www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/philosophy open-source-misses-the-point.ru....


From: GNUN
Subject: www/philosophy open-source-misses-the-point.ru....
Date: Thu, 23 Dec 2021 08:01:19 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     21/12/23 08:01:19

Modified files:
        philosophy     : open-source-misses-the-point.ru.html 
                         surveillance-vs-democracy.it.html 
        philosophy/po  : open-source-misses-the-point.ru-en.html 
                         open-source-misses-the-point.ru.po 
                         surveillance-vs-democracy.it-en.html 
                         surveillance-vs-democracy.it.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/open-source-misses-the-point.ru.html?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/surveillance-vs-democracy.it.html?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.ru-en.html?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.ru.po?cvsroot=www&r1=1.127&r2=1.128
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.it-en.html?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.it.po?cvsroot=www&r1=1.136&r2=1.137

Patches:
Index: open-source-misses-the-point.ru.html
===================================================================
RCS file: /web/www/www/philosophy/open-source-misses-the-point.ru.html,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- open-source-misses-the-point.ru.html        13 Sep 2021 11:34:07 -0000      
1.75
+++ open-source-misses-the-point.ru.html        23 Dec 2021 13:01:19 -0000      
1.76
@@ -141,10 +141,9 @@
 как программы с открытым исходным текстом. 
Почти все программы с открытым
 исходным текстом свободны, но есть 
исключения. Во-первых, некоторые лицензии
 открытого исходного текста слишком 
жестки, так что они не могут считаться
-лицензиями свободных программ. Например, 
&ldquo;Open Watcom&rdquo;
-несвободен, потому что его лицензия не 
допускает изготовление измененных
-версий для частного пользования. К 
счастью, программ с такими лицензиями
-мало.</p>
+лицензиями свободных программ. Например, 
Open Watcom несвободен, потому что
+его лицензия не допускает изготовление 
измененных версий для частного
+пользования. К счастью, программ с такими 
лицензиями мало.</p>
 
 <p>Во-вторых, когда исходный текст 
программы несет слабую лицензию,
 т.е. лицензию без авторского лева, ее 
исполняемые файлы могут нести
@@ -202,21 +201,27 @@
 программа&rdquo; есть та или иная 
семантическая проблема&nbsp;&mdash; в том
 числе и у &ldquo;открытого исходного 
текста&rdquo;.</p>
 
-<p><a href="https://opensource.org/osd";>Официальное 
определение
-&ldquo;программы с открытым исходным 
текстом&rdquo;</a> (которое
-опубликовано Инициативной группой 
открытого исходного текста и слишком
-длинно, чтобы приводить его здесь) было 
выведено (косвенно) из наших
-критериев свободных программ. Это не одно 
и тоже, оно немного шире в
-некоторых аспектах. Тем не менее их 
определение согласуется с нашим в
-большинстве случаев.</p>
+<p><a href="https://opensource.org/osd";>Официальное 
определение программы с
+открытым исходным текстом</a> (которое 
опубликовано Инициативной группой
+открытого исходного текста и слишком 
длинно, чтобы приводить его здесь) было
+выведено (косвенно) из наших критериев 
свободных программ. Это не одно и
+тоже, оно немного шире в некоторых аспектах
. Тем не менее их определение
+согласуется с нашим в большинстве 
случаев.</p>
 
 <p>Однако очевидное значение выражения 
&ldquo;программа с открытым исходным
 текстом&rdquo;&nbsp;&mdash; &ldquo;вы можете смотреть 
на исходный
-текст&rdquo;,&mdash; и большинство людей, похоже, 
думает, что оно это и
-означает. Этот критерий намного слабее, 
чем определение свободной программы,
-а также намного слабее, чем официальное 
определение открытого исходного
-текста. Ему соответствует много программ, 
которые не являются ни свободными
-программами, ни программами с открытым исх
одным текстом.</p>
+текст&rdquo;. Действительно, большинство 
людей, похоже, неверно понимает
+выражение &ldquo;программа с открытым исх
одным текстом&rdquo; в этом смысле
+(ясное выражение для такого понятия&nbsp;&mdash; 
&ldquo;доступен исходный
+текст&rdquo;). Этот критерий намного слабее, 
чем определение свободной
+программы, а также намного слабее, чем 
официальное определение открытого
+исходного текста. Ему соответствует много 
программ, которые не являются ни
+свободными программами, ни программами с 
открытым исходным текстом.</p>
+
+<p>Почему люди неверно понимают это в таком 
смысле? Потому что таково
+естественное значение слов &ldquo;открытый 
исходный текст&rdquo;. Но
+понятием, для которого сторонники 
открытого исходного текста искали другое
+значение, было понятие свободной 
программы.</p>
 
 <p>Поскольку наивное толкование 
&ldquo;открытого исходного текста&rdquo; не
 означает того, что подразумевают его 
защитники, это приводит к тому, что
@@ -369,13 +374,13 @@
 <h3>Боязнь свободы</h3>
 
 <p>Главная первоначальная мотивация тех, 
кто отделился в лагерь открытого
-исходного текста, заключается в том, что 
этические идеи &ldquo;свободных
-программ&rdquo; отпугивают некоторых людей. 
Это правда: поднимать такие
-этические вопросы, как свобода, говорить 
об ответственности, а не только об
-удобстве, значит просить людей думать о 
вещах, которые они, возможно,
-предпочли бы игнорировать, например 
этичен ли их образ жизни. Это может
-вызывать дискомфорт, и некоторые могут 
просто отвернуться от этого.
-Но из этого не следует, что мы должны 
перестать говорить об этих проблемах.</p>
+исходного текста, заключается в том, что 
этические идеи свободных программ
+отпугивают некоторых людей. Это правда: 
поднимать такие этические вопросы,
+как свобода, говорить об ответственности, 
а не только об удобстве, значит
+просить людей думать о вещах, которые они, 
возможно, предпочли бы
+игнорировать, например этичен ли их образ 
жизни. Это может вызывать
+дискомфорт, и некоторые могут просто 
отвернуться от этого. Но из этого не
+следует, что мы должны перестать говорить 
об этих проблемах.</p>
 
 <p>Именно это тем не менее решили сделать 
лидеры открытого исходного
 текста. Они поняли, что умалчивая
@@ -446,17 +451,16 @@
 <h3>Соперничество в умах</h3>
 
 <p>&ldquo;Свободный&rdquo; и &ldquo;открытый&rdquo; 
борются за
-известность. &ldquo;Свободные программы&rdquo; и 
&ldquo;открытый исходный
-текст&rdquo;&nbsp;&mdash; разные идеи, но 
большинство людей подходят к
-программам так, что эти идеи соревнуются 
за одну и ту же нишу понятий. Когда
-люди привыкают говорить и думать 
&ldquo;открытый исходный текст&rdquo;, это
-мешает им вникать в философию движения за 
свободные программы и думать о
-ней. Если они уже стали ассоциировать нас и 
наши программы со словом
-&ldquo;открытый&rdquo;, нам потребоваться встрях
нуть их в интеллектуальном
-отношении, прежде чем они признают, что мы 
отстаиваем что-то
-<em>другое</em>. Любая деятельность, которая 
выдвигает слово
-&ldquo;открытый&rdquo;, как правило, расширяет 
занавес, который скрывает
-идеи движения за свободные программы.</p>
+известность. Свободные программы и 
открытый исходный текст&nbsp;&mdash;
+разные идеи, но большинство людей подходят 
к программам так, что эти идеи
+соревнуются за одну и ту же нишу понятий. 
Когда люди привыкают говорить и
+думать &ldquo;открытый исходный текст&rdquo;, 
это мешает им вникать в
+философию движения за свободные программы 
и думать о ней. Если они уже стали
+ассоциировать нас и наши программы со 
словом &ldquo;открытый&rdquo;, нам
+потребоваться встряхнуть их в 
интеллектуальном отношении, прежде чем они
+признают, что мы отстаиваем что-то 
<em>другое</em>. Любая деятельность,
+которая выдвигает слово &ldquo;открытый&rdquo;, 
как правило, расширяет
+занавес, который скрывает идеи движения за 
свободные программы.</p>
 
 <p>Таким образом, активисты свободных 
программ благоразумно уменьшают свое
 участие в деятельности, которая называет 
себя &ldquo;открытой&rdquo;. Даже
@@ -574,7 +578,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2021/09/13 11:34:07 $
+$Date: 2021/12/23 13:01:19 $
 
 <!-- timestamp end -->
 </p>

Index: surveillance-vs-democracy.it.html
===================================================================
RCS file: /web/www/www/philosophy/surveillance-vs-democracy.it.html,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- surveillance-vs-democracy.it.html   5 Sep 2021 10:37:40 -0000       1.43
+++ surveillance-vs-democracy.it.html   23 Dec 2021 13:01:19 -0000      1.44
@@ -1,12 +1,10 @@
-<!--#set var="PO_FILE"
- value='<a href="/philosophy/po/surveillance-vs-democracy.it.po">
- https://www.gnu.org/philosophy/po/surveillance-vs-democracy.it.po</a>'
- --><!--#set var="ORIGINAL_FILE" 
value="/philosophy/surveillance-vs-democracy.html"
- --><!--#set var="DIFF_FILE" 
value="/philosophy/po/surveillance-vs-democracy.it-diff.html"
- --><!--#set var="OUTDATED_SINCE" value="2021-07-03" -->
+<!--#set var="ENGLISH_PAGE" 
value="/philosophy/surveillance-vs-democracy.en.html" -->
 
 <!--#include virtual="/server/header.it.html" -->
-<!-- Parent-Version: 1.90 -->
+<!-- Parent-Version: 1.96 -->
+<!-- This page is derived from /server/standards/boilerplate.html -->
+<!--#set var="TAGS" value="essays cultural evils" -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="yes" -->
 
 <!-- This file is automatically generated by GNUnited Nations! -->
 <title>Quanta sorveglianza può sostenere una democrazia? - Progetto GNU - Free
@@ -25,28 +23,20 @@
 <!-- GNUN: localize URL /graphics/dog.small.jpg -->
 <!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" -->
 <!--#include virtual="/server/banner.it.html" -->
-<!--#include virtual="/server/outdated.it.html" -->
+<!--#include virtual="/philosophy/ph-breadcrumb.it.html" -->
+<!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/top-addendum.it.html" -->
+<div class="article">
 <h2 class="center">Quanta sorveglianza può sostenere una democrazia?</h2>
 
-<address class="byline center">di <a href="http://www.stallman.org/";>Richard 
Stallman</a></address>
-
-<!-- rms: I deleted the link because of Wired's announced
-     anti-ad-block system -->
-<blockquote class="center"><p><em>La prima versione di questo articolo è 
stata pubblicata su
-<cite>Wired</cite>nel mese di ottobre 2013.<br />
-Suggeriamo anche la lettura di &ldquo;<a
-href="https://www.theguardian.com/commentisfree/2018/apr/03/facebook-abusing-data-law-privacy-big-tech-surveillance";>A
-radical proposal to keep your personal data safe</a>,&rdquo; pubblicato dal
-<cite>Guardian</cite> ad aprile&nbsp;2018.</em></p></blockquote>
-
-<div class="article">
+<address class="byline center">di <a href="https://www.stallman.org/";>Richard 
Stallman</a></address>
 
 <div id="intro">
 <div class="pict wide">
 <a href="/graphics/dog.html">
 <img src="/graphics/dog.small.jpg" alt="Vignetta: un cane che si sorprende a 
vedere comparire tre annunci
 pubblicitari sul suo monitor..." /></a>
-<p>&ldquo;Come fanno a sapere che sono un cane?&rdquo;</p>
+<p>«Come fanno a sapere che sono un cane?»</p>
 </div>
 
 <p>Grazie alle rivelazioni di Edward Snowden, sappiamo che il livello attuale
@@ -80,21 +70,21 @@
 digitali. Non possiamo fidarci del software non libero; la NSA <a
 
href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm";>
 sfrutta</a> e addirittura <a
-href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security";>crea</a>
+href="https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security";>crea</a>
 debolezze nel software non libero per invadere i nostri computer e
 router. Il software libero ci garantisce il controllo dei nostri computer,
-ma <a href="http://www.wired.com/opinion/2013/10/149481/";>non è in grado di
-proteggere la nostra privacy quando mettiamo piede su Internet</a>. </p>
+ma <a href="https://www.wired.com/opinion/2013/10/149481/";>non è in grado di
+proteggere la nostra privacy quando mettiamo piede su Internet</a>.</p>
 
 <p>Negli Stati Uniti si sta lavorando a una <a
-href="http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill";>legislazione
+href="https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill";>legislazione
 bipartisan</a> per “contenere i poteri di sorveglianza interna”, che però
 consiste nel limitare l’uso da parte del governo dei nostri dossier
 virtuali. Ciò non basterà a proteggere gli informatori se “beccarli” è
 motivo sufficiente a identificarli. Dobbiamo spingerci oltre.</p>
 </div>
 
-<h3 class="subheader" style="clear: both">Il limite massimo di sorveglianza in 
una democrazia</h3>
+<h3 style="clear: both">Il limite massimo di sorveglianza in una 
democrazia</h3>
 
 <div class="columns">
 <p>Se gli informatori non osano svelare menzogne e reati, allora perdiamo
@@ -105,30 +95,30 @@
 
 <p>Nel 2011 un anonimo funzionario statale americano ammonì i giornalisti che
 <a
-href="http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river";>gli
-USA non avrebbero citato come testimoni i giornalisti</a> perché “Noi
-sappiamo con chi parlate”. A volte <a
-href="http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press";>le
+href="https://www.rcfp.org/journals/news-media-and-law-summer-2011/lessons-wye-river/";>gli
+USA non avrebbero citato come testimoni i giornalisti</a> perché «Noi
+sappiamo con chi parlate». A volte <a
+href="https://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press";>le
 registrazioni delle telefonate dei giornalisti vengono richieste</a> come
 prove per scoprirlo, ma Snowden ci ha dimostrato che in realtà negli USA
 vengono richieste tutte le registrazioni delle telefonate di tutti, sempre,
 <a
 
href="https://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order";>
-a Verizon </a> e anche <a
-href="http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07";>
+a Verizon</a> e anche <a
+href="https://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07";>
 agli altri gestori</a>.</p>
 
 <p>Le attività di oppositori e dissidenti devono mantenere dei segreti al
 riparo dagli stati disposti a giocargli brutti scherzi. L’ACLU ha dimostrato
 la pratica sistematica del governo americano di <a
-href="http://www.aclu.org/files/assets/Spyfiles_2_0.pdf";>infiltrarsi in
+href="https://www.aclu.org/files/assets/Spyfiles_2_0.pdf";>infiltrarsi in
 gruppi di dissidenti pacifici</a> col pretesto di smascherare eventuali
 terroristi. Il punto in cui la sorveglianza diventa eccessiva è quello in
 cui lo stato può scoprire chi ha parlato con un certo giornalista o
 dissidente noto.</p>
 </div>
 
-<h3 class="subheader">Una volta raccolte, le informazioni saranno usate in 
modi impropri</h3>
+<h3>Una volta raccolte, le informazioni saranno usate in modi impropri</h3>
 
 <div  class="columns">
 <p id="willbemisused">Quando ci si accorge che il livello di sorveglianza 
diffusa è troppo alto,
@@ -136,7 +126,7 @@
 accumulati. Sembra una bella cosa, ma non risolve il problema, neanche
 lontanamente, anche supponendo che il governo obbedisca alle regole. (La NSA
 ha depistato la Corte FISA, che ha dichiarato di <a
-href="http://www.wired.com/threatlevel/2013/09/nsa-violations/";>non poter
+href="https://www.wired.com/threatlevel/2013/09/nsa-violations/";>non poter
 imputare</a> alla NSA alcuna violazione). Un sospetto di reato sarà
 sufficiente a garantire l’accesso ai dati, per cui se un informatore viene
 accusato di “spionaggio”, localizzare la “spia” fornirà la scusa per
@@ -153,19 +143,20 @@
 <p>Inoltre, lo staff della sorveglianza statale abusa dei dati per motivi
 personali. Alcuni agenti della NSA hanno usato i sistemi di sorveglianza
 americani <a
-href="http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems";>per
+href="https://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems";>per
 seguire i loro amanti</a> – passati, presenti o desiderati – creando una
 pratica chiamata LoveINT. La NSA sostiene di averli individuati e
 disciplinati in qualche occasione; non sappiamo quante altre volte non sono
 stati scoperti. Ma questi fatti non devono sorprenderci, perché la polizia
 usa da tempo gli schedari della motorizzazione per <a
 
href="https://web.archive.org/web/20160401102120/http://www.sweetliberty.org/issues/privacy/lein1.htm#.V_mKlYbb69I";>rintracciare
-persone attraenti</a>, una pratica nota come “running a plate for a date”
-(dalla targa all’appuntamento). Questa pratica è divenute più comune con <a
+persone attraenti</a>, una pratica nota come <i>running a plate for a
+date</i> (dalla targa all’appuntamento). Questa pratica è divenute più
+comune con <a
 href="https://theyarewatching.org/issues/risks-increase-once-data-shared";>i
 nuovi sistemi digitali</a>. Nel 2016, un  tutore della legge fu accusato di
 avere falsificato la firma di un giudice per essere autorizzato ad <a
-href="http://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933";>
+href="https://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933";>
 intercettare una persona per cui era ossessionato</a>. L'agenzia AP riporta
 l'esistenza di <a
 href="https://apnews.com/699236946e3140659fff8a2362e16f43";>molti casi
@@ -180,18 +171,30 @@
 Europa</a>, <a
 href="https://en.wikipedia.org/wiki/Japanese_American_internment";> negli
 Stati Uniti</a> e da casi più recenti in <a
-href="http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021";>Turchia</a>
+href="https://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021";>Turchia</a>
 (la confusione in Turchia su chi avesse davvero usato il programma Bylock ha
 solo peggiorato l'ingiustizia di punire persone per averlo usato).
 </p>
 
+<p>Si potrebbe pensare che il nostro governo non utilizzerà i nostri dati
+personali per scopi repressivi, ma non ci si può fidare, poiché i governi
+cambiano. Oggi, nel 2021, molti stati apparentemente democratici sono
+governati da individui con tendenze autoritarie. I talebani hanno preso il
+controllo dei sistemi di identificazione biometrica installati
+nell'Afghanistan su iniziativa degli Stati Uniti. Il Regno Unito sta
+lavorando ad una legge allo scopo di sopprimere le proteste pacifiche che
+potrebbero essere ritenute fonti di “gravi disordini”. Gli Stati Uniti, per
+quanto ne sappiamo, potrebbero diventare uno stato definitivamente
+repressivo a partire dal 2025.
+</p>
+
 <p>I dati personali raccolti dallo stato diventano disponibili anche ai
 criminali informatici che ne violano i server, compresi quelli che <a
 
href="https://www.techdirt.com/articles/20150612/16334231330/second-opm-hack-revealed-even-worse-than-first.shtml";>lavorano
 per potenze nemiche</a>.</p>
 
 <p>I governi possono facilmente usare la sorveglianza di massa per <a
-href="http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html";>sovvertire
+href="https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html";>sovvertire
 la democrazia</a>.</p>
 
 <p>La disponibilità della sorveglianza totale fornisce agli stati 
l’opportunità
@@ -200,7 +203,7 @@
 facilmente accessibili allo stato.</p>
 </div>
 
-<h3 class="subheader">Una forte tutela della privacy dev’essere tecnica</h3>
+<h3>Una forte tutela della privacy dev’essere tecnica</h3>
 
 <div class="columns">
 <p>La Electronic Frontier Foundation e altre organizzazioni propongono una
@@ -213,7 +216,7 @@
 
 <p>Tuttavia queste garanzie legali sono precarie: come dimostra la storia
 recente, esse possono venir abrogate (come nel caso del FISA Amendment Act),
-sospese o <a href="http://www.nytimes.com/2009/04/16/us/16nsa.html";>
+sospese o <a href="https://www.nytimes.com/2009/04/16/us/16nsa.html";>
 ignorate</a>.</p>
 
 <p>Nel frattempo i demagoghi ricorrono alle solite scuse per giustificare la
@@ -231,7 +234,7 @@
 legge, l’idea sarebbe priva di senso.</p>
 </div>
 
-<h3 class="subheader">Primo, non essere sciocchi</h3>
+<h3>Primo, non essere sciocchi</h3>
 
 <div class="columns">
 <p>Se si desidera avere privacy non bisogna mai rinunciarvi: la protezione
@@ -241,24 +244,24 @@
 visitatori. Inoltre è bene usare GNU Privacy Guard per cifrare il contenuto
 dei propri messaggi e pagare sempre in contanti.</p>
 
-<p>Conservate voi i vostri dati, senza metterli nel &ldquo;comodo&rdquo; server
-di un'azienda. &Egrave; comunque sicuro utilizzare un servizio commerciale
-per il backup dei dati, purché i dati siano messi in un archivio e l'intero
+<p>Conservate voi i vostri dati, senza metterli nel “comodo” server di
+un'azienda. È comunque sicuro utilizzare un servizio commerciale per il
+backup dei dati, purché i dati siano messi in un archivio e l'intero
 archivio, nomi di file compresi, sia criptato con software libero sul vostro
 computer prima dell'upload.</p>
 
 <p>Ai fini della privacy il software non libero va evitato poiché, come
 conseguenza del dare ad aziende esterne il controllo delle vostre operazioni
 informatiche, è probabile che <a
-href="/malware/proprietary-surveillance.html"> sia progettato per spiarvi
-</a>.  Bisogna anche evitare i <a
+href="/malware/proprietary-surveillance.html"> sia progettato per
+spiarvi</a>. Bisogna anche evitare i <a
 href="/philosophy/who-does-that-server-really-serve.html"> servizi come
-surrogati del software </a>; oltre a dare il controllo delle vostre
+surrogati del software</a>; oltre a dare il controllo delle vostre
 operazioni informatiche ad altri, vi costringe a consegnare ai server di
 un'azienda esterna tutti i relativi dati.</p>
 
 <p>Bisogna anche proteggere la privacy di amici e conoscenti. <a
-href="http://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/";>Non
+href="https://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/";>Non
 dare informazioni su altri</a> se non generiche, non dare ad alcun sito la
 propria lista di contatti e-mail o telefonici. Inoltre bisogna evitare di
 dare ad un'azienda come Facebook informazioni sui propri amici che questi
@@ -277,7 +280,7 @@
 sorvegliare persone non sospette.</p>
 </div>
 
-<h3 class="subheader">Dobbiamo progettare tutti i sistemi tenendo a mente la 
privacy</h3>
+<h3>Dobbiamo progettare tutti i sistemi tenendo a mente la privacy</h3>
 
 <div class="columns">
 <p>Se non vogliamo una società a sorveglianza totale, dobbiamo considerare la
@@ -300,7 +303,7 @@
 digitali.&nbsp;[<a href="#ambientprivacy">1</a>]</p>
 </div>
 
-<h3 class="subheader">Un rimedio alla raccolta dei dati: lasciarli 
dispersi</h3>
+<h3>Un rimedio alla raccolta dei dati: lasciarli dispersi</h3>
 
 <div class="columns">
 <p id="dispersal">Un modo per rendere il monitoraggio sicuro dal punto di 
vista della privacy
@@ -333,13 +336,24 @@
 persone. Tutti devono essere liberi di pubblicare foto e video ogni tanto,
 ma l’accumulazione sistematica di tali dati su Internet dev’essere 
limitata.</p>
 
+<div class="infobox" style="margin-top: 1.5em">
 <p id="privatespace">(*) Qui si dà per scontato che la telecamera di 
sorveglianza sia puntata
 verso l'interno di un negozio, o verso la strada. Qualsiasi telecamera
 puntata da qualcuno verso lo spazio privato di qualcun altro viola la
 privacy, ma questa è un'altra questione.</p>
 </div>
+</div>
 
-<h3 id="digitalcash" class="subheader">Un rimedio alla sorveglianza 
dell’e-commerce</h3>
+<div class="announcement comment" role="complementary">
+<hr class="no-display" />
+<p>Suggeriamo anche la lettura di <a
+href="https://www.theguardian.com/commentisfree/2018/apr/03/facebook-abusing-data-law-privacy-big-tech-surveillance";>“A
+radical proposal to keep your personal data safe”</a>, pubblicato dal
+<cite>Guardian</cite> ad aprile&nbsp;2018.</p>
+<hr class="no-display" />
+</div>
+
+<h3 id="digitalcash">Un rimedio alla sorveglianza dell’e-commerce</h3>
 
 <div class="columns">
 <p>Quasi tutte le raccolte di dati provengono dalle attività degli utenti
@@ -350,10 +364,11 @@
 disposizione dello stato.</p>
 
 <p>Grazie a PRISM, la NSA <a
-href="https://www.commondreams.org/headline/2013/08/23-2";>si è introdotta
-nei database</a> di molte grandi aziende di Internet. AT&amp;T archivia
-tutte le registrazioni delle sue chiamate telefoniche fin dal 1987 e <a
-href="http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0";>
+href="https://www.commondreams.org/news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-companies";>si
+è introdotta nei database</a> di molte grandi aziende di Internet. AT&amp;T
+archivia tutte le registrazioni delle sue chiamate telefoniche fin dal 1987
+e <a
+href="https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0";>
 le mette a disposizione</a> della DEA su richiesta. Tecnicamente il governo
 degli USA non possiede tali dati, ma in pratica è come se li
 possedesse. Alcune aziende ricevono apprezzamento per <a
@@ -382,18 +397,18 @@
 <p>Potremmo correggere entrambi questi problemi adottando un sistema di
 pagamenti anonimi, cioè anonimi per chi paga: non vogliamo aiutare i
 venditori ad evadere il fisco. <a
-href="http://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/";>Bitcoin
+href="https://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/";>Bitcoin
 non è anonimo</a> (benché siano allo studio sistemi per pagare in maniera
 anonima in Bitcoin), ma la tecnologia per <a
-href="http://www.wired.com/wired/archive/2.12/emoney_pr.html";>la moneta
+href="https://www.wired.com/wired/archive/2.12/emoney_pr.html";>la moneta
 digitale</a> è stata sviluppata negli anni Ottanta del secolo scorso; il
-programma di GNU che se ne occupa si chiama <a href="http://taler.net/";>GNU
+programma di GNU che se ne occupa si chiama <a href="https://taler.net/";>GNU
 Taler</a>. Ora ci occorrono solo dei modelli di business adatti, che non
 vengano intralciati dallo stato.</p>
 
 <p>Un altro modo possibile di effettuare pagamenti anonimi sarebbe con <a
-href="https://stallman.org/articles/anonymous-payments-thru-phones.html";>schede
-telefoniche prepagate</a>; è meno comodo ma molto semplice.</p>
+href="/philosophy/phone-anonymous-payment.html">schede telefoniche
+prepagate</a>; è meno comodo ma molto semplice.</p>
 
 <p>Un rischio ulteriore della raccolta di dati personali da parte dei siti è
 che altri possano violare i loro sistemi di sicurezza, impadronirsi dei dati
@@ -402,7 +417,7 @@
 in un sito non può danneggiarvi se il sito non sa niente di voi.</p>
 </div>
 
-<h3 class="subheader">Un rimedio alla sorveglianza dei trasporti</h3>
+<h3>Un rimedio alla sorveglianza dei trasporti</h3>
 
 <div class="columns">
 <p>Dobbiamo trasformare la riscossione di pedaggi digitali in pagamento anonimo
@@ -419,7 +434,8 @@
 l’accesso a questi andrebbe limitato alle ricerche di numeri di targa
 soggetti a ordini del tribunale.</p>
 
-<p>La “no-fly list” degli USA dev’essere abolita in quanto equivale a 
una <a
+<p>La <i>no-fly list</i> degli USA dev’essere abolita in quanto equivale a 
una
+<a
 
href="https://www.aclu.org/blog/national-security-technology-and-liberty-racial-justice/victory-federal-court-recognizes";>
 pena senza processo</a>.</p>
 
@@ -455,7 +471,7 @@
 quando l’utente lo restituisce a una postazione qualunque (in genere una
 diversa da quella iniziale), quella postazione sappia dove e quando è
 avvenuto il prestito e informi l'altra postazione che l'articolo non è più
-"fuori". Il sistema calcola anche il conto dell’utente e lo invia (dopo aver
+“fuori”. Il sistema calcola anche il conto dell’utente e lo invia (dopo 
aver
 atteso un numero variabile di minuti) alla sede centrale insieme ad altre
 postazioni, così che la sede centrale non possa scoprire da quale postazione
 viene il conto. Una volta terminata l’operazione la postazione dove è stato
@@ -465,17 +481,17 @@
 l’identità dell’utente.</p>
 </div>
 
-<h3 class="subheader">Un rimedio ai dossier sulle comunicazioni</h3>
+<h3>Un rimedio ai dossier sulle comunicazioni</h3>
 
 <div class="columns">
 <p>I fornitori di servizi Internet e le compagnie telefoniche conservano grandi
 quantità di dati sui contatti dei loro utenti (cronologia di navigazione,
 telefonate, etc). Grazie ai cellulari <a
-href="http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz";>viene
+href="https://web.archive.org/web/20210312235125/http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz";>viene
 registrata anche la posizione</a> fisica dell’utente. Questi dossier vengono
 conservati per molto tempo: più di 30 anni, nel caso di AT&amp;T. Presto
 saranno registrate persino <a
-href="http://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/";>le
+href="https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/";>le
 attività fisiche</a> degli utenti. Pare che la NSA <a
 
href="https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location";>raccolga
 in massa i dati</a> di localizzazione dei telefoni cellulari.</p>
@@ -489,7 +505,7 @@
 <p>Questa soluzione non è del tutto soddisfacente, perché non impedisce
 fisicamente al governo di raccogliere tutte le informazioni in modo
 istantaneo man mano che vengono generate, cosa che <a
-href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order";>gli
+href="https://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order";>gli
 USA fanno</a> con alcune, se non tutte le compagnie telefoniche. Dovremmo
 affidarci a un divieto per legge. Sarebbe comunque meglio della situazione
 attuale, in cui la legge pertinente (il PAT RIOT Act) non proibisce
@@ -509,7 +525,7 @@
 sono scambiate messaggi.</p>
 </div>
 
-<h3 class="subheader">Ma una certa dose di sorveglianza è necessaria</h3>
+<h3>Ma una certa dose di sorveglianza è necessaria</h3>
 
 <div class="columns">
 <p>Per poter scovare i criminali, lo stato deve poter indagare su reati
@@ -523,15 +539,14 @@
 
 <p>Gli individui a cui lo stato ha conferito poteri speciali, come gli agenti
 di polizia, perdono il diritto alla privacy e devono essere monitorati. (La
-polizia ha addirittura un termine gergale per la falsa testimonianza,
-&ldquo;<a
-href="https://en.wikipedia.org/w/index.php?title=Police_perjury&amp;oldid=552608302";>testilying</a>,&rdquo;,
+polizia ha addirittura un termine gergale per la falsa testimonianza, <a
+href="https://en.wikipedia.org/w/index.php?title=Police_perjury&amp;oldid=552608302";><i>testilying</i></a>,
 tanta è la frequenza con cui vi fa ricorso, soprattutto verso manifestanti e
 <a
 
href="https://web.archive.org/web/20131025014556/http://photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/";>fotografi</a>).
 In una città della California dove gli agenti di polizia erano obbligati a
 indossare videocamere, si è scoperto che il loro uso della forza era <a
-href="http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition";>diminuito
+href="https://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition";>diminuito
 del 60%</a>). L’ACLU è favorevole a questo provvedimento.</p>
 
 <p>Le imprese non sono persone, e <a
@@ -539,7 +554,7 @@
 godono di diritti umani</a>. È legittimo esigere che le imprese pubblichino
 i dettagli dei processi che potrebbero creare alla società dei rischi
 chimici, biologici, nucleari, fiscali, informatici (vedi <a
-href="http://DefectiveByDesign.org";>DRM</a>) o politici (vedi le lobby), a
+href="https://DefectiveByDesign.org";>DRM</a>) o politici (vedi le lobby), a
 qualunque livello sia necessario per garantire il benessere della
 popolazione. Il pericolo insito in queste operazioni (si pensi al disastro
 di British Petroleum, all’incidente di Fukushima e alla crisi fiscale del
@@ -571,7 +586,6 @@
 quanto lo fossero l’Unione sovietica e la Germania dell’Est, dobbiamo
 invertire questa tendenza. Ciò richiede l’interruzione dell’accumulo di 
big
 data sui cittadini.</p>
-</div>
 <div class="column-limit"></div>
 
 <h3 class="footnote">Nota</h3>
@@ -580,6 +594,16 @@
 href="https://idlewords.com/2019/06/the_new_wilderness.htm";>rispetto della
 vita privata</a>.</li>
 </ol>
+
+<div class="infobox extra" role="complementary">
+<hr />
+
+<!-- rms: I deleted the link because of Wired's announced
+     anti-ad-block system -->
+<p>La prima versione di questo articolo è stata pubblicata su
+<cite>Wired</cite>nel mese di ottobre 2013.</p>
+</div>
+</div>
 </div>
 
 <div class="translators-notes">
@@ -590,7 +614,7 @@
 
 <!-- for id="content", starts in the include above -->
 <!--#include virtual="/server/footer.it.html" -->
-<div id="footer">
+<div id="footer" role="contentinfo">
 <div class="unprintable">
 
 <p>Per informazioni su FSF e GNU rivolgetevi, possibilmente in inglese, a <a
@@ -610,7 +634,7 @@
 
         &lt;web-translators@gnu.org&gt;</a>.</p>
 
-        <p>For information on coordinating and submitting translations of
+        <p>For information on coordinating and contributing translations of
         our web pages, see <a
         href="/server/standards/README.translations.html">Translations
         README</a>. -->
@@ -642,7 +666,7 @@
      
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman</p>
+<p>Copyright &copy; 2013-2019, 2021 Richard Stallman</p>
 
 <p>Questa pagina è distribuita secondo i termini della licenza <a 
rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/deed.it";>Creative
@@ -659,7 +683,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2021/09/05 10:37:40 $
+$Date: 2021/12/23 13:01:19 $
 
 <!-- timestamp end -->
 </p>

Index: po/open-source-misses-the-point.ru-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.ru-en.html,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- po/open-source-misses-the-point.ru-en.html  4 Oct 2021 11:33:31 -0000       
1.53
+++ po/open-source-misses-the-point.ru-en.html  23 Dec 2021 13:01:19 -0000      
1.54
@@ -121,7 +121,7 @@
 software source code would qualify as open source.  Nearly all open
 source software is free software, but there are exceptions.  First,
 some open source licenses are too restrictive, so they do not qualify
-as free licenses.  For example, &ldquo;Open Watcom&rdquo; is nonfree
+as free licenses.  For example, Open Watcom is nonfree
 because its license does not allow making a modified version and using
 it privately.  Fortunately, few programs use such licenses.</p>
 
@@ -177,18 +177,25 @@
 this includes &ldquo;open source software.&rdquo;</p>
 
 <p>The <a href="https://opensource.org/osd";>official definition of
-&ldquo;open source software&rdquo;</a> (which is published by the Open
+open source software</a> (which is published by the Open
 Source Initiative and is too long to include here) was derived
 indirectly from our criteria for free software.  It is not the same;
 it is a little looser in some respects.  Nonetheless, their definition
 agrees with our definition in most cases.</p>
 
 <p>However, the obvious meaning for the expression &ldquo;open source
-software&rdquo;&mdash;and the one most people seem to think it
-means&mdash;is &ldquo;You can look at the source code.&rdquo; That
-criterion is much weaker than the free software definition, much
-weaker also than the official definition of open source.  It includes
-many programs that are neither free nor open source.</p>
+software&rdquo; is &ldquo;You can look at the source code.&rdquo;
+Indeed, most people seem to misunderstand &ldquo;open source
+software&rdquo; that way.  (The clear term for that meaning is
+&ldquo;source available.&rdquo;) That criterion is much weaker than
+the free software definition, much weaker also than the official
+definition of open source.  It includes many programs that are neither
+free nor open source.</p>
+
+<p>Why do people misunderstand it that way?  Because that is the
+natural meaning of the words &ldquo;open source.&rdquo; But the
+concept for which the open source advocates sought another meaning was
+that of free software.</p>
 
 <p>Since the obvious meaning for &ldquo;open source&rdquo; is not the
 meaning that its advocates intend, the result is that most people
@@ -334,7 +341,7 @@
 
 <p>The main initial motivation of those who split off the open source
 camp from the free software movement was that the ethical ideas of
-&ldquo;free software&rdquo; made some people uneasy.  That's true: raising 
+free software made some people uneasy.  That's true: raising 
 ethical issues such as freedom, talking about responsibilities as well as
 convenience, is asking people to think about things they might prefer
 to ignore, such as whether their conduct is ethical.  This can trigger
@@ -404,7 +411,7 @@
 <h3>Rivals for Mindshare</h3>
 
 <p>&ldquo;Free&rdquo; and &ldquo;open&rdquo; are rivals for mindshare.
-&ldquo;Free software&rdquo; and &ldquo;open source&rdquo; are
+Free software and open source are
 different ideas but, in most people's way of looking at software, they
 compete for the same conceptual slot.  When people become habituated
 to saying and thinking &ldquo;open source,&rdquo; that is an obstacle
@@ -511,7 +518,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/10/04 11:33:31 $
+$Date: 2021/12/23 13:01:19 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/open-source-misses-the-point.ru.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.ru.po,v
retrieving revision 1.127
retrieving revision 1.128
diff -u -b -r1.127 -r1.128
--- po/open-source-misses-the-point.ru.po       23 Dec 2021 12:33:00 -0000      
1.127
+++ po/open-source-misses-the-point.ru.po       23 Dec 2021 13:01:19 -0000      
1.128
@@ -19,7 +19,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2021-12-23 00:25+0000\n"
 
 # type: Content of: <title>
 #. type: Content of: <title>

Index: po/surveillance-vs-democracy.it-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.it-en.html,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- po/surveillance-vs-democracy.it-en.html     1 Feb 2021 13:30:45 -0000       
1.35
+++ po/surveillance-vs-democracy.it-en.html     23 Dec 2021 13:01:19 -0000      
1.36
@@ -1,5 +1,8 @@
 <!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.90 -->
+<!-- Parent-Version: 1.96 -->
+<!-- This page is derived from /server/standards/boilerplate.html -->
+<!--#set var="TAGS" value="essays cultural evils" -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="yes" -->
 <title>How Much Surveillance Can Democracy Withstand?
 - GNU Project - Free Software Foundation</title>
 <style type="text/css" media="print,screen"><!--
@@ -14,21 +17,14 @@
 <!-- GNUN: localize URL /graphics/dog.small.jpg -->
 <!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" -->
 <!--#include virtual="/server/banner.html" -->
+<!--#include virtual="/philosophy/ph-breadcrumb.html" -->
+<!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/top-addendum.html" -->
+<div class="article">
 <h2 class="center">How Much Surveillance Can Democracy Withstand?</h2>
 
 <address class="byline center">by
-<a href="http://www.stallman.org/";>Richard Stallman</a></address>
-
-<!-- rms: I deleted the link because of Wired's announced
-     anti-ad-block system -->
-<blockquote class="center"><p><em>A version of this article was first 
published in
-<cite>Wired</cite> in October&nbsp;2013.<br />
-Also consider reading &ldquo;<a
-href="https://www.theguardian.com/commentisfree/2018/apr/03/facebook-abusing-data-law-privacy-big-tech-surveillance";>A
-radical proposal to keep your personal data safe</a>,&rdquo; published in
-<cite>The Guardian</cite> in April&nbsp;2018.</em></p></blockquote>
-
-<div class="article">
+<a href="https://www.stallman.org/";>Richard Stallman</a></address>
 
 <div id="intro">
 <div class="pict wide">
@@ -70,14 +66,14 @@
 can't trust nonfree software; the NSA
 <a 
href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm";>uses</a>
 and
-even <a 
href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security";>creates</a>
+even <a 
href="https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security";>creates</a>
 security weaknesses in nonfree software to invade our own computers
 and routers.  Free software gives us control of our own computers,
-but <a href="http://www.wired.com/opinion/2013/10/149481/";>that won't
+but <a href="https://www.wired.com/opinion/2013/10/149481/";>that won't
 protect our privacy once we set foot on the Internet</a>.</p>
 
 <p><a
-href="http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill";>Bipartisan
+href="https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill";>Bipartisan
 legislation to &ldquo;curtail the domestic surveillance
 powers&rdquo;</a> in the U.S. is being drawn up, but it relies on
 limiting the government's use of our virtual dossiers.  That won't
@@ -86,7 +82,7 @@
 or her.  We need to go further.</p>
 </div>
 
-<h3 class="subheader" style="clear: both">The Upper Limit on Surveillance in a 
Democracy</h3>
+<h3 style="clear: both">The Upper Limit on Surveillance in a Democracy</h3>
 
 <div class="columns">
 <p>If whistleblowers don't dare reveal crimes and lies, we lose the
@@ -97,29 +93,29 @@
 
 <p>An unnamed U.S. government official ominously told journalists in
 2011 that
-the <a 
href="http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river";>U.S.
 would
+the <a 
href="https://www.rcfp.org/journals/news-media-and-law-summer-2011/lessons-wye-river/";>U.S.
 would
 not subpoena reporters because &ldquo;We know who you're talking
 to.&rdquo;</a>
-Sometimes <a 
href="http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press";>journalists'
+Sometimes <a 
href="https://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press";>journalists'
 phone call records are subpoenaed</a> to find this out, but Snowden
 has shown us that in effect they subpoena all the phone call records
 of everyone in the U.S., all the
 time, <a 
href="https://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order";>from
 Verizon</a>
-and <a 
href="http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07";>from
+and <a 
href="https://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07";>from
 other companies too</a>.</p>
 
 <p>Opposition and dissident activities need to keep secrets from
 states that are willing to play dirty tricks on them.  The ACLU has
 demonstrated the U.S. government's <a
-href="http://www.aclu.org/files/assets/Spyfiles_2_0.pdf";>systematic
+href="https://www.aclu.org/files/assets/Spyfiles_2_0.pdf";>systematic
 practice of infiltrating peaceful dissident groups</a> on the pretext
 that there might be terrorists among them.  The point at which
 surveillance is too much is the point at which the state can find who
 spoke to a known journalist or a known dissident.</p>
 </div>
 
-<h3 class="subheader">Information, Once Collected, Will Be Misused</h3>
+<h3>Information, Once Collected, Will Be Misused</h3>
 
 <div  class="columns">
 <p id="willbemisused">When people recognize
@@ -128,7 +124,7 @@
 accumulated data.  That sounds nice, but it won't fix the problem, not
 even slightly, even supposing that the government obeys the rules.
 (The NSA has misled the FISA court, which said it
-was <a href="http://www.wired.com/threatlevel/2013/09/nsa-violations/";>unable
+was <a href="https://www.wired.com/threatlevel/2013/09/nsa-violations/";>unable
 to effectively hold the NSA accountable</a>.) Suspicion of a crime
 will be grounds for access, so once a whistleblower is accused of
 &ldquo;espionage,&rdquo; finding the &ldquo;spy&rdquo; will provide an
@@ -144,7 +140,7 @@
 
 <p>In addition, the state's surveillance staff will misuse the data
 for personal reasons.  Some NSA
-agents <a 
href="http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems";>used
+agents <a 
href="https://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems";>used
 U.S. surveillance systems to track their lovers</a>&mdash;past,
 present, or wished-for&mdash;in a practice called
 &ldquo;LOVEINT.&rdquo; The NSA says it has caught and punished this a
@@ -157,7 +153,7 @@
 with <a 
href="https://theyarewatching.org/issues/risks-increase-once-data-shared";>new
 digital systems</a>.  In 2016, a prosecutor was accused of forging
 judges' signatures to get authorization
-to <a 
href="http://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933";>
+to <a 
href="https://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933";>
 wiretap someone who was the object of a romantic obsession</a>. The AP
 knows
 of <a href="https://apnews.com/699236946e3140659fff8a2362e16f43";>many
@@ -171,19 +167,32 @@
 from <a 
href="http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/";>Europe</a>,
 <a href="https://en.wikipedia.org/wiki/Japanese_American_internment";>the
 US</a>, and most
-recently <a 
href="http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021";>Turkey</a>.
+recently <a 
href="https://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021";>Turkey</a>.
 (Turkey's confusion about who had really used the Bylock program only
 exacerbated the basic deliberate injustice of arbitrarily punishing
 people for having used it.)
 </p>
 
+<p>You may feel your government won't use your personal data for
+repression, but you can't rely on that feeling, because governments do
+change.  As of 2021, many ostensibly democratic states
+are <a 
href="https://www.theguardian.com/commentisfree/2021/aug/21/beware-state-surveillance-of-your-lives-governments-can-change-afghanistan";>ruled
+by people with authoritarian leanings</a>, and the Taliban have taken
+over Afghanistan's systems of biometric identification that were set
+up at the instigation of the US.  The UK is working on a law
+to <a 
href="https://www.theguardian.com/commentisfree/2021/aug/09/police-bill-not-law-order-state-control-erosion-freedom";>repress
+nonviolent protests that might be described as causing &ldquo;serious
+disruption.&rdquo;</a>  The US could become permanently repressive in
+2025, for all we know.
+</p>
+
 <p>Personal data collected by the state is also likely to be obtained
 by outside crackers that break the security of the servers, even
 by <a 
href="https://www.techdirt.com/articles/20150612/16334231330/second-opm-hack-revealed-even-worse-than-first.shtml";>crackers
 working for hostile states</a>.</p>
 
 <p>Governments can easily use massive surveillance capability
-to <a 
href="http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html";>subvert
+to <a 
href="https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html";>subvert
 democracy directly</a>.</p>
 
 <p>Total surveillance accessible to the state enables the state to
@@ -192,7 +201,7 @@
 that is easily accessible to the state.</p>
 </div>
 
-<h3 class="subheader">Robust Protection for Privacy Must Be Technical</h3>
+<h3>Robust Protection for Privacy Must Be Technical</h3>
 
 <div class="columns">
 <p>The Electronic Frontier Foundation and other organizations propose
@@ -207,7 +216,7 @@
 <p>However, such legal protections are precarious: as recent history
 shows, they can be repealed (as in the FISA Amendments Act),
 suspended, or <a
-href="http://www.nytimes.com/2009/04/16/us/16nsa.html";>ignored</a>.</p>
+href="https://www.nytimes.com/2009/04/16/us/16nsa.html";>ignored</a>.</p>
 
 <p>Meanwhile, demagogues will cite the usual excuses as grounds for
 total surveillance; any terrorist attack, even one that kills just a
@@ -224,7 +233,7 @@
 ignoring this law, the idea would hardly make sense.</p>
 </div>
 
-<h3 class="subheader">First, Don't Be Foolish</h3>
+<h3>First, Don't Be Foolish</h3>
 
 <div class="columns">
 <p>To have privacy, you must not throw it away: the first one who has
@@ -250,7 +259,7 @@
 pertinent data to the company's server.</p>
 
 <p>Protect your friends' and acquaintances' privacy,
-too.  <a 
href="http://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/";>Don't
+too.  <a 
href="https://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/";>Don't
 give out their personal information</a> except how to contact them,
 and never give any web site your list of email or phone contacts.
 Don't tell a company such as Facebook anything about your friends that
@@ -269,7 +278,7 @@
 suspects.</p>
 </div>
 
-<h3 class="subheader">We Must Design Every System for Privacy</h3>
+<h3>We Must Design Every System for Privacy</h3>
 
 <div class="columns">
 <p>If we don't want a total surveillance society, we must consider
@@ -292,7 +301,7 @@
 systems&nbsp;[<a href="#ambientprivacy">1</a>].</p>
 </div>
 
-<h3 class="subheader">Remedy for Collecting Data: Leaving It Dispersed</h3>
+<h3>Remedy for Collecting Data: Leaving It Dispersed</h3>
 
 <div class="columns">
 <p id="dispersal">One way to make monitoring safe for privacy is
@@ -326,13 +335,24 @@
 occasionally, but the systematic accumulation of such data on the
 Internet must be limited.</p>
 
+<div class="infobox" style="margin-top: 1.5em">
 <p id="privatespace">(*) I assume here that the security
 camera points at the inside of a store, or at the street.  Any camera
 pointed at someone's private space by someone else violates privacy,
 but that is another issue.</p>
 </div>
+</div>
 
-<h3 id="digitalcash" class="subheader">Remedy for Internet Commerce 
Surveillance</h3>
+<div class="announcement comment" role="complementary">
+<hr class="no-display" />
+<p>Also consider reading &ldquo;<a
+href="https://www.theguardian.com/commentisfree/2018/apr/03/facebook-abusing-data-law-privacy-big-tech-surveillance";>A
+radical proposal to keep your personal data safe</a>,&rdquo; published in
+<cite>The Guardian</cite> in April&nbsp;2018.</p>
+<hr class="no-display" />
+</div>
+
+<h3 id="digitalcash">Remedy for Internet Commerce Surveillance</h3>
 
 <div class="columns">
 <p>Most data collection comes from people's own digital activities.
@@ -343,10 +363,10 @@
 systematically available to the state.</p>
 
 <p>The NSA, through PRISM,
-has <a href="https://www.commondreams.org/headline/2013/08/23-2";>gotten
+has <a 
href="https://www.commondreams.org/news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-companies";>gotten
 into the databases of many large Internet corporations</a>.  AT&amp;T
 has saved all its phone call records since 1987
-and <a 
href="http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0";>makes
+and <a 
href="https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0";>makes
 them available to the DEA</a> to search on request.  Strictly
 speaking, the U.S.  government does not possess that data, but in
 practical terms it may as well possess it.  Some companies are praised
@@ -376,17 +396,17 @@
 <p>We could correct both problems by adopting a system of anonymous
 payments&mdash;anonymous for the payer, that is.  (We don't want to
 help the payee dodge
-taxes.)  <a 
href="http://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/";>Bitcoin
+taxes.)  <a 
href="https://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/";>Bitcoin
 is not anonymous</a>, though there are efforts to develop ways to pay
 anonymously with Bitcoin.  However, technology
-for <a href="http://www.wired.com/wired/archive/2.12/emoney_pr.html";>digital
+for <a href="https://www.wired.com/wired/archive/2.12/emoney_pr.html";>digital
 cash was first developed in the 1980s</a>; the GNU software for doing
-this is called <a href="http://taler.net/";>GNU Taler</a>.  Now we need
+this is called <a href="https://taler.net/";>GNU Taler</a>.  Now we need
 only suitable business arrangements, and for the state not to obstruct
 them.</p>
 
 <p>Another possible method for anonymous payments would
-use <a 
href="https://stallman.org/articles/anonymous-payments-thru-phones.html";>prepaid
+use <a href="/philosophy/phone-anonymous-payment.html">prepaid
 phone cards</a>.  It is less convenient, but very easy to
 implement.</p>
 
@@ -397,7 +417,7 @@
 knows nothing about you.</p>
 </div>
 
-<h3 class="subheader">Remedy for Travel Surveillance</h3>
+<h3>Remedy for Travel Surveillance</h3>
 
 <div class="columns">
 <p>We must convert digital toll collection to anonymous payment (using
@@ -457,16 +477,16 @@
 borrower's identity immediately.</p>
 </div>
 
-<h3 class="subheader">Remedy for Communications Dossiers</h3>
+<h3>Remedy for Communications Dossiers</h3>
 
 <div class="columns">
 <p>Internet service providers and telephone companies keep extensive
 data on their users' contacts (browsing, phone calls, etc).  With
 mobile phones, they
-also <a 
href="http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz";>record
+also <a 
href="https://web.archive.org/web/20210312235125/http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz";>record
 the user's physical location</a>.  They keep these dossiers for a long
 time: over 30 years, in the case of AT&amp;T.  Soon they will
-even <a 
href="http://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/";>record
+even <a 
href="https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/";>record
 the user's body activities</a>.  It appears that
 the <a 
href="https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location";>NSA
 collects cell phone location data</a> in bulk.</p>
@@ -479,7 +499,7 @@
 <p>This solution is not entirely satisfactory, because it won't
 physically stop the government from collecting all the information
 immediately as it is generated&mdash;which is what
-the <a 
href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order";>U.S.
 does
+the <a 
href="https://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order";>U.S.
 does
 with some or all phone companies</a>.  We would have to rely on
 prohibiting that by law.  However, that would be better than the
 current situation, where the relevant law (the PAT RIOT Act) does not
@@ -499,7 +519,7 @@
 would be hard to determine that you had sent mail to me.</p>
 </div>
 
-<h3 class="subheader">But Some Surveillance Is Necessary</h3>
+<h3>But Some Surveillance Is Necessary</h3>
 
 <div class="columns">
 <p>For the state to find criminals, it needs to be able to investigate
@@ -520,7 +540,7 @@
 photographers</a>.)
 One city in California that required police to wear video cameras all
 the time
-found <a 
href="http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition";>their
+found <a 
href="https://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition";>their
 use of force fell by 60%</a>.  The ACLU is in favor of this.</p>
 
 <p><a
@@ -528,7 +548,7 @@
 are not people, and not entitled to human rights</a>.  It is
 legitimate to require businesses to publish the details of processes
 that might cause chemical, biological, nuclear, fiscal, computational
-(e.g., <a href="http://DefectiveByDesign.org";>DRM</a>) or political
+(e.g., <a href="https://DefectiveByDesign.org";>DRM</a>) or political
 (e.g., lobbying) hazards to society, to whatever level is needed for
 public well-being.  The danger of these operations (consider the BP
 oil spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs
@@ -559,7 +579,6 @@
 a grave surveillance deficit, and ought to be surveilled more than the
 Soviet Union and East Germany were, we must reverse this increase.
 That requires stopping the accumulation of big data about people.</p>
-</div>
 <div class="column-limit"></div>
 
 <h3 class="footnote">End Note</h3>
@@ -569,11 +588,20 @@
 href="https://idlewords.com/2019/06/the_new_wilderness.htm";>ambient
 privacy</a>.</li>
 </ol>
+
+<div class="infobox extra" role="complementary">
+<hr />
+<!-- rms: I deleted the link because of Wired's announced
+     anti-ad-block system -->
+<p>A version of this article was first published in
+<cite>Wired</cite> in October&nbsp;2013.</p>
+</div>
+</div>
 </div>
 
 </div><!-- for id="content", starts in the include above -->
 <!--#include virtual="/server/footer.html" -->
-<div id="footer">
+<div id="footer" role="contentinfo">
 <div class="unprintable">
 
 <p>Please send general FSF &amp; GNU inquiries to
@@ -591,13 +619,13 @@
         to <a href="mailto:web-translators@gnu.org";>
         &lt;web-translators@gnu.org&gt;</a>.</p>
 
-        <p>For information on coordinating and submitting translations of
+        <p>For information on coordinating and contributing translations of
         our web pages, see <a
         href="/server/standards/README.translations.html">Translations
         README</a>. -->
 Please see the <a
 href="/server/standards/README.translations.html">Translations
-README</a> for information on coordinating and submitting translations
+README</a> for information on coordinating and contributing translations
 of this article.</p>
 </div>
 
@@ -618,7 +646,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
 
-<p>Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman</p>
+<p>Copyright &copy; 2013-2019, 2021 Richard Stallman</p>
 
 <p>This page is licensed under a <a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative
@@ -628,7 +656,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/02/01 13:30:45 $
+$Date: 2021/12/23 13:01:19 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/surveillance-vs-democracy.it.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.it.po,v
retrieving revision 1.136
retrieving revision 1.137
diff -u -b -r1.136 -r1.137
--- po/surveillance-vs-democracy.it.po  23 Dec 2021 12:25:27 -0000      1.136
+++ po/surveillance-vs-democracy.it.po  23 Dec 2021 13:01:19 -0000      1.137
@@ -9,7 +9,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2021-12-23 13:19+0100\n"
+"POT-Creation-Date: 2021-09-05 10:26+0000\n"
 "PO-Revision-Date: 2021-12-23 13:01+0100\n"
 "Last-Translator: Dora Scilipoti\n"
 "Language-Team: Italian\n"
@@ -606,12 +606,12 @@
 msgstr ""
 "Un modo per rendere il monitoraggio sicuro dal punto di vista della privacy "
 "è quello di tenere i dati dispersi e rendere scomodo il loro accesso. Le "
-"vecchie telecamere di sicurezza non costituivano una minaccia alla "
-"privacy(<a href=\"#privatespace\">*</a>). Le registrazioni erano conservate "
-"in loco e per un massimo di poche settimane. Poiché consultarle era scomodo, 
"
-"non venivano mai studiate in modo massiccio, ma solo nei luoghi in cui "
-"qualcuno aveva denunciato un reato. Non sarebbe fattibile raccogliere "
-"fisicamente milioni di nastri ogni giorno e guardarli o copiarli tutti."
+"vecchie telecamere di sicurezza non costituivano una minaccia alla privacy"
+"(<a href=\"#privatespace\">*</a>). Le registrazioni erano conservate in loco "
+"e per un massimo di poche settimane. Poiché consultarle era scomodo, non "
+"venivano mai studiate in modo massiccio, ma solo nei luoghi in cui qualcuno "
+"aveva denunciato un reato. Non sarebbe fattibile raccogliere fisicamente "
+"milioni di nastri ogni giorno e guardarli o copiarli tutti."
 
 #. type: Content of: <div><div><p>
 msgid ""



reply via email to

[Prev in Thread] Current Thread [Next in Thread]