[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po all.fr.po all.pot all.ru.po ...
From: |
GNUN |
Subject: |
www/proprietary/po all.fr.po all.pot all.ru.po ... |
Date: |
Tue, 1 Jun 2021 17:31:40 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 21/06/01 17:31:39
Modified files:
proprietary/po : all.fr.po all.pot all.ru.po de.po es.po fr.po
it.po ja.po malware-apple.de-diff.html
malware-apple.de.po malware-apple.es.po
malware-apple.fr.po malware-apple.it-diff.html
malware-apple.it.po malware-apple.ja-diff.html
malware-apple.ja.po malware-apple.nl-diff.html
malware-apple.nl.po malware-apple.pot
malware-apple.ru.po nl.po pl.po pot
proprietary-insecurity.de-diff.html
proprietary-insecurity.de.po
proprietary-insecurity.es.po
proprietary-insecurity.fr.po
proprietary-insecurity.it-diff.html
proprietary-insecurity.it.po
proprietary-insecurity.ja-diff.html
proprietary-insecurity.ja.po
proprietary-insecurity.pot
proprietary-insecurity.ru.po
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.es.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.tr.po
proprietary.zh-cn.po
proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po tr.po
zh-cn.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.fr.po?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.pot?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.ru.po?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.315&r2=1.316
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.449&r2=1.450
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.557&r2=1.558
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.315&r2=1.316
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.323&r2=1.324
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de-diff.html?cvsroot=www&r1=1.71&r2=1.72
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de.po?cvsroot=www&r1=1.163&r2=1.164
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.es.po?cvsroot=www&r1=1.206&r2=1.207
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.fr.po?cvsroot=www&r1=1.212&r2=1.213
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it-diff.html?cvsroot=www&r1=1.77&r2=1.78
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it.po?cvsroot=www&r1=1.156&r2=1.157
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja-diff.html?cvsroot=www&r1=1.91&r2=1.92
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja.po?cvsroot=www&r1=1.139&r2=1.140
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl-diff.html?cvsroot=www&r1=1.95&r2=1.96
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl.po?cvsroot=www&r1=1.93&r2=1.94
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.pot?cvsroot=www&r1=1.103&r2=1.104
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ru.po?cvsroot=www&r1=1.261&r2=1.262
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.316&r2=1.317
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.315&r2=1.316
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.314&r2=1.315
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de-diff.html?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.175&r2=1.176
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.es.po?cvsroot=www&r1=1.97&r2=1.98
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.252&r2=1.253
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-diff.html?cvsroot=www&r1=1.90&r2=1.91
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.192&r2=1.193
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja-diff.html?cvsroot=www&r1=1.110&r2=1.111
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja.po?cvsroot=www&r1=1.164&r2=1.165
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pot?cvsroot=www&r1=1.130&r2=1.131
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.297&r2=1.298
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.203&r2=1.204
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.396&r2=1.397
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.199&r2=1.200
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.641&r2=1.642
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.268&r2=1.269
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.408&r2=1.409
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.285&r2=1.286
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.389&r2=1.390
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.328&r2=1.329
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.718&r2=1.719
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.274&r2=1.275
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.292&r2=1.293
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.459&r2=1.460
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.498&r2=1.499
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.285&r2=1.286
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.301&r2=1.302
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.289&r2=1.290
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.284&r2=1.285
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.286&r2=1.287
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.275&r2=1.276
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.302&r2=1.303
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.267&r2=1.268
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.264&r2=1.265
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.421&r2=1.422
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.514&r2=1.515
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.165&r2=1.166
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.208&r2=1.209
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.265&r2=1.266
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.254&r2=1.255
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.388&r2=1.389
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.660&r2=1.661
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.184&r2=1.185
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.185&r2=1.186
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.315&r2=1.316
Patches:
Index: all.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.fr.po,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- all.fr.po 31 May 2021 21:09:18 -0000 1.17
+++ all.fr.po 1 Jun 2021 21:31:29 -0000 1.18
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-05-26 08:55+0000\n"
+"POT-Creation-Date: 2021-06-01 21:25+0000\n"
"PO-Revision-Date: 2021-05-26 22:13+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-06-01 21:25+0000\n"
#. type: Content of: <title>
msgid ""
@@ -79,6 +80,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-"
+"to-chinese-government-conflicts-with-apples-privacy-first-focus/\">Apple is "
+"moving its Chinese customers' iCloud data to a datacenter controlled by the "
+"Chinese government</a>. Apple is already storing the encryption keys on "
+"these servers, obeying Chinese authority, making all Chinese user data "
+"available to the government."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"<a href=\"https://gizmodo.com/get-ready-for-in-car-ads-1846888390\">Ford is "
"planning to force ads on drivers in cars</a>, with the ability for the owner "
"to pay extra to turn them off. The system probably imposes surveillance on "
Index: all.pot
===================================================================
RCS file: /web/www/www/proprietary/po/all.pot,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- all.pot 26 May 2021 09:02:15 -0000 1.7
+++ all.pot 1 Jun 2021 21:31:29 -0000 1.8
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-05-26 08:55+0000\n"
+"POT-Creation-Date: 2021-06-01 21:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -74,6 +74,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a "
+"href=\"https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-to-chinese-government-conflicts-with-apples-privacy-first-focus/\">Apple
"
+"is moving its Chinese customers' iCloud data to a datacenter controlled by "
+"the Chinese government</a>. Apple is already storing the encryption keys on "
+"these servers, obeying Chinese authority, making all Chinese user data "
+"available to the government."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"<a href=\"https://gizmodo.com/get-ready-for-in-car-ads-1846888390\">Ford is "
"planning to force ads on drivers in cars</a>, with the ability for the owner "
"to pay extra to turn them off. The system probably imposes surveillance on "
Index: all.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.ru.po,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- all.ru.po 26 May 2021 17:30:40 -0000 1.14
+++ all.ru.po 1 Jun 2021 21:31:29 -0000 1.15
@@ -9,7 +9,7 @@
msgid ""
msgstr ""
"Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-05-26 08:55+0000\n"
+"POT-Creation-Date: 2021-06-01 21:25+0000\n"
"PO-Revision-Date: 2021-04-27 13:06+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -17,6 +17,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-06-01 21:25+0000\n"
#. type: Content of: <title>
msgid ""
@@ -85,6 +86,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-"
+"to-chinese-government-conflicts-with-apples-privacy-first-focus/\">Apple is "
+"moving its Chinese customers' iCloud data to a datacenter controlled by the "
+"Chinese government</a>. Apple is already storing the encryption keys on "
+"these servers, obeying Chinese authority, making all Chinese user data "
+"available to the government."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"<a href=\"https://gizmodo.com/get-ready-for-in-car-ads-1846888390\">Ford is "
"planning to force ads on drivers in cars</a>, with the ability for the owner "
"to pay extra to turn them off. The system probably imposes surveillance on "
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.315
retrieving revision 1.316
diff -u -b -r1.315 -r1.316
--- de.po 26 May 2021 09:02:15 -0000 1.315
+++ de.po 1 Jun 2021 21:31:29 -0000 1.316
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-adobe.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-05-26 08:55+0000\n"
+"POT-Creation-Date: 2021-06-01 21:25+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -107,6 +107,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-"
+"to-chinese-government-conflicts-with-apples-privacy-first-focus/\">Apple is "
+"moving its Chinese customers' iCloud data to a datacenter controlled by the "
+"Chinese government</a>. Apple is already storing the encryption keys on "
+"these servers, obeying Chinese authority, making all Chinese user data "
+"available to the government."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"<a href=\"https://gizmodo.com/get-ready-for-in-car-ads-1846888390\">Ford is "
"planning to force ads on drivers in cars</a>, with the ability for the owner "
"to pay extra to turn them off. The system probably imposes surveillance on "
@@ -12721,9 +12731,9 @@
"übers Ohr gehauen zu werden â¦"
#. type: Content of: <div><p>
-# | As of [-April, 2017,-] {+March, 2021,+} the [-files-] {+pages+} in this
+# | As of [-April, 2017,-] {+June, 2021,+} the [-files-] {+pages+} in this
# | directory list around [-3-]{+5+}00 instances of malicious
-# | [-functionalities,-] {+functionalities (with more than 590 references to
+# | [-functionalities,-] {+functionalities (with more than 600 references to
# | back them up),+} but there are surely thousands more we don't know about.
#, fuzzy
#| msgid ""
@@ -12731,8 +12741,8 @@
#| "of malicious functionalities, but there are surely thousands more we "
#| "don't know about."
msgid ""
-"As of March, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 590 references to back them up), "
+"As of June, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 600 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
"In den Dokumenten sind ungefähr 300 Fälle böswilliger Funktionalitäten "
@@ -14937,6 +14947,20 @@
msgstr ""
"<a href=\"/proprietary/malware-microsoft\">Schadsoftware von Microsoft</a>"
+#, fuzzy
+#~| msgid ""
+#~| "As of April, 2017, the files in this directory list around 300 instances "
+#~| "of malicious functionalities, but there are surely thousands more we "
+#~| "don't know about."
+#~ msgid ""
+#~ "As of March, 2021, the pages in this directory list around 500 instances "
+#~ "of malicious functionalities (with more than 590 references to back them "
+#~ "up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "In den Dokumenten sind ungefähr 300 Fälle böswilliger Funktionalitäten
"
+#~ "aufgelistet, es gibt aber sicherlich Tausende, über die nichts bekannt "
+#~ "sind (Stand 2017-04)."
+
#~ msgid ""
#~ "Please see the <a href=\"/server/standards/README.translations.html"
#~ "\">Translations README</a> for information on coordinating and submitting "
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.449
retrieving revision 1.450
diff -u -b -r1.449 -r1.450
--- es.po 27 May 2021 09:00:40 -0000 1.449
+++ es.po 1 Jun 2021 21:31:29 -0000 1.450
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2021-05-26 08:55+0000\n"
+"POT-Creation-Date: 2021-06-01 21:25+0000\n"
"PO-Revision-Date: 2018-10-27 11:09+0200\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -94,6 +94,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-"
+"to-chinese-government-conflicts-with-apples-privacy-first-focus/\">Apple is "
+"moving its Chinese customers' iCloud data to a datacenter controlled by the "
+"Chinese government</a>. Apple is already storing the encryption keys on "
+"these servers, obeying Chinese authority, making all Chinese user data "
+"available to the government."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"<a href=\"https://gizmodo.com/get-ready-for-in-car-ads-1846888390\">Ford is "
"planning to force ads on drivers in cars</a>, with the ability for the owner "
"to pay extra to turn them off. The system probably imposes surveillance on "
@@ -13926,22 +13936,22 @@
"de ser engañado."
#. type: Content of: <div><p>
-# | As of [-February,-] {+March,+} 2021, the pages in this directory list
-# | around 500 instances of malicious functionalities (with more than
-# | 5[-8-]{+9+}0 references to back them up), but there are surely thousands
-# | more we don't know about.
+# | As of [-March,-] {+June,+} 2021, the pages in this directory list around
+# | 500 instances of malicious functionalities (with more than [-590-] {+600+}
+# | references to back them up), but there are surely thousands more we don't
+# | know about.
#, fuzzy
#| msgid ""
-#| "As of February, 2021, the pages in this directory list around 500 "
-#| "instances of malicious functionalities (with more than 580 references to "
-#| "back them up), but there are surely thousands more we don't know about."
+#| "As of March, 2021, the pages in this directory list around 500 instances "
+#| "of malicious functionalities (with more than 590 references to back them "
+#| "up), but there are surely thousands more we don't know about."
msgid ""
-"As of March, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 590 references to back them up), "
+"As of June, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 600 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
-"Hasta febrero de 2021, las páginas de este directorio ofrecen una lista de "
-"alrededor de 500 ejemplos de funcionalidades maliciosas (con más de 580 "
+"Hasta marzo de 2021, las páginas de este directorio ofrecen una lista de "
+"alrededor de 500 ejemplos de funcionalidades maliciosas (con más de 590 "
"referencias de apoyo), pero seguramente hay miles más que desconocemos."
#. type: Content of: <div><p>
@@ -15689,6 +15699,21 @@
msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
+#, fuzzy
+#~| msgid ""
+#~| "As of February, 2021, the pages in this directory list around 500 "
+#~| "instances of malicious functionalities (with more than 580 references to "
+#~| "back them up), but there are surely thousands more we don't know about."
+#~ msgid ""
+#~ "As of March, 2021, the pages in this directory list around 500 instances "
+#~ "of malicious functionalities (with more than 590 references to back them "
+#~ "up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "Hasta febrero de 2021, las páginas de este directorio ofrecen una lista "
+#~ "de alrededor de 500 ejemplos de funcionalidades maliciosas (con más de "
+#~ "580 referencias de apoyo), pero seguramente hay miles más que "
+#~ "desconocemos."
+
#~ msgid ""
#~ "A motorcycle apparel company named Klim, <a href=\"https://www.newscon."
#~ "net/en-gb/posts/this-motorcycle-airbag-vest-will-stop-working-if-you-miss-"
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.557
retrieving revision 1.558
diff -u -b -r1.557 -r1.558
--- fr.po 26 May 2021 20:14:26 -0000 1.557
+++ fr.po 1 Jun 2021 21:31:29 -0000 1.558
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-05-26 08:55+0000\n"
+"POT-Creation-Date: 2021-06-01 21:25+0000\n"
"PO-Revision-Date: 2021-05-26 22:13+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -79,6 +79,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-"
+"to-chinese-government-conflicts-with-apples-privacy-first-focus/\">Apple is "
+"moving its Chinese customers' iCloud data to a datacenter controlled by the "
+"Chinese government</a>. Apple is already storing the encryption keys on "
+"these servers, obeying Chinese authority, making all Chinese user data "
+"available to the government."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"<a href=\"https://gizmodo.com/get-ready-for-in-car-ads-1846888390\">Ford is "
"planning to force ads on drivers in cars</a>, with the ability for the owner "
"to pay extra to turn them off. The system probably imposes surveillance on "
@@ -11756,9 +11766,18 @@
"typiquement un moyen de mal se conduire."
#. type: Content of: <div><p>
+# | As of [-March,-] {+June,+} 2021, the pages in this directory list around
+# | 500 instances of malicious functionalities (with more than [-590-] {+600+}
+# | references to back them up), but there are surely thousands more we don't
+# | know about.
+#, fuzzy
+#| msgid ""
+#| "As of March, 2021, the pages in this directory list around 500 instances "
+#| "of malicious functionalities (with more than 590 references to back them "
+#| "up), but there are surely thousands more we don't know about."
msgid ""
-"As of March, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 590 references to back them up), "
+"As of June, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 600 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
"En mars 2021, les pages de ce répertoire dénombraient à peu près 500 cas
de "
@@ -13289,3 +13308,12 @@
#. type: Content of: <div><div><dl><dd><ul><li>
msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
+
+#~ msgid ""
+#~ "As of March, 2021, the pages in this directory list around 500 instances "
+#~ "of malicious functionalities (with more than 590 references to back them "
+#~ "up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "En mars 2021, les pages de ce répertoire dénombraient à peu près 500
cas "
+#~ "de fonctionnalités malveillante (appuyés par plus de 590 références), "
+#~ "mais il y en a sûrement des milliers d'autres dont nous ne savons rien."
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.315
retrieving revision 1.316
diff -u -b -r1.315 -r1.316
--- it.po 26 May 2021 09:02:16 -0000 1.315
+++ it.po 1 Jun 2021 21:31:29 -0000 1.316
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2021-05-26 08:55+0000\n"
+"POT-Creation-Date: 2021-06-01 21:25+0000\n"
"PO-Revision-Date: 2017-09-30 22:48+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -109,6 +109,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-"
+"to-chinese-government-conflicts-with-apples-privacy-first-focus/\">Apple is "
+"moving its Chinese customers' iCloud data to a datacenter controlled by the "
+"Chinese government</a>. Apple is already storing the encryption keys on "
+"these servers, obeying Chinese authority, making all Chinese user data "
+"available to the government."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"<a href=\"https://gizmodo.com/get-ready-for-in-car-ads-1846888390\">Ford is "
"planning to force ads on drivers in cars</a>, with the ability for the owner "
"to pay extra to turn them off. The system probably imposes surveillance on "
@@ -11901,9 +11911,9 @@
"norma. Il software proprietario moderno è tipicamente una fregatura."
#. type: Content of: <div><p>
-# | As of [-April, 2017,-] {+March, 2021,+} the [-files-] {+pages+} in this
+# | As of [-April, 2017,-] {+June, 2021,+} the [-files-] {+pages+} in this
# | directory list around [-3-]{+5+}00 instances of malicious
-# | [-functionalities,-] {+functionalities (with more than 590 references to
+# | [-functionalities,-] {+functionalities (with more than 600 references to
# | back them up),+} but there are surely thousands more we don't know about.
#, fuzzy
#| msgid ""
@@ -11911,8 +11921,8 @@
#| "of malicious functionalities, but there are surely thousands more we "
#| "don't know about."
msgid ""
-"As of March, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 590 references to back them up), "
+"As of June, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 600 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
"Nel 2017 questo elenco comprende circa 300 esempi di funzionalità malevole, "
@@ -14010,6 +14020,20 @@
msgstr ""
"<a href=\"/proprietary/malware-microsoft.html\">Malware di Microsoft</a>"
+#, fuzzy
+#~| msgid ""
+#~| "As of April, 2017, the files in this directory list around 300 instances "
+#~| "of malicious functionalities, but there are surely thousands more we "
+#~| "don't know about."
+#~ msgid ""
+#~ "As of March, 2021, the pages in this directory list around 500 instances "
+#~ "of malicious functionalities (with more than 590 references to back them "
+#~ "up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "Nel 2017 questo elenco comprende circa 300 esempi di funzionalità "
+#~ "malevole, ma sicuramente ce ne sono altre migliaia che ancora non "
+#~ "conosciamo."
+
#~ msgid ""
#~ "Please see the <a href=\"/server/standards/README.translations.html"
#~ "\">Translations README</a> for information on coordinating and submitting "
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.323
retrieving revision 1.324
diff -u -b -r1.323 -r1.324
--- ja.po 26 May 2021 09:02:16 -0000 1.323
+++ ja.po 1 Jun 2021 21:31:29 -0000 1.324
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/po/\n"
-"POT-Creation-Date: 2021-05-26 08:55+0000\n"
+"POT-Creation-Date: 2021-06-01 21:25+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -96,6 +96,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-"
+"to-chinese-government-conflicts-with-apples-privacy-first-focus/\">Apple is "
+"moving its Chinese customers' iCloud data to a datacenter controlled by the "
+"Chinese government</a>. Apple is already storing the encryption keys on "
+"these servers, obeying Chinese authority, making all Chinese user data "
+"available to the government."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"<a href=\"https://gizmodo.com/get-ready-for-in-car-ads-1846888390\">Ford is "
"planning to force ads on drivers in cars</a>, with the ability for the owner "
"to pay extra to turn them off. The system probably imposes surveillance on "
@@ -9705,8 +9715,8 @@
#| "instances of malicious functionalities, but there are surely thousands "
#| "more we don't know about."
msgid ""
-"As of March, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 590 references to back them up), "
+"As of June, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 600 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
"2017å¹´1ææç¹ã§ãããã«ã¯ãç´260ã®ç°ãªãæªæã®ããæ©è½ã®å®ä¾ãæ²è¼ããã¦ãã¾"
@@ -11187,6 +11197,19 @@
msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
msgstr "<a
href=\"/proprietary/malware-microsoft.html\">ãã¤ã¯ãã½ãã</a>"
+#, fuzzy
+#~| msgid ""
+#~| "As of January, 2017, the files in this directory list around 260 "
+#~| "instances of malicious functionalities, but there are surely thousands "
+#~| "more we don't know about."
+#~ msgid ""
+#~ "As of March, 2021, the pages in this directory list around 500 instances "
+#~ "of malicious functionalities (with more than 590 references to back them "
+#~ "up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~
"2017å¹´1ææç¹ã§ãããã«ã¯ãç´260ã®ç°ãªãæªæã®ããæ©è½ã®å®ä¾ãæ²è¼ããã¦ã"
+#~
"ã¾ããã確å®ã«ããããã¡ãç¥ããªãä½åãã®ä¾ãããã§ãããã"
+
#~ msgid ""
#~ "Please see the <a href=\"/server/standards/README.translations.html"
#~ "\">Translations README</a> for information on coordinating and submitting "
Index: malware-apple.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de-diff.html,v
retrieving revision 1.71
retrieving revision 1.72
diff -u -b -r1.71 -r1.72
--- malware-apple.de-diff.html 1 Jun 2021 09:43:59 -0000 1.71
+++ malware-apple.de-diff.html 1 Jun 2021 21:31:29 -0000 1.72
@@ -421,8 +421,8 @@
useful and would not be wrong. Requiring users to get
Apple's approval is tyranny. Apple says the check will
only look for malware (not counting the malware that is <a
- href="/proprietary/malware-apple.html#TOC">part</em></ins></span> of
- <span class="inserted"><ins><em>the operating system</a>), but Apple
could change that policy step
+ href="/proprietary/malware-apple.html#TOC">part of
+ the operating system</a>), but Apple could change that policy step
by step. Or perhaps Apple will define malware to include any app
that China does not like.</p>
@@ -442,15 +442,15 @@
<p>Here is an article about the <a
href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/">
- code signing</a> that the</em></ins></span> iThings <span
class="inserted"><ins><em>use to lock up the user.</p>
+ code signing</a> that the iThings use to lock up the user.</p>
<p>Curiously, Apple is beginning to allow limited passage through the
- walls of the iThing jail: users can now install apps built from
+ walls</em></ins></span> of <span class="inserted"><ins><em>the iThing
jail: users can now install apps built from
source code, provided the source code is written in Swift. Users
- cannot do this freely because they are required</em></ins></span> to <span
class="removed"><del><strong>download</strong></del></span> <span
class="inserted"><ins><em>identify
+ cannot do this freely because they are required to identify
themselves. <a href="https://developer.apple.com/xcode/">Here
are details</a>. While this is a crack in the prison walls, it is not
- big enough to mean that the iThings are no longer jails.</p>
+ big enough to mean that the</em></ins></span> iThings <span
class="inserted"><ins><em>are no longer jails.</p>
</li>
</ul>
@@ -465,9 +465,9 @@
putting the squeeze on all business</a> conducted through apps
for iMonsters.</p>
- <p>This is</em></ins></span> a <span
class="inserted"><ins><em>symptom of a very big injustice: that Apple has the
- power to decide what software can be installed on an iMonster.
- That it is a jail.</p>
+ <p>This is a symptom of a very big injustice: that Apple has the
+ power</em></ins></span> to <span
class="removed"><del><strong>download</strong></del></span> <span
class="inserted"><ins><em>decide what software can be installed on an iMonster.
+ That it is</em></ins></span> a <span
class="inserted"><ins><em>jail.</p>
</li>
<li id="M201910100">
@@ -632,12 +632,12 @@
time the developers fixed one “problem”, Apple
complained about another. After the fifth rejection, Apple <a
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">
- admitted it was censoring the app based on the subject
matter</a>.</p></em></ins></span>
+ admitted it was censoring the app based on the subject
matter</a>.</p>
</li>
</ul>
-<h3 <span class="removed"><del><strong>id="pressuring">Apple
Pressuring</h3></strong></del></span> <span
class="inserted"><ins><em>id="manipulation">Manipulation</h3>
+<h3 id="manipulation">Manipulation</h3>
<ul class="blurbs">
<li id="M201308290">
@@ -650,12 +650,12 @@
<p>This allows a company such as Apple to say, “We allow users
to turn this off” while ensuring that few will understand how
- to actually turn it off.</p>
+ to actually turn it off.</p></em></ins></span>
</li>
</ul>
-<h3 id="pressuring">Pressuring</h3></em></ins></span>
+<h3 <span class="removed"><del><strong>id="pressuring">Apple
Pressuring</h3></strong></del></span> <span
class="inserted"><ins><em>id="pressuring">Pressuring</h3></em></ins></span>
<p>Proprietary companies can take advantage of their customers by
imposing arbitrary limits to their use of the software. This section reports
examples of hard sell and other unjust commercial tactics by Apple.</p>
@@ -865,6 +865,17 @@
<h3 id="surveillance">Surveillance</h3>
<ul class="blurbs">
+ <li id="M202105240">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-05</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-to-chinese-government-conflicts-with-apples-privacy-first-focus/">Apple
+ is moving its Chinese customers' iCloud data to a datacenter controlled
+ by the Chinese government</a>. Apple is already storing the
encryption
+ keys on these servers, obeying Chinese authority, making all Chinese
+ user data available to the government.</p>
+ </li>
+
<li id="M202004200">
<!--#set var="DATE" value='<small
class="date-tag">2020-04</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -1336,11 +1347,12 @@
<p>Apple has banned iThing applications that show the confederate
flag.
<a
href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html">
Not only those that use it as a symbol of
racism</a>,</strong></del></span> <span
class="inserted"><ins><em>default</a>. (That article talks about iOS
6,</em></ins></span> but <span class="removed"><del><strong>even
- strategic games that use</strong></del></span> it <span
class="removed"><del><strong>to represent confederate army units
+ strategic games that use it to represent confederate army units
fighting in the Civil War.</p>
<p>This ludicrous rigidity illustrates the point that Apple should
not
be allowed to censor apps. Even if Apple carried out this act of
- censorship with some care, it would still be wrong. Whether
racism</strong></del></span> is <span class="removed"><del><strong>bad, whether
educating people about drone attacks is bad, are not
+ censorship with some care,</strong></del></span> it <span
class="removed"><del><strong>would still be wrong. Whether racism
+ is bad, whether educating people about drone
attacks</strong></del></span> is <span class="removed"><del><strong>bad, are not
the real issue. Apple should not have the power to impose its views
about either of these questions, or any
other.</p></strong></del></span>
<span class="inserted"><ins><em>still true in iOS
7.)</p></em></ins></span>
@@ -1487,7 +1499,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/06/01 09:43:59 $
+$Date: 2021/06/01 21:31:29 $
<!-- timestamp end -->
</p>
</div>
Index: malware-apple.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de.po,v
retrieving revision 1.163
retrieving revision 1.164
diff -u -b -r1.163 -r1.164
--- malware-apple.de.po 31 May 2021 13:39:55 -0000 1.163
+++ malware-apple.de.po 1 Jun 2021 21:31:29 -0000 1.164
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-apple.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-03-09 09:56+0000\n"
+"POT-Creation-Date: 2021-06-01 21:25+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -1413,6 +1413,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-"
+"to-chinese-government-conflicts-with-apples-privacy-first-focus/\">Apple is "
+"moving its Chinese customers' iCloud data to a datacenter controlled by the "
+"Chinese government</a>. Apple is already storing the encryption keys on "
+"these servers, obeying Chinese authority, making all Chinese user data "
+"available to the government."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Apple whistleblower Thomas Le Bonniec reports that Apple made a practice of "
"surreptitiously activating the Siri software to <a href=\"https://www."
"politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB."
Index: malware-apple.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.es.po,v
retrieving revision 1.206
retrieving revision 1.207
diff -u -b -r1.206 -r1.207
--- malware-apple.es.po 30 Apr 2021 09:12:15 -0000 1.206
+++ malware-apple.es.po 1 Jun 2021 21:31:31 -0000 1.207
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-03-09 09:56+0000\n"
+"POT-Creation-Date: 2021-06-01 21:25+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-06-01 21:25+0000\n"
"X-Generator: Poedit 2.2.1\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
@@ -1191,6 +1192,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-"
+"to-chinese-government-conflicts-with-apples-privacy-first-focus/\">Apple is "
+"moving its Chinese customers' iCloud data to a datacenter controlled by the "
+"Chinese government</a>. Apple is already storing the encryption keys on "
+"these servers, obeying Chinese authority, making all Chinese user data "
+"available to the government."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Apple whistleblower Thomas Le Bonniec reports that Apple made a practice of "
"surreptitiously activating the Siri software to <a href=\"https://www."
"politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB."
Index: malware-apple.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.fr.po,v
retrieving revision 1.212
retrieving revision 1.213
diff -u -b -r1.212 -r1.213
--- malware-apple.fr.po 31 May 2021 21:09:18 -0000 1.212
+++ malware-apple.fr.po 1 Jun 2021 21:31:31 -0000 1.213
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-03-09 09:56+0000\n"
+"POT-Creation-Date: 2021-06-01 21:25+0000\n"
"PO-Revision-Date: 2021-03-10 21:40+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-06-01 21:25+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -1192,6 +1193,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-"
+"to-chinese-government-conflicts-with-apples-privacy-first-focus/\">Apple is "
+"moving its Chinese customers' iCloud data to a datacenter controlled by the "
+"Chinese government</a>. Apple is already storing the encryption keys on "
+"these servers, obeying Chinese authority, making all Chinese user data "
+"available to the government."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Apple whistleblower Thomas Le Bonniec reports that Apple made a practice of "
"surreptitiously activating the Siri software to <a href=\"https://www."
"politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB."
Index: malware-apple.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it-diff.html,v
retrieving revision 1.77
retrieving revision 1.78
diff -u -b -r1.77 -r1.78
--- malware-apple.it-diff.html 1 Jun 2021 09:43:59 -0000 1.77
+++ malware-apple.it-diff.html 1 Jun 2021 21:31:31 -0000 1.78
@@ -199,7 +199,7 @@
<li id="M201908150.1">
<!--#set var="DATE" value='<small
class="date-tag">2019-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Apple is putting DRM on iPhone batteries, and the system
proprietary
+ <p>Apple is putting DRM on</em></ins></span> iPhone <span
class="inserted"><ins><em>batteries, and the system proprietary
software <a href="#M201908150">turns off certain features when
batteries
are replaced other than by Apple.</a></p>
</li>
@@ -207,7 +207,7 @@
<li id="M201704070.1">
<!--#set var="DATE" value='<small
class="date-tag">2017-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>DRM makes the</em></ins></span> iPhone <span
class="inserted"><ins><em>7 nearly <a
+ <p>DRM makes the iPhone 7 nearly <a
href="#iphone7-sabotage">unrepairable</a> by anyone else but
Apple.</p>
</li>
@@ -348,16 +348,16 @@
--><!--#echo encoding="none" var="DATE" -->
<p>A vulnerability in Apple's Image I/O API allowed an attacker to
<a
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
- malicious code from any application which uses this API to
render</em></ins></span> a
- <span class="inserted"><ins><em>certain kind of image
file</a>.</p>
+ malicious code from any application which uses this API to render a
+ certain kind of image file</a>.</p>
</li>
<li id="M201604120">
<!--#set var="DATE" value='<small
class="date-tag">2016-04</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>A bug in the iThings Messages app <a
-
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/">allowed
- a malicious web site to extract all the user's messaging
+
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/">allowed</em></ins></span>
+ a <span class="inserted"><ins><em>malicious web site to extract all the
user's messaging
history</a>.</p>
</li>
@@ -420,7 +420,7 @@
by step. Or perhaps Apple will define malware to include any app
that China does not like.</p>
- <p>For free software, this means users will need to get Apple's
+ <p>For free software, this means</em></ins></span> users <span
class="inserted"><ins><em>will need to get Apple's
approval after compilation. This amounts to a system of surveilling
the use of free programs.</p>
</li>
@@ -439,7 +439,7 @@
code signing</a> that the iThings use to lock up the user.</p>
<p>Curiously, Apple is beginning to allow limited passage through the
- walls of the iThing jail:</em></ins></span> users <span
class="inserted"><ins><em>can now install apps built from
+ walls of the iThing jail: users can now install apps built from
source code, provided the source code is written in Swift. Users
cannot do this freely because they</em></ins></span> are <span
class="removed"><del><strong>led into
enabling</strong></del></span> <span class="inserted"><ins><em>required to
identify
@@ -826,22 +826,22 @@
to describe the DRM, but we prefer to use the term <a
<span
class="removed"><del><strong>href="https://gnu.org/philosophy/words-to-avoid.html#DigitalLocks"></strong></del></span>
<span
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#DigitalLocks"></em></ins></span>
digital <span
class="removed"><del><strong>handcuffs</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>handcuffs</a>.)</small></p></em></ins></span>
+ <span
class="inserted"><ins><em>handcuffs</a>.)</small></p>
</li>
-
- <span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201606080">
+ <li id="M201606080">
<!--#set var="DATE" value='<small
class="date-tag">2016-06</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Apple <a
href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/">
stops users from fixing the security bugs in Quicktime for
Windows</a>,
- while refusing to fix them itself.</p>
+ while refusing to fix them itself.</p></em></ins></span>
</li>
- <li id="M201605040">
+
+ <span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201605040">
<!--#set var="DATE" value='<small
class="date-tag">2016-05</small>'
--><!--#echo encoding="none" var="DATE" --></em></ins></span>
<p>The Apple Music client program <a <span
class="removed"><del><strong>href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans</strong></del></span>
@@ -931,6 +931,17 @@
<h3 id="surveillance">Surveillance</h3>
<ul class="blurbs">
+ <li id="M202105240">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-05</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-to-chinese-government-conflicts-with-apples-privacy-first-focus/">Apple
+ is moving its Chinese customers' iCloud data to a datacenter controlled
+ by the Chinese government</a>. Apple is already storing the
encryption
+ keys on these servers, obeying Chinese authority, making all Chinese
+ user data available to the government.</p>
+ </li>
+
<li id="M202004200">
<!--#set var="DATE" value='<small
class="date-tag">2020-04</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -1426,7 +1437,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/06/01 09:43:59 $
+$Date: 2021/06/01 21:31:31 $
<!-- timestamp end -->
</p>
</div>
Index: malware-apple.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it.po,v
retrieving revision 1.156
retrieving revision 1.157
diff -u -b -r1.156 -r1.157
--- malware-apple.it.po 30 Apr 2021 06:36:18 -0000 1.156
+++ malware-apple.it.po 1 Jun 2021 21:31:31 -0000 1.157
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-03-09 09:56+0000\n"
+"POT-Creation-Date: 2021-06-01 21:25+0000\n"
"PO-Revision-Date: 2017-12-31 13:01+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -1405,6 +1405,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-"
+"to-chinese-government-conflicts-with-apples-privacy-first-focus/\">Apple is "
+"moving its Chinese customers' iCloud data to a datacenter controlled by the "
+"Chinese government</a>. Apple is already storing the encryption keys on "
+"these servers, obeying Chinese authority, making all Chinese user data "
+"available to the government."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Apple whistleblower Thomas Le Bonniec reports that Apple made a practice of "
"surreptitiously activating the Siri software to <a href=\"https://www."
"politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB."
Index: malware-apple.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja-diff.html,v
retrieving revision 1.91
retrieving revision 1.92
diff -u -b -r1.91 -r1.92
--- malware-apple.ja-diff.html 1 Jun 2021 09:43:59 -0000 1.91
+++ malware-apple.ja-diff.html 1 Jun 2021 21:31:31 -0000 1.92
@@ -59,8 +59,8 @@
<em>Malware</em> means</strong></del></span> <span
class="inserted"><ins><em>class="infobox">
<hr class="full-width" />
<p>Nonfree (proprietary)</em></ins></span> software <span
class="removed"><del><strong>designed</strong></del></span> <span
class="inserted"><ins><em>is very often malware (designed</em></ins></span> to
<span class="removed"><del><strong>function in ways that</strong></del></span>
-mistreat <span class="removed"><del><strong>or harm the user. (This does not
include accidental errors.)
-This page explains how</strong></del></span> the <span
class="removed"><del><strong>software in Apple's computer products are
+mistreat <span class="removed"><del><strong>or harm</strong></del></span> the
<span class="removed"><del><strong>user. (This does not include accidental
errors.)
+This page explains how the software in Apple's computer products are
malware.
</p>
@@ -473,8 +473,8 @@
useful and would not be wrong. Requiring users to get
Apple's approval is tyranny. Apple says the check will
only look for malware (not counting the malware that is <a
- href="/proprietary/malware-apple.html#TOC">part of
- the operating system</a>), but Apple could change that policy step
+ href="/proprietary/malware-apple.html#TOC">part</em></ins></span> of
+ <span class="inserted"><ins><em>the operating system</a>), but Apple
could change that policy step
by step. Or perhaps Apple will define malware to include any app
that China does not like.</p>
@@ -487,14 +487,14 @@
<!--#set var="DATE" value='<small
class="date-tag">2008-03</small>'
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&oldid=835861046">
- iOS, the operating system</em></ins></span> of <span
class="inserted"><ins><em>the Apple iThings, is the prototype
+ iOS, the operating system of the Apple iThings, is the prototype
of a jail</a>. It was Apple that introduced the practice of
designing general purpose computers with censorship of application
programs.</p>
<p>Here is an article about the <a
href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/">
- code signing</a> that the</em></ins></span> iThings <span
class="inserted"><ins><em>use</em></ins></span> to <span
class="removed"><del><strong>download</strong></del></span> <span
class="inserted"><ins><em>lock up the user.</p>
+ code signing</a> that the iThings use to lock up the user.</p>
<p>Curiously, Apple is beginning to allow limited passage through the
walls of the iThing jail: users can now install apps built from
@@ -502,7 +502,7 @@
cannot do this freely because they are required to identify
themselves. <a href="https://developer.apple.com/xcode/">Here
are details</a>. While this is a crack in the prison walls, it is not
- big enough to mean that the iThings are no longer jails.</p>
+ big enough to mean that the</em></ins></span> iThings <span
class="inserted"><ins><em>are no longer jails.</p>
</li>
</ul>
@@ -517,9 +517,9 @@
putting the squeeze on all business</a> conducted through apps
for iMonsters.</p>
- <p>This is</em></ins></span> a <span
class="inserted"><ins><em>symptom of a very big injustice: that Apple has the
- power to decide what software can be installed on an iMonster.
- That it is a jail.</p>
+ <p>This is a symptom of a very big injustice: that Apple has the
+ power</em></ins></span> to <span
class="removed"><del><strong>download</strong></del></span> <span
class="inserted"><ins><em>decide what software can be installed on an iMonster.
+ That it is</em></ins></span> a <span
class="inserted"><ins><em>jail.</p>
</li>
<li id="M201910100">
@@ -684,12 +684,12 @@
time the developers fixed one “problem”, Apple
complained about another. After the fifth rejection, Apple <a
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">
- admitted it was censoring the app based on the subject
matter</a>.</p>
+ admitted it was censoring the app based on the subject
matter</a>.</p></em></ins></span>
</li>
</ul>
-<h3 id="manipulation">Manipulation</h3>
+<h3 <span class="removed"><del><strong>id="pressuring">Apple
Pressuring</h3></strong></del></span> <span
class="inserted"><ins><em>id="manipulation">Manipulation</h3>
<ul class="blurbs">
<li id="M201308290">
@@ -702,12 +702,12 @@
<p>This allows a company such as Apple to say, “We allow users
to turn this off” while ensuring that few will understand how
- to actually turn it off.</p></em></ins></span>
+ to actually turn it off.</p>
</li>
</ul>
-<h3 <span class="removed"><del><strong>id="pressuring">Apple
Pressuring</h3></strong></del></span> <span
class="inserted"><ins><em>id="pressuring">Pressuring</h3></em></ins></span>
+<h3 id="pressuring">Pressuring</h3></em></ins></span>
<p>Proprietary companies can take advantage of their customers by
imposing arbitrary limits to their use of the software. This section reports
examples of hard sell and other unjust commercial tactics by Apple.</p>
@@ -772,15 +772,15 @@
<p>The <span class="removed"><del><strong>Apple
Music</strong></del></span> <span
class="inserted"><ins><em>Telegram</em></ins></span> client
<span class="removed"><del><strong>program</strong></del></span> <span
class="inserted"><ins><em>is free software on other platforms, but not on
- iThings. Since</em></ins></span> <a <span
class="removed"><del><strong>href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html#apple">they
+ iThings. Since <a
href="/proprietary/proprietary-jails.html#apple">they
are jails</a>, they don't permit any app to be free
software.</p>
</li>
<li id="M201710044">
<!--#set var="DATE" value='<small
class="date-tag">2017-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>MacOS High Sierra forcibly reformats SSD boot drives, and <a
-
href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html">
+ <p>MacOS High Sierra forcibly reformats SSD boot drives,
and</em></ins></span> <a <span
class="removed"><del><strong>href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html">
changes</em></ins></span> the <span
class="removed"><del><strong>user's</strong></del></span> file system <span
class="inserted"><ins><em>from HFS+ to APFS</a>, which cannot be
accessed from GNU/Linux, Windows or even older versions of MacOS.</p>
</li>
@@ -907,6 +907,17 @@
<h3 id="surveillance">Surveillance</h3>
<ul class="blurbs">
+ <li id="M202105240">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-05</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-to-chinese-government-conflicts-with-apples-privacy-first-focus/">Apple
+ is moving its Chinese customers' iCloud data to a datacenter controlled
+ by the Chinese government</a>. Apple is already storing the
encryption
+ keys on these servers, obeying Chinese authority, making all Chinese
+ user data available to the government.</p>
+ </li>
+
<li id="M202004200">
<!--#set var="DATE" value='<small
class="date-tag">2020-04</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -959,8 +970,8 @@
phone, as “superusers.” Downloading and using this
app is mandatory at some workplaces.</p>
- <p>Note: The <a
-
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
+ <p>Note: The</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
Washington Post version of the article</a> (partly obfuscated, but
readable after copy-pasting in a text editor) includes a clarification
saying that the tests were only performed on the Android version
@@ -999,8 +1010,8 @@
<li id="M201711250">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The DMCA and the EU Copyright Directive make it</em></ins></span>
<a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ <p>The DMCA and the EU Copyright Directive make it <a
+ href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
illegal to study how iOS cr…apps spy on users</a>, because
this would require circumventing the iOS DRM.</p>
</li>
@@ -1394,7 +1405,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/06/01 09:43:59 $
+$Date: 2021/06/01 21:31:31 $
<!-- timestamp end -->
</p>
</div>
Index: malware-apple.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja.po,v
retrieving revision 1.139
retrieving revision 1.140
diff -u -b -r1.139 -r1.140
--- malware-apple.ja.po 9 Mar 2021 10:04:56 -0000 1.139
+++ malware-apple.ja.po 1 Jun 2021 21:31:31 -0000 1.140
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-03-09 09:56+0000\n"
+"POT-Creation-Date: 2021-06-01 21:25+0000\n"
"PO-Revision-Date: 2016-12-20 14:42+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -1066,6 +1066,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-"
+"to-chinese-government-conflicts-with-apples-privacy-first-focus/\">Apple is "
+"moving its Chinese customers' iCloud data to a datacenter controlled by the "
+"Chinese government</a>. Apple is already storing the encryption keys on "
+"these servers, obeying Chinese authority, making all Chinese user data "
+"available to the government."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Apple whistleblower Thomas Le Bonniec reports that Apple made a practice of "
"surreptitiously activating the Siri software to <a href=\"https://www."
"politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB."
Index: malware-apple.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl-diff.html,v
retrieving revision 1.95
retrieving revision 1.96
diff -u -b -r1.95 -r1.96
--- malware-apple.nl-diff.html 1 Jun 2021 09:43:59 -0000 1.95
+++ malware-apple.nl-diff.html 1 Jun 2021 21:31:31 -0000 1.96
@@ -59,8 +59,8 @@
<em>Malware</em> means</strong></del></span> <span
class="inserted"><ins><em>class="infobox">
<hr class="full-width" />
<p>Nonfree (proprietary)</em></ins></span> software <span
class="removed"><del><strong>designed</strong></del></span> <span
class="inserted"><ins><em>is very often malware (designed</em></ins></span> to
<span class="removed"><del><strong>function in ways that</strong></del></span>
-mistreat <span class="removed"><del><strong>or harm the user. (This does not
include accidental errors.)
-This page explains how</strong></del></span> the <span
class="removed"><del><strong>software in Apple's computer products are
+mistreat <span class="removed"><del><strong>or harm</strong></del></span> the
<span class="removed"><del><strong>user. (This does not include accidental
errors.)
+This page explains how the software in Apple's computer products are
malware.
</p>
@@ -473,8 +473,8 @@
useful and would not be wrong. Requiring users to get
Apple's approval is tyranny. Apple says the check will
only look for malware (not counting the malware that is <a
- href="/proprietary/malware-apple.html#TOC">part of
- the operating system</a>), but Apple could change that policy step
+ href="/proprietary/malware-apple.html#TOC">part</em></ins></span> of
+ <span class="inserted"><ins><em>the operating system</a>), but Apple
could change that policy step
by step. Or perhaps Apple will define malware to include any app
that China does not like.</p>
@@ -487,14 +487,14 @@
<!--#set var="DATE" value='<small
class="date-tag">2008-03</small>'
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&oldid=835861046">
- iOS, the operating system</em></ins></span> of <span
class="inserted"><ins><em>the Apple iThings, is the prototype
+ iOS, the operating system of the Apple iThings, is the prototype
of a jail</a>. It was Apple that introduced the practice of
designing general purpose computers with censorship of application
programs.</p>
<p>Here is an article about the <a
href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/">
- code signing</a> that the</em></ins></span> iThings <span
class="inserted"><ins><em>use</em></ins></span> to <span
class="removed"><del><strong>download</strong></del></span> <span
class="inserted"><ins><em>lock up the user.</p>
+ code signing</a> that the iThings use to lock up the user.</p>
<p>Curiously, Apple is beginning to allow limited passage through the
walls of the iThing jail: users can now install apps built from
@@ -502,7 +502,7 @@
cannot do this freely because they are required to identify
themselves. <a href="https://developer.apple.com/xcode/">Here
are details</a>. While this is a crack in the prison walls, it is not
- big enough to mean that the iThings are no longer jails.</p>
+ big enough to mean that the</em></ins></span> iThings <span
class="inserted"><ins><em>are no longer jails.</p>
</li>
</ul>
@@ -517,9 +517,9 @@
putting the squeeze on all business</a> conducted through apps
for iMonsters.</p>
- <p>This is</em></ins></span> a <span
class="inserted"><ins><em>symptom of a very big injustice: that Apple has the
- power to decide what software can be installed on an iMonster.
- That it is a jail.</p>
+ <p>This is a symptom of a very big injustice: that Apple has the
+ power</em></ins></span> to <span
class="removed"><del><strong>download</strong></del></span> <span
class="inserted"><ins><em>decide what software can be installed on an iMonster.
+ That it is</em></ins></span> a <span
class="inserted"><ins><em>jail.</p>
</li>
<li id="M201910100">
@@ -684,12 +684,12 @@
time the developers fixed one “problem”, Apple
complained about another. After the fifth rejection, Apple <a
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">
- admitted it was censoring the app based on the subject
matter</a>.</p>
+ admitted it was censoring the app based on the subject
matter</a>.</p></em></ins></span>
</li>
</ul>
-<h3 id="manipulation">Manipulation</h3>
+<h3 <span class="removed"><del><strong>id="pressuring">Apple
Pressuring</h3></strong></del></span> <span
class="inserted"><ins><em>id="manipulation">Manipulation</h3>
<ul class="blurbs">
<li id="M201308290">
@@ -702,12 +702,12 @@
<p>This allows a company such as Apple to say, “We allow users
to turn this off” while ensuring that few will understand how
- to actually turn it off.</p></em></ins></span>
+ to actually turn it off.</p>
</li>
</ul>
-<h3 <span class="removed"><del><strong>id="pressuring">Apple
Pressuring</h3></strong></del></span> <span
class="inserted"><ins><em>id="pressuring">Pressuring</h3></em></ins></span>
+<h3 id="pressuring">Pressuring</h3></em></ins></span>
<p>Proprietary companies can take advantage of their customers by
imposing arbitrary limits to their use of the software. This section reports
examples of hard sell and other unjust commercial tactics by Apple.</p>
@@ -772,15 +772,15 @@
<p>The <span class="removed"><del><strong>Apple
Music</strong></del></span> <span
class="inserted"><ins><em>Telegram</em></ins></span> client
<span class="removed"><del><strong>program</strong></del></span> <span
class="inserted"><ins><em>is free software on other platforms, but not on
- iThings. Since</em></ins></span> <a <span
class="removed"><del><strong>href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html#apple">they
+ iThings. Since <a
href="/proprietary/proprietary-jails.html#apple">they
are jails</a>, they don't permit any app to be free
software.</p>
</li>
<li id="M201710044">
<!--#set var="DATE" value='<small
class="date-tag">2017-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>MacOS High Sierra forcibly reformats SSD boot drives, and <a
-
href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html">
+ <p>MacOS High Sierra forcibly reformats SSD boot drives,
and</em></ins></span> <a <span
class="removed"><del><strong>href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html">
changes</em></ins></span> the <span
class="removed"><del><strong>user's</strong></del></span> file system <span
class="inserted"><ins><em>from HFS+ to APFS</a>, which cannot be
accessed from GNU/Linux, Windows or even older versions of MacOS.</p>
</li>
@@ -907,6 +907,17 @@
<h3 id="surveillance">Surveillance</h3>
<ul class="blurbs">
+ <li id="M202105240">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-05</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-to-chinese-government-conflicts-with-apples-privacy-first-focus/">Apple
+ is moving its Chinese customers' iCloud data to a datacenter controlled
+ by the Chinese government</a>. Apple is already storing the
encryption
+ keys on these servers, obeying Chinese authority, making all Chinese
+ user data available to the government.</p>
+ </li>
+
<li id="M202004200">
<!--#set var="DATE" value='<small
class="date-tag">2020-04</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -959,8 +970,8 @@
phone, as “superusers.” Downloading and using this
app is mandatory at some workplaces.</p>
- <p>Note: The <a
-
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
+ <p>Note: The</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
Washington Post version of the article</a> (partly obfuscated, but
readable after copy-pasting in a text editor) includes a clarification
saying that the tests were only performed on the Android version
@@ -999,8 +1010,8 @@
<li id="M201711250">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The DMCA and the EU Copyright Directive make it</em></ins></span>
<a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ <p>The DMCA and the EU Copyright Directive make it <a
+ href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
illegal to study how iOS cr…apps spy on users</a>, because
this would require circumventing the iOS DRM.</p>
</li>
@@ -1394,7 +1405,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/06/01 09:43:59 $
+$Date: 2021/06/01 21:31:31 $
<!-- timestamp end -->
</p>
</div>
Index: malware-apple.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl.po,v
retrieving revision 1.93
retrieving revision 1.94
diff -u -b -r1.93 -r1.94
--- malware-apple.nl.po 9 Mar 2021 10:04:56 -0000 1.93
+++ malware-apple.nl.po 1 Jun 2021 21:31:31 -0000 1.94
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-03-09 09:56+0000\n"
+"POT-Creation-Date: 2021-06-01 21:25+0000\n"
"PO-Revision-Date: 2017-01-10 22:15+0100\n"
"Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
"Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -1059,6 +1059,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-"
+"to-chinese-government-conflicts-with-apples-privacy-first-focus/\">Apple is "
+"moving its Chinese customers' iCloud data to a datacenter controlled by the "
+"Chinese government</a>. Apple is already storing the encryption keys on "
+"these servers, obeying Chinese authority, making all Chinese user data "
+"available to the government."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Apple whistleblower Thomas Le Bonniec reports that Apple made a practice of "
"surreptitiously activating the Siri software to <a href=\"https://www."
"politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB."
Index: malware-apple.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.pot,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -b -r1.103 -r1.104
--- malware-apple.pot 9 Mar 2021 10:04:56 -0000 1.103
+++ malware-apple.pot 1 Jun 2021 21:31:31 -0000 1.104
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-03-09 09:56+0000\n"
+"POT-Creation-Date: 2021-06-01 21:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -848,6 +848,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a "
+"href=\"https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-to-chinese-government-conflicts-with-apples-privacy-first-focus/\">Apple
"
+"is moving its Chinese customers' iCloud data to a datacenter controlled by "
+"the Chinese government</a>. Apple is already storing the encryption keys on "
+"these servers, obeying Chinese authority, making all Chinese user data "
+"available to the government."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Apple whistleblower Thomas Le Bonniec reports that Apple made a practice of "
"surreptitiously activating the Siri software to <a "
"href=\"https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf\">
"
Index: malware-apple.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ru.po,v
retrieving revision 1.261
retrieving revision 1.262
diff -u -b -r1.261 -r1.262
--- malware-apple.ru.po 1 Jun 2021 15:27:22 -0000 1.261
+++ malware-apple.ru.po 1 Jun 2021 21:31:31 -0000 1.262
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-03-09 09:56+0000\n"
+"POT-Creation-Date: 2021-06-01 21:25+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-06-01 21:25+0000\n"
#. type: Content of: <title>
msgid ""
@@ -1185,6 +1186,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-"
+"to-chinese-government-conflicts-with-apples-privacy-first-focus/\">Apple is "
+"moving its Chinese customers' iCloud data to a datacenter controlled by the "
+"Chinese government</a>. Apple is already storing the encryption keys on "
+"these servers, obeying Chinese authority, making all Chinese user data "
+"available to the government."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Apple whistleblower Thomas Le Bonniec reports that Apple made a practice of "
"surreptitiously activating the Siri software to <a href=\"https://www."
"politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB."
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.316
retrieving revision 1.317
diff -u -b -r1.316 -r1.317
--- nl.po 26 May 2021 09:02:16 -0000 1.316
+++ nl.po 1 Jun 2021 21:31:31 -0000 1.317
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-05-26 08:55+0000\n"
+"POT-Creation-Date: 2021-06-01 21:25+0000\n"
"PO-Revision-Date: 2017-01-10 22:15+0100\n"
"Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
"Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -113,6 +113,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-"
+"to-chinese-government-conflicts-with-apples-privacy-first-focus/\">Apple is "
+"moving its Chinese customers' iCloud data to a datacenter controlled by the "
+"Chinese government</a>. Apple is already storing the encryption keys on "
+"these servers, obeying Chinese authority, making all Chinese user data "
+"available to the government."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"<a href=\"https://gizmodo.com/get-ready-for-in-car-ads-1846888390\">Ford is "
"planning to force ads on drivers in cars</a>, with the ability for the owner "
"to pay extra to turn them off. The system probably imposes surveillance on "
@@ -8883,9 +8893,9 @@
"je meestal belazerd."
#. type: Content of: <div><p>
-# | As of [-April, 2019,-] {+March, 2021,+} the [-files-] {+pages+} in this
+# | As of [-April, 2019,-] {+June, 2021,+} the [-files-] {+pages+} in this
# | directory list around [-4-]{+5+}00 instances of malicious
-# | [-functionalities,-] {+functionalities (with more than 590 references to
+# | [-functionalities,-] {+functionalities (with more than 600 references to
# | back them up),+} but there are surely thousands more we don't know about.
#, fuzzy
#| msgid ""
@@ -8893,8 +8903,8 @@
#| "of malicious functionalities, but there are surely thousands more we "
#| "don't know about."
msgid ""
-"As of March, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 590 references to back them up), "
+"As of June, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 600 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
"Anno april 2019 staan er in dit overzicht ongeveer 400 gevallen van "
@@ -10454,6 +10464,20 @@
msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
msgstr "<a href=\"/proprietary/malware-microsoft.html\">Microsoft-malware</a>"
+#, fuzzy
+#~| msgid ""
+#~| "As of April, 2019, the files in this directory list around 400 instances "
+#~| "of malicious functionalities, but there are surely thousands more we "
+#~| "don't know about."
+#~ msgid ""
+#~ "As of March, 2021, the pages in this directory list around 500 instances "
+#~ "of malicious functionalities (with more than 590 references to back them "
+#~ "up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "Anno april 2019 staan er in dit overzicht ongeveer 400 gevallen van "
+#~ "kwaadaardige functionaliteit, maar er zijn zeker weten duizenden andere "
+#~ "gevallen waar we niks van weten."
+
#~ msgid ""
#~ "Please see the <a href=\"/server/standards/README.translations.html"
#~ "\">Translations README</a> for information on coordinating and submitting "
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.315
retrieving revision 1.316
diff -u -b -r1.315 -r1.316
--- pl.po 26 May 2021 09:02:16 -0000 1.315
+++ pl.po 1 Jun 2021 21:31:31 -0000 1.316
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-05-26 08:55+0000\n"
+"POT-Creation-Date: 2021-06-01 21:25+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -96,6 +96,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-"
+"to-chinese-government-conflicts-with-apples-privacy-first-focus/\">Apple is "
+"moving its Chinese customers' iCloud data to a datacenter controlled by the "
+"Chinese government</a>. Apple is already storing the encryption keys on "
+"these servers, obeying Chinese authority, making all Chinese user data "
+"available to the government."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"<a href=\"https://gizmodo.com/get-ready-for-in-car-ads-1846888390\">Ford is "
"planning to force ads on drivers in cars</a>, with the ability for the owner "
"to pay extra to turn them off. The system probably imposes surveillance on "
@@ -8314,8 +8324,8 @@
#. type: Content of: <div><p>
msgid ""
-"As of March, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 590 references to back them up), "
+"As of June, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 600 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.314
retrieving revision 1.315
diff -u -b -r1.314 -r1.315
--- pot 26 May 2021 09:02:16 -0000 1.314
+++ pot 1 Jun 2021 21:31:31 -0000 1.315
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/po/\n"
-"POT-Creation-Date: 2021-05-26 08:55+0000\n"
+"POT-Creation-Date: 2021-06-01 21:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -76,6 +76,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-"
+"to-chinese-government-conflicts-with-apples-privacy-first-focus/\">Apple is "
+"moving its Chinese customers' iCloud data to a datacenter controlled by the "
+"Chinese government</a>. Apple is already storing the encryption keys on "
+"these servers, obeying Chinese authority, making all Chinese user data "
+"available to the government."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"<a href=\"https://gizmodo.com/get-ready-for-in-car-ads-1846888390\">Ford is "
"planning to force ads on drivers in cars</a>, with the ability for the owner "
"to pay extra to turn them off. The system probably imposes surveillance on "
@@ -7842,8 +7852,8 @@
#. type: Content of: <div><p>
msgid ""
-"As of March, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 590 references to back them up), "
+"As of June, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 600 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
Index: proprietary-insecurity.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de-diff.html,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- proprietary-insecurity.de-diff.html 1 Jun 2021 09:44:01 -0000 1.76
+++ proprietary-insecurity.de-diff.html 1 Jun 2021 21:31:31 -0000 1.77
@@ -97,6 +97,17 @@
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
+ <li id="M202105240">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-05</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-to-chinese-government-conflicts-with-apples-privacy-first-focus/">Apple
+ is moving its Chinese customers' iCloud data to a datacenter controlled
+ by the Chinese government</a>. Apple is already storing the
encryption
+ keys on these servers, obeying Chinese authority, making all Chinese
+ user data available to the government.</p>
+ </li>
+
<li id="M202105040">
<!--#set var="DATE" value='<small
class="date-tag">2021-05</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -281,8 +292,11 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C">
- A disasterous security bug</a> touches millions of products in the
- Internet of Stings.</p>
+ A disasterous security bug</a> touches millions of products
in</em></ins></span> the <span class="removed"><del><strong>specifics.</p>
+
+<ul>
+<li></strong></del></span>
+ <span class="inserted"><ins><em>Internet of Stings.</p>
<p>As a result, anyone can sting the user, not only the
manufacturer.</p>
@@ -406,10 +420,7 @@
<!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The Ring (now Amazon) doorbell camera is designed so that the
- manufacturer (now Amazon) can watch all</em></ins></span> the <span
class="removed"><del><strong>specifics.</p>
-
-<ul>
-<li></strong></del></span> <span class="inserted"><ins><em>time. Now it
turns out
+ manufacturer (now Amazon) can watch all the time. Now it turns out
that <a
href="https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
anyone else can also watch, and fake videos too</a>.</p>
@@ -613,16 +624,16 @@
enables malware authors to capture keystrokes without taking the risk
of being classified as malicious task by AV
<span class="removed"><del><strong>heuristics”.
- </p>
-</li>
-<li>
+ </p></strong></del></span> <span
class="inserted"><ins><em>heuristics”.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong><li>
<p>The proprietary code that runs pacemakers, insulin pumps, and other
medical devices is <a
href="http://www.bbc.co.uk/news/technology-40042584">
-full of gross security faults</a>.</p></strong></del></span> <span
class="inserted"><ins><em>heuristics”.</p></em></ins></span>
- </li>
+full of gross security faults</a>.</p>
+</li>
-<span class="removed"><del><strong><li></strong></del></span>
+<li></strong></del></span>
<span class="inserted"><ins><em><li id="M201705120">
<!--#set var="DATE" value='<small
class="date-tag">2017-05</small>'
@@ -1027,19 +1038,19 @@
can't trust it. Western Digital's “My Passport” drives <a
<span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">have</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.vice.com/en/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">
have</em></ins></span> a back <span
class="removed"><del><strong>door</a>.
-</p>
-</li>
+</p></strong></del></span> <span
class="inserted"><ins><em>door</a>.</p></em></ins></span>
+ </li>
-<li>
+<span class="removed"><del><strong><li>
<p>
Mac OS X had an
<a
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
intentional local back door for 4 years</a>, which could be
exploited by attackers to gain root privileges.
-</p></strong></del></span> <span
class="inserted"><ins><em>door</a>.</p></em></ins></span>
- </li>
+</p>
+</li>
-<span class="removed"><del><strong><li></strong></del></span>
+<li></strong></del></span>
<span class="inserted"><ins><em><li id="M201508120">
<!--#set var="DATE" value='<small
class="date-tag">2015-08</small>'
@@ -1160,8 +1171,8 @@
<li>
<p><a
href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html">
-The FTC punished a company</strong></del></span> for <span
class="removed"><del><strong>making webcams with bad security so
-that it was easy for anyone to watch them</a>.
+The FTC punished a company for making webcams with bad security so
+that it was easy</strong></del></span> for <span
class="removed"><del><strong>anyone to watch them</a>.
</p>
</li>
@@ -1424,7 +1435,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/06/01 09:44:01 $
+$Date: 2021/06/01 21:31:31 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.175
retrieving revision 1.176
diff -u -b -r1.175 -r1.176
--- proprietary-insecurity.de.po 31 May 2021 13:39:55 -0000 1.175
+++ proprietary-insecurity.de.po 1 Jun 2021 21:31:31 -0000 1.176
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-05-17 21:25+0000\n"
+"POT-Creation-Date: 2021-06-01 21:25+0000\n"
"PO-Revision-Date: 2018-08-29 02:41+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -165,6 +165,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-"
+"to-chinese-government-conflicts-with-apples-privacy-first-focus/\">Apple is "
+"moving its Chinese customers' iCloud data to a datacenter controlled by the "
+"Chinese government</a>. Apple is already storing the encryption keys on "
+"these servers, obeying Chinese authority, making all Chinese user data "
+"available to the government."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"A motorcycle company named Klim is selling airbag vests with different "
"payment methods, one of them is through a <a href=\"https://www.vice.com/en/"
"article/93yyyd/this-motorcycle-airbag-vest-will-stop-working-if-you-miss-a-"
Index: proprietary-insecurity.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.es.po,v
retrieving revision 1.97
retrieving revision 1.98
diff -u -b -r1.97 -r1.98
--- proprietary-insecurity.es.po 1 Jun 2021 15:27:22 -0000 1.97
+++ proprietary-insecurity.es.po 1 Jun 2021 21:31:31 -0000 1.98
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-05-17 21:25+0000\n"
+"POT-Creation-Date: 2021-06-01 21:25+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: \n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-06-01 21:25+0000\n"
"X-Generator: Poedit 2.2.1\n"
#. type: Content of: <title>
@@ -125,6 +126,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-"
+"to-chinese-government-conflicts-with-apples-privacy-first-focus/\">Apple is "
+"moving its Chinese customers' iCloud data to a datacenter controlled by the "
+"Chinese government</a>. Apple is already storing the encryption keys on "
+"these servers, obeying Chinese authority, making all Chinese user data "
+"available to the government."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"A motorcycle company named Klim is selling airbag vests with different "
"payment methods, one of them is through a <a href=\"https://www.vice.com/en/"
"article/93yyyd/this-motorcycle-airbag-vest-will-stop-working-if-you-miss-a-"
Index: proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.252
retrieving revision 1.253
diff -u -b -r1.252 -r1.253
--- proprietary-insecurity.fr.po 31 May 2021 21:09:19 -0000 1.252
+++ proprietary-insecurity.fr.po 1 Jun 2021 21:31:31 -0000 1.253
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-05-17 21:25+0000\n"
+"POT-Creation-Date: 2021-06-01 21:25+0000\n"
"PO-Revision-Date: 2021-05-19 22:07+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-06-01 21:25+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -125,6 +126,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-"
+"to-chinese-government-conflicts-with-apples-privacy-first-focus/\">Apple is "
+"moving its Chinese customers' iCloud data to a datacenter controlled by the "
+"Chinese government</a>. Apple is already storing the encryption keys on "
+"these servers, obeying Chinese authority, making all Chinese user data "
+"available to the government."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"A motorcycle company named Klim is selling airbag vests with different "
"payment methods, one of them is through a <a href=\"https://www.vice.com/en/"
"article/93yyyd/this-motorcycle-airbag-vest-will-stop-working-if-you-miss-a-"
Index: proprietary-insecurity.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it-diff.html,v
retrieving revision 1.90
retrieving revision 1.91
diff -u -b -r1.90 -r1.91
--- proprietary-insecurity.it-diff.html 1 Jun 2021 09:44:01 -0000 1.90
+++ proprietary-insecurity.it-diff.html 1 Jun 2021 21:31:31 -0000 1.91
@@ -88,6 +88,17 @@
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
+ <li id="M202105240">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-05</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-to-chinese-government-conflicts-with-apples-privacy-first-focus/">Apple
+ is moving its Chinese customers' iCloud data to a datacenter controlled
+ by the Chinese government</a>. Apple is already storing the
encryption
+ keys on these servers, obeying Chinese authority, making all Chinese
+ user data available to the government.</p>
+ </li>
+
<li id="M202105040">
<!--#set var="DATE" value='<small
class="date-tag">2021-05</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -111,7 +122,7 @@
<p>What creates the opportunity to try this is the fact that these
companies are already snooping on users' private activities. That
- in turn is due to people's use</em></ins></span> of <span
class="inserted"><ins><em>nonfree software which snoops,
+ in turn is due to people's use of nonfree software which snoops,
and online dis-services which snoop.</p>
</li>
@@ -123,7 +134,7 @@
be used to launch remote code execution (RCE) attacks</a> has been
disclosed by researchers. The researchers demonstrated a three-bug
attack chain that caused an RCE on a target machine, all this without
- any form of user interaction.</p>
+ any form</em></ins></span> of <span class="inserted"><ins><em>user
interaction.</p>
</li>
<li id="M202103090">
@@ -202,9 +213,9 @@
A Zoom executive carried out snooping and censorship for
China</a>.</p>
- <p>This abuse of Zoom's power shows how dangerous</em></ins></span>
that <span class="inserted"><ins><em>power is. The
+ <p>This abuse of Zoom's power shows how dangerous that power is. The
root problem is not the surveillance and censorship, but rather the
- power that Zoom has. It gets that power partly from the use of its
+ power that Zoom has. It gets</em></ins></span> that <span
class="inserted"><ins><em>power partly from the use of its
server, but also partly from the nonfree client program.</p>
</li>
@@ -588,16 +599,16 @@
enables malware authors to capture keystrokes without taking the risk
of being classified as malicious task by AV
<span class="removed"><del><strong>heuristics”.
- </p>
-</li>
-<li>
+ </p></strong></del></span> <span
class="inserted"><ins><em>heuristics”.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong><li>
<p>The proprietary code that runs pacemakers, insulin pumps, and other
medical devices is <a
href="http://www.bbc.co.uk/news/technology-40042584">
-full of gross security faults</a>.</p></strong></del></span> <span
class="inserted"><ins><em>heuristics”.</p></em></ins></span>
- </li>
+full of gross security faults</a>.</p>
+</li>
-<span class="removed"><del><strong><li></strong></del></span>
+<li></strong></del></span>
<span class="inserted"><ins><em><li id="M201705120">
<!--#set var="DATE" value='<small
class="date-tag">2017-05</small>'
@@ -1002,19 +1013,19 @@
can't trust it. Western Digital's “My Passport” drives <a
<span
class="removed"><del><strong>href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">have</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.vice.com/en/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">
have</em></ins></span> a back <span
class="removed"><del><strong>door</a>.
-</p></strong></del></span> <span
class="inserted"><ins><em>door</a>.</p></em></ins></span>
- </li>
+</p>
+</li>
-<span class="removed"><del><strong><li>
+<li>
<p>
Mac OS X had an
<a
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
intentional local back door for 4 years</a>, which could be
exploited by attackers to gain root privileges.
-</p>
-</li>
+</p></strong></del></span> <span
class="inserted"><ins><em>door</a>.</p></em></ins></span>
+ </li>
-<li></strong></del></span>
+<span class="removed"><del><strong><li></strong></del></span>
<span class="inserted"><ins><em><li id="M201508120">
<!--#set var="DATE" value='<small
class="date-tag">2015-08</small>'
@@ -1092,17 +1103,17 @@
<p>Depending</em></ins></span> on what drug is being infused, the
insecurity could open
the door to <span class="removed"><del><strong>murder.
-</p>
-</li>
+</p></strong></del></span> <span
class="inserted"><ins><em>murder.</p></em></ins></span>
+ </li>
-<li>
+<span class="removed"><del><strong><li>
<p>
Due to bad security in a drug pump, crackers could use it to
<a
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/">kill
patients</a>.
-</p></strong></del></span> <span
class="inserted"><ins><em>murder.</p></em></ins></span>
- </li>
+</p>
+</li>
-<span class="removed"><del><strong><li>
+<li>
<p></strong></del></span>
<span class="inserted"><ins><em><li id="M201504090">
@@ -1193,20 +1204,20 @@
from the state. Quite the contrary: confiding your data to someone
else's server, if not first encrypted by you with free software,
undermines your <span class="removed"><del><strong>rights.
-</p></strong></del></span> <span
class="inserted"><ins><em>rights.</p></em></ins></span>
+</p></strong></del></span> <span
class="inserted"><ins><em>rights.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201404250">
+ <li id="M201404250">
<!--#set var="DATE" value='<small
class="date-tag">2014-04</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Lots of <a
href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">
- hospital equipment has lousy security</a>, and it can be
fatal.</p>
+ hospital equipment has lousy security</a>, and it can be
fatal.</p></em></ins></span>
</li>
- <li id="M201402210">
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201402210">
<!--#set var="DATE" value='<small
class="date-tag">2014-02</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The <a
@@ -1399,7 +1410,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/06/01 09:44:01 $
+$Date: 2021/06/01 21:31:31 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.192
retrieving revision 1.193
diff -u -b -r1.192 -r1.193
--- proprietary-insecurity.it.po 17 May 2021 21:30:40 -0000 1.192
+++ proprietary-insecurity.it.po 1 Jun 2021 21:31:32 -0000 1.193
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-05-17 21:25+0000\n"
+"POT-Creation-Date: 2021-06-01 21:25+0000\n"
"PO-Revision-Date: 2017-12-31 13:13+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -155,6 +155,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-"
+"to-chinese-government-conflicts-with-apples-privacy-first-focus/\">Apple is "
+"moving its Chinese customers' iCloud data to a datacenter controlled by the "
+"Chinese government</a>. Apple is already storing the encryption keys on "
+"these servers, obeying Chinese authority, making all Chinese user data "
+"available to the government."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"A motorcycle company named Klim is selling airbag vests with different "
"payment methods, one of them is through a <a href=\"https://www.vice.com/en/"
"article/93yyyd/this-motorcycle-airbag-vest-will-stop-working-if-you-miss-a-"
Index: proprietary-insecurity.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja-diff.html,v
retrieving revision 1.110
retrieving revision 1.111
diff -u -b -r1.110 -r1.111
--- proprietary-insecurity.ja-diff.html 1 Jun 2021 09:44:01 -0000 1.110
+++ proprietary-insecurity.ja-diff.html 1 Jun 2021 21:31:32 -0000 1.111
@@ -88,6 +88,17 @@
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
+ <li id="M202105240">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-05</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-to-chinese-government-conflicts-with-apples-privacy-first-focus/">Apple
+ is moving its Chinese customers' iCloud data to a datacenter controlled
+ by the Chinese government</a>. Apple is already storing the
encryption
+ keys on these servers, obeying Chinese authority, making all Chinese
+ user data available to the government.</p>
+ </li>
+
<li id="M202105040">
<!--#set var="DATE" value='<small
class="date-tag">2021-05</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -294,9 +305,9 @@
<li id="M202004150">
<!--#set var="DATE" value='<small
class="date-tag">2020-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Riot Games' new anti-cheat is malware; <a
+ <p>Riot Games' new anti-cheat</em></ins></span> is <span
class="inserted"><ins><em>malware; <a
href="https://www.extremetech.com/gaming/309320-riot-games-new-anti-cheat-system-runs-at-system-boot-uses-kernel-driver">runs
- on system boot at kernel level</a> on Windows. It</em></ins></span>
is <span class="inserted"><ins><em>insecure software
+ on system boot at kernel level</a> on Windows. It is insecure
software
that increases the attack surface of the operating system.</p>
</li>
@@ -404,7 +415,7 @@
manufacturer (now Amazon) can watch all the time. Now it turns out
that <a
href="https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
- anyone else can also watch,</em></ins></span> and <span
class="removed"><del><strong><em>the</strong></del></span> <span
class="inserted"><ins><em>fake videos too</a>.</p>
+ anyone else can also watch, and fake videos too</a>.</p>
<p>The third party vulnerability is presumably
unintentional and Amazon will probably fix it. However, we
@@ -425,8 +436,8 @@
<li id="M201808120">
<!--#set var="DATE" value='<small
class="date-tag">2018-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Crackers found a way to break the security of an Amazon device,
- and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
+ <p>Crackers found a way to break the security of an Amazon
device,</em></ins></span>
+ and <span class="removed"><del><strong><em>the</strong></del></span>
<span class="inserted"><ins><em><a
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
turn it into a listening device</a> for them.</p>
<p>It was very difficult for them to do this. The job would be much
@@ -1326,7 +1337,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/06/01 09:44:01 $
+$Date: 2021/06/01 21:31:32 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja.po,v
retrieving revision 1.164
retrieving revision 1.165
diff -u -b -r1.164 -r1.165
--- proprietary-insecurity.ja.po 17 May 2021 21:30:40 -0000 1.164
+++ proprietary-insecurity.ja.po 1 Jun 2021 21:31:32 -0000 1.165
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-05-17 21:25+0000\n"
+"POT-Creation-Date: 2021-06-01 21:25+0000\n"
"PO-Revision-Date: 2016-10-31 12:56+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -131,6 +131,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-"
+"to-chinese-government-conflicts-with-apples-privacy-first-focus/\">Apple is "
+"moving its Chinese customers' iCloud data to a datacenter controlled by the "
+"Chinese government</a>. Apple is already storing the encryption keys on "
+"these servers, obeying Chinese authority, making all Chinese user data "
+"available to the government."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"A motorcycle company named Klim is selling airbag vests with different "
"payment methods, one of them is through a <a href=\"https://www.vice.com/en/"
"article/93yyyd/this-motorcycle-airbag-vest-will-stop-working-if-you-miss-a-"
Index: proprietary-insecurity.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pot,v
retrieving revision 1.130
retrieving revision 1.131
diff -u -b -r1.130 -r1.131
--- proprietary-insecurity.pot 17 May 2021 21:30:40 -0000 1.130
+++ proprietary-insecurity.pot 1 Jun 2021 21:31:32 -0000 1.131
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-05-17 21:25+0000\n"
+"POT-Creation-Date: 2021-06-01 21:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -96,6 +96,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a "
+"href=\"https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-to-chinese-government-conflicts-with-apples-privacy-first-focus/\">Apple
"
+"is moving its Chinese customers' iCloud data to a datacenter controlled by "
+"the Chinese government</a>. Apple is already storing the encryption keys on "
+"these servers, obeying Chinese authority, making all Chinese user data "
+"available to the government."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"A motorcycle company named Klim is selling airbag vests with different "
"payment methods, one of them is through a <a "
"href=\"https://www.vice.com/en/article/93yyyd/this-motorcycle-airbag-vest-will-stop-working-if-you-miss-a-payment\">proprietary
"
Index: proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.297
retrieving revision 1.298
diff -u -b -r1.297 -r1.298
--- proprietary-insecurity.ru.po 1 Jun 2021 15:27:22 -0000 1.297
+++ proprietary-insecurity.ru.po 1 Jun 2021 21:31:32 -0000 1.298
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-05-17 21:25+0000\n"
+"POT-Creation-Date: 2021-06-01 21:25+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-06-01 21:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -121,6 +122,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-"
+"to-chinese-government-conflicts-with-apples-privacy-first-focus/\">Apple is "
+"moving its Chinese customers' iCloud data to a datacenter controlled by the "
+"Chinese government</a>. Apple is already storing the encryption keys on "
+"these servers, obeying Chinese authority, making all Chinese user data "
+"available to the government."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"A motorcycle company named Klim is selling airbag vests with different "
"payment methods, one of them is through a <a href=\"https://www.vice.com/en/"
"article/93yyyd/this-motorcycle-airbag-vest-will-stop-working-if-you-miss-a-"
Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.203
retrieving revision 1.204
diff -u -b -r1.203 -r1.204
--- proprietary-surveillance.de-diff.html 1 Jun 2021 09:44:01 -0000
1.203
+++ proprietary-surveillance.de-diff.html 1 Jun 2021 21:31:32 -0000
1.204
@@ -843,14 +843,20 @@
<p>Portable phones with GPS</em></ins></span> <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
will send their GPS location</em></ins></span> on <span
class="removed"><del><strong>users</a>.</p>
- <p>With free software apps,</strong></del></span> <span
class="inserted"><ins><em>remote command, and</em></ins></span> users <span
class="removed"><del><strong>could <em>make sure</em> that they
don't snoop.</p>
- <p>With proprietary apps, one can only hope that they
don't.</p></strong></del></span> <span class="inserted"><ins><em>cannot
stop
- them</a>. (The US says it will eventually require all new portable
phones
- to have GPS.)</p></em></ins></span>
+ <p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
+ <p>With proprietary apps, one can only hope that they don't.</p>
+</li>
+
+<li>
+ <p>A study found 234 Android apps that track</strong></del></span>
<span class="inserted"><ins><em>remote command, and</em></ins></span> users
<span class="removed"><del><strong>by
+ <a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening</strong></del></span>
<span class="inserted"><ins><em>cannot stop
+ them</a>. (The US says it will eventually require all new portable
phones</em></ins></span>
+ to <span class="removed"><del><strong>ultrasound from beacons placed in
stores or played by TV programs</a>.
+ </p></strong></del></span> <span class="inserted"><ins><em>have
GPS.)</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
- <p>A study found 234 Android apps that track users
by</strong></del></span>
+ <p>Pairs of Android apps can collude</strong></del></span>
<span class="inserted"><ins><em></ul>
@@ -860,118 +866,127 @@
</div>
<ul class="blurbs">
- <li id="M202009183">
- <!--#set var="DATE" value='<small
class="date-tag">2020-09</small>'
+ <li id="M202105240">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Facebook</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed in stores or
played</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html">snoops
- on Instagram</a> users</em></ins></span> by <span
class="removed"><del><strong>TV programs</a>.
- </p></strong></del></span> <span
class="inserted"><ins><em>surreptitously turning on the device's
- camera.</p></em></ins></span>
+ <p><a
+
href="https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-to-chinese-government-conflicts-with-apples-privacy-first-focus/">Apple
+ is moving its Chinese customers' iCloud data</em></ins></span> to <span
class="removed"><del><strong>transmit users' personal</strong></del></span>
<span class="inserted"><ins><em>a datacenter controlled
+ by the Chinese government</a>. Apple is already storing the
encryption
+ keys on these servers, obeying Chinese authority, making all Chinese
+ user</em></ins></span> data <span
class="inserted"><ins><em>available</em></ins></span> to <span
class="removed"><del><strong>servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
+ tens of thousands of pairs that
collude</a>.</p></strong></del></span> <span
class="inserted"><ins><em>the government.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
- <p>Pairs</strong></del></span>
+<p>Google Play intentionally sends app developers</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M202009183">
+ <!--#set var="DATE" value='<small
class="date-tag">2020-09</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Facebook</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
+the personal details of</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html">snoops
+ on Instagram</a></em></ins></span> users <span
class="removed"><del><strong>that install the app</a>.</p>
+
+<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>by surreptitously turning on</em></ins></span> the
<span class="removed"><del><strong>“consent”</strong></del></span>
<span class="inserted"><ins><em>device's
+ camera.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M202004200">
+ <li id="M202004200">
<!--#set var="DATE" value='<small
class="date-tag">2020-04</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Apple whistleblower Thomas Le Bonniec reports that Apple
- made a practice</em></ins></span> of <span
class="removed"><del><strong>Android apps can collude</strong></del></span>
<span class="inserted"><ins><em>surreptitiously activating the Siri
software</em></ins></span> to <span
class="removed"><del><strong>transmit</strong></del></span> <span
class="inserted"><ins><em><a
+ made a practice</em></ins></span> of <span
class="removed"><del><strong>users is not enough
+to legitimize actions like this. At this point, most users have
+stopped reading</strong></del></span> <span
class="inserted"><ins><em>surreptitiously activating</em></ins></span> the
<span class="removed"><del><strong>“Terms and Conditions” that
spell out
+what</strong></del></span> <span class="inserted"><ins><em>Siri software to
<a
href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf">
- record</em></ins></span> users' <span class="removed"><del><strong>personal
- data</strong></del></span> <span
class="inserted"><ins><em>conversations when they had not activated
Siri</a>.
- This was not just occasional, it was systematic practice.</p>
+ record users' conversations when</em></ins></span> they <span
class="removed"><del><strong>are “consenting” to. Google should
clearly
+and honestly identify the information it collects on users, instead
+of hiding</strong></del></span> <span class="inserted"><ins><em>had not
activated Siri</a>.
+ This was not just occasional,</em></ins></span> it <span
class="inserted"><ins><em>was systematic practice.</p>
- <p>His job was</em></ins></span> to <span
class="removed"><del><strong>servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
- tens of thousands of pairs that collude</a>.</p>
+ <p>His job was to listen to these recordings,</em></ins></span> in
<span class="removed"><del><strong>an obscurely worded EULA.</p>
+
+<p>However,</strong></del></span> <span class="inserted"><ins><em>a
group that made
+ transcripts of them. He does not believes that Apple has ceased this
+ practice.</p>
+
+ <p>The only reliable way</em></ins></span> to <span
class="removed"><del><strong>truly protect people's privacy, we
must</strong></del></span> prevent <span class="removed"><del><strong>Google
+and other companies from getting</strong></del></span> this <span
class="removed"><del><strong>personal information in the first
+place!</p>
</li>
-<li>
-<p>Google Play intentionally sends app developers <a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
-the personal details of users</strong></del></span> <span
class="inserted"><ins><em>listen to these recordings, in a
group</em></ins></span> that <span class="removed"><del><strong>install the
app</a>.</p>
+ <li>
+ <p>Google Play (a component of Android) <a
+
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ tracks</strong></del></span> <span class="inserted"><ins><em>is,
for</em></ins></span> the <span class="removed"><del><strong>users' movements
without their permission</a>.</p>
-<p>Merely asking the “consent”</strong></del></span> <span
class="inserted"><ins><em>made
- transcripts</em></ins></span> of <span class="removed"><del><strong>users
is</strong></del></span> <span class="inserted"><ins><em>them. He
does</em></ins></span> not <span
class="removed"><del><strong>enough</strong></del></span> <span
class="inserted"><ins><em>believes that Apple has ceased this
- practice.</p>
+ <p>Even if you disable Google Maps and location tracking, you must
+ disable Google Play itself</strong></del></span> <span
class="inserted"><ins><em>program that
+ controls access</em></ins></span> to <span
class="removed"><del><strong>completely stop</strong></del></span> the <span
class="removed"><del><strong>tracking. This is
+ yet another example of nonfree software pretending</strong></del></span>
<span class="inserted"><ins><em>microphone</em></ins></span> to <span
class="removed"><del><strong>obey the user,</strong></del></span> <span
class="inserted"><ins><em>decide</em></ins></span> when <span
class="removed"><del><strong>it's actually doing something else. Such a thing
would</strong></del></span> <span class="inserted"><ins><em>the user has
+ “activated” any service, to</em></ins></span> be <span
class="removed"><del><strong>almost
+ unthinkable with</strong></del></span> free <span
class="removed"><del><strong>software.</p>
- <p>The only reliable way</em></ins></span> to <span
class="removed"><del><strong>legitimize actions like this.
At</strong></del></span> <span
class="inserted"><ins><em>prevent</em></ins></span> this <span
class="removed"><del><strong>point, most users have
-stopped reading</strong></del></span> <span class="inserted"><ins><em>is,
for</em></ins></span> the <span class="removed"><del><strong>“Terms and
Conditions”</strong></del></span> <span
class="inserted"><ins><em>program</em></ins></span> that <span
class="removed"><del><strong>spell out
-what they are “consenting” to. Google should clearly
-and honestly identify</strong></del></span>
- <span class="inserted"><ins><em>controls access to</em></ins></span> the
<span class="removed"><del><strong>information it collects on users, instead
-of hiding it in an obscurely worded EULA.</p>
-
-<p>However,</strong></del></span> <span
class="inserted"><ins><em>microphone</em></ins></span> to <span
class="removed"><del><strong>truly protect people's privacy, we must prevent
Google</strong></del></span> <span class="inserted"><ins><em>decide when the
user has
- “activated” any service, to be free
software,</em></ins></span> and <span class="removed"><del><strong>other
companies from getting this personal information in</strong></del></span> the
<span class="removed"><del><strong>first
-place!</p></strong></del></span>
- <span class="inserted"><ins><em>operating system under it free as well.
This way, users could make
- sure Apple can't listen to them.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li>
- <p>Google Play (a component of Android)</strong></del></span>
+ <li><p>More than 73% of the most popular Android apps
+ <a href="http://jots.pub/a/2015103001/index.php">share personal,
+ behavioral</strong></del></span> <span
class="inserted"><ins><em>software,</em></ins></span> and <span
class="removed"><del><strong>location information</a> of
their</strong></del></span> <span class="inserted"><ins><em>the
+ operating system under it free as well. This way,</em></ins></span> users
<span class="removed"><del><strong>with third parties.</p>
+ </li>
+
+ <li><p>“Cryptic communication,”
unrelated</strong></del></span> <span class="inserted"><ins><em>could make
+ sure Apple can't listen</em></ins></span> to <span
class="removed"><del><strong>the app's functionality,
+ was</strong></del></span> <span class="inserted"><ins><em>them.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201910131">
+ <li id="M201910131">
<!--#set var="DATE" value='<small
class="date-tag">2019-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Safari occasionally</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks the users' movements without their permission</a>.</p>
-
- <p>Even if you disable Google Maps and location tracking, you must
- disable Google Play itself</strong></del></span>
+ <p>Safari occasionally</em></ins></span> <a <span
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found</strong></del></span>
<span
class="inserted"><ins><em>href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">
- sends browsing data from Apple devices in China</em></ins></span> to <span
class="removed"><del><strong>completely stop</strong></del></span> the <span
class="removed"><del><strong>tracking. This is
- yet another example of nonfree software pretending</strong></del></span>
<span class="inserted"><ins><em>Tencent Safe
- Browsing service</a>,</em></ins></span> to <span
class="removed"><del><strong>obey the user,
- when it's actually doing something else. Such a thing would be almost
- unthinkable</strong></del></span> <span class="inserted"><ins><em>check
URLs that possibly correspond to
- “fraudulent” websites. Since Tencent
collaborates</em></ins></span>
- with <span class="removed"><del><strong>free software.</p>
+ sends browsing data from Apple devices</em></ins></span> in <span
class="inserted"><ins><em>China to</em></ins></span> the <span
class="removed"><del><strong>500 most popular gratis Android
apps</a>.</p>
- </li>
-
- <li><p>More than 73% of</strong></del></span> the <span
class="inserted"><ins><em>Chinese government, its Safe Browsing black
list</em></ins></span> most <span class="removed"><del><strong>popular Android
apps
- <a href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral and location information</a></strong></del></span> <span
class="inserted"><ins><em>certainly
- contains the websites</em></ins></span> of <span
class="inserted"><ins><em>political opponents. By linking the requests
+ <p>The article should not have described these apps as
+ “free”—they are not free software. The clear
way</strong></del></span> <span class="inserted"><ins><em>Tencent Safe
+ Browsing service</a>,</em></ins></span> to <span
class="removed"><del><strong>say
+ “zero price” is “gratis.”</p>
+
+ <p>The article takes for granted</strong></del></span> <span
class="inserted"><ins><em>check URLs</em></ins></span> that <span
class="inserted"><ins><em>possibly correspond to
+ “fraudulent” websites. Since Tencent collaborates
+ with</em></ins></span> the <span class="removed"><del><strong>usual
analytics tools are
+ legitimate, but is that valid? Software developers have no
right</strong></del></span> <span class="inserted"><ins><em>Chinese government,
its Safe Browsing black list most certainly
+ contains the websites of political opponents. By linking the requests
originating from single IP addresses, the government can identify
- dissenters in China and Hong Kong, thus endangering</em></ins></span>
their <span class="removed"><del><strong>users with third
parties.</p></strong></del></span> <span
class="inserted"><ins><em>lives.</p></em></ins></span>
+ dissenters in China and Hong Kong, thus endangering their lives.</p>
</li>
- <span class="removed"><del><strong><li><p>“Cryptic
communication,” unrelated</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201905280">
+ <li id="M201905280">
<!--#set var="DATE" value='<small
class="date-tag">2019-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>In spite of Apple's supposed commitment</em></ins></span> to
<span class="removed"><del><strong>the app's functionality,
- was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in the 500 most popular gratis Android apps</a>.</p>
-
- <p>The article should not have described these</strong></del></span>
- <span class="inserted"><ins><em>privacy, iPhone</em></ins></span> apps
<span class="removed"><del><strong>as
- “free”—they</strong></del></span> <span
class="inserted"><ins><em>contain trackers that</em></ins></span> are <span
class="removed"><del><strong>not free software. The clear
way</strong></del></span> <span class="inserted"><ins><em>busy at night <a
-
href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html">
- sending users' personal information</em></ins></span> to <span
class="removed"><del><strong>say
- “zero price” is
“gratis.”</p></strong></del></span> <span
class="inserted"><ins><em>third parties</a>.</p></em></ins></span>
+ <p>In spite of Apple's supposed commitment</em></ins></span> to
+ <span class="removed"><del><strong>analyze what users are doing or how.
“Analytics” tools</strong></del></span>
+ <span class="inserted"><ins><em>privacy, iPhone apps contain
trackers</em></ins></span> that <span
class="removed"><del><strong>snoop</strong></del></span> are
+ <span class="removed"><del><strong>just as wrong as any other
snooping.</p>
+ </li>
+ <li><p>Gratis Android apps (but not</strong></del></span> <span
class="inserted"><ins><em>busy at night</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-sw.html">free
software</a>)
+ connect</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html">
+ sending users' personal information</em></ins></span> to <span
class="removed"><del><strong>100
+ <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
<span class="inserted"><ins><em>third parties</a>.</p>
- <p>The article <span class="removed"><del><strong>takes for granted
that the usual analytics tools are
- legitimate, but</strong></del></span> <span
class="inserted"><ins><em>mentions specific examples: Microsoft OneDrive,
+ <p>The article mentions specific examples: Microsoft OneDrive,
Intuit's Mint, Nike, Spotify, The Washington Post, The Weather
- Channel (owned by IBM), the crime-alert service Citizen, Yelp
- and DoorDash. But it</em></ins></span> is <span
class="inserted"><ins><em>likely</em></ins></span> that <span
class="removed"><del><strong>valid? Software developers have no right to
- analyze what users are doing or how. “Analytics” tools that
snoop are
- just as wrong as any other snooping.</p>
- </li>
- <li><p>Gratis Android</strong></del></span> <span
class="inserted"><ins><em>most nonfree</em></ins></span> apps <span
class="removed"><del><strong>(but not <a
href="/philosophy/free-sw.html">free software</a>)
- connect to 100
- <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
and advertising</a> URLs,
+ Channel (owned by IBM), the crime-alert service Citizen,
Yelp</em></ins></span>
+ and <span class="removed"><del><strong>advertising</a> URLs,
on the average.</p>
</li>
- <li><p>Spyware is present in some Android devices when they are
sold.</strong></del></span> <span class="inserted"><ins><em>contain
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>DoorDash. But it</em></ins></span> is <span
class="removed"><del><strong>present in some Android devices when they are
sold.</strong></del></span> <span class="inserted"><ins><em>likely that most
nonfree apps contain
trackers.</em></ins></span> Some <span
class="removed"><del><strong>Motorola phones modify Android to
<a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"></strong></del></span>
<span class="inserted"><ins><em>of these</em></ins></span> send <span
class="removed"><del><strong>personal</strong></del></span> <span
class="inserted"><ins><em>personally identifying</em></ins></span> data <span
class="removed"><del><strong>to Motorola</a>.</p>
</li>
@@ -1685,171 +1700,158 @@
<p>Note: The <a
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
- Washington Post version of</em></ins></span> the <span
class="removed"><del><strong>pictures are likely to be
- sent across</strong></del></span> <span
class="inserted"><ins><em>article</a> (partly obfuscated, but
+ Washington Post version of</em></ins></span> the <span
class="removed"><del><strong>pictures are likely</strong></del></span> <span
class="inserted"><ins><em>article</a> (partly obfuscated, but
readable after copy-pasting in a text editor) includes a clarification
- saying that</em></ins></span> the <span class="removed"><del><strong>wire
to Facebook's servers and face-recognition
- algorithms.</p>
-
- <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>tests were only performed on the Android
version</em></ins></span>
- of <span class="removed"><del><strong>Facebook users' pictures are private
- anymore, even if</strong></del></span> the <span
class="removed"><del><strong>user didn't “upload”
them</strong></del></span> <span class="inserted"><ins><em>app, and that,
according</em></ins></span> to <span class="removed"><del><strong>the
service.</p>
- </li>
-
- <li><p>Like most “music screaming” disservices,
Spotify
- is based</strong></del></span> <span class="inserted"><ins><em>Apple,
“this kind of
- ‘superuser’ surveillance could not be
conducted</em></ins></span> on <span class="removed"><del><strong>proprietary
malware (DRM and snooping). In August
- 2015 it</strong></del></span>
- <span class="inserted"><ins><em>Apple's operating system.”</p>
+ saying that the tests were only performed on the Android version
+ of the app, and that, according</em></ins></span> to <span
class="inserted"><ins><em>Apple, “this kind of
+ ‘superuser’ surveillance could not</em></ins></span> be
+ <span class="removed"><del><strong>sent across</strong></del></span>
<span class="inserted"><ins><em>conducted on
+ Apple's operating system.”</p>
</li>
<li id="M201909091">
<!--#set var="DATE" value='<small
class="date-tag">2019-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Facebook app</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded</strong></del></span>
- <span
class="inserted"><ins><em>href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">
- tracks</em></ins></span> users <span class="removed"><del><strong>submit
to increased snooping</a>, and some
- are starting to realize that</strong></del></span> <span
class="inserted"><ins><em>even when</em></ins></span> it is <span
class="removed"><del><strong>nasty.</p>
-
- <p>This article shows</strong></del></span> <span
class="inserted"><ins><em>turned off</a>, after tricking them
- into giving</em></ins></span> the <span class="inserted"><ins><em>app
broad permissions in order to use one of its
+ <p>The Facebook app <a
+
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">
+ tracks users even when it is turned off</a>, after tricking them
+ into giving</em></ins></span> the <span
class="removed"><del><strong>wire</strong></del></span> <span
class="inserted"><ins><em>app broad permissions in order</em></ins></span> to
<span class="removed"><del><strong>Facebook's servers</strong></del></span>
<span class="inserted"><ins><em>use one of its
functionalities.</p>
</li>
<li id="M201909090">
<!--#set var="DATE" value='<small
class="date-tag">2019-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Some nonfree period-tracking apps including MIA Fem and
Maya</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping as a way</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem">
- send intimate details of users' lives</em></ins></span> to <span
class="removed"><del><strong>“serve” users
better</a>—never mind
- whether they want that. This</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p>
+ <p>Some nonfree period-tracking apps including MIA
Fem</em></ins></span> and <span class="removed"><del><strong>face-recognition
+ algorithms.</p>
+
+ <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>Maya <a
+
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem">
+ send intimate details</em></ins></span> of <span
class="removed"><del><strong>Facebook</strong></del></span> users' <span
class="removed"><del><strong>pictures are private
+ anymore, even if the user didn't “upload”
them</strong></del></span> <span
class="inserted"><ins><em>lives</em></ins></span> to <span
class="removed"><del><strong>the service.</p></strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p></em></ins></span>
</li>
- <li id="M201909060">
+ <span class="removed"><del><strong><li><p>Like most “music
screaming” disservices, Spotify</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201909060">
<!--#set var="DATE" value='<small
class="date-tag">2019-09</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Keeping track of who downloads a proprietary
- program</em></ins></span> is a <span class="removed"><del><strong>typical
example</strong></del></span> <span
class="inserted"><ins><em>form</em></ins></span> of <span
class="inserted"><ins><em>surveillance. There is a
- proprietary program for adjusting a certain telescopic rifle sight. <a
-
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/">
- A US prosecutor has demanded</em></ins></span> the <span
class="removed"><del><strong>attitude</strong></del></span> <span
class="inserted"><ins><em>list</em></ins></span> of <span
class="inserted"><ins><em>all</em></ins></span> the <span
class="removed"><del><strong>proprietary software industry towards
- those they</strong></del></span> <span class="inserted"><ins><em>10,000
or more people
- who</em></ins></span> have <span
class="removed"><del><strong>subjugated.</p>
-
- <p>Out, out, damned Spotify!</p>
- </li>
- <li><p>Many proprietary apps for mobile devices report which
other
- apps the user</strong></del></span> <span
class="inserted"><ins><em>installed it</a>.</p>
+ program</em></ins></span> is <span class="removed"><del><strong>based
on</strong></del></span> <span class="inserted"><ins><em>a form of
surveillance. There is a</em></ins></span>
+ proprietary <span class="removed"><del><strong>malware (DRM and snooping).
In August
+ 2015 it</strong></del></span> <span class="inserted"><ins><em>program
for adjusting a certain telescopic rifle sight.</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/">
+ A US prosecutor has</em></ins></span> demanded <span
class="removed"><del><strong>users submit</strong></del></span> <span
class="inserted"><ins><em>the list of all the 10,000 or more people
+ who have installed it</a>.</p>
- <p>With a free program there would not be a list of
who</em></ins></span> has
- <span class="removed"><del><strong>installed.</strong></del></span> <span
class="inserted"><ins><em>installed
+ <p>With a free program there would not be a list of who has installed
it.</p>
</li>
<li id="M201907081">
<!--#set var="DATE" value='<small
class="date-tag">2019-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Many unscrupulous mobile-app developers keep finding ways
to</em></ins></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this in a way that at least is visible</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
- bypass user's settings</a>, regulations,</em></ins></span> and
- <span class="removed"><del><strong>optional</a>.
Not</strong></del></span> <span class="inserted"><ins><em>privacy-enhancing
features
- of the operating system, in order to gather</em></ins></span> as <span
class="removed"><del><strong>bad</strong></del></span> <span
class="inserted"><ins><em>much private data</em></ins></span> as <span
class="removed"><del><strong>what</strong></del></span>
- <span class="inserted"><ins><em>they possibly can.</p>
+ <p>Many unscrupulous mobile-app developers keep finding
ways</em></ins></span> to <span class="removed"><del><strong>increased
snooping</a>,</strong></del></span> <span class="inserted"><ins><em><a
+
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
+ bypass user's settings</a>, regulations,</em></ins></span> and <span
class="removed"><del><strong>some
+ are starting to realize that it is nasty.</p>
+
+ <p>This article shows</strong></del></span> <span
class="inserted"><ins><em>privacy-enhancing features
+ of</em></ins></span> the <span class="removed"><del><strong><a
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways that they present snooping as a way</strong></del></span>
<span class="inserted"><ins><em>operating system, in order</em></ins></span> to
<span class="removed"><del><strong>“serve” users
better</a>—never mind
+ whether</strong></del></span> <span class="inserted"><ins><em>gather as
much private data as</em></ins></span>
+ they <span class="removed"><del><strong>want that.
This</strong></del></span> <span class="inserted"><ins><em>possibly
can.</p>
+
+ <p>Thus, we can't trust rules against spying. What we can
trust</em></ins></span> is <span class="removed"><del><strong>a typical example
of
+ the attitude of</strong></del></span>
+ <span class="inserted"><ins><em>having control over</em></ins></span> the
<span class="removed"><del><strong>proprietary</strong></del></span> software
<span class="removed"><del><strong>industry towards
+ those they have subjugated.</p>
- <p>Thus, we can't trust rules against spying. What we can trust is
- having control over</em></ins></span> the <span
class="removed"><del><strong>others do.</p></strong></del></span> <span
class="inserted"><ins><em>software we run.</p></em></ins></span>
+ <p>Out, out, damned Spotify!</p></strong></del></span> <span
class="inserted"><ins><em>we run.</p></em></ins></span>
</li>
-
- <span class="removed"><del><strong><li><p>FTC says most
mobile</strong></del></span>
+ <span class="removed"><del><strong><li><p>Many proprietary apps
for mobile devices report which other</strong></del></span>
<span class="inserted"><ins><em><li id="M201907080">
<!--#set var="DATE" value='<small
class="date-tag">2019-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Many Android</em></ins></span> apps <span
class="removed"><del><strong>for children don't respect
privacy:</strong></del></span> <span class="inserted"><ins><em>can track
- users' movements even when the user says</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
+ <p>Many Android</em></ins></span> apps <span
class="inserted"><ins><em>can track
+ users' movements even when</em></ins></span> the user <span
class="removed"><del><strong>has
+ installed.</strong></del></span> <span
class="inserted"><ins><em>says</em></ins></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing this</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
not to allow them access to locations</a>.</p>
- <p>This involves an apparently unintentional weakness in Android,
+ <p>This involves an apparently unintentional
weakness</em></ins></span> in <span class="removed"><del><strong>a way that at
least is visible and
+ optional</a>. Not as bad as what the others
do.</p></strong></del></span> <span class="inserted"><ins><em>Android,
exploited intentionally by malicious apps.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
+ <span class="removed"><del><strong><li><p>FTC says most mobile
apps for children don't respect privacy:</strong></del></span>
<span class="inserted"><ins><em><li id="M201905300">
<!--#set var="DATE" value='<small
class="date-tag">2019-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Femm “fertility” app is secretly
a</em></ins></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop</strong></del></span>
+ <p>The Femm “fertility” app is secretly
a</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
tool for propaganda</a> by natalist Christians. It spreads distrust
for contraception.</p>
- <p>It snoops</em></ins></span> on <span
class="removed"><del><strong>the user</a>. This is in
addition</strong></del></span> <span class="inserted"><ins><em>users, too, as
you must expect from nonfree
- programs.</p>
+ <p>It snoops on users, too, as you must expect from nonfree
+ programs.</p></em></ins></span>
</li>
- <li id="M201905060">
+ <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201905060">
<!--#set var="DATE" value='<small
class="date-tag">2019-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>BlizzCon 2019 imposed a <a
-
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
- requirement</em></ins></span> to
- <span class="removed"><del><strong>the snooping done by
the</strong></del></span> <span class="inserted"><ins><em>run a
proprietary</em></ins></span> phone <span class="removed"><del><strong>company,
and perhaps by the OS in the
- phone.</p>
-
- <p>Don't</strong></del></span> <span
class="inserted"><ins><em>app</a> to</em></ins></span> be <span
class="removed"><del><strong>distracted by the question of
whether</strong></del></span> <span class="inserted"><ins><em>allowed
into</em></ins></span>
- the <span class="inserted"><ins><em>event.</p>
-
- <p>This</em></ins></span> app <span
class="removed"><del><strong>developers get
- users to say “I agree”. That</strong></del></span> is <span
class="removed"><del><strong>no excuse for malware.</p>
- </li>
-
- <li><p>The Brightest Flashlight app
- <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user</strong></del></span> <span class="inserted"><ins><em>a
spyware that can snoop on a lot of
- sensitive</em></ins></span> data, including <span
class="removed"><del><strong>geolocation, for use by
companies.</a></p>
+ <p>BlizzCon 2019 imposed a</em></ins></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
+ requirement to run a proprietary phone app</a> to be allowed into
+ the event.</p>
- <p>The FTC criticized this app because it
asked</strong></del></span> <span class="inserted"><ins><em>user's location and
contact list, and has <a
+ <p>This app is a spyware that can</em></ins></span> snoop on <span
class="inserted"><ins><em>a lot of
+ sensitive data, including user's location and contact list, and has <a
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
- near-complete control</a> over</em></ins></span> the <span
class="removed"><del><strong>user to
- approve sending personal data</strong></del></span> <span
class="inserted"><ins><em>phone.</p>
+ near-complete control</a> over</em></ins></span> the <span
class="removed"><del><strong>user</a>. This</strong></del></span> <span
class="inserted"><ins><em>phone.</p>
</li>
<li id="M201904131">
<!--#set var="DATE" value='<small
class="date-tag">2019-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Data collected by menstrual and pregnancy monitoring apps is
often <a
+ <p>Data collected by menstrual and pregnancy monitoring
apps</em></ins></span> is <span class="removed"><del><strong>in
addition</strong></del></span> <span class="inserted"><ins><em>often <a
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
- available</em></ins></span> to <span class="inserted"><ins><em>employers
and insurance companies</a>. Even though</em></ins></span> the <span
class="removed"><del><strong>app developer but did not
- ask about sending</strong></del></span>
- <span class="inserted"><ins><em>data is “anonymized and
aggregated,”</em></ins></span> it <span class="inserted"><ins><em>can
easily be
- traced back</em></ins></span> to <span class="removed"><del><strong>other
companies. This shows</strong></del></span> the
- <span class="removed"><del><strong>weakness of</strong></del></span>
<span class="inserted"><ins><em>woman who uses</em></ins></span> the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
- “solution”</strong></del></span> <span
class="inserted"><ins><em>app.</p>
-
- <p>This has harmful implications for women's
rights</em></ins></span> to <span class="removed"><del><strong>surveillance:
why should</strong></del></span> <span class="inserted"><ins><em>equal
employment
- and freedom to make their own pregnancy choices. Don't use
- these apps, even if someone offers you</em></ins></span> a <span
class="removed"><del><strong>flashlight
- app send any information</strong></del></span> <span
class="inserted"><ins><em>reward</em></ins></span> to <span
class="removed"><del><strong>anyone?</strong></del></span> <span
class="inserted"><ins><em>do so.</em></ins></span> A <span
class="removed"><del><strong>free software flashlight</strong></del></span>
- <span class="inserted"><ins><em>free-software</em></ins></span> app <span
class="removed"><del><strong>would not.</p></strong></del></span> <span
class="inserted"><ins><em>that does more or less the same thing without
+ available</em></ins></span> to
+ <span class="removed"><del><strong>the snooping done by the phone
company,</strong></del></span> <span
class="inserted"><ins><em>employers</em></ins></span> and <span
class="removed"><del><strong>perhaps by the OS in</strong></del></span> <span
class="inserted"><ins><em>insurance companies</a>. Even
though</em></ins></span> the
+ <span class="removed"><del><strong>phone.</p>
+
+ <p>Don't</strong></del></span>
+ <span class="inserted"><ins><em>data is “anonymized and
aggregated,” it can easily</em></ins></span> be <span
class="removed"><del><strong>distracted by</strong></del></span>
+ <span class="inserted"><ins><em>traced back to</em></ins></span> the <span
class="removed"><del><strong>question of whether</strong></del></span> <span
class="inserted"><ins><em>woman who uses</em></ins></span> the <span
class="removed"><del><strong>app developers get
+ users to say “I agree”. That is no excuse for
malware.</p>
+ </li>
+
+ <li><p>The Brightest Flashlight app
+ <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation,</strong></del></span> <span
class="inserted"><ins><em>app.</p>
+
+ <p>This has harmful implications</em></ins></span> for <span
class="inserted"><ins><em>women's rights to equal employment
+ and freedom to make their own pregnancy choices. Don't</em></ins></span>
use <span class="removed"><del><strong>by companies.</a></p>
+
+ <p>The FTC criticized this</strong></del></span>
+ <span class="inserted"><ins><em>these apps, even if someone offers you a
reward to do so. A
+ free-software</em></ins></span> app <span
class="removed"><del><strong>because it asked</strong></del></span> <span
class="inserted"><ins><em>that does more or less</em></ins></span> the <span
class="removed"><del><strong>user</strong></del></span> <span
class="inserted"><ins><em>same thing without
spying on you is available from <a
href="https://search.f-droid.org/?q=menstr">F-Droid</a>, and <a
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f">
- a new one is being developed</a>.</p></em></ins></span>
+ a new one is being developed</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInToys">Spyware</strong></del></span>
- <span class="inserted"><ins><em><li id="M201904130">
+ <li id="M201904130">
<!--#set var="DATE" value='<small
class="date-tag">2019-04</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Google tracks the movements of Android phones and iPhones
@@ -1857,142 +1859,152 @@
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
saves the data for years</a>.</p>
- <p>Nonfree software</em></ins></span> in <span
class="removed"><del><strong>Toys</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
-</div>
-
-<ul>
-
- <li>
- <p>A remote-control sex toy was found</strong></del></span> <span
class="inserted"><ins><em>the phone has</em></ins></span> to <span
class="removed"><del><strong>make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings
- of</strong></del></span> <span class="inserted"><ins><em>be
responsible for sending</em></ins></span>
- the <span class="removed"><del><strong>conversation between two
users</a>.</p></strong></del></span> <span
class="inserted"><ins><em>location data to Google.</p></em></ins></span>
+ <p>Nonfree software in the phone has</em></ins></span> to
+ <span class="removed"><del><strong>approve</strong></del></span> <span
class="inserted"><ins><em>be responsible for</em></ins></span> sending <span
class="removed"><del><strong>personal</strong></del></span>
+ <span class="inserted"><ins><em>the location</em></ins></span> data to
<span class="inserted"><ins><em>Google.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>The “smart” toys My Friend Cayla and i-Que
transmit</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201903251">
+ <li id="M201903251">
<!--#set var="DATE" value='<small
class="date-tag">2019-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Many Android phones come with a huge number of</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</strong></del></span>
- <span
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
- preinstalled nonfree apps that have access</em></ins></span> to <span
class="removed"><del><strong>Nuance Communications</a>,
- a speech recognition company based</strong></del></span> <span
class="inserted"><ins><em>sensitive data without
- users' knowledge</a>. These hidden apps may either call home with
- the data, or pass it on to user-installed apps that have access to
- the network but no direct access to the data. This
results</em></ins></span> in <span class="inserted"><ins><em>massive
- surveillance on which</em></ins></span> the <span
class="removed"><del><strong>U.S.</p>
-
- <p>Those toys also contain major security vulnerabilities;
crackers</strong></del></span> <span class="inserted"><ins><em>user has
absolutely no control.</p>
+ <p>Many Android phones come with a huge number of <a
+
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
+ preinstalled nonfree apps that have access to sensitive data without
+ users' knowledge</a>. These hidden apps may either call home
with</em></ins></span>
+ the <span class="removed"><del><strong>app developer but did not
+ ask about sending</strong></del></span> <span
class="inserted"><ins><em>data, or pass</em></ins></span> it <span
class="inserted"><ins><em>on</em></ins></span> to <span
class="removed"><del><strong>other companies.</strong></del></span> <span
class="inserted"><ins><em>user-installed apps that have access to
+ the network but no direct access to the data.</em></ins></span> This <span
class="removed"><del><strong>shows</strong></del></span> <span
class="inserted"><ins><em>results in massive
+ surveillance on which</em></ins></span> the
+ <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>user has absolutely no control.</p>
</li>
<li id="M201903201">
<!--#set var="DATE" value='<small
class="date-tag">2019-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A study of 24 “health” apps found that 19 of them
<a
-
href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
- send sensitive personal data to third parties</a>,
which</em></ins></span> can <span class="removed"><del><strong>remotely control
the toys with</strong></del></span> <span class="inserted"><ins><em>use it
- for invasive advertising or discriminating against people in poor
+ <p>A study</em></ins></span> of <span
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
+ “solution” to surveillance: why should a flashlight
+ app</strong></del></span> <span class="inserted"><ins><em>24
“health” apps found that 19 of them <a
+
href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"></em></ins></span>
+ send <span class="removed"><del><strong>any
information</strong></del></span> <span class="inserted"><ins><em>sensitive
personal data</em></ins></span> to <span class="removed"><del><strong>anyone?
A free software flashlight
+ app would not.</p>
+ </li>
+</ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInToys">Spyware</strong></del></span> <span
class="inserted"><ins><em>third parties</a>, which can use it
+ for invasive advertising or discriminating against
people</em></ins></span> in <span class="removed"><del><strong>Toys</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
+</div>
+
+<ul>
+
+ <li>
+ <p>A remote-control sex toy was found</strong></del></span> <span
class="inserted"><ins><em>poor
medical condition.</p>
<p>Whenever user “consent” is sought, it is buried in
- lengthy terms of service that are difficult to understand. In any case,
+ lengthy terms of service that are difficult</em></ins></span> to <span
class="removed"><del><strong>make</strong></del></span> <span
class="inserted"><ins><em>understand. In any case,
“consent” is not sufficient to legitimize snooping.</p>
</li>
<li id="M201902230">
<!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Facebook offered</em></ins></span> a <span
class="inserted"><ins><em>convenient proprietary
- library for building</em></ins></span> mobile <span
class="removed"><del><strong>phone. This</strong></del></span> <span
class="inserted"><ins><em>apps, which also <a
- href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
- sent personal data to Facebook</a>. Lots of companies built apps that
- way and released them, apparently not realizing that all the personal
- data they collected</em></ins></span> would
- <span class="removed"><del><strong>enable crackers</strong></del></span>
<span class="inserted"><ins><em>go</em></ins></span> to <span
class="removed"><del><strong>listen in on</strong></del></span> <span
class="inserted"><ins><em>Facebook as well.</p>
-
- <p>It shows that no one can trust</em></ins></span> a <span
class="removed"><del><strong>child's speech, and</strong></del></span> <span
class="inserted"><ins><em>nonfree program, not</em></ins></span> even <span
class="removed"><del><strong>speak
- into</strong></del></span> the <span class="removed"><del><strong>toys
themselves.</p></strong></del></span>
- <span class="inserted"><ins><em>developers of other nonfree
programs.</p></em></ins></span>
+ <p>Facebook offered a convenient proprietary
+ library for building mobile apps, which also</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
+ sent personal data to Facebook</a>. Lots</em></ins></span> of <span
class="inserted"><ins><em>companies built apps that
+ way and released them, apparently not realizing that all</em></ins></span>
the <span class="removed"><del><strong>conversation between two
users</a>.</p></strong></del></span> <span
class="inserted"><ins><em>personal
+ data they collected would go to Facebook as well.</p>
+
+ <p>It shows that no one can trust a nonfree program, not even the
+ developers of other nonfree programs.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li>
- <p>A computerized vibrator
- <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on its users through the proprietary control
app</a>.</p></strong></del></span>
+ <span class="removed"><del><strong><li></strong></del></span>
<span class="inserted"><ins><em><li id="M201902140">
<!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
--><!--#echo encoding="none" var="DATE" --></em></ins></span>
- <p>The <span class="removed"><del><strong>app was
reporting</strong></del></span> <span class="inserted"><ins><em>AppCensus
database gives information on <a
- href="https://www.appcensus.mobi"> how Android apps use and
- misuse users' personal data</a>. As of March 2019, nearly
- 78,000 have been analyzed, of which 24,000 (31%)
transmit</em></ins></span> the <span
class="removed"><del><strong>temperature</strong></del></span> <span
class="inserted"><ins><em><a
- href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a> to other companies, and <a
+ <p>The <span class="removed"><del><strong>“smart” toys
My Friend Cayla</strong></del></span> <span class="inserted"><ins><em>AppCensus
database gives information on <a
+ href="https://www.appcensus.mobi"> how Android apps
use</em></ins></span> and <span
class="removed"><del><strong>i-Que</strong></del></span>
+ <span class="inserted"><ins><em>misuse users' personal data</a>. As
of March 2019, nearly
+ 78,000 have been analyzed, of which 24,000 (31%)</em></ins></span>
transmit <span class="inserted"><ins><em>the</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201812290">
+ Advertising ID</a></em></ins></span> to <span
class="removed"><del><strong>Nuance Communications</a>,
+ a speech recognition company based in</strong></del></span> <span
class="inserted"><ins><em>other companies, and <a
href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23%</em></ins></span> of the <span
class="removed"><del><strong>vibrator minute</strong></del></span> <span
class="inserted"><ins><em>total) link this ID to hardware identifiers</a>,
- so that users cannot escape tracking</em></ins></span> by
- <span class="removed"><del><strong>minute (thus, indirectly,
whether</strong></del></span> <span class="inserted"><ins><em>resetting
it.</p>
+ 18,000 (23% of</em></ins></span> the <span
class="removed"><del><strong>U.S.</p>
- <p>Collecting hardware identifiers is in apparent violation of
- Google's policies. But</em></ins></span> it <span
class="inserted"><ins><em>seems that Google wasn't aware of it,
- and, once informed,</em></ins></span> was <span
class="removed"><del><strong>surrounded by a person's
- body), as well as the vibration frequency.</p>
+ <p>Those toys also contain major security vulnerabilities; crackers
+ can remotely control</strong></del></span> <span
class="inserted"><ins><em>total) link this ID to hardware identifiers</a>,
+ so that users cannot escape tracking by resetting it.</p>
- <p>Note</strong></del></span> <span class="inserted"><ins><em>in no
hurry to take action. This proves
- that</em></ins></span> the <span class="removed"><del><strong>totally
inadequate proposed response:</strong></del></span> <span
class="inserted"><ins><em>policies of</em></ins></span> a <span
class="removed"><del><strong>labeling
- standard with which manufacturers would make statements about
- their products, rather than free</strong></del></span> <span
class="inserted"><ins><em>development platform are ineffective at
- preventing nonfree</em></ins></span> software <span
class="removed"><del><strong>which users could</strong></del></span> <span
class="inserted"><ins><em>developers from including malware in
- their programs.</p>
+ <p>Collecting hardware identifiers is in apparent violation of
+ Google's policies. But it seems that Google wasn't aware of it,
+ and, once informed, was in no hurry to take action. This proves
+ that</em></ins></span> the <span class="removed"><del><strong>toys
with</strong></del></span> <span class="inserted"><ins><em>policies
of</em></ins></span> a <span class="removed"><del><strong>mobile phone. This
would
+ enable crackers to listen</strong></del></span> <span
class="inserted"><ins><em>development platform are ineffective at
+ preventing nonfree software developers from including
malware</em></ins></span> in <span
class="removed"><del><strong>on</strong></del></span>
+ <span class="inserted"><ins><em>their programs.</p>
</li>
<li id="M201902060">
<!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Many nonfree apps</em></ins></span> have
- <span class="removed"><del><strong>checked</strong></del></span> <span
class="inserted"><ins><em>a surveillance feature for <a
+ <p>Many nonfree apps have</em></ins></span> a <span
class="removed"><del><strong>child's speech, and even speak
+ into</strong></del></span> <span class="inserted"><ins><em>surveillance
feature for <a
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all the users' actions</a> in interacting with the
app.</p>
+ recording all</em></ins></span> the <span
class="removed"><del><strong>toys themselves.</p></strong></del></span>
<span class="inserted"><ins><em>users' actions</a> in interacting with
the app.</p></em></ins></span>
</li>
- <li id="M201902041.1">
+ <span class="removed"><del><strong><li>
+ <p>A computerized vibrator</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902041.1">
<!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Twenty nine “beauty camera” apps that used to
- be on Google Play had one or more malicious functionalities, such as <a
-
href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/">
+ be on Google Play had one or more malicious functionalities, such
as</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/">
stealing users' photos</a> instead of “beautifying” them,
- pushing unwanted</em></ins></span> and <span
class="removed"><del><strong>changed.</p>
+ pushing unwanted and often malicious ads</em></ins></span> on <span
class="removed"><del><strong>its users through the proprietary control
app</a>.</p>
- <p>The company</strong></del></span> <span
class="inserted"><ins><em>often malicious ads on users, and redirecting
- them to phishing sites</em></ins></span> that <span
class="removed"><del><strong>made</strong></del></span> <span
class="inserted"><ins><em>stole their credentials.
Furthermore,</em></ins></span>
- the <span class="removed"><del><strong>vibrator
- <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"></strong></del></span>
<span class="inserted"><ins><em>user interface of most of
them</em></ins></span> was <span
class="removed"><del><strong>sued</strong></del></span> <span
class="inserted"><ins><em>designed to make uninstallation
+ <p>The app was reporting</strong></del></span> <span
class="inserted"><ins><em>users, and redirecting
+ them to phishing sites that stole their credentials.
Furthermore,</em></ins></span>
+ the <span class="removed"><del><strong>temperature</strong></del></span>
<span class="inserted"><ins><em>user interface</em></ins></span> of <span
class="removed"><del><strong>the vibrator minute by
+ minute (thus, indirectly, whether it</strong></del></span> <span
class="inserted"><ins><em>most of them</em></ins></span> was <span
class="removed"><del><strong>surrounded by</strong></del></span> <span
class="inserted"><ins><em>designed to make uninstallation
difficult.</p>
<p>Users should of course uninstall these dangerous apps if they
haven't yet, but they should also stay away from nonfree apps in
- general. <em>All</em> nonfree apps carry a potential risk
because
+ general. <em>All</em> nonfree apps carry</em></ins></span> a
<span class="removed"><del><strong>person's
+ body), as well as the vibration frequency.</p>
+
+ <p>Note</strong></del></span> <span
class="inserted"><ins><em>potential risk because
there is no easy way of knowing what they really do.</p>
</li>
<li id="M201902010">
<!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>An investigation of the 150 most popular
+ <p>An investigation of</em></ins></span> the <span
class="removed"><del><strong>totally inadequate proposed response: a labeling
+ standard with which manufacturers would make statements
about</strong></del></span> <span class="inserted"><ins><em>150 most popular
gratis VPN apps in Google Play found that <a
href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
- 25% fail to protect their users' privacy</a> due to DNS leaks. In
+ 25% fail to protect</em></ins></span> their <span
class="removed"><del><strong>products, rather than free software which
users</strong></del></span> <span class="inserted"><ins><em>users'
privacy</a> due to DNS leaks. In
addition, 85% feature intrusive permissions or functions in their
- source code—often used</em></ins></span> for <span
class="removed"><del><strong>collecting lots</strong></del></span> <span
class="inserted"><ins><em>invasive advertising—that could
- potentially also be used to spy on users. Other technical flaws were
+ source code—often used for invasive
advertising—that</em></ins></span> could <span
class="removed"><del><strong>have
+ checked and changed.</p>
+
+ <p>The company</strong></del></span>
+ <span class="inserted"><ins><em>potentially also be used to spy on users.
Other technical flaws were
found as well.</p>
- <p>Moreover, a previous investigation had found that <a
-
href="https://www.top10vpn.com/free-vpn-app-investigation/">half</em></ins></span>
of <span class="removed"><del><strong>personal
information</strong></del></span>
+ <p>Moreover, a previous investigation had found</em></ins></span>
that <span class="removed"><del><strong>made the vibrator</strong></del></span>
<a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued for collecting lots</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/">half</em></ins></span>
of <span class="removed"><del><strong>personal
information</strong></del></span>
<span class="inserted"><ins><em>the top 10 gratis VPN apps have lousy
privacy policies</a>.</p>
<p><small>(It is unfortunate that these articles
talk</em></ins></span> about <span class="removed"><del><strong>how
@@ -2581,8 +2593,8 @@
<p>Even if no one connects</strong></del></span> <span
class="inserted"><ins><em><a
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit</em></ins></span> to <span
class="inserted"><ins><em>increased snooping</a>, and some are starting
- to realize that it is nasty.</p>
+ demanded users submit to increased snooping</a>, and some are
starting</em></ins></span>
+ to <span class="inserted"><ins><em>realize that it is nasty.</p>
<p>This article shows</em></ins></span> the <span
class="removed"><del><strong>car remotely,</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
@@ -3081,20 +3093,20 @@
snooping all the time</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
snoops on what programs people watch, and even what they wanted to
- record</a>.</p>
+ record</a>.</p></em></ins></span>
</li>
+ <span
class="removed"><del><strong><li><p>The</strong></del></span>
- <li id="M201504300">
+ <span class="inserted"><ins><em><li id="M201504300">
<!--#set var="DATE" value='<small
class="date-tag">2015-04</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Vizio <a
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
used a firmware “upgrade” to make its TVs snoop on what
- users watch</a>. The TVs did not do that when first
sold.</p></em></ins></span>
+ users watch</a>. The TVs did not do that when first sold.</p>
</li>
- <span
class="removed"><del><strong><li><p>The</strong></del></span>
- <span class="inserted"><ins><em><li id="M201502090">
+ <li id="M201502090">
<!--#set var="DATE" value='<small
class="date-tag">2015-02</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The</em></ins></span> Samsung “Smart” TV <a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits</strong></del></span>
@@ -3263,16 +3275,16 @@
<span class="inserted"><ins><em><li id="M201711100">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A remote-control sex toy was found to make <a
-
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
+ <p>A remote-control sex toy was found to make</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings of the conversation between two users</a>.</p>
</li>
<li id="M201703140">
<!--#set var="DATE" value='<small
class="date-tag">2017-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A computerized vibrator</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ <p>A computerized vibrator <a
+
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
was snooping on its</em></ins></span> users <span
class="removed"><del><strong>identify themselves</strong></del></span> <span
class="inserted"><ins><em>through the proprietary control
app</a>.</p>
<p>The app was reporting the temperature of the vibrator minute by
@@ -4426,7 +4438,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/06/01 09:44:01 $
+$Date: 2021/06/01 21:31:32 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.396
retrieving revision 1.397
diff -u -b -r1.396 -r1.397
--- proprietary-surveillance.de.po 31 May 2021 13:39:56 -0000 1.396
+++ proprietary-surveillance.de.po 1 Jun 2021 21:31:32 -0000 1.397
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-05-26 08:55+0000\n"
+"POT-Creation-Date: 2021-06-01 21:25+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -1402,6 +1402,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-"
+"to-chinese-government-conflicts-with-apples-privacy-first-focus/\">Apple is "
+"moving its Chinese customers' iCloud data to a datacenter controlled by the "
+"Chinese government</a>. Apple is already storing the encryption keys on "
+"these servers, obeying Chinese authority, making all Chinese user data "
+"available to the government."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Facebook <a href=\"https://www.dailymail.co.uk/news/article-8747541/Facebook-"
"accused-watching-Instagram-users-mobile-cameras.html\">snoops on Instagram</"
"a> users by surreptitously turning on the device's camera."
Index: proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.199
retrieving revision 1.200
diff -u -b -r1.199 -r1.200
--- proprietary-surveillance.es.po 27 May 2021 09:00:41 -0000 1.199
+++ proprietary-surveillance.es.po 1 Jun 2021 21:31:32 -0000 1.200
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-05-26 08:55+0000\n"
+"POT-Creation-Date: 2021-06-01 21:25+0000\n"
"PO-Revision-Date: 2021-05-27 10:25+0200\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-06-01 21:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -1070,6 +1071,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-"
+"to-chinese-government-conflicts-with-apples-privacy-first-focus/\">Apple is "
+"moving its Chinese customers' iCloud data to a datacenter controlled by the "
+"Chinese government</a>. Apple is already storing the encryption keys on "
+"these servers, obeying Chinese authority, making all Chinese user data "
+"available to the government."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Facebook <a href=\"https://www.dailymail.co.uk/news/article-8747541/Facebook-"
"accused-watching-Instagram-users-mobile-cameras.html\">snoops on Instagram</"
"a> users by surreptitously turning on the device's camera."
Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.641
retrieving revision 1.642
diff -u -b -r1.641 -r1.642
--- proprietary-surveillance.fr.po 31 May 2021 21:09:19 -0000 1.641
+++ proprietary-surveillance.fr.po 1 Jun 2021 21:31:32 -0000 1.642
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-05-26 08:55+0000\n"
+"POT-Creation-Date: 2021-06-01 21:25+0000\n"
"PO-Revision-Date: 2021-05-26 22:13+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-06-01 21:25+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -1068,6 +1069,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-"
+"to-chinese-government-conflicts-with-apples-privacy-first-focus/\">Apple is "
+"moving its Chinese customers' iCloud data to a datacenter controlled by the "
+"Chinese government</a>. Apple is already storing the encryption keys on "
+"these servers, obeying Chinese authority, making all Chinese user data "
+"available to the government."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Facebook <a href=\"https://www.dailymail.co.uk/news/article-8747541/Facebook-"
"accused-watching-Instagram-users-mobile-cameras.html\">snoops on Instagram</"
"a> users by surreptitously turning on the device's camera."
Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.268
retrieving revision 1.269
diff -u -b -r1.268 -r1.269
--- proprietary-surveillance.it-diff.html 1 Jun 2021 09:44:02 -0000
1.268
+++ proprietary-surveillance.it-diff.html 1 Jun 2021 21:31:33 -0000
1.269
@@ -791,16 +791,11 @@
will send</em></ins></span> their <span
class="removed"><del><strong>permission</a>.</p>
<p>Even if you disable Google Maps and</strong></del></span> <span
class="inserted"><ins><em>GPS</em></ins></span> location <span
class="removed"><del><strong>tracking, you must
- disable Google Play itself to completely</strong></del></span> <span
class="inserted"><ins><em>on remote command, and users cannot</em></ins></span>
stop <span class="removed"><del><strong>the tracking. This is
- yet another example of nonfree software pretending</strong></del></span>
- <span class="inserted"><ins><em>them</a>. (The US says it will
eventually require all new portable phones</em></ins></span>
- to <span class="removed"><del><strong>obey the user,
- when it's actually doing something else. Such a thing would be almost
- unthinkable with free software.</p></strong></del></span> <span
class="inserted"><ins><em>have GPS.)</p></em></ins></span>
+ disable Google Play itself to completely</strong></del></span> <span
class="inserted"><ins><em>on remote command, and users cannot</em></ins></span>
stop
+ <span class="inserted"><ins><em>them</a>. (The US says it will
eventually require all new portable phones
+ to have GPS.)</p>
</li>
-
- <span class="removed"><del><strong><li><p>More than 73% of the
most popular Android apps</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<div class="big-subsection">
@@ -809,7 +804,23 @@
</div>
<ul class="blurbs">
- <li id="M202009183">
+ <li id="M202105240">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-05</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-to-chinese-government-conflicts-with-apples-privacy-first-focus/">Apple
+ is moving its Chinese customers' iCloud data to a datacenter controlled
+ by</em></ins></span> the <span class="removed"><del><strong>tracking.
This</strong></del></span> <span class="inserted"><ins><em>Chinese
government</a>. Apple</em></ins></span> is
+ <span class="removed"><del><strong>yet another example of nonfree software
pretending</strong></del></span> <span class="inserted"><ins><em>already
storing the encryption
+ keys on these servers, obeying Chinese authority, making all Chinese
+ user data available</em></ins></span> to <span
class="removed"><del><strong>obey</strong></del></span> the <span
class="removed"><del><strong>user,
+ when it's actually doing something else. Such a thing would be almost
+ unthinkable with free software.</p></strong></del></span> <span
class="inserted"><ins><em>government.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>More than 73% of the
most popular Android apps</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M202009183">
<!--#set var="DATE" value='<small
class="date-tag">2020-09</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Facebook</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
@@ -1776,61 +1787,76 @@
<p>The company's statement that it was
anonymizing</strong></del></span> <span class="inserted"><ins><em>Android
phones and iPhones
running Google apps, and sometimes <a
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
- saves</em></ins></span> the data <span
class="removed"><del><strong>may</strong></del></span> <span
class="inserted"><ins><em>for years</a>.</p>
+ saves</em></ins></span> the data <span class="removed"><del><strong>may be
+ true, but it doesn't really matter. If it had sold</strong></del></span>
<span class="inserted"><ins><em>for years</a>.</p>
+
+ <p>Nonfree software in</em></ins></span> the <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>phone has</em></ins></span> to <span
class="removed"><del><strong>a
+ data broker,</strong></del></span> <span class="inserted"><ins><em>be
responsible for sending</em></ins></span>
+ the <span class="inserted"><ins><em>location</em></ins></span> data <span
class="removed"><del><strong>broker would have been able to figure out
+ who the user was.</p>
- <p>Nonfree software in the phone has to</em></ins></span> be
- <span class="removed"><del><strong>true, but it doesn't really matter.
If it had sold</strong></del></span> <span
class="inserted"><ins><em>responsible for sending</em></ins></span>
- the <span class="inserted"><ins><em>location</em></ins></span> data to
<span class="inserted"><ins><em>Google.</p>
+ <p>Following this lawsuit,
+ <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company has been ordered to pay a total of
C$4m</a></strong></del></span> to <span class="removed"><del><strong>its
customers.</p></strong></del></span> <span
class="inserted"><ins><em>Google.</p></em></ins></span>
</li>
- <li id="M201903251">
+ <span class="removed"><del><strong><li><p>
“CloudPets” toys</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201903251">
<!--#set var="DATE" value='<small
class="date-tag">2019-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Many Android phones come with</em></ins></span> a <span
class="inserted"><ins><em>huge number of <a
-
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
- preinstalled nonfree apps that have access to sensitive</em></ins></span>
data <span class="removed"><del><strong>broker,</strong></del></span> <span
class="inserted"><ins><em>without
+ <p>Many Android phones come</em></ins></span> with <span
class="removed"><del><strong>microphones</strong></del></span> <span
class="inserted"><ins><em>a huge number of</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
+ preinstalled nonfree apps that have access</em></ins></span> to <span
class="inserted"><ins><em>sensitive data without
users' knowledge</a>. These hidden apps may either call home
with</em></ins></span>
- the <span class="removed"><del><strong>data broker
would</strong></del></span> <span class="inserted"><ins><em>data, or pass it on
to user-installed apps that</em></ins></span> have <span
class="removed"><del><strong>been able</strong></del></span> <span
class="inserted"><ins><em>access</em></ins></span> to <span
class="removed"><del><strong>figure out
- who</strong></del></span>
- the <span class="removed"><del><strong>user was.</p>
+ the
+ <span class="removed"><del><strong>manufacturer</a>. Guess what?
+ <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a way</strong></del></span> <span class="inserted"><ins><em>data, or
pass it on</em></ins></span> to <span class="inserted"><ins><em>user-installed
apps that have</em></ins></span> access <span class="removed"><del><strong>the
data</a>
+ collected by the manufacturer's snooping.</p>
- <p>Following this lawsuit,
- <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></strong></del></span>
<span class="inserted"><ins><em>network but no direct access
to</em></ins></span> the <span
class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>data. This results in massive
- surveillance on which the user</em></ins></span> has <span
class="removed"><del><strong>been ordered</strong></del></span> <span
class="inserted"><ins><em>absolutely no control.</p>
+ <p>That the manufacturer and the FBI could
listen</strong></del></span> to <span class="removed"><del><strong>these
conversations
+ was unacceptable by itself.</p></li>
+
+ <li><p>Barbie
+ <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span>
+ <span class="inserted"><ins><em>the network but no direct
access</em></ins></span> to <span
class="removed"><del><strong>spy</strong></del></span> <span
class="inserted"><ins><em>the data. This results in massive
+ surveillance</em></ins></span> on <span
class="removed"><del><strong>children and
adults</a>.</p></strong></del></span> <span
class="inserted"><ins><em>which the user has absolutely no
control.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <li id="M201903201">
+
+<!-- #SpywareAtLowLevel</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201903201">
<!--#set var="DATE" value='<small
class="date-tag">2019-03</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>A study of 24 “health” apps found that 19 of them
<a
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+<span class="removed"><del><strong><!-- WEBMASTERS: make sure to place new
items on top under each subsection</strong></del></span>
+ <span class="inserted"><ins><em><p>A study of 24
“health” apps found that 19 of them <a
href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
- send sensitive personal data</em></ins></span> to <span
class="removed"><del><strong>pay a total</strong></del></span> <span
class="inserted"><ins><em>third parties</a>, which can use it
+ send sensitive personal data to third parties</a>, which can use it
for invasive advertising or discriminating against people in poor
medical condition.</p>
<p>Whenever user “consent” is sought, it is buried in
- lengthy terms</em></ins></span> of <span
class="removed"><del><strong>C$4m</a></strong></del></span> <span
class="inserted"><ins><em>service that are difficult</em></ins></span> to <span
class="removed"><del><strong>its customers.</p></strong></del></span>
<span class="inserted"><ins><em>understand. In any case,
- “consent” is not sufficient to legitimize
snooping.</p></em></ins></span>
+ lengthy terms of service that are difficult to understand. In any case,
+ “consent” is not sufficient to legitimize snooping.</p>
</li>
- <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902230">
+ <li id="M201902230">
<!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Facebook offered a convenient proprietary
- library for building mobile apps, which also</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
- sent personal data</em></ins></span> to <span
class="removed"><del><strong>the
- manufacturer</a>. Guess what?
- <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>. Lots of companies built apps
that</em></ins></span>
- way <span class="removed"><del><strong>to access the
data</a></strong></del></span> <span class="inserted"><ins><em>and
released them, apparently not realizing that all the personal
- data they</em></ins></span> collected <span
class="removed"><del><strong>by</strong></del></span> <span
class="inserted"><ins><em>would go to Facebook as well.</p>
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
- <p>It shows that no one can trust a nonfree program, not
even</em></ins></span> the <span class="removed"><del><strong>manufacturer's
snooping.</p>
+<span class="removed"><del><strong><div class="big-section">
+ <h3 id="SpywareAtLowLevel">Spyware</strong></del></span>
+ <span class="inserted"><ins><em><p>Facebook offered a convenient
proprietary
+ library for building mobile apps, which also <a
+ href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
+ sent personal data to Facebook</a>. Lots of companies built apps that
+ way and released them, apparently not realizing that all the personal
+ data they collected would go to Facebook as well.</p>
- <p>That</strong></del></span>
- <span class="inserted"><ins><em>developers of other nonfree
programs.</p>
+ <p>It shows that no one can trust a nonfree program, not even the
+ developers of other nonfree programs.</p>
</li>
<li id="M201902140">
@@ -1839,60 +1865,48 @@
<p>The AppCensus database gives information on <a
href="https://www.appcensus.mobi"> how Android apps use and
misuse users' personal data</a>. As of March 2019, nearly
- 78,000 have been analyzed, of which 24,000 (31%)
transmit</em></ins></span> the <span
class="removed"><del><strong>manufacturer</strong></del></span> <span
class="inserted"><ins><em><a
+ 78,000 have been analyzed, of which 24,000 (31%) transmit the <a
href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a> to other companies,</em></ins></span> and <span
class="inserted"><ins><em><a
+ Advertising ID</a> to other companies, and <a
href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23% of</em></ins></span> the <span
class="removed"><del><strong>FBI could listen</strong></del></span> <span
class="inserted"><ins><em>total) link this ID</em></ins></span> to <span
class="removed"><del><strong>these conversations
- was unacceptable</strong></del></span> <span
class="inserted"><ins><em>hardware identifiers</a>,
- so that users cannot escape tracking</em></ins></span> by <span
class="removed"><del><strong>itself.</p></li>
-
- <li><p>Barbie
- <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span> <span class="inserted"><ins><em>resetting
it.</p>
+ 18,000 (23% of the total) link this ID to hardware identifiers</a>,
+ so that users cannot escape tracking by resetting it.</p>
<p>Collecting hardware identifiers is in apparent violation of
Google's policies. But it seems that Google wasn't aware of it,
- and, once informed, was in no hurry</em></ins></span> to <span
class="removed"><del><strong>spy on children and
adults</a>.</p></strong></del></span> <span
class="inserted"><ins><em>take action. This proves
- that the policies of a development platform are ineffective at
- preventing nonfree software developers from including malware in
- their programs.</p></em></ins></span>
- </li>
-<span class="removed"><del><strong></ul>
-
-
-<!-- #SpywareAtLowLevel</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902060">
- <!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
- <span class="inserted"><ins><em><p>Many nonfree apps have a
surveillance feature for <a
-
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all the users' actions</a> in interacting with the
app.</p>
- </li>
-
- <li id="M201902041.1">
- <!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Twenty nine “beauty camera” apps that
used</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span>
- <span class="inserted"><ins><em>be</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
+ and, once informed, was in no hurry to take action. This proves
+ that the policies of a development platform are
ineffective</em></ins></span> at <span class="removed"><del><strong>Low
Level</h3>
<span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
</div>
<div style="clear: left;"></div>
<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
+ <h4 id="SpywareInBIOS">Spyware</strong></del></span>
+ <span class="inserted"><ins><em>preventing nonfree software developers
from including malware</em></ins></span> in <span
class="removed"><del><strong>BIOS</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
</div>
<ul>
-<li><p></strong></del></span> <span
class="inserted"><ins><em>Google Play had one or more malicious
functionalities, such as</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+<li><p></strong></del></span>
+ <span class="inserted"><ins><em>their programs.</p>
+ </li>
+
+ <li id="M201902060">
+ <!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Many nonfree apps have a surveillance feature
for</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
Lenovo stealthily installed crapware</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/">
+ <span
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
+ recording all the users' actions</a> in interacting with the
app.</p>
+ </li>
+
+ <li id="M201902041.1">
+ <!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Twenty nine “beauty camera” apps that used to
+ be on Google Play had one or more malicious functionalities, such as <a
+
href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/">
stealing users' photos</a> instead of “beautifying” them,
pushing unwanted</em></ins></span> and <span
class="removed"><del><strong>spyware via BIOS</a></strong></del></span>
<span class="inserted"><ins><em>often malicious ads</em></ins></span> on <span
class="removed"><del><strong>Windows installs.
Note</strong></del></span> <span class="inserted"><ins><em>users, and
redirecting
@@ -2215,8 +2229,8 @@
anyone</strong></del></span> <span
class="inserted"><ins><em>id="M201705040">
<!--#set var="DATE" value='<small
class="date-tag">2017-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A study found 234 Android apps that track users by <a
-
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
+ <p>A study found 234 Android apps that track users
by</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
to ultrasound from beacons placed in stores or played by TV
programs</a>.</p>
</li>
@@ -2224,8 +2238,8 @@
<li id="M201704260">
<!--#set var="DATE" value='<small
class="date-tag">2017-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Faceapp appears to do lots of surveillance, judging
by</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ <p>Faceapp appears to do lots of surveillance, judging by <a
+
href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
how much</em></ins></span> access <span class="inserted"><ins><em>it
demands to personal data in the device</a>.</p>
</li>
@@ -3305,17 +3319,17 @@
<p>Data collected by devices such as the Nest thermostat, the Philips
Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
speakers are likewise stored longer than necessary on the servers
- the devices are tethered to. Moreover, they are made
available</em></ins></span> to
- <span class="inserted"><ins><em>Alexa. As a result, Amazon has a very
precise picture of users' life
+ the devices are tethered to. Moreover, they are made available to
+ Alexa. As a result, Amazon has a very precise picture of users' life
at home, not only in the present, but in the past (and, who knows,
- in</em></ins></span> the
- <span
class="removed"><del><strong>internet</a>—</strong></del></span>
<span class="inserted"><ins><em>future too?)</p>
+ in the future too?)</p>
</li>
<li id="M201904240">
<!--#set var="DATE" value='<small
class="date-tag">2019-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Some of users' commands to the Alexa service are <a
+ <p>Some of users' commands</em></ins></span> to the
+ <span
class="removed"><del><strong>internet</a>—</strong></del></span>
<span class="inserted"><ins><em>Alexa service are <a
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
recorded for Amazon employees to listen to</a>. The Google and Apple
voice assistants do similar things.</p>
@@ -3655,8 +3669,8 @@
<ul class="blurbs">
<li id="M202008182">
<!--#set var="DATE" value='<small
class="date-tag">2020-08</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Oculus headsets <a
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+ <span class="inserted"><ins><em><p>Oculus headsets <a
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october">require
users to identify themselves to Facebook</a>. This will give Facebook
free rein to pervasively snoop on Oculus users.</p>
@@ -3664,8 +3678,8 @@
<li id="M201612230">
<!--#set var="DATE" value='<small
class="date-tag">2016-12</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
- <span class="inserted"><ins><em><p>VR equipment, measuring every
slight motion,
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>VR equipment, measuring every slight motion,
creates the potential for the most intimate
surveillance ever. All it takes to make this potential real <a
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/">is
@@ -4231,7 +4245,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/06/01 09:44:02 $
+$Date: 2021/06/01 21:31:33 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.408
retrieving revision 1.409
diff -u -b -r1.408 -r1.409
--- proprietary-surveillance.it.po 26 May 2021 09:02:17 -0000 1.408
+++ proprietary-surveillance.it.po 1 Jun 2021 21:31:35 -0000 1.409
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-05-26 08:55+0000\n"
+"POT-Creation-Date: 2021-06-01 21:25+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -1361,6 +1361,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-"
+"to-chinese-government-conflicts-with-apples-privacy-first-focus/\">Apple is "
+"moving its Chinese customers' iCloud data to a datacenter controlled by the "
+"Chinese government</a>. Apple is already storing the encryption keys on "
+"these servers, obeying Chinese authority, making all Chinese user data "
+"available to the government."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Facebook <a href=\"https://www.dailymail.co.uk/news/article-8747541/Facebook-"
"accused-watching-Instagram-users-mobile-cameras.html\">snoops on Instagram</"
"a> users by surreptitously turning on the device's camera."
Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.285
retrieving revision 1.286
diff -u -b -r1.285 -r1.286
--- proprietary-surveillance.ja-diff.html 1 Jun 2021 09:44:02 -0000
1.285
+++ proprietary-surveillance.ja-diff.html 1 Jun 2021 21:31:35 -0000
1.286
@@ -732,38 +732,42 @@
<p>According to Edward Snowden,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
and advertising</a> URLs,</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.bbc.com/news/uk-34444233">agencies
can take over
smartphones</a> by sending hidden text messages which enable
- them to turn the phones</em></ins></span> on <span
class="inserted"><ins><em>and off, listen to</em></ins></span> the <span
class="removed"><del><strong>average.</p></strong></del></span> <span
class="inserted"><ins><em>microphone,
+ them to turn the phones</em></ins></span> on <span
class="inserted"><ins><em>and off, listen to</em></ins></span> the <span
class="removed"><del><strong>average.</p>
+ </li>
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>microphone,
retrieve geo-location data from the GPS, take photographs, read
text messages, read call, location and web browsing history, and
- read the contact list. This malware is designed to disguise itself
- from investigation.</p></em></ins></span>
+ read the contact list. This malware</em></ins></span> is <span
class="removed"><del><strong>present</strong></del></span> <span
class="inserted"><ins><em>designed to disguise itself
+ from investigation.</p>
</li>
- <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
- <span class="inserted"><ins><em><li id="M201311120">
+ <li id="M201311120">
<!--#set var="DATE" value='<small
class="date-tag">2013-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
- The NSA can tap data in smart phones, including iPhones,
- Android, and BlackBerry</a>. While there</em></ins></span> is <span
class="removed"><del><strong>present</strong></del></span> <span
class="inserted"><ins><em>not much
+ The NSA can tap data</em></ins></span> in <span
class="removed"><del><strong>some Android devices when
they</strong></del></span> <span class="inserted"><ins><em>smart phones,
including iPhones,
+ Android, and BlackBerry</a>. While there is not much
detail here, it seems that this does not operate via
the universal back door that we know nearly all portable
- phones have. It may involve exploiting various bugs. There are <a
+ phones have. It may involve exploiting various bugs.
There</em></ins></span> are <span class="removed"><del><strong>sold.
+ Some Motorola</strong></del></span> <span class="inserted"><ins><em><a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
- lots of bugs</em></ins></span> in <span class="removed"><del><strong>some
Android devices</strong></del></span> <span class="inserted"><ins><em>the
phones' radio software</a>.</p>
+ lots of bugs in the phones' radio software</a>.</p>
</li>
<li id="M201307000">
<!--#set var="DATE" value='<small
class="date-tag">2013-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Portable phones with GPS <a
-
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
- will send their GPS location on remote command, and users cannot stop
- them</a>. (The US says it will eventually require all new portable
phones
- to have GPS.)</p>
+ <p>Portable</em></ins></span> phones <span
class="removed"><del><strong>modify Android to</strong></del></span> <span
class="inserted"><ins><em>with GPS</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+ will</em></ins></span> send <span class="removed"><del><strong>personal
data</strong></del></span> <span class="inserted"><ins><em>their GPS location
on remote command, and users cannot stop
+ them</a>. (The US says it will eventually require all new portable
phones</em></ins></span>
+ to <span
class="removed"><del><strong>Motorola</a>.</p></strong></del></span>
<span class="inserted"><ins><em>have GPS.)</p></em></ins></span>
</li>
-</ul>
+
+ <span class="removed"><del><strong><li><p>Some manufacturers
add</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
@@ -772,23 +776,37 @@
</div>
<ul class="blurbs">
+ <li id="M202105240">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-05</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-to-chinese-government-conflicts-with-apples-privacy-first-focus/">Apple
+ is moving its Chinese customers' iCloud data to</em></ins></span> a <span
class="inserted"><ins><em>datacenter controlled
+ by the Chinese government</a>. Apple is already storing the
encryption
+ keys on these servers, obeying Chinese authority, making all Chinese
+ user data available to the government.</p>
+ </li>
+
<li id="M202009183">
<!--#set var="DATE" value='<small
class="date-tag">2020-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Facebook <a
-
href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html">snoops
+ <p>Facebook</em></ins></span> <a <span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general surveillance package such as Carrier
IQ.</a></p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html">snoops
on Instagram</a> users by surreptitously turning on the device's
- camera.</p>
+ camera.</p></em></ins></span>
</li>
- <li id="M202004200">
+ <span class="removed"><del><strong><li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
+ Samsung's back door</a> provides</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M202004200">
<!--#set var="DATE" value='<small
class="date-tag">2020-04</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Apple whistleblower Thomas Le Bonniec reports that Apple
made a practice of surreptitiously activating the Siri software to <a
href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf">
- record users' conversations</em></ins></span> when they <span
class="removed"><del><strong>are sold.
- Some Motorola phones modify Android</strong></del></span> <span
class="inserted"><ins><em>had not activated Siri</a>.
+ record users' conversations when they had not activated Siri</a>.
This was not just occasional, it was systematic practice.</p>
<p>His job was to listen to these recordings, in a group that made
@@ -796,85 +814,78 @@
practice.</p>
<p>The only reliable way to prevent this is, for the program that
- controls access to the microphone to decide when the user has
- “activated” any service, to be free software, and the
- operating system under it free as well. This way, users could make
- sure Apple can't listen</em></ins></span> to <span
class="inserted"><ins><em>them.</p>
+ controls</em></ins></span> access to <span class="inserted"><ins><em>the
microphone to decide when the user has
+ “activated”</em></ins></span> any <span
class="removed"><del><strong>file on</strong></del></span> <span
class="inserted"><ins><em>service, to be free software, and</em></ins></span>
the <span class="removed"><del><strong>system.</p></strong></del></span>
+ <span class="inserted"><ins><em>operating system under it free as well.
This way, users could make
+ sure Apple can't listen to them.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+
- <li id="M201910131">
+<!-- #SpywareOnMobiles</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201910131">
<!--#set var="DATE" value='<small
class="date-tag">2019-10</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Safari occasionally</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- send personal</strong></del></span>
- <span
class="inserted"><ins><em>href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">
- sends browsing</em></ins></span> data <span class="inserted"><ins><em>from
Apple devices in China</em></ins></span> to <span
class="removed"><del><strong>Motorola</a>.</p></strong></del></span>
<span class="inserted"><ins><em>the Tencent Safe
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+<span class="removed"><del><strong><!-- WEBMASTERS:</strong></del></span>
+ <span class="inserted"><ins><em><p>Safari occasionally <a
+
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">
+ sends browsing data from Apple devices in China to the Tencent Safe
Browsing service</a>, to check URLs that possibly correspond to
“fraudulent” websites. Since Tencent collaborates
with the Chinese government, its Safe Browsing black list most certainly
contains the websites of political opponents. By linking the requests
originating from single IP addresses, the government can identify
- dissenters in China and Hong Kong, thus endangering their
lives.</p></em></ins></span>
+ dissenters in China and Hong Kong, thus endangering their lives.</p>
</li>
- <span class="removed"><del><strong><li><p>Some manufacturers add
a</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201905280">
+ <li id="M201905280">
<!--#set var="DATE" value='<small
class="date-tag">2019-05</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>In spite of Apple's supposed commitment to
- privacy, iPhone apps contain trackers that are busy at
night</em></ins></span> <a <span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html">
+ privacy, iPhone apps contain trackers that are busy at night <a
+
href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html">
sending users' personal information to third parties</a>.</p>
<p>The article mentions specific examples: Microsoft OneDrive,
Intuit's Mint, Nike, Spotify, The Washington Post, The Weather
Channel (owned by IBM), the crime-alert service Citizen, Yelp
and DoorDash. But it is likely that most nonfree apps contain
- trackers. Some of these send personally identifying data</em></ins></span>
such as <span class="removed"><del><strong>Carrier
IQ.</a></p></strong></del></span> <span
class="inserted"><ins><em>phone
+ trackers. Some of these send personally identifying data such as phone
fingerprint, exact location, email address, phone number or even
delivery address (in the case of DoorDash). Once this information
is collected by the company, there is no telling what it will be
- used for.</p></em></ins></span>
+ used for.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201711250">
+ <li id="M201711250">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The DMCA and the EU Copyright Directive make it <a
+ <p>The DMCA and the EU Copyright Directive</em></ins></span> make
<span class="removed"><del><strong>sure</strong></del></span> <span
class="inserted"><ins><em>it <a
href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal</em></ins></span> to <span class="removed"><del><strong>any
file</strong></del></span> <span class="inserted"><ins><em>study how iOS
cr…apps spy</em></ins></span> on <span
class="inserted"><ins><em>users</a>, because
- this would require circumventing</em></ins></span> the <span
class="removed"><del><strong>system.</p></strong></del></span> <span
class="inserted"><ins><em>iOS DRM.</p></em></ins></span>
+ illegal</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>study how iOS
cr…apps spy</em></ins></span> on <span class="removed"><del><strong>top
under each subsection</strong></del></span> <span
class="inserted"><ins><em>users</a>, because
+ this would require circumventing the iOS DRM.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<!-- #SpywareOnMobiles</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201709210">
+ <li id="M201709210">
<!--#set var="DATE" value='<small
class="date-tag">2017-09</small>'
--><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
+
+<span class="removed"><del><strong><div class="big-section">
+ <h3 id="SpywareOnMobiles">Spyware</strong></del></span>
<span class="inserted"><ins><em><p>In the latest iThings system,
“turning off” WiFi and Bluetooth the obvious way <a
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
doesn't really turn them off</a>. A more advanced way really does
turn
them off—only until 5am. That's Apple for you—“We
- know you want</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each
subsection</strong></del></span> <span class="inserted"><ins><em>be spied
on”.</p>
+ know you want to be spied on”.</p>
</li>
<li id="M201702150">
<!--#set var="DATE" value='<small
class="date-tag">2017-02</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-
-<span class="removed"><del><strong><div class="big-section">
- <h3 id="SpywareOnMobiles">Spyware</strong></del></span>
- <span class="inserted"><ins><em><p>Apple proposes <a
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Apple proposes <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>—which would mean no way
to use it without having your fingerprints taken. Users would have
@@ -1641,7 +1652,7 @@
<p>This app is</em></ins></span> a <span
class="removed"><del><strong>labeling
standard with which manufacturers would make statements about
their products, rather than free software which
users</strong></del></span> <span class="inserted"><ins><em>spyware
that</em></ins></span> can <span
class="removed"><del><strong>check</strong></del></span> <span
class="inserted"><ins><em>snoop on a lot of
- sensitive data, including user's location</em></ins></span> and <span
class="removed"><del><strong>change.</p></strong></del></span> <span
class="inserted"><ins><em>contact list, and has <a
+ sensitive data, including user's location and contact
list,</em></ins></span> and <span
class="removed"><del><strong>change.</p></strong></del></span> <span
class="inserted"><ins><em>has <a
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
near-complete control</a> over the phone.</p></em></ins></span>
</li>
@@ -1925,12 +1936,11 @@
<ul>
<li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed to spy</strong></del></span> <span
class="inserted"><ins><em>Google Play had one or more malicious
functionalities, such as <a
+ Rent-to-own computers</strong></del></span> <span
class="inserted"><ins><em>Google Play had one or more malicious
functionalities, such as <a
href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/">
stealing users' photos</a> instead of “beautifying” them,
- pushing unwanted and often malicious ads</em></ins></span> on <span
class="inserted"><ins><em>users, and redirecting
- them to phishing sites that stole</em></ins></span> their <span
class="removed"><del><strong>renters</a>.</p>
- </li></strong></del></span> <span
class="inserted"><ins><em>credentials. Furthermore,
+ pushing unwanted and often malicious ads on users, and redirecting
+ them to phishing sites that stole their credentials. Furthermore,
the user interface of most of them was designed to make uninstallation
difficult.</p>
@@ -1949,8 +1959,8 @@
25% fail to protect their users' privacy</a> due to DNS leaks. In
addition, 85% feature intrusive permissions or functions in their
source code—often used for invasive advertising—that could
- potentially also be used to spy on users. Other technical flaws were
- found as well.</p>
+ potentially also be used to spy on users. Other technical
flaws</em></ins></span> were <span
class="removed"><del><strong>programmed</strong></del></span>
+ <span class="inserted"><ins><em>found as well.</p>
<p>Moreover, a previous investigation had found that <a
href="https://www.top10vpn.com/free-vpn-app-investigation/">half of
@@ -1985,7 +1995,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Around 40% of gratis Android apps <a
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
- report on the user's actions to Facebook</a>.</p>
+ report on the user's actions</em></ins></span> to <span
class="inserted"><ins><em>Facebook</a>.</p>
<p>Often they send the machine's “advertising ID,” so
that
Facebook can correlate the data it obtains from the same machine via
@@ -2071,8 +2081,8 @@
<li id="M201803050">
<!--#set var="DATE" value='<small
class="date-tag">2018-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The moviepass app and dis-service
- spy on users even more than users expected. It <a
+ <p>The moviepass app and dis-service</em></ins></span>
+ spy on <span class="inserted"><ins><em>users even more than users
expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
where they travel before and after going to a movie</a>.</p>
@@ -2115,7 +2125,7 @@
for the snooping of these apps.</p>
<p>On the other hand, Google redistributes nonfree Android apps, and
- therefore shares in the responsibility for the injustice of their being
+ therefore shares in the responsibility for the injustice
of</em></ins></span> their <span
class="removed"><del><strong>renters</a>.</p></strong></del></span>
<span class="inserted"><ins><em>being
nonfree. It also distributes its own nonfree apps, such as Google Play,
<a href="/philosophy/free-software-even-more-important.html">which
are malicious</a>.</p>
@@ -2464,13 +2474,13 @@
--><!--#echo encoding="none" var="DATE" -->
<p>FTC says most mobile apps for children don't respect privacy:
<a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInSkype">Skype</h4>
+ <h4 <span
class="removed"><del><strong>id="SpywareInTVSets">Spyware</strong></del></span>
<span class="inserted"><ins><em>id="SpywareInSkype">Skype</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
</div>
@@ -2493,12 +2503,12 @@
Microsoft changed Skype <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
specifically for spying</a>.</p>
- </li></em></ins></span>
+ </li>
</ul>
<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInTVSets">Spyware</strong></del></span>
<span class="inserted"><ins><em>id="SpywareInGames">Games</h4>
+ <h4 id="SpywareInGames">Games</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
</div>
@@ -2724,9 +2734,9 @@
<span class="inserted"><ins><em>matter), the easiest way to make sure it
isn't spying on you is
to disconnect it from the Internet, and use a terrestrial antenna
instead. Unfortunately, this is</em></ins></span> not <span
class="removed"><del><strong>allowed</strong></del></span> <span
class="inserted"><ins><em>always possible. Another option,
- if you are technically oriented, is to get your own router (which can
+ if you are technically oriented, is</em></ins></span> to <span
class="inserted"><ins><em>get your own router (which can
be an old computer running completely free software), and set up a
- firewall</em></ins></span> to <span class="inserted"><ins><em>block
connections to Vizio's servers. Or, as a last resort,
+ firewall to block connections to Vizio's servers. Or, as a last resort,
you can replace your TV with another model.</p>
</li>
@@ -2821,20 +2831,20 @@
watching</strong></del></span>
<span
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
snoops on what programs people watch,</em></ins></span> and <span
class="removed"><del><strong>listening all the
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>even what they wanted to
- record</a>.</p>
+ record</a>.</p></em></ins></span>
</li>
+ <span
class="removed"><del><strong><li><p>The</strong></del></span>
- <li id="M201504300">
+ <span class="inserted"><ins><em><li id="M201504300">
<!--#set var="DATE" value='<small
class="date-tag">2015-04</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Vizio <a
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
used a firmware “upgrade” to make its TVs snoop on what
- users watch</a>. The TVs did not do that when first
sold.</p></em></ins></span>
+ users watch</a>. The TVs did not do that when first sold.</p>
</li>
- <span
class="removed"><del><strong><li><p>The</strong></del></span>
- <span class="inserted"><ins><em><li id="M201502090">
+ <li id="M201502090">
<!--#set var="DATE" value='<small
class="date-tag">2015-02</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The</em></ins></span> Samsung “Smart” TV <a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits</strong></del></span>
@@ -2939,9 +2949,8 @@
<p>In many cases, the video shows everyone that comes near, or merely
passes by, the user's front door.</p>
- <p>The article focuses</em></ins></span> on <span
class="removed"><del><strong>their users and report</strong></del></span> <span
class="inserted"><ins><em>how Ring used</em></ins></span> to <span
class="inserted"><ins><em>let individual employees look
- at</em></ins></span> the
- <span
class="removed"><del><strong>internet</a>—</strong></del></span>
<span class="inserted"><ins><em>videos freely. It appears Amazon has tried to
prevent that
+ <p>The article focuses</em></ins></span> on <span
class="removed"><del><strong>their users and report</strong></del></span> <span
class="inserted"><ins><em>how Ring used to let individual employees look
+ at the videos freely. It appears Amazon has tried to prevent that
secondary abuse, but the primary abuse—that Amazon gets the
video—Amazon expects society to surrender to.</p>
</li>
@@ -2956,7 +2965,8 @@
name!</p>
<p>When Consumer Reports tested them, it suggested that these
- manufacturers promise not to look at what's in the videos. That's not
+ manufacturers promise not</em></ins></span> to <span
class="inserted"><ins><em>look at what's in</em></ins></span> the
+ <span
class="removed"><del><strong>internet</a>—</strong></del></span>
<span class="inserted"><ins><em>videos. That's not
security for your home. Security means making sure they don't get to
see through your camera.</p>
</li>
@@ -3041,11 +3051,11 @@
<li id="M201702280">
<!--#set var="DATE" value='<small
class="date-tag">2017-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>“CloudPets” toys with microphones <a
+ <p>“CloudPets” toys</em></ins></span> with <span
class="inserted"><ins><em>microphones <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
leak childrens' conversations to the manufacturer</a>. Guess what?
<a
href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found a way to access the data</a> collected by the
+ Crackers found</em></ins></span> a <span class="inserted"><ins><em>way to
access the data</a> collected by the
manufacturer's snooping.</p>
<p>That the manufacturer and the FBI could listen to these
@@ -3061,7 +3071,7 @@
company based in the U.S.</p>
<p>Those toys also contain major security vulnerabilities; crackers
- can remotely control the toys</em></ins></span> with a <span
class="inserted"><ins><em>mobile phone. This would enable
+ can remotely control the toys with a mobile phone. This would enable
crackers to listen in on a child's speech, and even speak into the
toys themselves.</p>
</li>
@@ -3127,7 +3137,7 @@
out prematurely</em></ins></span> and <span
class="removed"><del><strong>associates</a>.</p>
<p>Even nastier, they do</strong></del></span> <span
class="inserted"><ins><em>on accident and Google was planning on disclosing
- this new feature and offering it to customers who pay for it.</p>
+ this new feature and offering</em></ins></span> it <span
class="inserted"><ins><em>to customers who pay for it.</p>
</li>
<li id="M202006300">
@@ -3142,7 +3152,7 @@
an adequate basis for protecting digital privacy. The boss can coerce
most workers into consenting to almost anything, even probable exposure
to contagious disease that can be fatal. Software like this should
- be illegal and bosses that demand</em></ins></span> it <span
class="inserted"><ins><em>should be prosecuted for it.</p>
+ be illegal and bosses that demand it should be prosecuted for it.</p>
</li>
<li id="M201911190">
@@ -4096,7 +4106,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/06/01 09:44:02 $
+$Date: 2021/06/01 21:31:35 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.389
retrieving revision 1.390
diff -u -b -r1.389 -r1.390
--- proprietary-surveillance.ja.po 26 May 2021 09:02:17 -0000 1.389
+++ proprietary-surveillance.ja.po 1 Jun 2021 21:31:35 -0000 1.390
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-05-26 08:55+0000\n"
+"POT-Creation-Date: 2021-06-01 21:25+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -1043,6 +1043,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-"
+"to-chinese-government-conflicts-with-apples-privacy-first-focus/\">Apple is "
+"moving its Chinese customers' iCloud data to a datacenter controlled by the "
+"Chinese government</a>. Apple is already storing the encryption keys on "
+"these servers, obeying Chinese authority, making all Chinese user data "
+"available to the government."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Facebook <a href=\"https://www.dailymail.co.uk/news/article-8747541/Facebook-"
"accused-watching-Instagram-users-mobile-cameras.html\">snoops on Instagram</"
"a> users by surreptitously turning on the device's camera."
Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.328
retrieving revision 1.329
diff -u -b -r1.328 -r1.329
--- proprietary-surveillance.pot 26 May 2021 09:02:18 -0000 1.328
+++ proprietary-surveillance.pot 1 Jun 2021 21:31:35 -0000 1.329
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-05-26 08:55+0000\n"
+"POT-Creation-Date: 2021-06-01 21:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -775,6 +775,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a "
+"href=\"https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-to-chinese-government-conflicts-with-apples-privacy-first-focus/\">Apple
"
+"is moving its Chinese customers' iCloud data to a datacenter controlled by "
+"the Chinese government</a>. Apple is already storing the encryption keys on "
+"these servers, obeying Chinese authority, making all Chinese user data "
+"available to the government."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Facebook <a "
"href=\"https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html\">snoops
"
"on Instagram</a> users by surreptitously turning on the device's camera."
Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.718
retrieving revision 1.719
diff -u -b -r1.718 -r1.719
--- proprietary-surveillance.ru.po 26 May 2021 17:30:40 -0000 1.718
+++ proprietary-surveillance.ru.po 1 Jun 2021 21:31:35 -0000 1.719
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-05-26 08:55+0000\n"
+"POT-Creation-Date: 2021-06-01 21:25+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-06-01 21:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -1057,6 +1058,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-"
+"to-chinese-government-conflicts-with-apples-privacy-first-focus/\">Apple is "
+"moving its Chinese customers' iCloud data to a datacenter controlled by the "
+"Chinese government</a>. Apple is already storing the encryption keys on "
+"these servers, obeying Chinese authority, making all Chinese user data "
+"available to the government."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Facebook <a href=\"https://www.dailymail.co.uk/news/article-8747541/Facebook-"
"accused-watching-Instagram-users-mobile-cameras.html\">snoops on Instagram</"
"a> users by surreptitously turning on the device's camera."
Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.274
retrieving revision 1.275
diff -u -b -r1.274 -r1.275
--- proprietary.de-diff.html 31 May 2021 13:39:56 -0000 1.274
+++ proprietary.de-diff.html 1 Jun 2021 21:31:35 -0000 1.275
@@ -29,9 +29,9 @@
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%; width: max-content;
overflow: auto;
border: .2em solid #e0dfda;
@@ -65,14 +65,14 @@
color: #004caa;
text-decoration: none;
}
-#TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
+#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration:
none;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC a:hover { text-decoration: underline; }
-->
</style>
<style type="text/css" media="print,screen">
- .reduced-width</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>width: 55em;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em></style></em></ins></span>
+ .reduced-width { width: 55em; }
+</style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<span class="inserted"><ins><em><div
class="reduced-width"></em></ins></span>
@@ -116,8 +116,8 @@
<span class="inserted"><ins><em><hr class="thin" />
</div></em></ins></span>
-<p>As of <span class="removed"><del><strong>April,
2017,</strong></del></span> <span class="inserted"><ins><em>March,
2021,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list around
<span class="removed"><del><strong>300</strong></del></span> <span
class="inserted"><ins><em>500</em></ins></span>
-instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with more than 590 references to
+<p>As of <span class="removed"><del><strong>April,
2017,</strong></del></span> <span class="inserted"><ins><em>June,
2021,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list around
<span class="removed"><del><strong>300</strong></del></span> <span
class="inserted"><ins><em>500</em></ins></span>
+instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with more than 600 references to
back them up),</em></ins></span> but there are surely thousands more we don't
know about.</p>
<span class="removed"><del><strong><div class="toc">
@@ -137,19 +137,19 @@
</tr>
<tr>
<td>
- <ul class="columns"></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li>
- <li><a
href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
- <li><a
href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
+ <ul class="columns">
+ <li><a
href="/proprietary/proprietary-addictions.html">Addictions</a></li>
+ <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
<li><a
href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
<li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
<li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
@@ -224,6 +224,17 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202105240">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-05</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-to-chinese-government-conflicts-with-apples-privacy-first-focus/">Apple
+ is moving its Chinese customers' iCloud data to a datacenter controlled
+ by the Chinese government</a>. Apple is already storing the
encryption
+ keys on these servers, obeying Chinese authority, making all Chinese
+ user data available to the government.</p>
+ </li>
+
<li id="M202105130">
<!--#set var="DATE" value='<small
class="date-tag">2021-05</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -274,18 +285,6 @@
in turn is due to people's use of nonfree software which snoops,
and online dis-services which snoop.</p>
</li>
-
- <li id="M202104060">
- <!--#set var="DATE" value='<small
class="date-tag">2021-04</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>The <a
-
href="https://www.wired.com/story/weddings-social-media-apps-photos-memories-miscarriage-problem/">WeddingWire
- app saves people's wedding photos forever and hands over data
- to others</a>, giving users no control over their personal
- information/data. The app also sometimes shows old photos and
- memories to users, without giving them any control over this
- either.</p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -349,7 +348,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/05/31 13:39:56 $
+$Date: 2021/06/01 21:31:35 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.292
retrieving revision 1.293
diff -u -b -r1.292 -r1.293
--- proprietary.de.po 31 May 2021 13:39:56 -0000 1.292
+++ proprietary.de.po 1 Jun 2021 21:31:36 -0000 1.293
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-05-26 08:55+0000\n"
+"POT-Creation-Date: 2021-06-01 21:25+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -106,9 +106,9 @@
"übers Ohr gehauen zu werden â¦"
#. type: Content of: <div><p>
-# | As of [-April, 2017,-] {+March, 2021,+} the [-files-] {+pages+} in this
+# | As of [-April, 2017,-] {+June, 2021,+} the [-files-] {+pages+} in this
# | directory list around [-3-]{+5+}00 instances of malicious
-# | [-functionalities,-] {+functionalities (with more than 590 references to
+# | [-functionalities,-] {+functionalities (with more than 600 references to
# | back them up),+} but there are surely thousands more we don't know about.
#, fuzzy
#| msgid ""
@@ -116,8 +116,8 @@
#| "of malicious functionalities, but there are surely thousands more we "
#| "don't know about."
msgid ""
-"As of March, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 590 references to back them up), "
+"As of June, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 600 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
"In den Dokumenten sind ungefähr 300 Fälle böswilliger Funktionalitäten "
@@ -480,6 +480,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-"
+"to-chinese-government-conflicts-with-apples-privacy-first-focus/\">Apple is "
+"moving its Chinese customers' iCloud data to a datacenter controlled by the "
+"Chinese government</a>. Apple is already storing the encryption keys on "
+"these servers, obeying Chinese authority, making all Chinese user data "
+"available to the government."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"<a href=\"https://gizmodo.com/get-ready-for-in-car-ads-1846888390\">Ford is "
"planning to force ads on drivers in cars</a>, with the ability for the owner "
"to pay extra to turn them off. The system probably imposes surveillance on "
@@ -533,16 +543,6 @@
"snoop."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The <a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
-"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
-"photos forever and hands over data to others</a>, giving users no control "
-"over their personal information/data. The app also sometimes shows old "
-"photos and memories to users, without giving them any control over this "
-"either."
-msgstr ""
-
#. type: Content of: <div><p>
# | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
# | devices</a>-] {+href=\"/proprietary/all.html\">More items…</a>+}
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.459
retrieving revision 1.460
diff -u -b -r1.459 -r1.460
--- proprietary.es.po 27 May 2021 09:00:42 -0000 1.459
+++ proprietary.es.po 1 Jun 2021 21:31:37 -0000 1.460
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-05-26 08:55+0000\n"
+"POT-Creation-Date: 2021-06-01 21:25+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-06-01 21:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -100,9 +101,18 @@
"de ser engañado."
#. type: Content of: <div><p>
+# | As of [-March,-] {+June,+} 2021, the pages in this directory list around
+# | 500 instances of malicious functionalities (with more than [-590-] {+600+}
+# | references to back them up), but there are surely thousands more we don't
+# | know about.
+#, fuzzy
+#| msgid ""
+#| "As of March, 2021, the pages in this directory list around 500 instances "
+#| "of malicious functionalities (with more than 590 references to back them "
+#| "up), but there are surely thousands more we don't know about."
msgid ""
-"As of March, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 590 references to back them up), "
+"As of June, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 600 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
"Hasta marzo de 2021, las páginas de este directorio ofrecen una lista de "
@@ -341,6 +351,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-"
+"to-chinese-government-conflicts-with-apples-privacy-first-focus/\">Apple is "
+"moving its Chinese customers' iCloud data to a datacenter controlled by the "
+"Chinese government</a>. Apple is already storing the encryption keys on "
+"these servers, obeying Chinese authority, making all Chinese user data "
+"available to the government."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"<a href=\"https://gizmodo.com/get-ready-for-in-car-ads-1846888390\">Ford is "
"planning to force ads on drivers in cars</a>, with the ability for the owner "
"to pay extra to turn them off. The system probably imposes surveillance on "
@@ -425,22 +445,6 @@
"esto se debe a la utilización por parte de la gente de software privativo y "
"antiservicios que los espÃan."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The <a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
-"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
-"photos forever and hands over data to others</a>, giving users no control "
-"over their personal information/data. The app also sometimes shows old "
-"photos and memories to users, without giving them any control over this "
-"either."
-msgstr ""
-"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
-"memories-miscarriage-problem/\">La aplicación WeddingWire guarda las fotos "
-"de boda de la gente para siempre y proporciona los datos a terceros</a>, sin "
-"dar a los usuarios el control sobre sus datos e información personal. La "
-"aplicación muestra también de vez en cuando a los usuarios viejas fotos y "
-"recuerdos, sin darles tampoco ningún control sobre ello."
-
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr "<a href=\"/proprietary/all.html\">Ver más…</a>"
@@ -519,3 +523,19 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Ãltima actualización:"
+
+#~ msgid ""
+#~ "The <a href=\"https://www.wired.com/story/weddings-social-media-apps-"
+#~ "photos-memories-miscarriage-problem/\">WeddingWire app saves people's "
+#~ "wedding photos forever and hands over data to others</a>, giving users no "
+#~ "control over their personal information/data. The app also sometimes "
+#~ "shows old photos and memories to users, without giving them any control "
+#~ "over this either."
+#~ msgstr ""
+#~ "<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
+#~ "memories-miscarriage-problem/\">La aplicación WeddingWire guarda las "
+#~ "fotos de boda de la gente para siempre y proporciona los datos a "
+#~ "terceros</a>, sin dar a los usuarios el control sobre sus datos e "
+#~ "información personal. La aplicación muestra también de vez en cuando a "
+#~ "los usuarios viejas fotos y recuerdos, sin darles tampoco ningún control "
+#~ "sobre ello."
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.498
retrieving revision 1.499
diff -u -b -r1.498 -r1.499
--- proprietary.fr.po 31 May 2021 21:09:19 -0000 1.498
+++ proprietary.fr.po 1 Jun 2021 21:31:37 -0000 1.499
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-05-26 08:55+0000\n"
+"POT-Creation-Date: 2021-06-01 21:25+0000\n"
"PO-Revision-Date: 2021-05-26 22:13+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-06-01 21:25+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -99,9 +100,18 @@
"typiquement un moyen de mal se conduire."
#. type: Content of: <div><p>
+# | As of [-March,-] {+June,+} 2021, the pages in this directory list around
+# | 500 instances of malicious functionalities (with more than [-590-] {+600+}
+# | references to back them up), but there are surely thousands more we don't
+# | know about.
+#, fuzzy
+#| msgid ""
+#| "As of March, 2021, the pages in this directory list around 500 instances "
+#| "of malicious functionalities (with more than 590 references to back them "
+#| "up), but there are surely thousands more we don't know about."
msgid ""
-"As of March, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 590 references to back them up), "
+"As of June, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 600 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
"En mars 2021, les pages de ce répertoire dénombraient à peu près 500 cas
de "
@@ -338,6 +348,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-"
+"to-chinese-government-conflicts-with-apples-privacy-first-focus/\">Apple is "
+"moving its Chinese customers' iCloud data to a datacenter controlled by the "
+"Chinese government</a>. Apple is already storing the encryption keys on "
+"these servers, obeying Chinese authority, making all Chinese user data "
+"available to the government."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"<a href=\"https://gizmodo.com/get-ready-for-in-car-ads-1846888390\">Ford is "
"planning to force ads on drivers in cars</a>, with the ability for the owner "
"to pay extra to turn them off. The system probably imposes surveillance on "
@@ -422,22 +442,6 @@
"utilisent du logiciel non libre et des mal-services en ligne qui les "
"espionnent."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The <a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
-"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
-"photos forever and hands over data to others</a>, giving users no control "
-"over their personal information/data. The app also sometimes shows old "
-"photos and memories to users, without giving them any control over this "
-"either."
-msgstr ""
-"L'appli <a href=\"https://www.wired.com/story/weddings-social-media-apps-"
-"photos-memories-miscarriage-problem/\">WeddingWire sauvegarde les photos de "
-"mariage de l'utilisateur indéfiniment et les communique à d'autres</a> sans
"
-"lui donner le moindre contrôle sur ses données personnelles. De plus, "
-"l'appli montre de temps en temps ces vieux souvenirs à l'utilisateur, là "
-"aussi sans qu'il ait son mot à dire."
-
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr "<a href=\"/proprietary/all.html\">Voir plus…</a>"
@@ -510,3 +514,18 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "The <a href=\"https://www.wired.com/story/weddings-social-media-apps-"
+#~ "photos-memories-miscarriage-problem/\">WeddingWire app saves people's "
+#~ "wedding photos forever and hands over data to others</a>, giving users no "
+#~ "control over their personal information/data. The app also sometimes "
+#~ "shows old photos and memories to users, without giving them any control "
+#~ "over this either."
+#~ msgstr ""
+#~ "L'appli <a href=\"https://www.wired.com/story/weddings-social-media-apps-"
+#~ "photos-memories-miscarriage-problem/\">WeddingWire sauvegarde les photos "
+#~ "de mariage de l'utilisateur indéfiniment et les communique Ã
d'autres</a> "
+#~ "sans lui donner le moindre contrôle sur ses données personnelles. De "
+#~ "plus, l'appli montre de temps en temps ces vieux souvenirs à "
+#~ "l'utilisateur, là aussi sans qu'il ait son mot à dire."
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.285
retrieving revision 1.286
diff -u -b -r1.285 -r1.286
--- proprietary.it-diff.html 26 May 2021 17:04:51 -0000 1.285
+++ proprietary.it-diff.html 1 Jun 2021 21:31:37 -0000 1.286
@@ -29,9 +29,9 @@
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%; width: max-content;
overflow: auto;
border: .2em solid #e0dfda;
@@ -58,16 +58,16 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
+#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
}
-#TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
+#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration:
none;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC a:hover { text-decoration: underline; }
-->
</style>
<style type="text/css" media="print,screen">
@@ -116,8 +116,8 @@
<span class="inserted"><ins><em><hr class="thin" />
</div></em></ins></span>
-<p>As of <span class="removed"><del><strong>April,
2017,</strong></del></span> <span class="inserted"><ins><em>March,
2021,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list around
<span class="removed"><del><strong>300</strong></del></span> <span
class="inserted"><ins><em>500</em></ins></span>
-instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with more than 590 references to
+<p>As of <span class="removed"><del><strong>April,
2017,</strong></del></span> <span class="inserted"><ins><em>June,
2021,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list around
<span class="removed"><del><strong>300</strong></del></span> <span
class="inserted"><ins><em>500</em></ins></span>
+instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with more than 600 references to
back them up),</em></ins></span> but there are surely thousands more we don't
know about.</p>
<span class="removed"><del><strong><div class="toc">
@@ -137,19 +137,19 @@
</tr>
<tr>
<td>
- <ul class="columns"></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li>
- <li><a
href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
- <li><a
href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
+ <ul class="columns">
+ <li><a
href="/proprietary/proprietary-addictions.html">Addictions</a></li>
+ <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
<li><a
href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
<li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
<li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
@@ -199,10 +199,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -223,6 +223,17 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202105240">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-05</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-to-chinese-government-conflicts-with-apples-privacy-first-focus/">Apple
+ is moving its Chinese customers' iCloud data to a datacenter controlled
+ by the Chinese government</a>. Apple is already storing the
encryption
+ keys on these servers, obeying Chinese authority, making all Chinese
+ user data available to the government.</p>
+ </li>
+
<li id="M202105130">
<!--#set var="DATE" value='<small
class="date-tag">2021-05</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -273,18 +284,6 @@
in turn is due to people's use of nonfree software which snoops,
and online dis-services which snoop.</p>
</li>
-
- <li id="M202104060">
- <!--#set var="DATE" value='<small
class="date-tag">2021-04</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>The <a
-
href="https://www.wired.com/story/weddings-social-media-apps-photos-memories-miscarriage-problem/">WeddingWire
- app saves people's wedding photos forever and hands over data
- to others</a>, giving users no control over their personal
- information/data. The app also sometimes shows old photos and
- memories to users, without giving them any control over this
- either.</p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -348,7 +347,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/05/26 17:04:51 $
+$Date: 2021/06/01 21:31:37 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.301
retrieving revision 1.302
diff -u -b -r1.301 -r1.302
--- proprietary.it.po 26 May 2021 09:02:18 -0000 1.301
+++ proprietary.it.po 1 Jun 2021 21:31:37 -0000 1.302
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-05-26 08:55+0000\n"
+"POT-Creation-Date: 2021-06-01 21:25+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -102,9 +102,9 @@
"norma. Il software proprietario moderno è tipicamente una fregatura."
#. type: Content of: <div><p>
-# | As of [-April, 2017,-] {+March, 2021,+} the [-files-] {+pages+} in this
+# | As of [-April, 2017,-] {+June, 2021,+} the [-files-] {+pages+} in this
# | directory list around [-3-]{+5+}00 instances of malicious
-# | [-functionalities,-] {+functionalities (with more than 590 references to
+# | [-functionalities,-] {+functionalities (with more than 600 references to
# | back them up),+} but there are surely thousands more we don't know about.
#, fuzzy
#| msgid ""
@@ -112,8 +112,8 @@
#| "of malicious functionalities, but there are surely thousands more we "
#| "don't know about."
msgid ""
-"As of March, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 590 references to back them up), "
+"As of June, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 600 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
"Nel 2017 questo elenco comprende circa 300 esempi di funzionalità malevole, "
@@ -485,6 +485,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-"
+"to-chinese-government-conflicts-with-apples-privacy-first-focus/\">Apple is "
+"moving its Chinese customers' iCloud data to a datacenter controlled by the "
+"Chinese government</a>. Apple is already storing the encryption keys on "
+"these servers, obeying Chinese authority, making all Chinese user data "
+"available to the government."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"<a href=\"https://gizmodo.com/get-ready-for-in-car-ads-1846888390\">Ford is "
"planning to force ads on drivers in cars</a>, with the ability for the owner "
"to pay extra to turn them off. The system probably imposes surveillance on "
@@ -538,16 +548,6 @@
"snoop."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The <a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
-"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
-"photos forever and hands over data to others</a>, giving users no control "
-"over their personal information/data. The app also sometimes shows old "
-"photos and memories to users, without giving them any control over this "
-"either."
-msgstr ""
-
#. type: Content of: <div><p>
# | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
# | devices</a>-] {+href=\"/proprietary/all.html\">More items…</a>+}
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.289
retrieving revision 1.290
diff -u -b -r1.289 -r1.290
--- proprietary.ja-diff.html 26 May 2021 17:04:51 -0000 1.289
+++ proprietary.ja-diff.html 1 Jun 2021 21:31:37 -0000 1.290
@@ -28,10 +28,10 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC {
- display: block;</em></ins></span>
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%; width: max-content;
overflow: auto;
border: .2em solid #e0dfda;
@@ -56,7 +56,7 @@
#TOC ul { padding-top: .5em; margin: 0; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom:
.5em; margin: 0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
@@ -64,7 +64,7 @@
text-decoration: none;
}
#TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline;</em></ins></span> }
+#TOC a:hover</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -113,8 +113,8 @@
<span class="inserted"><ins><em><hr class="thin" />
</div></em></ins></span>
-<p>As of <span class="removed"><del><strong>January,
2017,</strong></del></span> <span class="inserted"><ins><em>March,
2021,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list around
<span class="removed"><del><strong>260</strong></del></span> <span
class="inserted"><ins><em>500</em></ins></span>
-instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with more than 590 references to
+<p>As of <span class="removed"><del><strong>January,
2017,</strong></del></span> <span class="inserted"><ins><em>June,
2021,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list around
<span class="removed"><del><strong>260</strong></del></span> <span
class="inserted"><ins><em>500</em></ins></span>
+instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with more than 600 references to
back them up),</em></ins></span> but there are surely thousands more we don't
know about.</p>
<span class="removed"><del><strong><div class="toc">
@@ -129,8 +129,7 @@
<li><a href="/proprietary/malware-mobiles.html">Malware in
mobile devices</a></li>
<li><a href="/proprietary/malware-kindle-swindle.html">Malware
in</strong></del></span> <span class="inserted"><ins><em>make other changes,
subscribe to</em></ins></span> the <span class="removed"><del><strong>Amazon
- Swindle</a></li>
- <li><a href="/proprietary/malware-games.html">Malware in
games</a></li></strong></del></span> <span
class="inserted"><ins><em><a
+ Swindle</a></li></strong></del></span> <span
class="inserted"><ins><em><a
href="https://lists.gnu.org/mailman/listinfo/www-malware-commits">mailing
list
<www-malware-commits@gnu.org></a>.</p>
@@ -142,7 +141,8 @@
<tr>
<td>
<ul class="columns"></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li>
+ <li><a href="/proprietary/malware-appliances.html">Malware in
appliances</a></li>
</ul>
</div>
@@ -166,13 +166,13 @@
<li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary-tethers.html">Tethers</a> (<a
href="#f4">4</a>)</li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html">Tethers</a>
to
-servers</li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-tyrants.html">Tyrants</a> (<a
href="#f5">5</a>)</li>
- <li><a href="/proprietary/potential-malware.html">In the
pipe</a></li>
+servers</li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-tyrants.html">Tyrants</a> (<a
href="#f5">5</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/potential-malware.html">In the
pipe</a></li>
</ul>
</td>
<td>
- <ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
+ <ul>
+ <li><a
href="/proprietary/malware-appliances.html">Appliances</a></li>
<li><a
href="/proprietary/malware-cars.html">Cars</a></li>
<li><a
href="/proprietary/malware-games.html">Games</a></li>
<li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li>
@@ -205,10 +205,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -228,6 +228,17 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202105240">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-05</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-to-chinese-government-conflicts-with-apples-privacy-first-focus/">Apple
+ is moving its Chinese customers' iCloud data to a datacenter controlled
+ by the Chinese government</a>. Apple is already storing the
encryption
+ keys on these servers, obeying Chinese authority, making all Chinese
+ user data available to the government.</p>
+ </li>
+
<li id="M202105130">
<!--#set var="DATE" value='<small
class="date-tag">2021-05</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -278,18 +289,6 @@
in turn is due to people's use of nonfree software which snoops,
and online dis-services which snoop.</p>
</li>
-
- <li id="M202104060">
- <!--#set var="DATE" value='<small
class="date-tag">2021-04</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>The <a
-
href="https://www.wired.com/story/weddings-social-media-apps-photos-memories-miscarriage-problem/">WeddingWire
- app saves people's wedding photos forever and hands over data
- to others</a>, giving users no control over their personal
- information/data. The app also sometimes shows old photos and
- memories to users, without giving them any control over this
- either.</p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -353,7 +352,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/05/26 17:04:51 $
+$Date: 2021/06/01 21:31:37 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.284
retrieving revision 1.285
diff -u -b -r1.284 -r1.285
--- proprietary.ja.po 26 May 2021 09:02:18 -0000 1.284
+++ proprietary.ja.po 1 Jun 2021 21:31:37 -0000 1.285
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-05-26 08:55+0000\n"
+"POT-Creation-Date: 2021-06-01 21:25+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -100,8 +100,8 @@
#| "instances of malicious functionalities, but there are surely thousands "
#| "more we don't know about."
msgid ""
-"As of March, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 590 references to back them up), "
+"As of June, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 600 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
"2017å¹´1ææç¹ã§ãããã«ã¯ãç´260ã®ç°ãªãæªæã®ããæ©è½ã®å®ä¾ãæ²è¼ããã¦ãã¾"
@@ -343,6 +343,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-"
+"to-chinese-government-conflicts-with-apples-privacy-first-focus/\">Apple is "
+"moving its Chinese customers' iCloud data to a datacenter controlled by the "
+"Chinese government</a>. Apple is already storing the encryption keys on "
+"these servers, obeying Chinese authority, making all Chinese user data "
+"available to the government."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"<a href=\"https://gizmodo.com/get-ready-for-in-car-ads-1846888390\">Ford is "
"planning to force ads on drivers in cars</a>, with the ability for the owner "
"to pay extra to turn them off. The system probably imposes surveillance on "
@@ -396,16 +406,6 @@
"snoop."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The <a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
-"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
-"photos forever and hands over data to others</a>, giving users no control "
-"over their personal information/data. The app also sometimes shows old "
-"photos and memories to users, without giving them any control over this "
-"either."
-msgstr ""
-
#. type: Content of: <div><p>
#, fuzzy
#| msgid "<a href=\"/proprietary/malware-mobiles.html\">Mobiles</a>"
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.286
retrieving revision 1.287
diff -u -b -r1.286 -r1.287
--- proprietary.nl-diff.html 31 May 2021 09:06:22 -0000 1.286
+++ proprietary.nl-diff.html 1 Jun 2021 21:31:37 -0000 1.287
@@ -29,9 +29,9 @@
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%; width: max-content;
overflow: auto;
border: .2em solid #e0dfda;
@@ -58,16 +58,16 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
+#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
}
-#TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
+#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration:
none;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC a:hover { text-decoration: underline; }
-->
</style>
<style type="text/css" media="print,screen">
@@ -116,8 +116,8 @@
<span class="inserted"><ins><em><hr class="thin" />
</div></em></ins></span>
-<p>As of <span class="removed"><del><strong>April,
2017,</strong></del></span> <span class="inserted"><ins><em>March,
2021,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list around
<span class="removed"><del><strong>300</strong></del></span> <span
class="inserted"><ins><em>500</em></ins></span>
-instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with more than 590 references to
+<p>As of <span class="removed"><del><strong>April,
2017,</strong></del></span> <span class="inserted"><ins><em>June,
2021,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list around
<span class="removed"><del><strong>300</strong></del></span> <span
class="inserted"><ins><em>500</em></ins></span>
+instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with more than 600 references to
back them up),</em></ins></span> but there are surely thousands more we don't
know about.</p>
<span class="removed"><del><strong><div class="toc">
@@ -137,20 +137,20 @@
</tr>
<tr>
<td>
- <ul class="columns"></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-phones.html">Malware
in phones</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
- <li><a
href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
- <li><a
href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
+ <ul class="columns">
+ <li><a
href="/proprietary/proprietary-addictions.html">Addictions</a></li>
+ <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-phones.html">Malware
in phones</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html">Manipulation</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
<li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
<li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
<li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
@@ -199,10 +199,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -223,6 +223,17 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202105240">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-05</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-to-chinese-government-conflicts-with-apples-privacy-first-focus/">Apple
+ is moving its Chinese customers' iCloud data to a datacenter controlled
+ by the Chinese government</a>. Apple is already storing the
encryption
+ keys on these servers, obeying Chinese authority, making all Chinese
+ user data available to the government.</p>
+ </li>
+
<li id="M202105130">
<!--#set var="DATE" value='<small
class="date-tag">2021-05</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -273,18 +284,6 @@
in turn is due to people's use of nonfree software which snoops,
and online dis-services which snoop.</p>
</li>
-
- <li id="M202104060">
- <!--#set var="DATE" value='<small
class="date-tag">2021-04</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>The <a
-
href="https://www.wired.com/story/weddings-social-media-apps-photos-memories-miscarriage-problem/">WeddingWire
- app saves people's wedding photos forever and hands over data
- to others</a>, giving users no control over their personal
- information/data. The app also sometimes shows old photos and
- memories to users, without giving them any control over this
- either.</p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -348,7 +347,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/05/31 09:06:22 $
+$Date: 2021/06/01 21:31:37 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.275
retrieving revision 1.276
diff -u -b -r1.275 -r1.276
--- proprietary.nl.po 30 May 2021 20:26:38 -0000 1.275
+++ proprietary.nl.po 1 Jun 2021 21:31:37 -0000 1.276
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-05-26 08:55+0000\n"
+"POT-Creation-Date: 2021-06-01 21:25+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
"Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -104,9 +104,9 @@
"je meestal belazerd."
#. type: Content of: <div><p>
-# | As of [-April, 2019,-] {+March, 2021,+} the [-files-] {+pages+} in this
+# | As of [-April, 2019,-] {+June, 2021,+} the [-files-] {+pages+} in this
# | directory list around [-4-]{+5+}00 instances of malicious
-# | [-functionalities,-] {+functionalities (with more than 590 references to
+# | [-functionalities,-] {+functionalities (with more than 600 references to
# | back them up),+} but there are surely thousands more we don't know about.
#, fuzzy
#| msgid ""
@@ -114,8 +114,8 @@
#| "of malicious functionalities, but there are surely thousands more we "
#| "don't know about."
msgid ""
-"As of March, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 590 references to back them up), "
+"As of June, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 600 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
"Anno april 2019 staan er in dit overzicht ongeveer 400 gevallen van "
@@ -388,6 +388,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-"
+"to-chinese-government-conflicts-with-apples-privacy-first-focus/\">Apple is "
+"moving its Chinese customers' iCloud data to a datacenter controlled by the "
+"Chinese government</a>. Apple is already storing the encryption keys on "
+"these servers, obeying Chinese authority, making all Chinese user data "
+"available to the government."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"<a href=\"https://gizmodo.com/get-ready-for-in-car-ads-1846888390\">Ford is "
"planning to force ads on drivers in cars</a>, with the ability for the owner "
"to pay extra to turn them off. The system probably imposes surveillance on "
@@ -441,16 +451,6 @@
"snoop."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The <a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
-"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
-"photos forever and hands over data to others</a>, giving users no control "
-"over their personal information/data. The app also sometimes shows old "
-"photos and memories to users, without giving them any control over this "
-"either."
-msgstr ""
-
#. type: Content of: <div><p>
# | <a [-href=\"/proprietary/malware-mobiles.html\">Mobiles</a>-]
# | {+href=\"/proprietary/all.html\">More items…</a>+}
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.302
retrieving revision 1.303
diff -u -b -r1.302 -r1.303
--- proprietary.pl-diff.html 26 May 2021 17:04:51 -0000 1.302
+++ proprietary.pl-diff.html 1 Jun 2021 21:31:37 -0000 1.303
@@ -63,8 +63,8 @@
color: #004caa;
text-decoration: none;
}
-#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration:
none; }
-#TOC a:hover { text-decoration: underline;</em></ins></span> }
+#TOC a { text-decoration: none; }
+#TOC a:hover</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -121,8 +121,8 @@
<hr class="thin" />
</div>
-<p>As of March, 2021, the pages in this directory list around 500
-instances</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>malicious functionalities (with more than 590
references to
+<p>As</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>June, 2021, the pages in this directory list
around 500
+instances of malicious functionalities (with more than 600 references to
back them up), but there are surely thousands more we don't know
about.</p>
<p>If you want to be notified when we add new items or make other
changes,
@@ -166,15 +166,15 @@
<td></em></ins></span>
<ul>
<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
- <li><a
href="/proprietary/malware-cars.html">Cars</a></li>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li>
<li><a
href="/proprietary/malware-games.html">Games</a></li>
- <li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html">Conferencing</a></li>
+ <li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li>
+ <li><a
href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a
href="/proprietary/malware-in-online-conferencing.html">Conferencing</a></li>
</ul>
- <ul>
- <li><a
href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <ul></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
@@ -199,10 +199,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/philosophy/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -222,6 +222,17 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202105240">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-05</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-to-chinese-government-conflicts-with-apples-privacy-first-focus/">Apple
+ is moving its Chinese customers' iCloud data to a datacenter controlled
+ by the Chinese government</a>. Apple is already storing the
encryption
+ keys on these servers, obeying Chinese authority, making all Chinese
+ user data available to the government.</p>
+ </li>
+
<li id="M202105130">
<!--#set var="DATE" value='<small
class="date-tag">2021-05</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -272,18 +283,6 @@
in turn is due to people's use of nonfree software which snoops,
and online dis-services which snoop.</p>
</li>
-
- <li id="M202104060">
- <!--#set var="DATE" value='<small
class="date-tag">2021-04</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>The <a
-
href="https://www.wired.com/story/weddings-social-media-apps-photos-memories-miscarriage-problem/">WeddingWire
- app saves people's wedding photos forever and hands over data
- to others</a>, giving users no control over their personal
- information/data. The app also sometimes shows old photos and
- memories to users, without giving them any control over this
- either.</p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -347,7 +346,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/05/26 17:04:51 $
+$Date: 2021/06/01 21:31:37 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.267
retrieving revision 1.268
diff -u -b -r1.267 -r1.268
--- proprietary.pl.po 26 May 2021 09:02:18 -0000 1.267
+++ proprietary.pl.po 1 Jun 2021 21:31:37 -0000 1.268
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-05-26 08:55+0000\n"
+"POT-Creation-Date: 2021-06-01 21:25+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -143,8 +143,8 @@
#. type: Content of: <div><p>
msgid ""
-"As of March, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 590 references to back them up), "
+"As of June, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 600 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
@@ -569,6 +569,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-"
+"to-chinese-government-conflicts-with-apples-privacy-first-focus/\">Apple is "
+"moving its Chinese customers' iCloud data to a datacenter controlled by the "
+"Chinese government</a>. Apple is already storing the encryption keys on "
+"these servers, obeying Chinese authority, making all Chinese user data "
+"available to the government."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"<a href=\"https://gizmodo.com/get-ready-for-in-car-ads-1846888390\">Ford is "
"planning to force ads on drivers in cars</a>, with the ability for the owner "
"to pay extra to turn them off. The system probably imposes surveillance on "
@@ -622,16 +632,6 @@
"snoop."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The <a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
-"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
-"photos forever and hands over data to others</a>, giving users no control "
-"over their personal information/data. The app also sometimes shows old "
-"photos and memories to users, without giving them any control over this "
-"either."
-msgstr ""
-
#. type: Content of: <div><p>
# | <a [-href=\"/philosophy/malware-mobiles.html\">Malware in mobile
# | devices</a>-] {+href=\"/proprietary/all.html\">More items…</a>+}
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.264
retrieving revision 1.265
diff -u -b -r1.264 -r1.265
--- proprietary.pot 26 May 2021 09:02:18 -0000 1.264
+++ proprietary.pot 1 Jun 2021 21:31:37 -0000 1.265
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-05-26 08:55+0000\n"
+"POT-Creation-Date: 2021-06-01 21:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -79,8 +79,8 @@
#. type: Content of: <div><p>
msgid ""
-"As of March, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 590 references to back them up), "
+"As of June, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 600 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
@@ -280,6 +280,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a "
+"href=\"https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-to-chinese-government-conflicts-with-apples-privacy-first-focus/\">Apple
"
+"is moving its Chinese customers' iCloud data to a datacenter controlled by "
+"the Chinese government</a>. Apple is already storing the encryption keys on "
+"these servers, obeying Chinese authority, making all Chinese user data "
+"available to the government."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"<a href=\"https://gizmodo.com/get-ready-for-in-car-ads-1846888390\">Ford is "
"planning to force ads on drivers in cars</a>, with the ability for the owner "
"to pay extra to turn them off. The system probably imposes surveillance on "
@@ -333,16 +343,6 @@
"snoop."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The <a "
-"href=\"https://www.wired.com/story/weddings-social-media-apps-photos-memories-miscarriage-problem/\">WeddingWire
"
-"app saves people's wedding photos forever and hands over data to others</a>, "
-"giving users no control over their personal information/data. The app also "
-"sometimes shows old photos and memories to users, without giving them any "
-"control over this either."
-msgstr ""
-
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr ""
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.421
retrieving revision 1.422
diff -u -b -r1.421 -r1.422
--- proprietary.pt-br.po 26 May 2021 09:02:18 -0000 1.421
+++ proprietary.pt-br.po 1 Jun 2021 21:31:37 -0000 1.422
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-05-26 08:55+0000\n"
+"POT-Creation-Date: 2021-06-01 21:25+0000\n"
"PO-Revision-Date: 2021-05-08 07:48-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -98,9 +98,14 @@
"ser mal."
#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "As of March, 2021, the pages in this directory list around 500 instances "
+#| "of malicious functionalities (with more than 590 references to back them "
+#| "up), but there are surely thousands more we don't know about."
msgid ""
-"As of March, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 590 references to back them up), "
+"As of June, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 600 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
"Até março de 2021, as páginas neste diretório listam quase 500 exemplos
de "
@@ -336,6 +341,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-"
+"to-chinese-government-conflicts-with-apples-privacy-first-focus/\">Apple is "
+"moving its Chinese customers' iCloud data to a datacenter controlled by the "
+"Chinese government</a>. Apple is already storing the encryption keys on "
+"these servers, obeying Chinese authority, making all Chinese user data "
+"available to the government."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"<a href=\"https://gizmodo.com/get-ready-for-in-car-ads-1846888390\">Ford is "
"planning to force ads on drivers in cars</a>, with the ability for the owner "
"to pay extra to turn them off. The system probably imposes surveillance on "
@@ -397,22 +412,6 @@
"é devido ao uso que as pessoas fazem de softwares não livres que
bisbilhotam "
"e de serviços on-line que bisbilhotam."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The <a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
-"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
-"photos forever and hands over data to others</a>, giving users no control "
-"over their personal information/data. The app also sometimes shows old "
-"photos and memories to users, without giving them any control over this "
-"either."
-msgstr ""
-"O <a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
-"memories-miscarriage-problem/\">aplicativo WeddingWire armazena as fotos de "
-"casamento das pessoas para sempre e entrega os dados a outros</a> e não dá "
-"às pessoas nenhum controle sobre suas informações/dados pessoais. O "
-"aplicativo às vezes também mostra fotos e memórias antigas para o
usuário, "
-"sem que o usuário tenha controle sobre isso."
-
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr "<a href=\"/proprietary/all.html\">Mais itensâ¦</a>"
@@ -488,6 +487,21 @@
msgstr "Ãltima atualização:"
#~ msgid ""
+#~ "The <a href=\"https://www.wired.com/story/weddings-social-media-apps-"
+#~ "photos-memories-miscarriage-problem/\">WeddingWire app saves people's "
+#~ "wedding photos forever and hands over data to others</a>, giving users no "
+#~ "control over their personal information/data. The app also sometimes "
+#~ "shows old photos and memories to users, without giving them any control "
+#~ "over this either."
+#~ msgstr ""
+#~ "O <a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
+#~ "memories-miscarriage-problem/\">aplicativo WeddingWire armazena as fotos "
+#~ "de casamento das pessoas para sempre e entrega os dados a outros</a> e "
+#~ "não dá às pessoas nenhum controle sobre suas informações/dados
pessoais. "
+#~ "O aplicativo às vezes também mostra fotos e memórias antigas para o "
+#~ "usuário, sem que o usuário tenha controle sobre isso."
+
+#~ msgid ""
#~ "A zero-day vulnerability in Zoom which <a href=\"https://www.zdnet.com/"
#~ "article/critical-zoom-vulnerability-triggers-remote-code-execution-"
#~ "without-user-input/\">can be used to launch remote code execution (RCE) "
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.514
retrieving revision 1.515
diff -u -b -r1.514 -r1.515
--- proprietary.ru.po 26 May 2021 17:30:40 -0000 1.514
+++ proprietary.ru.po 1 Jun 2021 21:31:37 -0000 1.515
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-05-26 08:55+0000\n"
+"POT-Creation-Date: 2021-06-01 21:25+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-06-01 21:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -101,9 +102,18 @@
"ÑпоÑоб даÑÑ ÑÐµÐ±Ñ Ð¾Ð´ÑÑаÑиÑÑ."
#. type: Content of: <div><p>
+# | As of [-March,-] {+June,+} 2021, the pages in this directory list around
+# | 500 instances of malicious functionalities (with more than [-590-] {+600+}
+# | references to back them up), but there are surely thousands more we don't
+# | know about.
+#, fuzzy
+#| msgid ""
+#| "As of March, 2021, the pages in this directory list around 500 instances "
+#| "of malicious functionalities (with more than 590 references to back them "
+#| "up), but there are surely thousands more we don't know about."
msgid ""
-"As of March, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 590 references to back them up), "
+"As of June, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 600 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
"Ðа маÑÑ 2021 года на ÑÑÑаниÑаÑ
ÑÑого
каÑалога пеÑеÑиÑлено около 500 "
@@ -340,6 +350,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-"
+"to-chinese-government-conflicts-with-apples-privacy-first-focus/\">Apple is "
+"moving its Chinese customers' iCloud data to a datacenter controlled by the "
+"Chinese government</a>. Apple is already storing the encryption keys on "
+"these servers, obeying Chinese authority, making all Chinese user data "
+"available to the government."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"<a href=\"https://gizmodo.com/get-ready-for-in-car-ads-1846888390\">Ford is "
"planning to force ads on drivers in cars</a>, with the ability for the owner "
"to pay extra to turn them off. The system probably imposes surveillance on "
@@ -422,22 +442,6 @@
"лÑди полÑзÑÑÑÑÑ Ð½ÐµÑвободнÑми
пÑогÑаммами, коÑоÑÑе подглÑдÑваÑÑ, и
ÑеÑевÑми "
"медвежÑими ÑÑлÑгами, коÑоÑÑе
подглÑдÑваÑÑ."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The <a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
-"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
-"photos forever and hands over data to others</a>, giving users no control "
-"over their personal information/data. The app also sometimes shows old "
-"photos and memories to users, without giving them any control over this "
-"either."
-msgstr ""
-"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
-"memories-miscarriage-problem/\">ÐÑиложение WeddingWire ÑоÑ
ÑанÑÐµÑ Ð½Ð°Ð²Ñегда "
-"ÑвадебнÑе ÑоÑогÑаÑии, пеÑÐµÐ´Ð°ÐµÑ Ð´Ð°Ð½Ð½Ñе
дÑÑгим</a>, не пÑедоÑÑавлÑÑ Ð»ÑдÑм "
-"конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´ иÑ
пеÑÑоналÑнÑми даннÑми.
ÐÑиложение Ñакже иногда показÑÐ²Ð°ÐµÑ "
-"полÑзоваÑелzм ÑÑаÑÑе ÑоÑогÑаÑии и
запиÑки, и полÑзоваÑели Ñоже ниÑего не "
-"могÑÑ Ñ ÑÑим ÑделаÑÑ."
-
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr "<a href=\"/proprietary/all.html\">Ðалее...</a>"
@@ -515,6 +519,21 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "The <a href=\"https://www.wired.com/story/weddings-social-media-apps-"
+#~ "photos-memories-miscarriage-problem/\">WeddingWire app saves people's "
+#~ "wedding photos forever and hands over data to others</a>, giving users no "
+#~ "control over their personal information/data. The app also sometimes "
+#~ "shows old photos and memories to users, without giving them any control "
+#~ "over this either."
+#~ msgstr ""
+#~ "<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
+#~ "memories-miscarriage-problem/\">ÐÑиложение WeddingWire ÑоÑ
ÑанÑÐµÑ Ð½Ð°Ð²Ñегда "
+#~ "ÑвадебнÑе ÑоÑогÑаÑии, пеÑÐµÐ´Ð°ÐµÑ Ð´Ð°Ð½Ð½Ñе
дÑÑгим</a>, не пÑедоÑÑавлÑÑ Ð»ÑдÑм "
+#~ "конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´ иÑ
пеÑÑоналÑнÑми даннÑми.
ÐÑиложение Ñакже иногда показÑÐ²Ð°ÐµÑ "
+#~ "полÑзоваÑелzм ÑÑаÑÑе ÑоÑогÑаÑии и
запиÑки, и полÑзоваÑели Ñоже ниÑего не "
+#~ "могÑÑ Ñ ÑÑим ÑделаÑÑ."
+
+#~ msgid ""
#~ "A zero-day vulnerability in Zoom which <a href=\"https://www.zdnet.com/"
#~ "article/critical-zoom-vulnerability-triggers-remote-code-execution-"
#~ "without-user-input/\">can be used to launch remote code execution (RCE) "
Index: proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.165
retrieving revision 1.166
diff -u -b -r1.165 -r1.166
--- proprietary.tr.po 29 May 2021 10:07:13 -0000 1.165
+++ proprietary.tr.po 1 Jun 2021 21:31:37 -0000 1.166
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-05-26 08:55+0000\n"
+"POT-Creation-Date: 2021-06-01 21:25+0000\n"
"PO-Revision-Date: 2021-05-29 11:51+0200\n"
"Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
"Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-06-01 21:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"X-Generator: Poedit 2.4.2\n"
@@ -98,9 +99,14 @@
"Modern özel mülk yazılımın genellikle sahip olduÄu bir yoldur."
#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "As of March, 2021, the pages in this directory list around 500 instances "
+#| "of malicious functionalities (with more than 590 references to back them "
+#| "up), but there are surely thousands more we don't know about."
msgid ""
-"As of March, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 590 references to back them up), "
+"As of June, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 600 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
"Mart 2021 itibarıyla bu dizindeki sayfalar (destekleyen 590'dan fazla "
@@ -336,6 +342,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-"
+"to-chinese-government-conflicts-with-apples-privacy-first-focus/\">Apple is "
+"moving its Chinese customers' iCloud data to a datacenter controlled by the "
+"Chinese government</a>. Apple is already storing the encryption keys on "
+"these servers, obeying Chinese authority, making all Chinese user data "
+"available to the government."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"<a href=\"https://gizmodo.com/get-ready-for-in-car-ads-1846888390\">Ford is "
"planning to force ads on drivers in cars</a>, with the ability for the owner "
"to pay extra to turn them off. The system probably imposes surveillance on "
@@ -415,22 +431,6 @@
"gizlice gözetleyen özgür olmayan yazılımlar ve gizlice gözetleyen
çevrimiçi "
"hizmetsizlikler kullanmasından kaynaklanıyor."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The <a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
-"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
-"photos forever and hands over data to others</a>, giving users no control "
-"over their personal information/data. The app also sometimes shows old "
-"photos and memories to users, without giving them any control over this "
-"either."
-msgstr ""
-"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
-"memories-miscarriage-problem/\">WeddingWire uygulaması insanların düÄün "
-"fotoÄraflarını sonsuza kadar saklıyor ve baÅkalarına verilerini
veriyor</a>, "
-"ancak insanlara kiÅisel bilgileri/verileri üzerinde herhangi bir denetim "
-"imkanı sunmuyor. Uygulama ayrıca, kullanıcının kesinlikle hiçbir
denetimi "
-"olmadan, eski fotoÄrafları ve anıları gösteriyor."
-
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr "<a href=\"/proprietary/all.html\">Daha fazlası…</a>"
@@ -512,6 +512,21 @@
msgstr "Son Güncelleme:"
#~ msgid ""
+#~ "The <a href=\"https://www.wired.com/story/weddings-social-media-apps-"
+#~ "photos-memories-miscarriage-problem/\">WeddingWire app saves people's "
+#~ "wedding photos forever and hands over data to others</a>, giving users no "
+#~ "control over their personal information/data. The app also sometimes "
+#~ "shows old photos and memories to users, without giving them any control "
+#~ "over this either."
+#~ msgstr ""
+#~ "<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
+#~ "memories-miscarriage-problem/\">WeddingWire uygulaması insanların
düÄün "
+#~ "fotoÄraflarını sonsuza kadar saklıyor ve baÅkalarına verilerini
veriyor</"
+#~ "a>, ancak insanlara kiÅisel bilgileri/verileri üzerinde herhangi bir "
+#~ "denetim imkanı sunmuyor. Uygulama ayrıca, kullanıcının kesinlikle
hiçbir "
+#~ "denetimi olmadan, eski fotoÄrafları ve anıları gösteriyor."
+
+#~ msgid ""
#~ "A zero-day vulnerability in Zoom which <a href=\"https://www.zdnet.com/"
#~ "article/critical-zoom-vulnerability-triggers-remote-code-execution-"
#~ "without-user-input/\">can be used to launch remote code execution (RCE) "
Index: proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.208
retrieving revision 1.209
diff -u -b -r1.208 -r1.209
--- proprietary.zh-cn.po 27 May 2021 03:30:39 -0000 1.208
+++ proprietary.zh-cn.po 1 Jun 2021 21:31:37 -0000 1.209
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-05-26 08:55+0000\n"
+"POT-Creation-Date: 2021-06-01 21:25+0000\n"
"PO-Revision-Date: 2021-05-27 10:30+0800\n"
"Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
"Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-06-01 21:25+0000\n"
"X-Generator: Poedit 2.3\n"
#. type: Content of: <title>
@@ -91,9 +92,14 @@
"çåå¨ã"
#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "As of March, 2021, the pages in this directory list around 500 instances "
+#| "of malicious functionalities (with more than 590 references to back them "
+#| "up), but there are surely thousands more we don't know about."
msgid ""
-"As of March, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 590 references to back them up), "
+"As of June, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 600 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
"æªè³ 2021 å¹´ 3 æï¼æ¤ç®å½ç页é¢ä¸ååºäºå¤§çº¦ 500
个æ¶æåè½å®ä¾ï¼æ 590 å¤ä»½è¯"
@@ -315,6 +321,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-"
+"to-chinese-government-conflicts-with-apples-privacy-first-focus/\">Apple is "
+"moving its Chinese customers' iCloud data to a datacenter controlled by the "
+"Chinese government</a>. Apple is already storing the encryption keys on "
+"these servers, obeying Chinese authority, making all Chinese user data "
+"available to the government."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"<a href=\"https://gizmodo.com/get-ready-for-in-car-ads-1846888390\">Ford is "
"planning to force ads on drivers in cars</a>, with the ability for the owner "
"to pay extra to turn them off. The system probably imposes surveillance on "
@@ -386,20 +402,6 @@
"éåè¿ç§çç¥çæ ¹æºå°±æ¯è¿äºç§äººå
¬å¸å·²ç»å¨å
æ¢ç¨æ·ç个人活å¨è¿ä¸äºå®ï¼èè¿åæ¯"
"ç±äºäººä»¬ä½¿ç¨äºå¸¦æå
æ¢åè½çéèªç±è½¯ä»¶ã"
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The <a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
-"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
-"photos forever and hands over data to others</a>, giving users no control "
-"over their personal information/data. The app also sometimes shows old "
-"photos and memories to users, without giving them any control over this "
-"either."
-msgstr ""
-"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
-"memories-miscarriage-problem/\">WeddingWire åºç¨ä¼æ°¸ä¹
ä¿å人们çå©ç¤¼ç
§ç并æ"
-"交ç»å«äºº</a>ï¼è¿è®©äººä»¬æ
æ³ææ§èªå·±ç个人信æ¯/æ°æ®ã该åºç¨ææ¶è¿åç¨æ·å±ç¤ºè¿å»"
-"çç
§ç以ååå¿çï¼èç¨æ·å´æ æ³æ§å¶è¿ä¸ªåè½ã"
-
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr "<a href=\"/proprietary/all.html\">æ´å¤å
容…</a>"
@@ -475,6 +477,19 @@
msgstr "æåæ´æ°ï¼"
#~ msgid ""
+#~ "The <a href=\"https://www.wired.com/story/weddings-social-media-apps-"
+#~ "photos-memories-miscarriage-problem/\">WeddingWire app saves people's "
+#~ "wedding photos forever and hands over data to others</a>, giving users no "
+#~ "control over their personal information/data. The app also sometimes "
+#~ "shows old photos and memories to users, without giving them any control "
+#~ "over this either."
+#~ msgstr ""
+#~ "<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
+#~ "memories-miscarriage-problem/\">WeddingWire åºç¨ä¼æ°¸ä¹
ä¿å人们çå©ç¤¼ç
§ç并"
+#~ "æ交ç»å«äºº</a>ï¼è¿è®©äººä»¬æ
æ³ææ§èªå·±ç个人信æ¯/æ°æ®ã该åºç¨ææ¶è¿åç¨æ·å±"
+#~ "示è¿å»çç
§ç以ååå¿çï¼èç¨æ·å´æ
æ³æ§å¶è¿ä¸ªåè½ã"
+
+#~ msgid ""
#~ "A zero-day vulnerability in Zoom which <a href=\"https://www.zdnet.com/"
#~ "article/critical-zoom-vulnerability-triggers-remote-code-execution-"
#~ "without-user-input/\">can be used to launch remote code execution (RCE) "
Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.265
retrieving revision 1.266
diff -u -b -r1.265 -r1.266
--- proprietary.zh-tw-diff.html 26 May 2021 17:04:51 -0000 1.265
+++ proprietary.zh-tw-diff.html 1 Jun 2021 21:31:37 -0000 1.266
@@ -29,9 +29,9 @@
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%; width: max-content;
overflow: auto;
border: .2em solid #e0dfda;
@@ -65,14 +65,14 @@
color: #004caa;
text-decoration: none;
}
-#TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
+#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration:
none;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC a:hover { text-decoration: underline; }
-->
</style>
<style type="text/css" media="print,screen">
- .reduced-width</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>width: 55em;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em></style></em></ins></span>
+ .reduced-width { width: 55em; }
+</style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<span class="inserted"><ins><em><div
class="reduced-width"></em></ins></span>
@@ -116,8 +116,8 @@
<span class="inserted"><ins><em><hr class="thin" />
</div></em></ins></span>
-<p>As of <span class="removed"><del><strong>April,
2017,</strong></del></span> <span class="inserted"><ins><em>March,
2021,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list around
<span class="removed"><del><strong>300</strong></del></span> <span
class="inserted"><ins><em>500</em></ins></span>
-instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with more than 590 references to
+<p>As of <span class="removed"><del><strong>April,
2017,</strong></del></span> <span class="inserted"><ins><em>June,
2021,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list around
<span class="removed"><del><strong>300</strong></del></span> <span
class="inserted"><ins><em>500</em></ins></span>
+instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with more than 600 references to
back them up),</em></ins></span> but there are surely thousands more we don't
know about.</p>
<span class="removed"><del><strong><div class="toc">
@@ -137,19 +137,19 @@
</tr>
<tr>
<td>
- <ul class="columns"></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li>
- <li><a
href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
- <li><a
href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
+ <ul class="columns">
+ <li><a
href="/proprietary/proprietary-addictions.html">Addictions</a></li>
+ <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
<li><a
href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
<li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
<li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
@@ -224,6 +224,17 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202105240">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-05</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-to-chinese-government-conflicts-with-apples-privacy-first-focus/">Apple
+ is moving its Chinese customers' iCloud data to a datacenter controlled
+ by the Chinese government</a>. Apple is already storing the
encryption
+ keys on these servers, obeying Chinese authority, making all Chinese
+ user data available to the government.</p>
+ </li>
+
<li id="M202105130">
<!--#set var="DATE" value='<small
class="date-tag">2021-05</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -274,18 +285,6 @@
in turn is due to people's use of nonfree software which snoops,
and online dis-services which snoop.</p>
</li>
-
- <li id="M202104060">
- <!--#set var="DATE" value='<small
class="date-tag">2021-04</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>The <a
-
href="https://www.wired.com/story/weddings-social-media-apps-photos-memories-miscarriage-problem/">WeddingWire
- app saves people's wedding photos forever and hands over data
- to others</a>, giving users no control over their personal
- information/data. The app also sometimes shows old photos and
- memories to users, without giving them any control over this
- either.</p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -349,7 +348,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/05/26 17:04:51 $
+$Date: 2021/06/01 21:31:37 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.254
retrieving revision 1.255
diff -u -b -r1.254 -r1.255
--- proprietary.zh-tw.po 26 May 2021 09:02:19 -0000 1.254
+++ proprietary.zh-tw.po 1 Jun 2021 21:31:38 -0000 1.255
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-05-26 08:55+0000\n"
+"POT-Creation-Date: 2021-06-01 21:25+0000\n"
"PO-Revision-Date: 2020-02-08 17:12+0800\n"
"Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
"Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -97,9 +97,9 @@
"æ¹å¼çºå°æè»é«ã"
#. type: Content of: <div><p>
-# | As of [-April, 2017,-] {+March, 2021,+} the [-files-] {+pages+} in this
+# | As of [-April, 2017,-] {+June, 2021,+} the [-files-] {+pages+} in this
# | directory list around [-3-]{+5+}00 instances of malicious
-# | [-functionalities,-] {+functionalities (with more than 590 references to
+# | [-functionalities,-] {+functionalities (with more than 600 references to
# | back them up),+} but there are surely thousands more we don't know about.
#, fuzzy
#| msgid ""
@@ -107,8 +107,8 @@
#| "of malicious functionalities, but there are surely thousands more we "
#| "don't know about."
msgid ""
-"As of March, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 590 references to back them up), "
+"As of June, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 600 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
"å°2017å¹´4æçºæ¢ï¼æ¤ç®éååºçæªæ¡å·²æ´çåºç´ 300
種æ¡æåè½ç實ä¾ï¼ä½æ¯çµå°é"
@@ -458,6 +458,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-"
+"to-chinese-government-conflicts-with-apples-privacy-first-focus/\">Apple is "
+"moving its Chinese customers' iCloud data to a datacenter controlled by the "
+"Chinese government</a>. Apple is already storing the encryption keys on "
+"these servers, obeying Chinese authority, making all Chinese user data "
+"available to the government."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"<a href=\"https://gizmodo.com/get-ready-for-in-car-ads-1846888390\">Ford is "
"planning to force ads on drivers in cars</a>, with the ability for the owner "
"to pay extra to turn them off. The system probably imposes surveillance on "
@@ -511,16 +521,6 @@
"snoop."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The <a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
-"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
-"photos forever and hands over data to others</a>, giving users no control "
-"over their personal information/data. The app also sometimes shows old "
-"photos and memories to users, without giving them any control over this "
-"either."
-msgstr ""
-
#. type: Content of: <div><p>
# | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
# | devices</a>-] {+href=\"/proprietary/all.html\">More items…</a>+}
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.388
retrieving revision 1.389
diff -u -b -r1.388 -r1.389
--- pt-br.po 26 May 2021 09:02:19 -0000 1.388
+++ pt-br.po 1 Jun 2021 21:31:38 -0000 1.389
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-05-26 08:55+0000\n"
+"POT-Creation-Date: 2021-06-01 21:25+0000\n"
"PO-Revision-Date: 2018-12-11 11:00-0200\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -84,6 +84,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-"
+"to-chinese-government-conflicts-with-apples-privacy-first-focus/\">Apple is "
+"moving its Chinese customers' iCloud data to a datacenter controlled by the "
+"Chinese government</a>. Apple is already storing the encryption keys on "
+"these servers, obeying Chinese authority, making all Chinese user data "
+"available to the government."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"<a href=\"https://gizmodo.com/get-ready-for-in-car-ads-1846888390\">Ford is "
"planning to force ads on drivers in cars</a>, with the ability for the owner "
"to pay extra to turn them off. The system probably imposes surveillance on "
@@ -9863,16 +9873,16 @@
#. type: Content of: <div><p>
#, fuzzy
#| msgid ""
-#| "As of January, 2021, the pages in this directory list around 500 "
-#| "instances of malicious functionalities (with more than 570 references to "
-#| "back them up), but there are surely thousands more we don't know about."
+#| "As of March, 2021, the pages in this directory list around 500 instances "
+#| "of malicious functionalities (with more than 590 references to back them "
+#| "up), but there are surely thousands more we don't know about."
msgid ""
-"As of March, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 590 references to back them up), "
+"As of June, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 600 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
-"Até janeiro de 2021, as páginas neste diretório listam quase 500 exemplos
de "
-"funcionalidades maliciosas (com mais de 570 referências para confirmá-las),
"
+"Até março de 2021, as páginas neste diretório listam quase 500 exemplos
de "
+"funcionalidades maliciosas (com mais de 590 referências para confirmá-las),
"
"mas com certeza há mais milhares das quais nós não temos conhecimento."
#. type: Content of: <div><p>
@@ -11128,6 +11138,21 @@
msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
+#, fuzzy
+#~| msgid ""
+#~| "As of January, 2021, the pages in this directory list around 500 "
+#~| "instances of malicious functionalities (with more than 570 references to "
+#~| "back them up), but there are surely thousands more we don't know about."
+#~ msgid ""
+#~ "As of March, 2021, the pages in this directory list around 500 instances "
+#~ "of malicious functionalities (with more than 590 references to back them "
+#~ "up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "Até janeiro de 2021, as páginas neste diretório listam quase 500
exemplos "
+#~ "de funcionalidades maliciosas (com mais de 570 referências para
confirmá-"
+#~ "las), mas com certeza há mais milhares das quais nós não temos "
+#~ "conhecimento."
+
#
#~ msgid ""
#~ "Please see the <a href=\"/server/standards/README.translations.html"
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.660
retrieving revision 1.661
diff -u -b -r1.660 -r1.661
--- ru.po 26 May 2021 17:23:36 -0000 1.660
+++ ru.po 1 Jun 2021 21:31:38 -0000 1.661
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-05-26 08:55+0000\n"
+"POT-Creation-Date: 2021-06-01 21:25+0000\n"
"PO-Revision-Date: 2021-04-19 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -84,6 +84,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-"
+"to-chinese-government-conflicts-with-apples-privacy-first-focus/\">Apple is "
+"moving its Chinese customers' iCloud data to a datacenter controlled by the "
+"Chinese government</a>. Apple is already storing the encryption keys on "
+"these servers, obeying Chinese authority, making all Chinese user data "
+"available to the government."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"<a href=\"https://gizmodo.com/get-ready-for-in-car-ads-1846888390\">Ford is "
"planning to force ads on drivers in cars</a>, with the ability for the owner "
"to pay extra to turn them off. The system probably imposes surveillance on "
@@ -11689,9 +11699,18 @@
"ÑпоÑоб даÑÑ ÑÐµÐ±Ñ Ð¾Ð´ÑÑаÑиÑÑ."
#. type: Content of: <div><p>
+# | As of [-March,-] {+June,+} 2021, the pages in this directory list around
+# | 500 instances of malicious functionalities (with more than [-590-] {+600+}
+# | references to back them up), but there are surely thousands more we don't
+# | know about.
+#, fuzzy
+#| msgid ""
+#| "As of March, 2021, the pages in this directory list around 500 instances "
+#| "of malicious functionalities (with more than 590 references to back them "
+#| "up), but there are surely thousands more we don't know about."
msgid ""
-"As of March, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 590 references to back them up), "
+"As of June, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 600 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
"Ðа маÑÑ 2021 года на ÑÑÑаниÑаÑ
ÑÑого
каÑалога пеÑеÑиÑлено около 500 "
@@ -13225,6 +13244,15 @@
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
#~ msgid ""
+#~ "As of March, 2021, the pages in this directory list around 500 instances "
+#~ "of malicious functionalities (with more than 590 references to back them "
+#~ "up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "Ðа маÑÑ 2021 года на ÑÑÑаниÑаÑ
ÑÑого
каÑалога пеÑеÑиÑлено около 500 "
+#~ "пÑимеÑов вÑедоноÑнÑÑ
ÑÑнкÑий (и более 590
ÑÑÑлок, подкÑеплÑÑÑиÑ
иÑ
), но "
+#~ "еÑÑÑ, беÑÑпоÑно, ÑÑÑÑÑи дÑÑгиÑ
, о коÑоÑÑÑ
Ð¼Ñ Ð½Ðµ знаем."
+
+#~ msgid ""
#~ "A motorcycle apparel company named Klim, <a href=\"https://www.newscon."
#~ "net/en-gb/posts/this-motorcycle-airbag-vest-will-stop-working-if-you-miss-"
#~ "a-payment/\">sells airbag vests which won't work if you miss a payment</"
Index: tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.184
retrieving revision 1.185
diff -u -b -r1.184 -r1.185
--- tr.po 29 May 2021 10:30:03 -0000 1.184
+++ tr.po 1 Jun 2021 21:31:38 -0000 1.185
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-addictions.html\n"
-"POT-Creation-Date: 2021-05-26 08:55+0000\n"
+"POT-Creation-Date: 2021-06-01 21:25+0000\n"
"PO-Revision-Date: 2020-03-01 15:29+0100\n"
"Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
"Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -85,6 +85,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-"
+"to-chinese-government-conflicts-with-apples-privacy-first-focus/\">Apple is "
+"moving its Chinese customers' iCloud data to a datacenter controlled by the "
+"Chinese government</a>. Apple is already storing the encryption keys on "
+"these servers, obeying Chinese authority, making all Chinese user data "
+"available to the government."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"<a href=\"https://gizmodo.com/get-ready-for-in-car-ads-1846888390\">Ford is "
"planning to force ads on drivers in cars</a>, with the ability for the owner "
"to pay extra to turn them off. The system probably imposes surveillance on "
@@ -8950,15 +8960,15 @@
#. type: Content of: <div><p>
#, fuzzy
#| msgid ""
-#| "As of February, 2021, the pages in this directory list around 500 "
-#| "instances of malicious functionalities (with more than 580 references to "
-#| "back them up), but there are surely thousands more we don't know about."
+#| "As of March, 2021, the pages in this directory list around 500 instances "
+#| "of malicious functionalities (with more than 590 references to back them "
+#| "up), but there are surely thousands more we don't know about."
msgid ""
-"As of March, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 590 references to back them up), "
+"As of June, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 600 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
-"Åubat 2021 itibarıyla bu dizindeki sayfalar (destekleyen 580'den fazla "
+"Mart 2021 itibarıyla bu dizindeki sayfalar (destekleyen 590'dan fazla "
"referansla birlikte) yaklaÅık 500 kötücül iÅlevsellik örneÄini
listeliyor, "
"ancak muhakkak henüz bilmediÄimiz binlercesi vardır."
@@ -10197,6 +10207,20 @@
msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
+#, fuzzy
+#~| msgid ""
+#~| "As of February, 2021, the pages in this directory list around 500 "
+#~| "instances of malicious functionalities (with more than 580 references to "
+#~| "back them up), but there are surely thousands more we don't know about."
+#~ msgid ""
+#~ "As of March, 2021, the pages in this directory list around 500 instances "
+#~ "of malicious functionalities (with more than 590 references to back them "
+#~ "up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "Åubat 2021 itibarıyla bu dizindeki sayfalar (destekleyen 580'den fazla "
+#~ "referansla birlikte) yaklaÅık 500 kötücül iÅlevsellik örneÄini "
+#~ "listeliyor, ancak muhakkak henüz bilmediÄimiz binlercesi vardır."
+
#~ msgid ""
#~ "Please see the <a href=\"/server/standards/README.translations.html"
#~ "\">Translations README</a> for information on coordinating and submitting "
Index: zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.185
retrieving revision 1.186
diff -u -b -r1.185 -r1.186
--- zh-cn.po 27 May 2021 03:30:39 -0000 1.185
+++ zh-cn.po 1 Jun 2021 21:31:38 -0000 1.186
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-05-26 08:55+0000\n"
+"POT-Creation-Date: 2021-06-01 21:25+0000\n"
"PO-Revision-Date: 2020-04-05 15:32+0800\n"
"Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
"Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -87,6 +87,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-"
+"to-chinese-government-conflicts-with-apples-privacy-first-focus/\">Apple is "
+"moving its Chinese customers' iCloud data to a datacenter controlled by the "
+"Chinese government</a>. Apple is already storing the encryption keys on "
+"these servers, obeying Chinese authority, making all Chinese user data "
+"available to the government."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"<a href=\"https://gizmodo.com/get-ready-for-in-car-ads-1846888390\">Ford is "
"planning to force ads on drivers in cars</a>, with the ability for the owner "
"to pay extra to turn them off. The system probably imposes surveillance on "
@@ -8622,15 +8632,15 @@
#. type: Content of: <div><p>
#, fuzzy
#| msgid ""
-#| "As of February, 2021, the pages in this directory list around 500 "
-#| "instances of malicious functionalities (with more than 580 references to "
-#| "back them up), but there are surely thousands more we don't know about."
+#| "As of March, 2021, the pages in this directory list around 500 instances "
+#| "of malicious functionalities (with more than 590 references to back them "
+#| "up), but there are surely thousands more we don't know about."
msgid ""
-"As of March, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 590 references to back them up), "
+"As of June, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 600 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
-"æªè³ 2021 å¹´ 2 æï¼æ¤ç®å½ç页é¢ä¸ååºäºå¤§çº¦ 500
个æ¶æåè½å®ä¾ï¼æ 580 å¤ä»½è¯"
+"æªè³ 2021 å¹´ 3 æï¼æ¤ç®å½ç页é¢ä¸ååºäºå¤§çº¦ 500
个æ¶æåè½å®ä¾ï¼æ 590 å¤ä»½è¯"
"æ®æ¯æï¼ï¼ä½æ¯è¯å®è¿ææ°å个æ们ä¸ç¥éæ
åµã"
#. type: Content of: <div><p>
@@ -9911,6 +9921,19 @@
msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
msgstr "<a href=\"/proprietary/malware-microsoft.html\">微软</a>"
+#, fuzzy
+#~| msgid ""
+#~| "As of February, 2021, the pages in this directory list around 500 "
+#~| "instances of malicious functionalities (with more than 580 references to "
+#~| "back them up), but there are surely thousands more we don't know about."
+#~ msgid ""
+#~ "As of March, 2021, the pages in this directory list around 500 instances "
+#~ "of malicious functionalities (with more than 590 references to back them "
+#~ "up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "æªè³ 2021 å¹´ 2 æï¼æ¤ç®å½ç页é¢ä¸ååºäºå¤§çº¦ 500
个æ¶æåè½å®ä¾ï¼æ 580 å¤"
+#~ "份è¯æ®æ¯æï¼ï¼ä½æ¯è¯å®è¿ææ°å个æ们ä¸ç¥éæ
åµã"
+
#
#
#
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.315
retrieving revision 1.316
diff -u -b -r1.315 -r1.316
--- zh-tw.po 26 May 2021 09:02:19 -0000 1.315
+++ zh-tw.po 1 Jun 2021 21:31:38 -0000 1.316
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-05-26 08:55+0000\n"
+"POT-Creation-Date: 2021-06-01 21:25+0000\n"
"PO-Revision-Date: 2018-03-27 16:48+0800\n"
"Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
"Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -95,6 +95,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-"
+"to-chinese-government-conflicts-with-apples-privacy-first-focus/\">Apple is "
+"moving its Chinese customers' iCloud data to a datacenter controlled by the "
+"Chinese government</a>. Apple is already storing the encryption keys on "
+"these servers, obeying Chinese authority, making all Chinese user data "
+"available to the government."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"<a href=\"https://gizmodo.com/get-ready-for-in-car-ads-1846888390\">Ford is "
"planning to force ads on drivers in cars</a>, with the ability for the owner "
"to pay extra to turn them off. The system probably imposes surveillance on "
@@ -8256,9 +8266,9 @@
"æ¹å¼çºå°æè»é«ã"
#. type: Content of: <div><p>
-# | As of [-April, 2017,-] {+March, 2021,+} the [-files-] {+pages+} in this
+# | As of [-April, 2017,-] {+June, 2021,+} the [-files-] {+pages+} in this
# | directory list around [-3-]{+5+}00 instances of malicious
-# | [-functionalities,-] {+functionalities (with more than 590 references to
+# | [-functionalities,-] {+functionalities (with more than 600 references to
# | back them up),+} but there are surely thousands more we don't know about.
#, fuzzy
#| msgid ""
@@ -8266,8 +8276,8 @@
#| "of malicious functionalities, but there are surely thousands more we "
#| "don't know about."
msgid ""
-"As of March, 2021, the pages in this directory list around 500 instances of "
-"malicious functionalities (with more than 590 references to back them up), "
+"As of June, 2021, the pages in this directory list around 500 instances of "
+"malicious functionalities (with more than 600 references to back them up), "
"but there are surely thousands more we don't know about."
msgstr ""
"å°2017å¹´4æçºæ¢ï¼æ¤ç®éååºçæªæ¡å·²æ´çåºç´ 300
種æ¡æåè½ç實ä¾ï¼ä½æ¯çµå°é"
@@ -9806,6 +9816,19 @@
msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
msgstr "<a href=\"/proprietary/malware-microsoft.html\">å¾®è»æ¡æè»é«</a>"
+#, fuzzy
+#~| msgid ""
+#~| "As of April, 2017, the files in this directory list around 300 instances "
+#~| "of malicious functionalities, but there are surely thousands more we "
+#~| "don't know about."
+#~ msgid ""
+#~ "As of March, 2021, the pages in this directory list around 500 instances "
+#~ "of malicious functionalities (with more than 590 references to back them "
+#~ "up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "å°2017å¹´4æçºæ¢ï¼æ¤ç®éååºçæªæ¡å·²æ´çåºç´ 300
種æ¡æåè½ç實ä¾ï¼ä½æ¯çµå°"
+#~ "éæä¸å種æåä¸ç解çå©ç¨æ¹å¼ã"
+
#
#
#
- www/proprietary/po all.fr.po all.pot all.ru.po ...,
GNUN <=