proprietary/po/proprietary.ru-en.html       5 Dec 2022 10:03:35 -0000       
1.274
+++ proprietary/po/proprietary.ru-en.html       5 Dec 2022 16:30:59 -0000       
1.275
@@ -225,6 +225,19 @@
   to detect once installed...</a></strong></p>
 
 <ul class="blurbs">
+  <li id="M202210140">
+    <!--#set var="DATE" value='<small class="date-tag">2022-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://www.bleepingcomputer.com/news/security/microsoft-office-365-email-encryption-could-expose-message-content/";>
+    The Microsoft Office encryption is weak</a>, and susceptible to
+    attack.</p>
+
+    <p>Encryption is a tricky field, and easy to mess up. It is wise
+    to insist on encryption software that is (1) free software and (2)
+    studied by experts.</p>
+  </li>
+
   <li id="M202211300">
     <!--#set var="DATE" value='<small class="date-tag">2022-11</small>'
     --><!--#echo encoding="none" var="DATE" -->
@@ -354,19 +367,6 @@
     <p><small>Please note that the article wrongly refers
     to crackers as &ldquo;hackers.&rdquo;</small></p>
   </li>
-
-  <li id="M202208070">
-    <!--#set var="DATE" value='<small class="date-tag">2022-08</small>'
-    --><!--#echo encoding="none" var="DATE" -->
-    <p>Some Epson printers are programmed to <a
-    
href="https://hardware.slashdot.org/story/22/08/07/0350244/epson-programs-some-printers-to-stop-operating-claiming-danger-of-ink-spills";>
-    stop working after they have printed a predetermined number
-    of pages</a>, on the pretext that ink pads become saturated
-    with ink. This constitutes an unacceptable infringement on
-    users' freedom to use their printers as they wish, and on their <a
-    
href="https://fighttorepair.substack.com/p/citing-danger-of-ink-spills-epson";>
-    right to repair them</a>.</p>
-  </li>
 </ul>
 <p class="button right-align">
 <a href="/proprietary/all.html">More items&hellip;</a></p>
@@ -429,7 +429,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2022/12/05 10:03:35 $
+$Date: 2022/12/05 16:30:59 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.655
retrieving revision 1.656
diff -u -b -r1.655 -r1.656
--- proprietary/po/proprietary.ru.po    5 Dec 2022 11:33:51 -0000       1.655
+++ proprietary/po/proprietary.ru.po    5 Dec 2022 16:30:59 -0000       1.656
@@ -17,7 +17,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2022-12-05 11:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -431,12 +430,18 @@
 "office-365-email-encryption-could-expose-message-content/\"> The Microsoft "
 "Office encryption is weak</a>, and susceptible to attack."
 msgstr ""
+"<a href=\"https://www.bleepingcomputer.com/news/security/microsoft-";
+"office-365-email-encryption-could-expose-message-content/\"> 
Шифрование в "
+"Microsoft Office слабо</a> и плохо противостоит 
взлому."
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "Encryption is a tricky field, and easy to mess up. It is wise to insist on "
 "encryption software that is (1) free software and (2)  studied by experts."
 msgstr ""
+"Шифрование&nbsp;&mdash; предмет капризный, в 
нем легко наломать дров. Мудрые "
+"люди настаивают на программах шифрования, 
которые (1) свободны и (2) "
+"исследованы экспертами."
 
 #. type: Content of: <div><ul><li><p>
 msgid ""

Index: server/sitemap.fr.html
===================================================================
RCS file: /web/www/www/server/sitemap.fr.html,v
retrieving revision 1.589
retrieving revision 1.590
diff -u -b -r1.589 -r1.590
--- server/sitemap.fr.html      3 Dec 2022 16:00:36 -0000       1.589
+++ server/sitemap.fr.html      5 Dec 2022 16:30:59 -0000       1.590
@@ -345,7 +345,8 @@
   <dd>Educational Malware App &ldquo;Along&rdquo;</dd>
   <dt><a
 
href="/education/governments-let-companies-snoop-on-students.html">governments-let-companies-snoop-on-students.html</a></dt>
-  <dd>Many Governments Encourage Schools to Let Companies Snoop on 
Students</dd>
+  <dd>De nombreux gouvernements encouragent les écoles à laisser les 
entreprises
+espionner les élèves</dd>
   <dt><a
 
href="/education/how-i-fought-to-graduate-without-using-non-free-software.html">how-i-fought-to-graduate-without-using-non-free-software.html</a></dt>
   <dd>How I Fought To Graduate Without Using Nonfree Software</dd>
@@ -2340,7 +2341,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2022/12/03 16:00:36 $
+$Date: 2022/12/05 16:30:59 $
 
 <!-- timestamp end -->
 </p>

Index: education/governments-let-companies-snoop-on-students.fr.html
===================================================================
RCS file: education/governments-let-companies-snoop-on-students.fr.html
diff -N education/governments-let-companies-snoop-on-students.fr.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ education/governments-let-companies-snoop-on-students.fr.html       5 Dec 
2022 16:30:57 -0000       1.1
@@ -0,0 +1,177 @@
+<!--#set var="ENGLISH_PAGE" 
value="/education/governments-let-companies-snoop-on-students.en.html" -->
+
+<!--#include virtual="/server/header.fr.html" -->
+<!-- Parent-Version: 1.97 -->
+<!-- This page is derived from /server/standards/boilerplate.html -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="yes" -->
+
+<!-- This file is automatically generated by GNUnited Nations! -->
+<title>De nombreux gouvernements encouragent les écoles à laisser les 
entreprises
+espionner les élèves - Projet GNU - Free Software Foundation</title>
+
+<link rel="stylesheet" type="text/css" href="/side-menu.css" media="screen" />
+
+<!--#include 
virtual="/education/po/governments-let-companies-snoop-on-students.translist" 
-->
+<!--#include virtual="/server/banner.fr.html" -->
+<div class="nav">
+<a id="side-menu-button" class="switch" href="#navlinks">
+ <img id="side-menu-icon" height="32"
+      src="/graphics/icons/side-menu.png"
+      title="Menu Éducation"
+      alt="&nbsp;[Menu Éducation]&nbsp;" />
+</a>
+
+<p class="breadcrumb">
+ <a href="/"><img src="/graphics/icons/home.png" height="24"
+    alt="Accueil GNU" title="Accueil GNU" /></a>&nbsp;/ <a 
href="/education/education.html">Education</a>&nbsp;/ <a
+href="/education/bigtech-threats-to-education-and-society.html">Menaces des 
géants
+de la tech</a>&nbsp;/</p>
+</div>
+
+<!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/top-addendum.fr.html" -->
+<div style="clear: both"></div>
+<div id="last-div" class="reduced-width">
+
+<div class="announcement comment" role="complementary">
+<p>
+Autres exemples de la <a
+href="/proprietary/malware-edtech.html#content">malveillance de
+l'Edtech</a>.
+</p>
+</div>
+
+<h2>De nombreux gouvernements encouragent les écoles à laisser les 
entreprises
+espionner les élèves</h2>
+
+<address class="byline">par Richard Stallman</address>
+<hr class="thin" />
+<div class="article">
+
+<p><i>Human Rights Watch</i> a étudié 164 logiciels et sites Internet
+recommandés par divers gouvernements pour l'enseignement scolaire. Ils ont
+trouvé que 146 d'entre eux <a
+href="https://www.hrw.org/report/2022/05/25/how-dare-they-peep-my-private-life/childrens-rights-violations-governments";>envoyaient
+des données à des annonceurs et à des entreprises de pistage</a>.</p>
+
+<p>Les chercheurs ont fait un travail approfondi et se sont intéressés aux
+différentes méthodes d'espionnage, entre autres à l'identification des
+utilisateurs grâce à l'empreinte digitale de leur appareil. L'étude n'avait
+pas seulement pour cible des programmes et sites « spécifiques à
+l'éducation », mais concernait aussi, par exemple, Zoom et Microsoft 
Teams.</p>
+
+<p>Je m'attends à ce que chaque programme collecte des données personnelles
+pour son développeur. Je ne suis pas sûr que les résultats en tiennent
+compte, mais ils devraient. Dès lors que le développeur du logiciel 
récupère
+des données personnelles, il peut les fournir aussi bien à des profileurs
+publicitaires qu'à d'autres entreprises et gouvernements, et peut aussi se
+livrer directement à la manipulation des élèves et enseignants.</p>
+
+<p>Les recommandations de <i>Human Rights Watch</i> suivent l'approche
+habituelle consistant à réglementer l'utilisation des données une fois
+qu'elles ont été collectées. Ceci est foncièrement insuffisant ; <a
+href="/philosophy/surveillance-vs-democracy.html">les données personnelles,
+une fois collectées, seront certainement utilisées à de mauvaises 
fins</a>.</p>
+
+<p>La seule approche qui rende possible la fin de la surveillance de masse
+exige tout d'abord que les logiciels soient libres. Ainsi les utilisateurs
+peuvent les modifier afin d'éviter qu'ils ne donnent de vraies données aux
+entreprises.</p>
+<div class="column-limit"></div>
+
+<p>Pour approfondir :</p>
+
+<div class="important">
+<p>
+<a href="/education/resisting-proprietary-software.html#content">Résister
+aux logiciels privateurs</a> <br /> 
+<a
+href="/education/dangers-of-proprietary-systems-in-online-teaching.html#content">Les
+dangers des systèmes privateurs dans l'enseignement en ligne</a>
+</p>
+</div>
+</div>
+<div class="translators-notes">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
+ </div>
+</div>
+
+<!--#include virtual="/education/education-menu.fr.html" -->
+<!--#include virtual="/server/footer.fr.html" -->
+<div id="footer" role="contentinfo">
+<div class="unprintable">
+
+<p>Veuillez envoyer les requêtes concernant la FSF et GNU à &lt;<a
+href="mailto:gnu@gnu.org";>gnu@gnu.org</a>&gt;. Il existe aussi <a
+href="/contact/">d'autres moyens de contacter</a> la FSF. Les liens
+orphelins et autres corrections ou suggestions peuvent être signalés à
+&lt;<a href="mailto:webmasters@gnu.org";>webmasters@gnu.org</a>&gt;.</p>
+
+<p>
+<!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to <a href="mailto:web-translators@gnu.org";>
+
+        &lt;web-translators@gnu.org&gt;</a>.</p>
+
+        <p>For information on coordinating and contributing translations of
+        our web pages, see <a
+        href="/server/standards/README.translations.html">Translations
+        README</a>. -->
+Merci d'adresser vos commentaires sur les pages en français à &lt;<a
+href="mailto:trad-gnu@april.org";>trad-gnu@april.org</a>&gt;, et sur les
+traductions en général à &lt;<a
+href="mailto:web-translators@gnu.org";>web-translators@gnu.org</a>&gt;. Si
+vous souhaitez y contribuer, vous trouverez dans le <a
+href="/server/standards/README.translations.html">guide de traduction</a>
+les infos nécessaires.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+     
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+     
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. -->
+<p>Copyright &copy; 2022 Richard Stallman</p>
+
+<p>Cette page peut être utilisée suivant les conditions de la licence <a
+rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/deed.fr";>Creative
+Commons attribution, pas de modification, 4.0 internationale (CC BY-ND
+4.0)</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.fr.html" -->
+<div class="translators-credits">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.-->
+Traduction : Nicolas Joubert<br /> Révision : <a
+href="mailto:trad-gnu&#64;april.org";>trad-gnu&#64;april.org</a></div>
+
+<p class="unprintable"><!-- timestamp start -->
+Dernière mise à jour :
+
+$Date: 2022/12/05 16:30:57 $
+
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+<!-- for class="inner", starts in the banner include -->
+</body>
+</html>

Index: education/po/governments-let-companies-snoop-on-students.fr-en.html
===================================================================
RCS file: education/po/governments-let-companies-snoop-on-students.fr-en.html
diff -N education/po/governments-let-companies-snoop-on-students.fr-en.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ education/po/governments-let-companies-snoop-on-students.fr-en.html 5 Dec 
2022 16:30:58 -0000       1.1
@@ -0,0 +1,152 @@
+<!--#include virtual="/server/header.html" -->
+<!-- Parent-Version: 1.97 -->
+<!-- This page is derived from /server/standards/boilerplate.html -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="yes" -->
+<title>Many Governments Encourage Schools to Let Companies Snoop on 
+Students - GNU Project - Free Software Foundation</title>
+
+<link rel="stylesheet" type="text/css" href="/side-menu.css" media="screen" />
+ <!--#include 
virtual="/education/po/governments-let-companies-snoop-on-students.translist" 
-->
+<!--#include virtual="/server/banner.html" -->
+
+<div class="nav">
+<a id="side-menu-button" class="switch" href="#navlinks">
+ <img id="side-menu-icon" height="32"
+      src="/graphics/icons/side-menu.png"
+      title="Education Contents"
+      alt="&nbsp;[Education Contents]&nbsp;" />
+</a>
+
+<p class="breadcrumb">
+ <a href="/"><img src="/graphics/icons/home.png" height="24"
+    alt="GNU Home" title="GNU Home" /></a>&nbsp;/
+ <a href="/education/education.html">Education</a>&nbsp;/
+ <a 
href="/education/bigtech-threats-to-education-and-society.html">Big&nbsp;Tech&nbsp;Threats</a>&nbsp;/</p>
+</div>
+
+<!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/top-addendum.html" -->
+
+<div style="clear: both"></div>
+<div id="last-div" class="reduced-width">
+
+<div class="announcement comment" role="complementary">
+<p>
+More examples of 
+<a href="/proprietary/malware-edtech.html#content">malware in
+educational proprietary technologies</a>.
+</p>
+</div>
+
+<h2>Many Governments Encourage Schools to Let Companies Snoop on 
+Students</h2>
+
+<address class="byline">by Richard Stallman</address>
+<hr class="thin" />
+<div class="article">
+
+<p>Human Rights Watch studied 164 software programs and web sites 
+recommended by various governments for schools to make students use.  It 
+found that 146 of them <a 
+href="https://www.hrw.org/report/2022/05/25/how-dare-they-peep-my-private-life/childrens-rights-violations-governments";>
+gave data to advertising and tracking companies</a>.</p>
+
+<p>The researchers were thorough and checked for various snooping methods, 
+including fingerprinting of devices to identify users.  The targets of the 
+investigation were not limited to programs and sites specifically 
+&ldquo;for education;&rdquo; they included, for instance, Zoom and
+Microsoft Teams.</p>
+
+<p>I expect that each program collected personal data for its developer.
+I'm not sure whether the results counted that, but they should.  Once
+the developer company gets personal data, it can provide that data to
+advertising profilers, as well as to other companies and governments, and
+it can engage directly in manipulation of students and teachers.</p>
+
+<p>The recommendations Human Rights Watch makes follow the usual approach
+of regulating the use of data once collected.  This is fundamentally
+inadequate; <a 
+href="/philosophy/surveillance-vs-democracy.html">personal data, once 
+collected, will surely be misused</a>.</p>
+
+<p>The only approach that makes it possible to end massive surveillance
+starts with demanding that the software be free.  Then users will be
+able to modify the software to avoid giving real data to companies.</p>
+<div class="column-limit"></div>
+
+<p>To learn more:</p>
+
+<div class="important">
+<p>
+<a href="/education/resisting-proprietary-software.html#content">
+Resisting Proprietary Software</a> <br /> 
+<a 
href="/education/dangers-of-proprietary-systems-in-online-teaching.html#content">
+The Dangers of Proprietary Systems in Online Teaching</a>
+</p>
+</div>
+</div>
+</div>
+<!--#include virtual="/education/education-menu.html" -->
+<!--#include virtual="/server/footer.html" -->
+<div id="footer" role="contentinfo">
+<div class="unprintable">
+
+<p>Please send general FSF &amp; GNU inquiries to
+<a href="mailto:gnu@gnu.org";>&lt;gnu@gnu.org&gt;</a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF.  Broken links and other corrections or suggestions can be sent
+to <a href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>.</p>
+
+<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to <a href="mailto:web-translators@gnu.org";>
+        &lt;web-translators@gnu.org&gt;</a>.</p>
+
+        <p>For information on coordinating and contributing translations of
+        our web pages, see <a
+        href="/server/standards/README.translations.html">Translations
+        README</a>. -->
+Please see the <a
+href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and contributing translations
+of this article.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+     
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+     
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. -->
+
+<p>Copyright &copy; 2022 Richard Stallman</p>
+
+<p>This page is licensed under a <a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative
+Commons Attribution-NoDerivatives 4.0 International License</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.html" -->
+
+<p class="unprintable">Updated:
+<!-- timestamp start -->
+$Date: 2022/12/05 16:30:58 $
+<!-- timestamp end -->
+</p>
+</div>
+</div><!-- for class="inner", starts in the banner include -->
+</body>
+</html>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]