[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/philosophy/po you-the-problem-tpm2-solves.f...
From: |
Therese Godefroy |
Subject: |
www/philosophy/po you-the-problem-tpm2-solves.f... |
Date: |
Fri, 23 Dec 2022 06:34:24 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: Therese Godefroy <th_g> 22/12/23 06:34:24
Modified files:
philosophy/po : you-the-problem-tpm2-solves.fr.po
Log message:
Update.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/you-the-problem-tpm2-solves.fr.po?cvsroot=www&r1=1.5&r2=1.6
Patches:
Index: you-the-problem-tpm2-solves.fr.po
===================================================================
RCS file: /web/www/www/philosophy/po/you-the-problem-tpm2-solves.fr.po,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- you-the-problem-tpm2-solves.fr.po 23 Dec 2022 11:02:42 -0000 1.5
+++ you-the-problem-tpm2-solves.fr.po 23 Dec 2022 11:34:22 -0000 1.6
@@ -9,14 +9,13 @@
msgstr ""
"Project-Id-Version: you-the-problem-tpm2-solves.html\n"
"POT-Creation-Date: 2022-12-23 10:57+0000\n"
-"PO-Revision-Date: 2022-12-03 15:00+0100\n"
+"PO-Revision-Date: 2022-12-23 12:33+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th@free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
"Language: fr\n"
"MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2022-12-23 10:57+0000\n"
#. type: Content of: <title>
msgid "You, the Problem TPM2 Solves - GNU Project - Free Software Foundation"
@@ -56,15 +55,16 @@
"cheat in games, and video intercepting software to cheat in the exam, among "
"many possibilities."
msgstr ""
-"Microsoft veut vous faire croire que vous pouvez faire confiance à TPM2 pour
"
-"améliorer la sécurité. TPM2 est un prérequis obligatoire et non une
option "
-"pour Windows 11. Cela ne cadre pas avec l'idée que nous nous faisons de la "
-"confiance. En réalité, l'objectif de TPM2 n'est pas de renforcer la
sécurité "
-"des utilisateurs de l'informatique, il est de résoudre le problème des "
-"utilisateurs indignes de confiance dans des domaines comme <a href=\"https://"
-"drm.info/what-is-drm.fr.html\">la gestion numérique des restrictions (DRM)</"
-"a>, <a href=\"https://news.ycombinator.com/item?id=25336063\">les mesures "
-"contre la fraude dans les jeux</a> et <a href=\"https://www.forbes.com/sites/"
+"Microsoft veut vous faire croire que vous pouvez faire confiance au
«â¯module "
+"de plateforme fiableâ¯Â» <abbr title=\"Trusted Platform Module\">TPM</abbr>2
"
+"pour améliorer la sécurité. TPM2 est un prérequis obligatoire et non une "
+"option pour Windows 11. Cela ne cadre pas avec l'idée que nous nous faisons
"
+"de la confiance. En réalité, l'objectif de TPM2 n'est pas de renforcer la "
+"sécurité des utilisateurs de l'informatique, il est de résoudre le
problème "
+"des utilisateurs non fiables dans des domaines comme <a href=\"https://drm."
+"info/what-is-drm.fr.html\">la gestion numérique des restrictions (DRM)</a>, "
+"<a href=\"https://news.ycombinator.com/item?id=25336063\">les mesures contre "
+"la fraude dans les jeux</a> et <a href=\"https://www.forbes.com/sites/"
"seanlawson/2020/04/24/are-schools-forcing-students-to-install-spyware-that-"
"invades-their-privacy-as-a-result-of-the-coronavirus-lockdown/\">la "
"surveillance des examens</a>. Toutes ces applications ont échoué jusqu'à "
@@ -146,35 +146,6 @@
"démarche</a>, si bien développée en Chine)."
#. type: Content of: <div><p>
-# | The public portions of the endorsement key (EK), Attestation Identity Key
-# | (AIK), and other keys in a TPM2 chip have properties similar to the
-# | biometrics of a person. It is unique just like the serial number of the
-# | engine in a car, and the manufacturers keep track of all those numbers in
-# | their products. With a physically carved serial number, it is easy for
-# | the user to share with his friends in a fake report in case the remote
-# | corporate lords demand the knowledge or the photo of that number. In the
-# | TPM2 situation, however, knowledge of the public keys alone is not
-# | sufficient to carry out the attestations. Cryptographic properties ensure
-# | that it is impossible for the user to attest without the physical presence
-# | of the [-CPU-] {+TPM+} since the private part of those keys are sealed
-# | tight in the chip, protected even (mainly) against the computer owner.
-# | This renders the old trick of sharing Netflix password, for example,
-# | invalid.
-#, fuzzy
-#| msgid ""
-#| "The public portions of the endorsement key (EK), Attestation Identity Key "
-#| "(AIK), and other keys in a TPM2 chip have properties similar to the "
-#| "biometrics of a person. It is unique just like the serial number of the "
-#| "engine in a car, and the manufacturers keep track of all those numbers in "
-#| "their products. With a physically carved serial number, it is easy for "
-#| "the user to share with his friends in a fake report in case the remote "
-#| "corporate lords demand the knowledge or the photo of that number. In the "
-#| "TPM2 situation, however, knowledge of the public keys alone is not "
-#| "sufficient to carry out the attestations. Cryptographic properties "
-#| "ensure that it is impossible for the user to attest without the physical "
-#| "presence of the CPU since the private part of those keys are sealed tight "
-#| "in the chip, protected even (mainly) against the computer owner. This "
-#| "renders the old trick of sharing Netflix password, for example, invalid."
msgid ""
"The public portions of the endorsement key (EK), Attestation Identity Key "
"(AIK), and other keys in a TPM2 chip have properties similar to the "
@@ -201,7 +172,7 @@
"photo. Dans le cas de TPM2, cependant, la seule connaissance des clés "
"publiques n'est pas suffisante pour effectuer les attestations. Les "
"propriétés cryptographiques garantissent qu'il est impossible pour "
-"l'utilisateur de le faire sans la présence physique du CPU, car la partie "
+"l'utilisateur de le faire sans la présence physique du TPM, car la partie "
"privée de ces clés est scellée profondément dans la puce, protégée
même "
"(principalement) contre le propriétaire de l'ordinateur. Cela rend caduque, "
"par exemple, la vieille astuce du partage du mot de passe Netflix."
@@ -350,12 +321,6 @@
"la télémétrie et le contrôle de Microsoft sont retirés du Windows Store."
#. type: Content of: <div><ul><li>
-# | Software competing with Microsoft products are de-listed from the Windows
-# | [-s-]{+S+}tore.
-#, fuzzy
-#| msgid ""
-#| "Software competing with Microsoft products are de-listed from the Windows "
-#| "store."
msgid ""
"Software competing with Microsoft products are de-listed from the Windows "
"Store."
@@ -364,16 +329,6 @@
"Store."
#. type: Content of: <div><ul><li>
-# | <a href=\"https://web2.qatar.cmu.edu/cs/15349/dl/DRM-TC.pdf\"> Ever
-# | fewer</a> [-w-]{+W+}indows configuration settings remain modifiable if the
-# | system is to remain trusted. Container technology might slightly mitigate
-# | the problem.
-#, fuzzy
-#| msgid ""
-#| "<a href=\"https://web2.qatar.cmu.edu/cs/15349/dl/DRM-TC.pdf\"> Ever "
-#| "fewer</a> windows configuration settings remain modifiable if the system "
-#| "is to remain trusted. Container technology might slightly mitigate the "
-#| "problem."
msgid ""
"<a href=\"https://web2.qatar.cmu.edu/cs/15349/dl/DRM-TC.pdf\"> Ever fewer</"
"a> Windows configuration settings remain modifiable if the system is to "