[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/philosophy open-source-misses-the-point.ru....
From: |
GNUN |
Subject: |
www/philosophy open-source-misses-the-point.ru.... |
Date: |
Thu, 23 Dec 2021 08:01:19 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 21/12/23 08:01:19
Modified files:
philosophy : open-source-misses-the-point.ru.html
surveillance-vs-democracy.it.html
philosophy/po : open-source-misses-the-point.ru-en.html
open-source-misses-the-point.ru.po
surveillance-vs-democracy.it-en.html
surveillance-vs-democracy.it.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/open-source-misses-the-point.ru.html?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/surveillance-vs-democracy.it.html?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.ru-en.html?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.ru.po?cvsroot=www&r1=1.127&r2=1.128
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.it-en.html?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.it.po?cvsroot=www&r1=1.136&r2=1.137
Patches:
Index: open-source-misses-the-point.ru.html
===================================================================
RCS file: /web/www/www/philosophy/open-source-misses-the-point.ru.html,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- open-source-misses-the-point.ru.html 13 Sep 2021 11:34:07 -0000
1.75
+++ open-source-misses-the-point.ru.html 23 Dec 2021 13:01:19 -0000
1.76
@@ -141,10 +141,9 @@
как пÑогÑÐ°Ð¼Ð¼Ñ Ñ Ð¾ÑкÑÑÑÑм иÑÑ
однÑм ÑекÑÑом.
ÐоÑÑи вÑе пÑогÑÐ°Ð¼Ð¼Ñ Ñ Ð¾ÑкÑÑÑÑм
иÑÑ
однÑм ÑекÑÑом ÑвободнÑ, но еÑÑÑ
иÑклÑÑениÑ. Ðо-пеÑвÑÑ
, некоÑоÑÑе лиÑензии
оÑкÑÑÑого иÑÑ
одного ÑекÑÑа ÑлиÑком
жеÑÑки, Ñак ÑÑо они не могÑÑ ÑÑиÑаÑÑÑÑ
-лиÑензиÑми ÑвободнÑÑ
пÑогÑамм. ÐапÑимеÑ,
“Open Watcom”
-неÑвободен, поÑÐ¾Ð¼Ñ ÑÑо его лиÑÐµÐ½Ð·Ð¸Ñ Ð½Ðµ
допÑÑÐºÐ°ÐµÑ Ð¸Ð·Ð³Ð¾Ñовление измененнÑÑ
-веÑÑий Ð´Ð»Ñ ÑаÑÑного полÑзованиÑ. Ð
ÑÑаÑÑÑÑ, пÑогÑамм Ñ Ñакими лиÑензиÑми
-мало.</p>
+лиÑензиÑми ÑвободнÑÑ
пÑогÑамм. ÐапÑимеÑ,
Open Watcom неÑвободен, поÑÐ¾Ð¼Ñ ÑÑо
+его лиÑÐµÐ½Ð·Ð¸Ñ Ð½Ðµ допÑÑÐºÐ°ÐµÑ Ð¸Ð·Ð³Ð¾Ñовление
измененнÑÑ
веÑÑий Ð´Ð»Ñ ÑаÑÑного
+полÑзованиÑ. Ð ÑÑаÑÑÑÑ, пÑогÑамм Ñ Ñакими
лиÑензиÑми мало.</p>
<p>Ðо-вÑоÑÑÑ
, когда иÑÑ
однÑй ÑекÑÑ
пÑогÑÐ°Ð¼Ð¼Ñ Ð½ÐµÑÐµÑ ÑлабÑÑ Ð»Ð¸ÑензиÑ,
Ñ.е. лиÑÐµÐ½Ð·Ð¸Ñ Ð±ÐµÐ· авÑоÑÑкого лева, ее
иÑполнÑемÑе ÑÐ°Ð¹Ð»Ñ Ð¼Ð¾Ð³ÑÑ Ð½ÐµÑÑи
@@ -202,21 +201,27 @@
пÑогÑамма” еÑÑÑ Ñа или инаÑ
ÑеманÑиÑеÑÐºÐ°Ñ Ð¿Ñоблема — в Ñом
ÑиÑле и Ñ “оÑкÑÑÑого иÑÑ
одного
ÑекÑÑа”.</p>
-<p><a href="https://opensource.org/osd">ÐÑиÑиалÑное
опÑеделение
-“пÑогÑÐ°Ð¼Ð¼Ñ Ñ Ð¾ÑкÑÑÑÑм иÑÑ
однÑм
ÑекÑÑом”</a> (коÑоÑое
-опÑбликовано ÐниÑиаÑивной гÑÑппой
оÑкÑÑÑого иÑÑ
одного ÑекÑÑа и ÑлиÑком
-длинно, ÑÑÐ¾Ð±Ñ Ð¿ÑиводиÑÑ ÐµÐ³Ð¾ здеÑÑ) бÑло
вÑведено (коÑвенно) из наÑиÑ
-кÑиÑеÑиев ÑвободнÑÑ
пÑогÑамм. ÐÑо не одно
и Ñоже, оно немного ÑиÑе в
-некоÑоÑÑÑ
аÑпекÑаÑ
. Тем не менее иÑ
опÑеделение ÑоглаÑÑеÑÑÑ Ñ Ð½Ð°Ñим в
-болÑÑинÑÑве ÑлÑÑаев.</p>
+<p><a href="https://opensource.org/osd">ÐÑиÑиалÑное
опÑеделение пÑогÑÐ°Ð¼Ð¼Ñ Ñ
+оÑкÑÑÑÑм иÑÑ
однÑм ÑекÑÑом</a> (коÑоÑое
опÑбликовано ÐниÑиаÑивной гÑÑппой
+оÑкÑÑÑого иÑÑ
одного ÑекÑÑа и ÑлиÑком
длинно, ÑÑÐ¾Ð±Ñ Ð¿ÑиводиÑÑ ÐµÐ³Ð¾ здеÑÑ) бÑло
+вÑведено (коÑвенно) из наÑиÑ
кÑиÑеÑиев
ÑвободнÑÑ
пÑогÑамм. ÐÑо не одно и
+Ñоже, оно немного ÑиÑе в некоÑоÑÑÑ
аÑпекÑаÑ
. Тем не менее иÑ
опÑеделение
+ÑоглаÑÑеÑÑÑ Ñ Ð½Ð°Ñим в болÑÑинÑÑве
ÑлÑÑаев.</p>
<p>Ðднако оÑевидное знаÑение вÑÑажениÑ
“пÑогÑамма Ñ Ð¾ÑкÑÑÑÑм иÑÑ
однÑм
ÑекÑÑом” — “Ð²Ñ Ð¼Ð¾Ð¶ÐµÑе ÑмоÑÑеÑÑ
на иÑÑ
однÑй
-ÑекÑÑ”,— и болÑÑинÑÑво лÑдей, поÑ
оже,
дÑмаеÑ, ÑÑо оно ÑÑо и
-ознаÑаеÑ. ÐÑÐ¾Ñ ÐºÑиÑеÑий намного Ñлабее,
Ñем опÑеделение Ñвободной пÑогÑаммÑ,
-а Ñакже намного Ñлабее, Ñем оÑиÑиалÑное
опÑеделение оÑкÑÑÑого иÑÑ
одного
-ÑекÑÑа. ÐÐ¼Ñ ÑооÑвеÑÑÑвÑÐµÑ Ð¼Ð½Ð¾Ð³Ð¾ пÑогÑамм,
коÑоÑÑе не ÑвлÑÑÑÑÑ Ð½Ð¸ ÑвободнÑми
-пÑогÑаммами, ни пÑогÑаммами Ñ Ð¾ÑкÑÑÑÑм иÑÑ
однÑм ÑекÑÑом.</p>
+ÑекÑÑ”. ÐейÑÑвиÑелÑно, болÑÑинÑÑво
лÑдей, поÑ
оже, невеÑно понимаеÑ
+вÑÑажение “пÑогÑамма Ñ Ð¾ÑкÑÑÑÑм иÑÑ
однÑм ÑекÑÑом” в ÑÑом ÑмÑÑле
+(ÑÑное вÑÑажение Ð´Ð»Ñ Ñакого понÑÑÐ¸Ñ —
“доÑÑÑпен иÑÑ
однÑй
+ÑекÑÑ”). ÐÑÐ¾Ñ ÐºÑиÑеÑий намного Ñлабее,
Ñем опÑеделение Ñвободной
+пÑогÑаммÑ, а Ñакже намного Ñлабее, Ñем
оÑиÑиалÑное опÑеделение оÑкÑÑÑого
+иÑÑ
одного ÑекÑÑа. ÐÐ¼Ñ ÑооÑвеÑÑÑвÑÐµÑ Ð¼Ð½Ð¾Ð³Ð¾
пÑогÑамм, коÑоÑÑе не ÑвлÑÑÑÑÑ Ð½Ð¸
+ÑвободнÑми пÑогÑаммами, ни пÑогÑаммами Ñ
оÑкÑÑÑÑм иÑÑ
однÑм ÑекÑÑом.</p>
+
+<p>ÐоÑÐµÐ¼Ñ Ð»Ñди невеÑно понимаÑÑ ÑÑо в Ñаком
ÑмÑÑле? ÐоÑÐ¾Ð¼Ñ ÑÑо Ñаково
+еÑÑеÑÑвенное знаÑение Ñлов “оÑкÑÑÑÑй
иÑÑ
однÑй ÑекÑÑ”. Ðо
+понÑÑием, Ð´Ð»Ñ ÐºÐ¾ÑоÑого ÑÑоÑонники
оÑкÑÑÑого иÑÑ
одного ÑекÑÑа иÑкали дÑÑгое
+знаÑение, бÑло понÑÑие Ñвободной
пÑогÑаммÑ.</p>
<p>ÐоÑколÑÐºÑ Ð½Ð°Ð¸Ð²Ð½Ð¾Ðµ Ñолкование
“оÑкÑÑÑого иÑÑ
одного ÑекÑÑа” не
ознаÑÐ°ÐµÑ Ñого, ÑÑо подÑазÑмеваÑÑ ÐµÐ³Ð¾
заÑиÑники, ÑÑо пÑÐ¸Ð²Ð¾Ð´Ð¸Ñ Ðº ÑомÑ, ÑÑо
@@ -369,13 +374,13 @@
<h3>ÐоÑÐ·Ð½Ñ ÑвободÑ</h3>
<p>ÐÐ»Ð°Ð²Ð½Ð°Ñ Ð¿ÐµÑвонаÑалÑÐ½Ð°Ñ Ð¼Ð¾ÑиваÑÐ¸Ñ ÑеÑ
,
кÑо оÑделилÑÑ Ð² лагеÑÑ Ð¾ÑкÑÑÑого
-иÑÑ
одного ÑекÑÑа, заклÑÑаеÑÑÑ Ð² Ñом, ÑÑо
ÑÑиÑеÑкие идеи “ÑвободнÑÑ
-пÑогÑамм” оÑпÑгиваÑÑ Ð½ÐµÐºÐ¾ÑоÑÑÑ
лÑдей.
ÐÑо пÑавда: поднимаÑÑ Ñакие
-ÑÑиÑеÑкие вопÑоÑÑ, как Ñвобода, говоÑиÑÑ
об оÑвеÑÑÑвенноÑÑи, а не ÑолÑко об
-ÑдобÑÑве, знаÑÐ¸Ñ Ð¿ÑоÑиÑÑ Ð»Ñдей дÑмаÑÑ Ð¾
веÑаÑ
, коÑоÑÑе они, возможно,
-пÑедпоÑли Ð±Ñ Ð¸Ð³Ð½Ð¾ÑиÑоваÑÑ, напÑимеÑ
ÑÑиÑен ли иÑ
обÑаз жизни. ÐÑо можеÑ
-вÑзÑваÑÑ Ð´Ð¸ÑкомÑоÑÑ, и некоÑоÑÑе могÑÑ
пÑоÑÑо оÑвеÑнÑÑÑÑÑ Ð¾Ñ ÑÑого.
-Ðо из ÑÑого не ÑледÑеÑ, ÑÑо Ð¼Ñ Ð´Ð¾Ð»Ð¶Ð½Ñ
пеÑеÑÑаÑÑ Ð³Ð¾Ð²Ð¾ÑиÑÑ Ð¾Ð± ÑÑиÑ
пÑоблемаÑ
.</p>
+иÑÑ
одного ÑекÑÑа, заклÑÑаеÑÑÑ Ð² Ñом, ÑÑо
ÑÑиÑеÑкие идеи ÑвободнÑÑ
пÑогÑамм
+оÑпÑгиваÑÑ Ð½ÐµÐºÐ¾ÑоÑÑÑ
лÑдей. ÐÑо пÑавда:
поднимаÑÑ Ñакие ÑÑиÑеÑкие вопÑоÑÑ,
+как Ñвобода, говоÑиÑÑ Ð¾Ð± оÑвеÑÑÑвенноÑÑи,
а не ÑолÑко об ÑдобÑÑве, знаÑиÑ
+пÑоÑиÑÑ Ð»Ñдей дÑмаÑÑ Ð¾ веÑаÑ
, коÑоÑÑе они,
возможно, пÑедпоÑли бÑ
+игноÑиÑоваÑÑ, напÑÐ¸Ð¼ÐµÑ ÑÑиÑен ли иÑ
обÑаз
жизни. ÐÑо Ð¼Ð¾Ð¶ÐµÑ Ð²ÑзÑваÑÑ
+диÑкомÑоÑÑ, и некоÑоÑÑе могÑÑ Ð¿ÑоÑÑо
оÑвеÑнÑÑÑÑÑ Ð¾Ñ ÑÑого. Ðо из ÑÑого не
+ÑледÑеÑ, ÑÑо Ð¼Ñ Ð´Ð¾Ð»Ð¶Ð½Ñ Ð¿ÐµÑеÑÑаÑÑ Ð³Ð¾Ð²Ð¾ÑиÑÑ
об ÑÑиÑ
пÑоблемаÑ
.</p>
<p>Ðменно ÑÑо Ñем не менее ÑеÑили ÑделаÑÑ
лидеÑÑ Ð¾ÑкÑÑÑого иÑÑ
одного
ÑекÑÑа. Ðни понÑли, ÑÑо ÑмалÑиваÑ
@@ -446,17 +451,16 @@
<h3>СопеÑниÑеÑÑво в ÑмаÑ
</h3>
<p>“СвободнÑй” и “оÑкÑÑÑÑй”
боÑÑÑÑÑ Ð·Ð°
-извеÑÑноÑÑÑ. “СвободнÑе пÑогÑаммє и
“оÑкÑÑÑÑй иÑÑ
однÑй
-ÑекÑÑ” — ÑазнÑе идеи, но
болÑÑинÑÑво лÑдей подÑ
одÑÑ Ðº
-пÑогÑаммам Ñак, ÑÑо ÑÑи идеи ÑоÑевнÑÑÑÑÑ
за Ð¾Ð´Ð½Ñ Ð¸ ÑÑ Ð¶Ðµ ниÑÑ Ð¿Ð¾Ð½ÑÑий. Ðогда
-лÑди пÑивÑкаÑÑ Ð³Ð¾Ð²Ð¾ÑиÑÑ Ð¸ дÑмаÑÑ
“оÑкÑÑÑÑй иÑÑ
однÑй ÑекÑÑ”, ÑÑо
-меÑÐ°ÐµÑ Ð¸Ð¼ вникаÑÑ Ð² ÑилоÑоÑÐ¸Ñ Ð´Ð²Ð¸Ð¶ÐµÐ½Ð¸Ñ Ð·Ð°
ÑвободнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð¸ дÑмаÑÑ Ð¾
-ней. ÐÑли они Ñже ÑÑали аÑÑоÑииÑоваÑÑ Ð½Ð°Ñ Ð¸
наÑи пÑогÑÐ°Ð¼Ð¼Ñ Ñо Ñловом
-“оÑкÑÑÑÑй”, нам поÑÑебоваÑÑÑÑ Ð²ÑÑÑÑÑ
нÑÑÑ Ð¸Ñ
в инÑеллекÑÑалÑном
-оÑноÑении, пÑежде Ñем они пÑизнаÑÑ, ÑÑо мÑ
оÑÑÑаиваем ÑÑо-Ñо
-<em>дÑÑгое</em>. ÐÑÐ±Ð°Ñ Ð´ÐµÑÑелÑноÑÑÑ, коÑоÑаÑ
вÑÐ´Ð²Ð¸Ð³Ð°ÐµÑ Ñлово
-“оÑкÑÑÑÑй”, как пÑавило, ÑаÑÑиÑÑеÑ
занавеÑ, коÑоÑÑй ÑкÑÑваеÑ
-идеи Ð´Ð²Ð¸Ð¶ÐµÐ½Ð¸Ñ Ð·Ð° ÑвободнÑе пÑогÑаммÑ.</p>
+извеÑÑноÑÑÑ. СвободнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð¸
оÑкÑÑÑÑй иÑÑ
однÑй ÑекÑÑ —
+ÑазнÑе идеи, но болÑÑинÑÑво лÑдей подÑ
одÑÑ
к пÑогÑаммам Ñак, ÑÑо ÑÑи идеи
+ÑоÑевнÑÑÑÑÑ Ð·Ð° Ð¾Ð´Ð½Ñ Ð¸ ÑÑ Ð¶Ðµ ниÑÑ Ð¿Ð¾Ð½ÑÑий.
Ðогда лÑди пÑивÑкаÑÑ Ð³Ð¾Ð²Ð¾ÑиÑÑ Ð¸
+дÑмаÑÑ “оÑкÑÑÑÑй иÑÑ
однÑй ÑекÑÑ”,
ÑÑо меÑÐ°ÐµÑ Ð¸Ð¼ вникаÑÑ Ð²
+ÑилоÑоÑÐ¸Ñ Ð´Ð²Ð¸Ð¶ÐµÐ½Ð¸Ñ Ð·Ð° ÑвободнÑе пÑогÑаммÑ
и дÑмаÑÑ Ð¾ ней. ÐÑли они Ñже ÑÑали
+аÑÑоÑииÑоваÑÑ Ð½Ð°Ñ Ð¸ наÑи пÑогÑÐ°Ð¼Ð¼Ñ Ñо
Ñловом “оÑкÑÑÑÑй”, нам
+поÑÑебоваÑÑÑÑ Ð²ÑÑÑÑÑ
нÑÑÑ Ð¸Ñ
в
инÑеллекÑÑалÑном оÑноÑении, пÑежде Ñем они
+пÑизнаÑÑ, ÑÑо Ð¼Ñ Ð¾ÑÑÑаиваем ÑÑо-Ñо
<em>дÑÑгое</em>. ÐÑÐ±Ð°Ñ Ð´ÐµÑÑелÑноÑÑÑ,
+коÑоÑÐ°Ñ Ð²ÑÐ´Ð²Ð¸Ð³Ð°ÐµÑ Ñлово “оÑкÑÑÑÑй”,
как пÑавило, ÑаÑÑиÑÑеÑ
+занавеÑ, коÑоÑÑй ÑкÑÑÐ²Ð°ÐµÑ Ð¸Ð´ÐµÐ¸ Ð´Ð²Ð¸Ð¶ÐµÐ½Ð¸Ñ Ð·Ð°
ÑвободнÑе пÑогÑаммÑ.</p>
<p>Таким обÑазом, акÑивиÑÑÑ ÑвободнÑÑ
пÑогÑамм благоÑазÑмно ÑменÑÑаÑÑ Ñвое
ÑÑаÑÑие в деÑÑелÑноÑÑи, коÑоÑÐ°Ñ Ð½Ð°Ð·ÑваеÑ
ÑÐµÐ±Ñ “оÑкÑÑÑой”. Ðаже
@@ -574,7 +578,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2021/09/13 11:34:07 $
+$Date: 2021/12/23 13:01:19 $
<!-- timestamp end -->
</p>
Index: surveillance-vs-democracy.it.html
===================================================================
RCS file: /web/www/www/philosophy/surveillance-vs-democracy.it.html,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- surveillance-vs-democracy.it.html 5 Sep 2021 10:37:40 -0000 1.43
+++ surveillance-vs-democracy.it.html 23 Dec 2021 13:01:19 -0000 1.44
@@ -1,12 +1,10 @@
-<!--#set var="PO_FILE"
- value='<a href="/philosophy/po/surveillance-vs-democracy.it.po">
- https://www.gnu.org/philosophy/po/surveillance-vs-democracy.it.po</a>'
- --><!--#set var="ORIGINAL_FILE"
value="/philosophy/surveillance-vs-democracy.html"
- --><!--#set var="DIFF_FILE"
value="/philosophy/po/surveillance-vs-democracy.it-diff.html"
- --><!--#set var="OUTDATED_SINCE" value="2021-07-03" -->
+<!--#set var="ENGLISH_PAGE"
value="/philosophy/surveillance-vs-democracy.en.html" -->
<!--#include virtual="/server/header.it.html" -->
-<!-- Parent-Version: 1.90 -->
+<!-- Parent-Version: 1.96 -->
+<!-- This page is derived from /server/standards/boilerplate.html -->
+<!--#set var="TAGS" value="essays cultural evils" -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="yes" -->
<!-- This file is automatically generated by GNUnited Nations! -->
<title>Quanta sorveglianza può sostenere una democrazia? - Progetto GNU - Free
@@ -25,28 +23,20 @@
<!-- GNUN: localize URL /graphics/dog.small.jpg -->
<!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" -->
<!--#include virtual="/server/banner.it.html" -->
-<!--#include virtual="/server/outdated.it.html" -->
+<!--#include virtual="/philosophy/ph-breadcrumb.it.html" -->
+<!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/top-addendum.it.html" -->
+<div class="article">
<h2 class="center">Quanta sorveglianza può sostenere una democrazia?</h2>
-<address class="byline center">di <a href="http://www.stallman.org/">Richard
Stallman</a></address>
-
-<!-- rms: I deleted the link because of Wired's announced
- anti-ad-block system -->
-<blockquote class="center"><p><em>La prima versione di questo articolo è
stata pubblicata su
-<cite>Wired</cite>nel mese di ottobre 2013.<br />
-Suggeriamo anche la lettura di “<a
-href="https://www.theguardian.com/commentisfree/2018/apr/03/facebook-abusing-data-law-privacy-big-tech-surveillance">A
-radical proposal to keep your personal data safe</a>,” pubblicato dal
-<cite>Guardian</cite> ad aprile 2018.</em></p></blockquote>
-
-<div class="article">
+<address class="byline center">di <a href="https://www.stallman.org/">Richard
Stallman</a></address>
<div id="intro">
<div class="pict wide">
<a href="/graphics/dog.html">
<img src="/graphics/dog.small.jpg" alt="Vignetta: un cane che si sorprende a
vedere comparire tre annunci
pubblicitari sul suo monitor..." /></a>
-<p>“Come fanno a sapere che sono un cane?”</p>
+<p>«Come fanno a sapere che sono un cane?»</p>
</div>
<p>Grazie alle rivelazioni di Edward Snowden, sappiamo che il livello attuale
@@ -80,21 +70,21 @@
digitali. Non possiamo fidarci del software non libero; la NSA <a
href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">
sfrutta</a> e addirittura <a
-href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security">crea</a>
+href="https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security">crea</a>
debolezze nel software non libero per invadere i nostri computer e
router. Il software libero ci garantisce il controllo dei nostri computer,
-ma <a href="http://www.wired.com/opinion/2013/10/149481/">non è in grado di
-proteggere la nostra privacy quando mettiamo piede su Internet</a>. </p>
+ma <a href="https://www.wired.com/opinion/2013/10/149481/">non è in grado di
+proteggere la nostra privacy quando mettiamo piede su Internet</a>.</p>
<p>Negli Stati Uniti si sta lavorando a una <a
-href="http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill">legislazione
+href="https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill">legislazione
bipartisan</a> per âcontenere i poteri di sorveglianza internaâ, che però
consiste nel limitare lâuso da parte del governo dei nostri dossier
virtuali. Ciò non basterà a proteggere gli informatori se âbeccarliâ è
motivo sufficiente a identificarli. Dobbiamo spingerci oltre.</p>
</div>
-<h3 class="subheader" style="clear: both">Il limite massimo di sorveglianza in
una democrazia</h3>
+<h3 style="clear: both">Il limite massimo di sorveglianza in una
democrazia</h3>
<div class="columns">
<p>Se gli informatori non osano svelare menzogne e reati, allora perdiamo
@@ -105,30 +95,30 @@
<p>Nel 2011 un anonimo funzionario statale americano ammonì i giornalisti che
<a
-href="http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river">gli
-USA non avrebbero citato come testimoni i giornalisti</a> perché âNoi
-sappiamo con chi parlateâ. A volte <a
-href="http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press">le
+href="https://www.rcfp.org/journals/news-media-and-law-summer-2011/lessons-wye-river/">gli
+USA non avrebbero citato come testimoni i giornalisti</a> perché «Noi
+sappiamo con chi parlate». A volte <a
+href="https://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press">le
registrazioni delle telefonate dei giornalisti vengono richieste</a> come
prove per scoprirlo, ma Snowden ci ha dimostrato che in realtà negli USA
vengono richieste tutte le registrazioni delle telefonate di tutti, sempre,
<a
href="https://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order">
-a Verizon </a> e anche <a
-href="http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07">
+a Verizon</a> e anche <a
+href="https://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07">
agli altri gestori</a>.</p>
<p>Le attività di oppositori e dissidenti devono mantenere dei segreti al
riparo dagli stati disposti a giocargli brutti scherzi. LâACLU ha dimostrato
la pratica sistematica del governo americano di <a
-href="http://www.aclu.org/files/assets/Spyfiles_2_0.pdf">infiltrarsi in
+href="https://www.aclu.org/files/assets/Spyfiles_2_0.pdf">infiltrarsi in
gruppi di dissidenti pacifici</a> col pretesto di smascherare eventuali
terroristi. Il punto in cui la sorveglianza diventa eccessiva è quello in
cui lo stato può scoprire chi ha parlato con un certo giornalista o
dissidente noto.</p>
</div>
-<h3 class="subheader">Una volta raccolte, le informazioni saranno usate in
modi impropri</h3>
+<h3>Una volta raccolte, le informazioni saranno usate in modi impropri</h3>
<div class="columns">
<p id="willbemisused">Quando ci si accorge che il livello di sorveglianza
diffusa è troppo alto,
@@ -136,7 +126,7 @@
accumulati. Sembra una bella cosa, ma non risolve il problema, neanche
lontanamente, anche supponendo che il governo obbedisca alle regole. (La NSA
ha depistato la Corte FISA, che ha dichiarato di <a
-href="http://www.wired.com/threatlevel/2013/09/nsa-violations/">non poter
+href="https://www.wired.com/threatlevel/2013/09/nsa-violations/">non poter
imputare</a> alla NSA alcuna violazione). Un sospetto di reato sarÃ
sufficiente a garantire lâaccesso ai dati, per cui se un informatore viene
accusato di âspionaggioâ, localizzare la âspiaâ fornirà la scusa per
@@ -153,19 +143,20 @@
<p>Inoltre, lo staff della sorveglianza statale abusa dei dati per motivi
personali. Alcuni agenti della NSA hanno usato i sistemi di sorveglianza
americani <a
-href="http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems">per
+href="https://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems">per
seguire i loro amanti</a> â passati, presenti o desiderati â creando una
pratica chiamata LoveINT. La NSA sostiene di averli individuati e
disciplinati in qualche occasione; non sappiamo quante altre volte non sono
stati scoperti. Ma questi fatti non devono sorprenderci, perché la polizia
usa da tempo gli schedari della motorizzazione per <a
href="https://web.archive.org/web/20160401102120/http://www.sweetliberty.org/issues/privacy/lein1.htm#.V_mKlYbb69I">rintracciare
-persone attraenti</a>, una pratica nota come ârunning a plate for a dateâ
-(dalla targa allâappuntamento). Questa pratica è divenute più comune con <a
+persone attraenti</a>, una pratica nota come <i>running a plate for a
+date</i> (dalla targa allâappuntamento). Questa pratica è divenute più
+comune con <a
href="https://theyarewatching.org/issues/risks-increase-once-data-shared">i
nuovi sistemi digitali</a>. Nel 2016, un tutore della legge fu accusato di
avere falsificato la firma di un giudice per essere autorizzato ad <a
-href="http://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933">
+href="https://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933">
intercettare una persona per cui era ossessionato</a>. L'agenzia AP riporta
l'esistenza di <a
href="https://apnews.com/699236946e3140659fff8a2362e16f43">molti casi
@@ -180,18 +171,30 @@
Europa</a>, <a
href="https://en.wikipedia.org/wiki/Japanese_American_internment"> negli
Stati Uniti</a> e da casi più recenti in <a
-href="http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021">Turchia</a>
+href="https://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021">Turchia</a>
(la confusione in Turchia su chi avesse davvero usato il programma Bylock ha
solo peggiorato l'ingiustizia di punire persone per averlo usato).
</p>
+<p>Si potrebbe pensare che il nostro governo non utilizzerà i nostri dati
+personali per scopi repressivi, ma non ci si può fidare, poiché i governi
+cambiano. Oggi, nel 2021, molti stati apparentemente democratici sono
+governati da individui con tendenze autoritarie. I talebani hanno preso il
+controllo dei sistemi di identificazione biometrica installati
+nell'Afghanistan su iniziativa degli Stati Uniti. Il Regno Unito sta
+lavorando ad una legge allo scopo di sopprimere le proteste pacifiche che
+potrebbero essere ritenute fonti di âgravi disordiniâ. Gli Stati Uniti, per
+quanto ne sappiamo, potrebbero diventare uno stato definitivamente
+repressivo a partire dal 2025.
+</p>
+
<p>I dati personali raccolti dallo stato diventano disponibili anche ai
criminali informatici che ne violano i server, compresi quelli che <a
href="https://www.techdirt.com/articles/20150612/16334231330/second-opm-hack-revealed-even-worse-than-first.shtml">lavorano
per potenze nemiche</a>.</p>
<p>I governi possono facilmente usare la sorveglianza di massa per <a
-href="http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html">sovvertire
+href="https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html">sovvertire
la democrazia</a>.</p>
<p>La disponibilità della sorveglianza totale fornisce agli stati
lâopportunitÃ
@@ -200,7 +203,7 @@
facilmente accessibili allo stato.</p>
</div>
-<h3 class="subheader">Una forte tutela della privacy devâessere tecnica</h3>
+<h3>Una forte tutela della privacy devâessere tecnica</h3>
<div class="columns">
<p>La Electronic Frontier Foundation e altre organizzazioni propongono una
@@ -213,7 +216,7 @@
<p>Tuttavia queste garanzie legali sono precarie: come dimostra la storia
recente, esse possono venir abrogate (come nel caso del FISA Amendment Act),
-sospese o <a href="http://www.nytimes.com/2009/04/16/us/16nsa.html">
+sospese o <a href="https://www.nytimes.com/2009/04/16/us/16nsa.html">
ignorate</a>.</p>
<p>Nel frattempo i demagoghi ricorrono alle solite scuse per giustificare la
@@ -231,7 +234,7 @@
legge, lâidea sarebbe priva di senso.</p>
</div>
-<h3 class="subheader">Primo, non essere sciocchi</h3>
+<h3>Primo, non essere sciocchi</h3>
<div class="columns">
<p>Se si desidera avere privacy non bisogna mai rinunciarvi: la protezione
@@ -241,24 +244,24 @@
visitatori. Inoltre è bene usare GNU Privacy Guard per cifrare il contenuto
dei propri messaggi e pagare sempre in contanti.</p>
-<p>Conservate voi i vostri dati, senza metterli nel “comodo” server
-di un'azienda. È comunque sicuro utilizzare un servizio commerciale
-per il backup dei dati, purché i dati siano messi in un archivio e l'intero
+<p>Conservate voi i vostri dati, senza metterli nel âcomodoâ server di
+un'azienda. Ã comunque sicuro utilizzare un servizio commerciale per il
+backup dei dati, purché i dati siano messi in un archivio e l'intero
archivio, nomi di file compresi, sia criptato con software libero sul vostro
computer prima dell'upload.</p>
<p>Ai fini della privacy il software non libero va evitato poiché, come
conseguenza del dare ad aziende esterne il controllo delle vostre operazioni
informatiche, è probabile che <a
-href="/malware/proprietary-surveillance.html"> sia progettato per spiarvi
-</a>. Bisogna anche evitare i <a
+href="/malware/proprietary-surveillance.html"> sia progettato per
+spiarvi</a>. Bisogna anche evitare i <a
href="/philosophy/who-does-that-server-really-serve.html"> servizi come
-surrogati del software </a>; oltre a dare il controllo delle vostre
+surrogati del software</a>; oltre a dare il controllo delle vostre
operazioni informatiche ad altri, vi costringe a consegnare ai server di
un'azienda esterna tutti i relativi dati.</p>
<p>Bisogna anche proteggere la privacy di amici e conoscenti. <a
-href="http://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/">Non
+href="https://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/">Non
dare informazioni su altri</a> se non generiche, non dare ad alcun sito la
propria lista di contatti e-mail o telefonici. Inoltre bisogna evitare di
dare ad un'azienda come Facebook informazioni sui propri amici che questi
@@ -277,7 +280,7 @@
sorvegliare persone non sospette.</p>
</div>
-<h3 class="subheader">Dobbiamo progettare tutti i sistemi tenendo a mente la
privacy</h3>
+<h3>Dobbiamo progettare tutti i sistemi tenendo a mente la privacy</h3>
<div class="columns">
<p>Se non vogliamo una società a sorveglianza totale, dobbiamo considerare la
@@ -300,7 +303,7 @@
digitali. [<a href="#ambientprivacy">1</a>]</p>
</div>
-<h3 class="subheader">Un rimedio alla raccolta dei dati: lasciarli
dispersi</h3>
+<h3>Un rimedio alla raccolta dei dati: lasciarli dispersi</h3>
<div class="columns">
<p id="dispersal">Un modo per rendere il monitoraggio sicuro dal punto di
vista della privacy
@@ -333,13 +336,24 @@
persone. Tutti devono essere liberi di pubblicare foto e video ogni tanto,
ma lâaccumulazione sistematica di tali dati su Internet devâessere
limitata.</p>
+<div class="infobox" style="margin-top: 1.5em">
<p id="privatespace">(*) Qui si dà per scontato che la telecamera di
sorveglianza sia puntata
verso l'interno di un negozio, o verso la strada. Qualsiasi telecamera
puntata da qualcuno verso lo spazio privato di qualcun altro viola la
privacy, ma questa è un'altra questione.</p>
</div>
+</div>
-<h3 id="digitalcash" class="subheader">Un rimedio alla sorveglianza
dellâe-commerce</h3>
+<div class="announcement comment" role="complementary">
+<hr class="no-display" />
+<p>Suggeriamo anche la lettura di <a
+href="https://www.theguardian.com/commentisfree/2018/apr/03/facebook-abusing-data-law-privacy-big-tech-surveillance">âA
+radical proposal to keep your personal data safeâ</a>, pubblicato dal
+<cite>Guardian</cite> ad aprile 2018.</p>
+<hr class="no-display" />
+</div>
+
+<h3 id="digitalcash">Un rimedio alla sorveglianza dellâe-commerce</h3>
<div class="columns">
<p>Quasi tutte le raccolte di dati provengono dalle attività degli utenti
@@ -350,10 +364,11 @@
disposizione dello stato.</p>
<p>Grazie a PRISM, la NSA <a
-href="https://www.commondreams.org/headline/2013/08/23-2">si è introdotta
-nei database</a> di molte grandi aziende di Internet. AT&T archivia
-tutte le registrazioni delle sue chiamate telefoniche fin dal 1987 e <a
-href="http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0">
+href="https://www.commondreams.org/news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-companies">si
+è introdotta nei database</a> di molte grandi aziende di Internet. AT&T
+archivia tutte le registrazioni delle sue chiamate telefoniche fin dal 1987
+e <a
+href="https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0">
le mette a disposizione</a> della DEA su richiesta. Tecnicamente il governo
degli USA non possiede tali dati, ma in pratica è come se li
possedesse. Alcune aziende ricevono apprezzamento per <a
@@ -382,18 +397,18 @@
<p>Potremmo correggere entrambi questi problemi adottando un sistema di
pagamenti anonimi, cioè anonimi per chi paga: non vogliamo aiutare i
venditori ad evadere il fisco. <a
-href="http://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/">Bitcoin
+href="https://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/">Bitcoin
non è anonimo</a> (benché siano allo studio sistemi per pagare in maniera
anonima in Bitcoin), ma la tecnologia per <a
-href="http://www.wired.com/wired/archive/2.12/emoney_pr.html">la moneta
+href="https://www.wired.com/wired/archive/2.12/emoney_pr.html">la moneta
digitale</a> è stata sviluppata negli anni Ottanta del secolo scorso; il
-programma di GNU che se ne occupa si chiama <a href="http://taler.net/">GNU
+programma di GNU che se ne occupa si chiama <a href="https://taler.net/">GNU
Taler</a>. Ora ci occorrono solo dei modelli di business adatti, che non
vengano intralciati dallo stato.</p>
<p>Un altro modo possibile di effettuare pagamenti anonimi sarebbe con <a
-href="https://stallman.org/articles/anonymous-payments-thru-phones.html">schede
-telefoniche prepagate</a>; è meno comodo ma molto semplice.</p>
+href="/philosophy/phone-anonymous-payment.html">schede telefoniche
+prepagate</a>; è meno comodo ma molto semplice.</p>
<p>Un rischio ulteriore della raccolta di dati personali da parte dei siti è
che altri possano violare i loro sistemi di sicurezza, impadronirsi dei dati
@@ -402,7 +417,7 @@
in un sito non può danneggiarvi se il sito non sa niente di voi.</p>
</div>
-<h3 class="subheader">Un rimedio alla sorveglianza dei trasporti</h3>
+<h3>Un rimedio alla sorveglianza dei trasporti</h3>
<div class="columns">
<p>Dobbiamo trasformare la riscossione di pedaggi digitali in pagamento anonimo
@@ -419,7 +434,8 @@
lâaccesso a questi andrebbe limitato alle ricerche di numeri di targa
soggetti a ordini del tribunale.</p>
-<p>La âno-fly listâ degli USA devâessere abolita in quanto equivale a
una <a
+<p>La <i>no-fly list</i> degli USA devâessere abolita in quanto equivale a
una
+<a
href="https://www.aclu.org/blog/national-security-technology-and-liberty-racial-justice/victory-federal-court-recognizes">
pena senza processo</a>.</p>
@@ -455,7 +471,7 @@
quando lâutente lo restituisce a una postazione qualunque (in genere una
diversa da quella iniziale), quella postazione sappia dove e quando è
avvenuto il prestito e informi l'altra postazione che l'articolo non è più
-"fuori". Il sistema calcola anche il conto dellâutente e lo invia (dopo aver
+âfuoriâ. Il sistema calcola anche il conto dellâutente e lo invia (dopo
aver
atteso un numero variabile di minuti) alla sede centrale insieme ad altre
postazioni, così che la sede centrale non possa scoprire da quale postazione
viene il conto. Una volta terminata lâoperazione la postazione dove è stato
@@ -465,17 +481,17 @@
lâidentità dellâutente.</p>
</div>
-<h3 class="subheader">Un rimedio ai dossier sulle comunicazioni</h3>
+<h3>Un rimedio ai dossier sulle comunicazioni</h3>
<div class="columns">
<p>I fornitori di servizi Internet e le compagnie telefoniche conservano grandi
quantità di dati sui contatti dei loro utenti (cronologia di navigazione,
telefonate, etc). Grazie ai cellulari <a
-href="http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz">viene
+href="https://web.archive.org/web/20210312235125/http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz">viene
registrata anche la posizione</a> fisica dellâutente. Questi dossier vengono
conservati per molto tempo: più di 30 anni, nel caso di AT&T. Presto
saranno registrate persino <a
-href="http://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/">le
+href="https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/">le
attività fisiche</a> degli utenti. Pare che la NSA <a
href="https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location">raccolga
in massa i dati</a> di localizzazione dei telefoni cellulari.</p>
@@ -489,7 +505,7 @@
<p>Questa soluzione non è del tutto soddisfacente, perché non impedisce
fisicamente al governo di raccogliere tutte le informazioni in modo
istantaneo man mano che vengono generate, cosa che <a
-href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order">gli
+href="https://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order">gli
USA fanno</a> con alcune, se non tutte le compagnie telefoniche. Dovremmo
affidarci a un divieto per legge. Sarebbe comunque meglio della situazione
attuale, in cui la legge pertinente (il PAT RIOT Act) non proibisce
@@ -509,7 +525,7 @@
sono scambiate messaggi.</p>
</div>
-<h3 class="subheader">Ma una certa dose di sorveglianza è necessaria</h3>
+<h3>Ma una certa dose di sorveglianza è necessaria</h3>
<div class="columns">
<p>Per poter scovare i criminali, lo stato deve poter indagare su reati
@@ -523,15 +539,14 @@
<p>Gli individui a cui lo stato ha conferito poteri speciali, come gli agenti
di polizia, perdono il diritto alla privacy e devono essere monitorati. (La
-polizia ha addirittura un termine gergale per la falsa testimonianza,
-“<a
-href="https://en.wikipedia.org/w/index.php?title=Police_perjury&oldid=552608302">testilying</a>,”,
+polizia ha addirittura un termine gergale per la falsa testimonianza, <a
+href="https://en.wikipedia.org/w/index.php?title=Police_perjury&oldid=552608302"><i>testilying</i></a>,
tanta è la frequenza con cui vi fa ricorso, soprattutto verso manifestanti e
<a
href="https://web.archive.org/web/20131025014556/http://photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/">fotografi</a>).
In una città della California dove gli agenti di polizia erano obbligati a
indossare videocamere, si è scoperto che il loro uso della forza era <a
-href="http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition">diminuito
+href="https://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition">diminuito
del 60%</a>). LâACLU è favorevole a questo provvedimento.</p>
<p>Le imprese non sono persone, e <a
@@ -539,7 +554,7 @@
godono di diritti umani</a>. Ã legittimo esigere che le imprese pubblichino
i dettagli dei processi che potrebbero creare alla società dei rischi
chimici, biologici, nucleari, fiscali, informatici (vedi <a
-href="http://DefectiveByDesign.org">DRM</a>) o politici (vedi le lobby), a
+href="https://DefectiveByDesign.org">DRM</a>) o politici (vedi le lobby), a
qualunque livello sia necessario per garantire il benessere della
popolazione. Il pericolo insito in queste operazioni (si pensi al disastro
di British Petroleum, allâincidente di Fukushima e alla crisi fiscale del
@@ -571,7 +586,6 @@
quanto lo fossero lâUnione sovietica e la Germania dellâEst, dobbiamo
invertire questa tendenza. Ciò richiede lâinterruzione dellâaccumulo di
big
data sui cittadini.</p>
-</div>
<div class="column-limit"></div>
<h3 class="footnote">Nota</h3>
@@ -580,6 +594,16 @@
href="https://idlewords.com/2019/06/the_new_wilderness.htm">rispetto della
vita privata</a>.</li>
</ol>
+
+<div class="infobox extra" role="complementary">
+<hr />
+
+<!-- rms: I deleted the link because of Wired's announced
+ anti-ad-block system -->
+<p>La prima versione di questo articolo è stata pubblicata su
+<cite>Wired</cite>nel mese di ottobre 2013.</p>
+</div>
+</div>
</div>
<div class="translators-notes">
@@ -590,7 +614,7 @@
<!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.it.html" -->
-<div id="footer">
+<div id="footer" role="contentinfo">
<div class="unprintable">
<p>Per informazioni su FSF e GNU rivolgetevi, possibilmente in inglese, a <a
@@ -610,7 +634,7 @@
<web-translators@gnu.org></a>.</p>
- <p>For information on coordinating and submitting translations of
+ <p>For information on coordinating and contributing translations of
our web pages, see <a
href="/server/standards/README.translations.html">Translations
README</a>. -->
@@ -642,7 +666,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman</p>
+<p>Copyright © 2013-2019, 2021 Richard Stallman</p>
<p>Questa pagina è distribuita secondo i termini della licenza <a
rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/deed.it">Creative
@@ -659,7 +683,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2021/09/05 10:37:40 $
+$Date: 2021/12/23 13:01:19 $
<!-- timestamp end -->
</p>
Index: po/open-source-misses-the-point.ru-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.ru-en.html,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- po/open-source-misses-the-point.ru-en.html 4 Oct 2021 11:33:31 -0000
1.53
+++ po/open-source-misses-the-point.ru-en.html 23 Dec 2021 13:01:19 -0000
1.54
@@ -121,7 +121,7 @@
software source code would qualify as open source. Nearly all open
source software is free software, but there are exceptions. First,
some open source licenses are too restrictive, so they do not qualify
-as free licenses. For example, “Open Watcom” is nonfree
+as free licenses. For example, Open Watcom is nonfree
because its license does not allow making a modified version and using
it privately. Fortunately, few programs use such licenses.</p>
@@ -177,18 +177,25 @@
this includes “open source software.”</p>
<p>The <a href="https://opensource.org/osd">official definition of
-“open source software”</a> (which is published by the Open
+open source software</a> (which is published by the Open
Source Initiative and is too long to include here) was derived
indirectly from our criteria for free software. It is not the same;
it is a little looser in some respects. Nonetheless, their definition
agrees with our definition in most cases.</p>
<p>However, the obvious meaning for the expression “open source
-software”—and the one most people seem to think it
-means—is “You can look at the source code.” That
-criterion is much weaker than the free software definition, much
-weaker also than the official definition of open source. It includes
-many programs that are neither free nor open source.</p>
+software” is “You can look at the source code.”
+Indeed, most people seem to misunderstand “open source
+software” that way. (The clear term for that meaning is
+“source available.”) That criterion is much weaker than
+the free software definition, much weaker also than the official
+definition of open source. It includes many programs that are neither
+free nor open source.</p>
+
+<p>Why do people misunderstand it that way? Because that is the
+natural meaning of the words “open source.” But the
+concept for which the open source advocates sought another meaning was
+that of free software.</p>
<p>Since the obvious meaning for “open source” is not the
meaning that its advocates intend, the result is that most people
@@ -334,7 +341,7 @@
<p>The main initial motivation of those who split off the open source
camp from the free software movement was that the ethical ideas of
-“free software” made some people uneasy. That's true: raising
+free software made some people uneasy. That's true: raising
ethical issues such as freedom, talking about responsibilities as well as
convenience, is asking people to think about things they might prefer
to ignore, such as whether their conduct is ethical. This can trigger
@@ -404,7 +411,7 @@
<h3>Rivals for Mindshare</h3>
<p>“Free” and “open” are rivals for mindshare.
-“Free software” and “open source” are
+Free software and open source are
different ideas but, in most people's way of looking at software, they
compete for the same conceptual slot. When people become habituated
to saying and thinking “open source,” that is an obstacle
@@ -511,7 +518,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/10/04 11:33:31 $
+$Date: 2021/12/23 13:01:19 $
<!-- timestamp end -->
</p>
</div>
Index: po/open-source-misses-the-point.ru.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.ru.po,v
retrieving revision 1.127
retrieving revision 1.128
diff -u -b -r1.127 -r1.128
--- po/open-source-misses-the-point.ru.po 23 Dec 2021 12:33:00 -0000
1.127
+++ po/open-source-misses-the-point.ru.po 23 Dec 2021 13:01:19 -0000
1.128
@@ -19,7 +19,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2021-12-23 00:25+0000\n"
# type: Content of: <title>
#. type: Content of: <title>
Index: po/surveillance-vs-democracy.it-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.it-en.html,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- po/surveillance-vs-democracy.it-en.html 1 Feb 2021 13:30:45 -0000
1.35
+++ po/surveillance-vs-democracy.it-en.html 23 Dec 2021 13:01:19 -0000
1.36
@@ -1,5 +1,8 @@
<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.90 -->
+<!-- Parent-Version: 1.96 -->
+<!-- This page is derived from /server/standards/boilerplate.html -->
+<!--#set var="TAGS" value="essays cultural evils" -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="yes" -->
<title>How Much Surveillance Can Democracy Withstand?
- GNU Project - Free Software Foundation</title>
<style type="text/css" media="print,screen"><!--
@@ -14,21 +17,14 @@
<!-- GNUN: localize URL /graphics/dog.small.jpg -->
<!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" -->
<!--#include virtual="/server/banner.html" -->
+<!--#include virtual="/philosophy/ph-breadcrumb.html" -->
+<!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/top-addendum.html" -->
+<div class="article">
<h2 class="center">How Much Surveillance Can Democracy Withstand?</h2>
<address class="byline center">by
-<a href="http://www.stallman.org/">Richard Stallman</a></address>
-
-<!-- rms: I deleted the link because of Wired's announced
- anti-ad-block system -->
-<blockquote class="center"><p><em>A version of this article was first
published in
-<cite>Wired</cite> in October 2013.<br />
-Also consider reading “<a
-href="https://www.theguardian.com/commentisfree/2018/apr/03/facebook-abusing-data-law-privacy-big-tech-surveillance">A
-radical proposal to keep your personal data safe</a>,” published in
-<cite>The Guardian</cite> in April 2018.</em></p></blockquote>
-
-<div class="article">
+<a href="https://www.stallman.org/">Richard Stallman</a></address>
<div id="intro">
<div class="pict wide">
@@ -70,14 +66,14 @@
can't trust nonfree software; the NSA
<a
href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">uses</a>
and
-even <a
href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security">creates</a>
+even <a
href="https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security">creates</a>
security weaknesses in nonfree software to invade our own computers
and routers. Free software gives us control of our own computers,
-but <a href="http://www.wired.com/opinion/2013/10/149481/">that won't
+but <a href="https://www.wired.com/opinion/2013/10/149481/">that won't
protect our privacy once we set foot on the Internet</a>.</p>
<p><a
-href="http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill">Bipartisan
+href="https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill">Bipartisan
legislation to “curtail the domestic surveillance
powers”</a> in the U.S. is being drawn up, but it relies on
limiting the government's use of our virtual dossiers. That won't
@@ -86,7 +82,7 @@
or her. We need to go further.</p>
</div>
-<h3 class="subheader" style="clear: both">The Upper Limit on Surveillance in a
Democracy</h3>
+<h3 style="clear: both">The Upper Limit on Surveillance in a Democracy</h3>
<div class="columns">
<p>If whistleblowers don't dare reveal crimes and lies, we lose the
@@ -97,29 +93,29 @@
<p>An unnamed U.S. government official ominously told journalists in
2011 that
-the <a
href="http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river">U.S.
would
+the <a
href="https://www.rcfp.org/journals/news-media-and-law-summer-2011/lessons-wye-river/">U.S.
would
not subpoena reporters because “We know who you're talking
to.”</a>
-Sometimes <a
href="http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press">journalists'
+Sometimes <a
href="https://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press">journalists'
phone call records are subpoenaed</a> to find this out, but Snowden
has shown us that in effect they subpoena all the phone call records
of everyone in the U.S., all the
time, <a
href="https://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order">from
Verizon</a>
-and <a
href="http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07">from
+and <a
href="https://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07">from
other companies too</a>.</p>
<p>Opposition and dissident activities need to keep secrets from
states that are willing to play dirty tricks on them. The ACLU has
demonstrated the U.S. government's <a
-href="http://www.aclu.org/files/assets/Spyfiles_2_0.pdf">systematic
+href="https://www.aclu.org/files/assets/Spyfiles_2_0.pdf">systematic
practice of infiltrating peaceful dissident groups</a> on the pretext
that there might be terrorists among them. The point at which
surveillance is too much is the point at which the state can find who
spoke to a known journalist or a known dissident.</p>
</div>
-<h3 class="subheader">Information, Once Collected, Will Be Misused</h3>
+<h3>Information, Once Collected, Will Be Misused</h3>
<div class="columns">
<p id="willbemisused">When people recognize
@@ -128,7 +124,7 @@
accumulated data. That sounds nice, but it won't fix the problem, not
even slightly, even supposing that the government obeys the rules.
(The NSA has misled the FISA court, which said it
-was <a href="http://www.wired.com/threatlevel/2013/09/nsa-violations/">unable
+was <a href="https://www.wired.com/threatlevel/2013/09/nsa-violations/">unable
to effectively hold the NSA accountable</a>.) Suspicion of a crime
will be grounds for access, so once a whistleblower is accused of
“espionage,” finding the “spy” will provide an
@@ -144,7 +140,7 @@
<p>In addition, the state's surveillance staff will misuse the data
for personal reasons. Some NSA
-agents <a
href="http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems">used
+agents <a
href="https://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems">used
U.S. surveillance systems to track their lovers</a>—past,
present, or wished-for—in a practice called
“LOVEINT.” The NSA says it has caught and punished this a
@@ -157,7 +153,7 @@
with <a
href="https://theyarewatching.org/issues/risks-increase-once-data-shared">new
digital systems</a>. In 2016, a prosecutor was accused of forging
judges' signatures to get authorization
-to <a
href="http://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933">
+to <a
href="https://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933">
wiretap someone who was the object of a romantic obsession</a>. The AP
knows
of <a href="https://apnews.com/699236946e3140659fff8a2362e16f43">many
@@ -171,19 +167,32 @@
from <a
href="http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/">Europe</a>,
<a href="https://en.wikipedia.org/wiki/Japanese_American_internment">the
US</a>, and most
-recently <a
href="http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021">Turkey</a>.
+recently <a
href="https://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021">Turkey</a>.
(Turkey's confusion about who had really used the Bylock program only
exacerbated the basic deliberate injustice of arbitrarily punishing
people for having used it.)
</p>
+<p>You may feel your government won't use your personal data for
+repression, but you can't rely on that feeling, because governments do
+change. As of 2021, many ostensibly democratic states
+are <a
href="https://www.theguardian.com/commentisfree/2021/aug/21/beware-state-surveillance-of-your-lives-governments-can-change-afghanistan">ruled
+by people with authoritarian leanings</a>, and the Taliban have taken
+over Afghanistan's systems of biometric identification that were set
+up at the instigation of the US. The UK is working on a law
+to <a
href="https://www.theguardian.com/commentisfree/2021/aug/09/police-bill-not-law-order-state-control-erosion-freedom">repress
+nonviolent protests that might be described as causing “serious
+disruption.”</a> The US could become permanently repressive in
+2025, for all we know.
+</p>
+
<p>Personal data collected by the state is also likely to be obtained
by outside crackers that break the security of the servers, even
by <a
href="https://www.techdirt.com/articles/20150612/16334231330/second-opm-hack-revealed-even-worse-than-first.shtml">crackers
working for hostile states</a>.</p>
<p>Governments can easily use massive surveillance capability
-to <a
href="http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html">subvert
+to <a
href="https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html">subvert
democracy directly</a>.</p>
<p>Total surveillance accessible to the state enables the state to
@@ -192,7 +201,7 @@
that is easily accessible to the state.</p>
</div>
-<h3 class="subheader">Robust Protection for Privacy Must Be Technical</h3>
+<h3>Robust Protection for Privacy Must Be Technical</h3>
<div class="columns">
<p>The Electronic Frontier Foundation and other organizations propose
@@ -207,7 +216,7 @@
<p>However, such legal protections are precarious: as recent history
shows, they can be repealed (as in the FISA Amendments Act),
suspended, or <a
-href="http://www.nytimes.com/2009/04/16/us/16nsa.html">ignored</a>.</p>
+href="https://www.nytimes.com/2009/04/16/us/16nsa.html">ignored</a>.</p>
<p>Meanwhile, demagogues will cite the usual excuses as grounds for
total surveillance; any terrorist attack, even one that kills just a
@@ -224,7 +233,7 @@
ignoring this law, the idea would hardly make sense.</p>
</div>
-<h3 class="subheader">First, Don't Be Foolish</h3>
+<h3>First, Don't Be Foolish</h3>
<div class="columns">
<p>To have privacy, you must not throw it away: the first one who has
@@ -250,7 +259,7 @@
pertinent data to the company's server.</p>
<p>Protect your friends' and acquaintances' privacy,
-too. <a
href="http://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/">Don't
+too. <a
href="https://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/">Don't
give out their personal information</a> except how to contact them,
and never give any web site your list of email or phone contacts.
Don't tell a company such as Facebook anything about your friends that
@@ -269,7 +278,7 @@
suspects.</p>
</div>
-<h3 class="subheader">We Must Design Every System for Privacy</h3>
+<h3>We Must Design Every System for Privacy</h3>
<div class="columns">
<p>If we don't want a total surveillance society, we must consider
@@ -292,7 +301,7 @@
systems [<a href="#ambientprivacy">1</a>].</p>
</div>
-<h3 class="subheader">Remedy for Collecting Data: Leaving It Dispersed</h3>
+<h3>Remedy for Collecting Data: Leaving It Dispersed</h3>
<div class="columns">
<p id="dispersal">One way to make monitoring safe for privacy is
@@ -326,13 +335,24 @@
occasionally, but the systematic accumulation of such data on the
Internet must be limited.</p>
+<div class="infobox" style="margin-top: 1.5em">
<p id="privatespace">(*) I assume here that the security
camera points at the inside of a store, or at the street. Any camera
pointed at someone's private space by someone else violates privacy,
but that is another issue.</p>
</div>
+</div>
-<h3 id="digitalcash" class="subheader">Remedy for Internet Commerce
Surveillance</h3>
+<div class="announcement comment" role="complementary">
+<hr class="no-display" />
+<p>Also consider reading “<a
+href="https://www.theguardian.com/commentisfree/2018/apr/03/facebook-abusing-data-law-privacy-big-tech-surveillance">A
+radical proposal to keep your personal data safe</a>,” published in
+<cite>The Guardian</cite> in April 2018.</p>
+<hr class="no-display" />
+</div>
+
+<h3 id="digitalcash">Remedy for Internet Commerce Surveillance</h3>
<div class="columns">
<p>Most data collection comes from people's own digital activities.
@@ -343,10 +363,10 @@
systematically available to the state.</p>
<p>The NSA, through PRISM,
-has <a href="https://www.commondreams.org/headline/2013/08/23-2">gotten
+has <a
href="https://www.commondreams.org/news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-companies">gotten
into the databases of many large Internet corporations</a>. AT&T
has saved all its phone call records since 1987
-and <a
href="http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0">makes
+and <a
href="https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0">makes
them available to the DEA</a> to search on request. Strictly
speaking, the U.S. government does not possess that data, but in
practical terms it may as well possess it. Some companies are praised
@@ -376,17 +396,17 @@
<p>We could correct both problems by adopting a system of anonymous
payments—anonymous for the payer, that is. (We don't want to
help the payee dodge
-taxes.) <a
href="http://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/">Bitcoin
+taxes.) <a
href="https://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/">Bitcoin
is not anonymous</a>, though there are efforts to develop ways to pay
anonymously with Bitcoin. However, technology
-for <a href="http://www.wired.com/wired/archive/2.12/emoney_pr.html">digital
+for <a href="https://www.wired.com/wired/archive/2.12/emoney_pr.html">digital
cash was first developed in the 1980s</a>; the GNU software for doing
-this is called <a href="http://taler.net/">GNU Taler</a>. Now we need
+this is called <a href="https://taler.net/">GNU Taler</a>. Now we need
only suitable business arrangements, and for the state not to obstruct
them.</p>
<p>Another possible method for anonymous payments would
-use <a
href="https://stallman.org/articles/anonymous-payments-thru-phones.html">prepaid
+use <a href="/philosophy/phone-anonymous-payment.html">prepaid
phone cards</a>. It is less convenient, but very easy to
implement.</p>
@@ -397,7 +417,7 @@
knows nothing about you.</p>
</div>
-<h3 class="subheader">Remedy for Travel Surveillance</h3>
+<h3>Remedy for Travel Surveillance</h3>
<div class="columns">
<p>We must convert digital toll collection to anonymous payment (using
@@ -457,16 +477,16 @@
borrower's identity immediately.</p>
</div>
-<h3 class="subheader">Remedy for Communications Dossiers</h3>
+<h3>Remedy for Communications Dossiers</h3>
<div class="columns">
<p>Internet service providers and telephone companies keep extensive
data on their users' contacts (browsing, phone calls, etc). With
mobile phones, they
-also <a
href="http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz">record
+also <a
href="https://web.archive.org/web/20210312235125/http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz">record
the user's physical location</a>. They keep these dossiers for a long
time: over 30 years, in the case of AT&T. Soon they will
-even <a
href="http://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/">record
+even <a
href="https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/">record
the user's body activities</a>. It appears that
the <a
href="https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location">NSA
collects cell phone location data</a> in bulk.</p>
@@ -479,7 +499,7 @@
<p>This solution is not entirely satisfactory, because it won't
physically stop the government from collecting all the information
immediately as it is generated—which is what
-the <a
href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order">U.S.
does
+the <a
href="https://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order">U.S.
does
with some or all phone companies</a>. We would have to rely on
prohibiting that by law. However, that would be better than the
current situation, where the relevant law (the PAT RIOT Act) does not
@@ -499,7 +519,7 @@
would be hard to determine that you had sent mail to me.</p>
</div>
-<h3 class="subheader">But Some Surveillance Is Necessary</h3>
+<h3>But Some Surveillance Is Necessary</h3>
<div class="columns">
<p>For the state to find criminals, it needs to be able to investigate
@@ -520,7 +540,7 @@
photographers</a>.)
One city in California that required police to wear video cameras all
the time
-found <a
href="http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition">their
+found <a
href="https://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition">their
use of force fell by 60%</a>. The ACLU is in favor of this.</p>
<p><a
@@ -528,7 +548,7 @@
are not people, and not entitled to human rights</a>. It is
legitimate to require businesses to publish the details of processes
that might cause chemical, biological, nuclear, fiscal, computational
-(e.g., <a href="http://DefectiveByDesign.org">DRM</a>) or political
+(e.g., <a href="https://DefectiveByDesign.org">DRM</a>) or political
(e.g., lobbying) hazards to society, to whatever level is needed for
public well-being. The danger of these operations (consider the BP
oil spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs
@@ -559,7 +579,6 @@
a grave surveillance deficit, and ought to be surveilled more than the
Soviet Union and East Germany were, we must reverse this increase.
That requires stopping the accumulation of big data about people.</p>
-</div>
<div class="column-limit"></div>
<h3 class="footnote">End Note</h3>
@@ -569,11 +588,20 @@
href="https://idlewords.com/2019/06/the_new_wilderness.htm">ambient
privacy</a>.</li>
</ol>
+
+<div class="infobox extra" role="complementary">
+<hr />
+<!-- rms: I deleted the link because of Wired's announced
+ anti-ad-block system -->
+<p>A version of this article was first published in
+<cite>Wired</cite> in October 2013.</p>
+</div>
+</div>
</div>
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
-<div id="footer">
+<div id="footer" role="contentinfo">
<div class="unprintable">
<p>Please send general FSF & GNU inquiries to
@@ -591,13 +619,13 @@
to <a href="mailto:web-translators@gnu.org">
<web-translators@gnu.org></a>.</p>
- <p>For information on coordinating and submitting translations of
+ <p>For information on coordinating and contributing translations of
our web pages, see <a
href="/server/standards/README.translations.html">Translations
README</a>. -->
Please see the <a
href="/server/standards/README.translations.html">Translations
-README</a> for information on coordinating and submitting translations
+README</a> for information on coordinating and contributing translations
of this article.</p>
</div>
@@ -618,7 +646,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman</p>
+<p>Copyright © 2013-2019, 2021 Richard Stallman</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -628,7 +656,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/02/01 13:30:45 $
+$Date: 2021/12/23 13:01:19 $
<!-- timestamp end -->
</p>
</div>
Index: po/surveillance-vs-democracy.it.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.it.po,v
retrieving revision 1.136
retrieving revision 1.137
diff -u -b -r1.136 -r1.137
--- po/surveillance-vs-democracy.it.po 23 Dec 2021 12:25:27 -0000 1.136
+++ po/surveillance-vs-democracy.it.po 23 Dec 2021 13:01:19 -0000 1.137
@@ -9,7 +9,7 @@
msgid ""
msgstr ""
"Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2021-12-23 13:19+0100\n"
+"POT-Creation-Date: 2021-09-05 10:26+0000\n"
"PO-Revision-Date: 2021-12-23 13:01+0100\n"
"Last-Translator: Dora Scilipoti\n"
"Language-Team: Italian\n"
@@ -606,12 +606,12 @@
msgstr ""
"Un modo per rendere il monitoraggio sicuro dal punto di vista della privacy "
"è quello di tenere i dati dispersi e rendere scomodo il loro accesso. Le "
-"vecchie telecamere di sicurezza non costituivano una minaccia alla "
-"privacy(<a href=\"#privatespace\">*</a>). Le registrazioni erano conservate "
-"in loco e per un massimo di poche settimane. Poiché consultarle era scomodo,
"
-"non venivano mai studiate in modo massiccio, ma solo nei luoghi in cui "
-"qualcuno aveva denunciato un reato. Non sarebbe fattibile raccogliere "
-"fisicamente milioni di nastri ogni giorno e guardarli o copiarli tutti."
+"vecchie telecamere di sicurezza non costituivano una minaccia alla privacy"
+"(<a href=\"#privatespace\">*</a>). Le registrazioni erano conservate in loco "
+"e per un massimo di poche settimane. Poiché consultarle era scomodo, non "
+"venivano mai studiate in modo massiccio, ma solo nei luoghi in cui qualcuno "
+"aveva denunciato un reato. Non sarebbe fattibile raccogliere fisicamente "
+"milioni di nastri ogni giorno e guardarli o copiarli tutti."
#. type: Content of: <div><div><p>
msgid ""
- www/philosophy open-source-misses-the-point.ru....,
GNUN <=