[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po all.fr.po all.pot all.pt-br-...
|
From: |
GNUN |
|
Subject: |
www/proprietary/po all.fr.po all.pot all.pt-br-... |
|
Date: |
Wed, 3 Jan 2024 07:03:48 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 24/01/03 07:03:46
Modified files:
proprietary/po : all.fr.po all.pot all.pt-br-diff.html
all.pt-br.po all.ru.po de.po es.po fr.po it.po
ja.po nl.po pl.po pot
proprietary-drm.de-diff.html
proprietary-drm.de.po proprietary-drm.es.po
proprietary-drm.fr.po
proprietary-drm.it-diff.html
proprietary-drm.it.po
proprietary-drm.ja-diff.html
proprietary-drm.ja.po proprietary-drm.pot
proprietary-drm.pt-br-diff.html
proprietary-drm.pt-br.po proprietary-drm.ru.po
proprietary-insecurity.es.po
proprietary-insecurity.fr.po
proprietary-insecurity.it-diff.html
proprietary-insecurity.it.po
proprietary-insecurity.ja-diff.html
proprietary-insecurity.ja.po
proprietary-insecurity.pot
proprietary-insecurity.pt-br-diff.html
proprietary-insecurity.pt-br.po
proprietary-insecurity.ru.po
proprietary-sabotage.de-diff.html
proprietary-sabotage.de.po
proprietary-sabotage.es.po
proprietary-sabotage.fr.po
proprietary-sabotage.it-diff.html
proprietary-sabotage.it.po
proprietary-sabotage.ja-diff.html
proprietary-sabotage.ja.po
proprietary-sabotage.pot
proprietary-sabotage.pt-br-diff.html
proprietary-sabotage.pt-br.po
proprietary-sabotage.ru.po
proprietary-tethers.de-diff.html
proprietary-tethers.de.po
proprietary-tethers.es.po
proprietary-tethers.fr.po
proprietary-tethers.ja-diff.html
proprietary-tethers.ja.po
proprietary-tethers.pot
proprietary-tethers.pt-br-diff.html
proprietary-tethers.pt-br.po
proprietary-tethers.ru.po proprietary.es.po
proprietary.fr.po proprietary.it-diff.html
proprietary.it.po proprietary.ja-diff.html
proprietary.ja.po proprietary.nl-diff.html
proprietary.nl.po proprietary.pl-diff.html
proprietary.pl.po proprietary.pot
proprietary.pt-br-diff.html
proprietary.pt-br.po proprietary.ru.po
proprietary.tr.po proprietary.zh-cn.po
proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po tr.po
zh-cn.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.fr.po?cvsroot=www&r1=1.269&r2=1.270
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.pot?cvsroot=www&r1=1.144&r2=1.145
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.pt-br-diff.html?cvsroot=www&r1=1.96&r2=1.97
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.pt-br.po?cvsroot=www&r1=1.146&r2=1.147
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.ru.po?cvsroot=www&r1=1.255&r2=1.256
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.497&r2=1.498
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.795&r2=1.796
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.881&r2=1.882
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.496&r2=1.497
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.504&r2=1.505
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.497&r2=1.498
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.496&r2=1.497
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.495&r2=1.496
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.de-diff.html?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.de.po?cvsroot=www&r1=1.103&r2=1.104
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.es.po?cvsroot=www&r1=1.86&r2=1.87
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.fr.po?cvsroot=www&r1=1.135&r2=1.136
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.it-diff.html?cvsroot=www&r1=1.78&r2=1.79
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.it.po?cvsroot=www&r1=1.92&r2=1.93
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.ja-diff.html?cvsroot=www&r1=1.81&r2=1.82
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.ja.po?cvsroot=www&r1=1.89&r2=1.90
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.pot?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.pt-br-diff.html?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.pt-br.po?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.ru.po?cvsroot=www&r1=1.158&r2=1.159
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.es.po?cvsroot=www&r1=1.196&r2=1.197
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.337&r2=1.338
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-diff.html?cvsroot=www&r1=1.133&r2=1.134
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.234&r2=1.235
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja-diff.html?cvsroot=www&r1=1.154&r2=1.155
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja.po?cvsroot=www&r1=1.206&r2=1.207
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pot?cvsroot=www&r1=1.172&r2=1.173
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pt-br-diff.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pt-br.po?cvsroot=www&r1=1.51&r2=1.52
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.377&r2=1.378
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.de-diff.html?cvsroot=www&r1=1.98&r2=1.99
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.de.po?cvsroot=www&r1=1.175&r2=1.176
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.es.po?cvsroot=www&r1=1.130&r2=1.131
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.fr.po?cvsroot=www&r1=1.259&r2=1.260
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it-diff.html?cvsroot=www&r1=1.106&r2=1.107
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it.po?cvsroot=www&r1=1.168&r2=1.169
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ja-diff.html?cvsroot=www&r1=1.112&r2=1.113
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ja.po?cvsroot=www&r1=1.161&r2=1.162
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.pot?cvsroot=www&r1=1.125&r2=1.126
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.pt-br-diff.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.pt-br.po?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ru.po?cvsroot=www&r1=1.292&r2=1.293
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.de-diff.html?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.de.po?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.es.po?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.fr.po?cvsroot=www&r1=1.115&r2=1.116
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.ja-diff.html?cvsroot=www&r1=1.71&r2=1.72
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.ja.po?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.pot?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.pt-br-diff.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.pt-br.po?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.ru.po?cvsroot=www&r1=1.117&r2=1.118
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.722&r2=1.723
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.721&r2=1.722
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.407&r2=1.408
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.419&r2=1.420
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.412&r2=1.413
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.402&r2=1.403
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.408&r2=1.409
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.393&r2=1.394
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.426&r2=1.427
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.385&r2=1.386
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.382&r2=1.383
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br-diff.html?cvsroot=www&r1=1.106&r2=1.107
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.556&r2=1.557
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.724&r2=1.725
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.377&r2=1.378
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.457&r2=1.458
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.387&r2=1.388
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.372&r2=1.373
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.583&r2=1.584
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.1048&r2=1.1049
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.413&r2=1.414
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.420&r2=1.421
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.496&r2=1.497
Patches:
Index: all.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.fr.po,v
retrieving revision 1.269
retrieving revision 1.270
diff -u -b -r1.269 -r1.270
--- all.fr.po 3 Jan 2024 10:51:45 -0000 1.269
+++ all.fr.po 3 Jan 2024 12:03:34 -0000 1.270
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2024-01-03 10:25+0000\n"
+"POT-Creation-Date: 2024-01-03 11:55+0000\n"
"PO-Revision-Date: 2024-01-03 11:46+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2024-01-03 11:55+0000\n"
#. type: Content of: <title>
msgid ""
@@ -91,6 +92,47 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.bleepingcomputer.com/news/security/logofail-attack-can-"
+"install-uefi-bootkits-through-bootup-logos/\">x86 and ARM based computers "
+"shipped with UEFI are potentially vulnerable to a design omission called "
+"LogoFAIL</a>. A cracker can replace the BIOS logo with a fake one that "
+"contains malicious code. Users can't fix this omission because it is in the "
+"nonfree UEFI firmware that users can't replace."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-"
+"hardware-hacking/\">Newag, a Polish railway manufacturer, puts DRM inside "
+"trains to prevent third-party repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some time. "
+"If yes, the train will be “locked up” (i.e. bricked). It was "
+"also possible to unlock it by pressing a secret combination of buttons in "
+"the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent autos offer a feature by which the drivers can connect their snoop-"
"phones to the car. That feature <a href=\"https://therecord.media/class-"
"action-lawsuit-cars-text-messages-privacy\"> snoops on the calls and texts</"
Index: all.pot
===================================================================
RCS file: /web/www/www/proprietary/po/all.pot,v
retrieving revision 1.144
retrieving revision 1.145
diff -u -b -r1.144 -r1.145
--- all.pot 3 Jan 2024 10:31:18 -0000 1.144
+++ all.pot 3 Jan 2024 12:03:35 -0000 1.145
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2024-01-03 10:25+0000\n"
+"POT-Creation-Date: 2024-01-03 11:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -82,6 +82,48 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a "
+"href=\"https://www.bleepingcomputer.com/news/security/logofail-attack-can-install-uefi-bootkits-through-bootup-logos/\">x86
"
+"and ARM based computers shipped with UEFI are potentially vulnerable to a "
+"design omission called LogoFAIL</a>. A cracker can replace the BIOS logo "
+"with a fake one that contains malicious code. Users can't fix this omission "
+"because it is in the nonfree UEFI firmware that users can't replace."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a "
+"href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-hardware-hacking/\">Newag,
"
+"a Polish railway manufacturer, puts DRM inside trains to prevent third-party "
+"repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some "
+"time. If yes, the train will be “locked up” (i.e. bricked). It "
+"was also possible to unlock it by pressing a secret combination of buttons "
+"in the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent autos offer a feature by which the drivers can connect their "
"snoop-phones to the car. That feature <a "
"href=\"https://therecord.media/class-action-lawsuit-cars-text-messages-privacy\">
"
Index: all.pt-br-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/all.pt-br-diff.html,v
retrieving revision 1.96
retrieving revision 1.97
diff -u -b -r1.96 -r1.97
--- all.pt-br-diff.html 3 Jan 2024 10:31:18 -0000 1.96
+++ all.pt-br-diff.html 3 Jan 2024 12:03:35 -0000 1.97
@@ -64,6 +64,53 @@
<ul class="blurbs">
<span class="inserted"><ins><em><!-- Copied from workshop/mal.rec; don't
edit in all.html. -->
<!--#set var='ADD' value='2024-01-03' -->
+<!--#set var='PUB' value='2023-12-13' -->
+<li><small class='date-tag'>Added: <span
class="gnun-split"></span>
+<!--#echo encoding='none' var='ADD' --><span
class="gnun-split"></span>
+— Latest reference: <span
class="gnun-split"></span><!--#echo
+encoding='none' var='PUB' --></small>
+ <p><a
+
href="https://www.bleepingcomputer.com/news/security/logofail-attack-can-install-uefi-bootkits-through-bootup-logos/">x86
+ and ARM based computers shipped with UEFI are potentially vulnerable
+ to a design omission called LogoFAIL</a>. A cracker can replace the
+ BIOS logo with a fake one that contains malicious code. Users can't
+ fix this omission because it is in the nonfree UEFI firmware that
+ users can't replace.</p>
+ </li>
+
+<!-- Copied from workshop/mal.rec; don't edit in all.html. -->
+<!--#set var='ADD' value='2024-01-03' -->
+<!--#set var='PUB' value='2023-12-13' -->
+<li><small class='date-tag'>Added: <span
class="gnun-split"></span>
+<!--#echo encoding='none' var='ADD' --><span
class="gnun-split"></span>
+— Latest reference: <span
class="gnun-split"></span><!--#echo
+encoding='none' var='PUB' --></small>
+ <p><a
+
href="https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-hardware-hacking/">Newag,
+ a Polish railway manufacturer, puts DRM inside trains to prevent
+ third-party repairs</a>.</p>
+
+ <ul>
+ <li><p>The train's software contains code to detect if the
GPS
+ coordinates are near some third party repairers, or the train has not
+ been running for some time. If yes, the train will be “locked
+ up” (i.e. bricked). It was also possible to unlock it by
+ pressing a secret combination of buttons in the cockpit, but this
+ ability was removed by a manufacturer's software
update.</p></li>
+
+ <li><p>The train will also lock up after a certain date,
which is
+ hardcoded in the software.</p></li>
+
+ <li><p>The company pushes a software update that detects if
the
+ DRM code has been bypassed, i.e. the lock should have been engaged
+ but the train is still operational. If yes, the controller cabin
+ screen will display a scary message warning about “copyright
+ violation”.</p></li>
+ </ul>
+ </li>
+
+<!-- Copied from workshop/mal.rec; don't edit in all.html. -->
+<!--#set var='ADD' value='2024-01-03' -->
<!--#set var='PUB' value='2023-11-08' -->
<li><small class='date-tag'>Added: <span
class="gnun-split"></span>
<!--#echo encoding='none' var='ADD' --><span
class="gnun-split"></span>
@@ -5032,7 +5079,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2024/01/03 10:31:18 $
+$Date: 2024/01/03 12:03:35 $
<!-- timestamp end -->
</p>
</div>
Index: all.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.pt-br.po,v
retrieving revision 1.146
retrieving revision 1.147
diff -u -b -r1.146 -r1.147
--- all.pt-br.po 3 Jan 2024 10:31:18 -0000 1.146
+++ all.pt-br.po 3 Jan 2024 12:03:35 -0000 1.147
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2024-01-03 10:25+0000\n"
+"POT-Creation-Date: 2024-01-03 11:55+0000\n"
"PO-Revision-Date: 2021-06-26 09:39-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -89,6 +89,47 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.bleepingcomputer.com/news/security/logofail-attack-can-"
+"install-uefi-bootkits-through-bootup-logos/\">x86 and ARM based computers "
+"shipped with UEFI are potentially vulnerable to a design omission called "
+"LogoFAIL</a>. A cracker can replace the BIOS logo with a fake one that "
+"contains malicious code. Users can't fix this omission because it is in the "
+"nonfree UEFI firmware that users can't replace."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-"
+"hardware-hacking/\">Newag, a Polish railway manufacturer, puts DRM inside "
+"trains to prevent third-party repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some time. "
+"If yes, the train will be “locked up” (i.e. bricked). It was "
+"also possible to unlock it by pressing a secret combination of buttons in "
+"the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent autos offer a feature by which the drivers can connect their snoop-"
"phones to the car. That feature <a href=\"https://therecord.media/class-"
"action-lawsuit-cars-text-messages-privacy\"> snoops on the calls and texts</"
Index: all.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.ru.po,v
retrieving revision 1.255
retrieving revision 1.256
diff -u -b -r1.255 -r1.256
--- all.ru.po 3 Jan 2024 10:31:18 -0000 1.255
+++ all.ru.po 3 Jan 2024 12:03:35 -0000 1.256
@@ -9,7 +9,7 @@
msgid ""
msgstr ""
"Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2024-01-03 10:25+0000\n"
+"POT-Creation-Date: 2024-01-03 11:55+0000\n"
"PO-Revision-Date: 2021-04-27 13:06+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -97,6 +97,47 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.bleepingcomputer.com/news/security/logofail-attack-can-"
+"install-uefi-bootkits-through-bootup-logos/\">x86 and ARM based computers "
+"shipped with UEFI are potentially vulnerable to a design omission called "
+"LogoFAIL</a>. A cracker can replace the BIOS logo with a fake one that "
+"contains malicious code. Users can't fix this omission because it is in the "
+"nonfree UEFI firmware that users can't replace."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-"
+"hardware-hacking/\">Newag, a Polish railway manufacturer, puts DRM inside "
+"trains to prevent third-party repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some time. "
+"If yes, the train will be “locked up” (i.e. bricked). It was "
+"also possible to unlock it by pressing a secret combination of buttons in "
+"the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent autos offer a feature by which the drivers can connect their snoop-"
"phones to the car. That feature <a href=\"https://therecord.media/class-"
"action-lawsuit-cars-text-messages-privacy\"> snoops on the calls and texts</"
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.497
retrieving revision 1.498
diff -u -b -r1.497 -r1.498
--- de.po 3 Jan 2024 10:31:18 -0000 1.497
+++ de.po 3 Jan 2024 12:03:37 -0000 1.498
@@ -317,6 +317,47 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.bleepingcomputer.com/news/security/logofail-attack-can-"
+"install-uefi-bootkits-through-bootup-logos/\">x86 and ARM based computers "
+"shipped with UEFI are potentially vulnerable to a design omission called "
+"LogoFAIL</a>. A cracker can replace the BIOS logo with a fake one that "
+"contains malicious code. Users can't fix this omission because it is in the "
+"nonfree UEFI firmware that users can't replace."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-"
+"hardware-hacking/\">Newag, a Polish railway manufacturer, puts DRM inside "
+"trains to prevent third-party repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some time. "
+"If yes, the train will be “locked up” (i.e. bricked). It was "
+"also possible to unlock it by pressing a secret combination of buttons in "
+"the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent autos offer a feature by which the drivers can connect their snoop-"
"phones to the car. That feature <a href=\"https://therecord.media/class-"
"action-lawsuit-cars-text-messages-privacy\"> snoops on the calls and texts</"
@@ -8368,6 +8409,13 @@
"\"https://de.wikipedia.org/wiki/FairPlay\">diktieriert wo(mit) man seine "
"gekauften Mediendateien abspielt</a>."
+#. type: Content of: <div><p>
+# | Copyright © [-2014-] {+2014-2024+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright © 2014 Free Software Foundation, Inc."
+msgid "Copyright © 2014-2024 Free Software Foundation, Inc."
+msgstr "Copyright © 2014 Free Software Foundation, Inc."
+
#. type: Content of: <title>
msgid "Proprietary Tyrants - GNU Project - Free Software Foundation"
msgstr "Proprietäre Tyrannen - GNU-Projekt - Free Software Foundation"
@@ -10067,11 +10115,11 @@
"Applikationen. Scheinbar war das alles beabsichtigt."
#. type: Content of: <div><p>
-# | Copyright © 2013, [-2015-] {+2015-2023+} Free Software Foundation,
+# | Copyright © 2013, [-2015-] {+2015-2024+} Free Software Foundation,
# | Inc.
#, fuzzy
#| msgid "Copyright © 2013, 2015 Free Software Foundation, Inc."
-msgid "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
+msgid "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
msgstr "Copyright © 2013-2015 Free Software Foundation, Inc."
#. type: Content of: <title>
@@ -14426,13 +14474,6 @@
"\"#universal-back-door\">allgemeine universelle Hintertür</a>, die es "
"ermöglicht, sie in Vollzeit-Abhörgeräte umzuschalten."
-#. type: Content of: <div><p>
-# | Copyright © [-2014-] {+2014-2024+} Free Software Foundation, Inc.
-#, fuzzy
-#| msgid "Copyright © 2014 Free Software Foundation, Inc."
-msgid "Copyright © 2014-2024 Free Software Foundation, Inc."
-msgstr "Copyright © 2014 Free Software Foundation, Inc."
-
#. type: Content of: <title>
# | Proprietary [-Sabotage-] {+Software+} - GNU Project - Free Software
# | Foundation
@@ -15921,6 +15962,11 @@
msgstr ""
#, fuzzy
+#~| msgid "Copyright © 2013, 2015 Free Software Foundation, Inc."
+#~ msgid "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
+#~ msgstr "Copyright © 2013-2015 Free Software Foundation, Inc."
+
+#, fuzzy
#~| msgid ""
#~| "In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-"
#~| "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.795
retrieving revision 1.796
diff -u -b -r1.795 -r1.796
--- es.po 3 Jan 2024 10:31:19 -0000 1.795
+++ es.po 3 Jan 2024 12:03:38 -0000 1.796
@@ -259,6 +259,47 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.bleepingcomputer.com/news/security/logofail-attack-can-"
+"install-uefi-bootkits-through-bootup-logos/\">x86 and ARM based computers "
+"shipped with UEFI are potentially vulnerable to a design omission called "
+"LogoFAIL</a>. A cracker can replace the BIOS logo with a fake one that "
+"contains malicious code. Users can't fix this omission because it is in the "
+"nonfree UEFI firmware that users can't replace."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-"
+"hardware-hacking/\">Newag, a Polish railway manufacturer, puts DRM inside "
+"trains to prevent third-party repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some time. "
+"If yes, the train will be “locked up” (i.e. bricked). It was "
+"also possible to unlock it by pressing a secret combination of buttons in "
+"the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent autos offer a feature by which the drivers can connect their snoop-"
"phones to the car. That feature <a href=\"https://therecord.media/class-"
"action-lawsuit-cars-text-messages-privacy\"> snoops on the calls and texts</"
@@ -9482,6 +9523,10 @@
"wikipedia.org/wiki/FairPlay\">imponer a sus clientes dónde pueden ver los "
"vÃdeos que han comprado</a>."
+#. type: Content of: <div><p>
+msgid "Copyright © 2014-2024 Free Software Foundation, Inc."
+msgstr "Copyright © 2014-2024 Free Software Foundation, Inc."
+
#. type: Content of: <title>
msgid "Proprietary Tyrants - GNU Project - Free Software Foundation"
msgstr ""
@@ -10551,8 +10596,8 @@
"parecer, todo esto fue intencionado."
#. type: Content of: <div><p>
-msgid "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
-msgstr "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
+msgid "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
+msgstr "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
#. type: Content of: <title>
msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -14594,10 +14639,6 @@
"class=\"not-a-duplicate\" href=\"#universal-back-door-phone-modem"
"\">dispositivos de escucha a tiempo completo</a>."
-#. type: Content of: <div><p>
-msgid "Copyright © 2014-2024 Free Software Foundation, Inc."
-msgstr "Copyright © 2014-2024 Free Software Foundation, Inc."
-
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
msgstr "Software privativo - Proyecto GNU - Free Software Foundation"
@@ -15881,5 +15922,8 @@
msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
+#~ msgid "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
+#~ msgstr "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
+
#~ msgid "Copyright © 2013-2023 Free Software Foundation, Inc."
#~ msgstr "Copyright © 2013-2023 Free Software Foundation, Inc."
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.881
retrieving revision 1.882
diff -u -b -r1.881 -r1.882
--- fr.po 3 Jan 2024 11:01:45 -0000 1.881
+++ fr.po 3 Jan 2024 12:03:40 -0000 1.882
@@ -249,6 +249,47 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.bleepingcomputer.com/news/security/logofail-attack-can-"
+"install-uefi-bootkits-through-bootup-logos/\">x86 and ARM based computers "
+"shipped with UEFI are potentially vulnerable to a design omission called "
+"LogoFAIL</a>. A cracker can replace the BIOS logo with a fake one that "
+"contains malicious code. Users can't fix this omission because it is in the "
+"nonfree UEFI firmware that users can't replace."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-"
+"hardware-hacking/\">Newag, a Polish railway manufacturer, puts DRM inside "
+"trains to prevent third-party repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some time. "
+"If yes, the train will be “locked up” (i.e. bricked). It was "
+"also possible to unlock it by pressing a secret combination of buttons in "
+"the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent autos offer a feature by which the drivers can connect their snoop-"
"phones to the car. That feature <a href=\"https://therecord.media/class-"
"action-lawsuit-cars-text-messages-privacy\"> snoops on the calls and texts</"
@@ -9492,6 +9533,11 @@
"fr.wikipedia.org/wiki/FairPlay\">décider où ses clients peuvent regarder
les "
"vidéos qu'ils ont achetées</a>."
+# Pas de changement significatif en 2024.
+#. type: Content of: <div><p>
+msgid "Copyright © 2014-2024 Free Software Foundation, Inc."
+msgstr "Copyright © 2014-2023 Free Software Foundation, Inc."
+
#. type: Content of: <title>
msgid "Proprietary Tyrants - GNU Project - Free Software Foundation"
msgstr "Tyrans privateurs - Projet GNU - Free Software Foundation"
@@ -10571,8 +10617,8 @@
"ceci était apparemment intentionnel."
#. type: Content of: <div><p>
-msgid "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
-msgstr "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
+msgid "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
+msgstr "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
#. type: Content of: <title>
msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -14624,11 +14670,6 @@
"class=\"not-a-duplicate\" href=\"#universal-back-door-phone-modem"
"\">appareils d'écoute permanente</a>."
-# Pas de changement significatif en 2024.
-#. type: Content of: <div><p>
-msgid "Copyright © 2014-2024 Free Software Foundation, Inc."
-msgstr "Copyright © 2014-2023 Free Software Foundation, Inc."
-
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
msgstr "Logiciel privateur - Projet GNU - Free Software Foundation"
@@ -15908,3 +15949,6 @@
#. type: Content of: <div><div><dl><dd><ul><li>
msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
+
+#~ msgid "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
+#~ msgstr "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.496
retrieving revision 1.497
diff -u -b -r1.496 -r1.497
--- it.po 3 Jan 2024 10:31:21 -0000 1.496
+++ it.po 3 Jan 2024 12:03:40 -0000 1.497
@@ -321,6 +321,47 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.bleepingcomputer.com/news/security/logofail-attack-can-"
+"install-uefi-bootkits-through-bootup-logos/\">x86 and ARM based computers "
+"shipped with UEFI are potentially vulnerable to a design omission called "
+"LogoFAIL</a>. A cracker can replace the BIOS logo with a fake one that "
+"contains malicious code. Users can't fix this omission because it is in the "
+"nonfree UEFI firmware that users can't replace."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-"
+"hardware-hacking/\">Newag, a Polish railway manufacturer, puts DRM inside "
+"trains to prevent third-party repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some time. "
+"If yes, the train will be “locked up” (i.e. bricked). It was "
+"also possible to unlock it by pressing a secret combination of buttons in "
+"the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent autos offer a feature by which the drivers can connect their snoop-"
"phones to the car. That feature <a href=\"https://therecord.media/class-"
"action-lawsuit-cars-text-messages-privacy\"> snoops on the calls and texts</"
@@ -8166,6 +8207,13 @@
"purchased</a>."
msgstr ""
+#. type: Content of: <div><p>
+# | Copyright © [-2014-] {+2014-2024+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright © 2014 Free Software Foundation, Inc."
+msgid "Copyright © 2014-2024 Free Software Foundation, Inc."
+msgstr "Copyright © 2014 Free Software Foundation, Inc."
+
#. type: Content of: <title>
msgid "Proprietary Tyrants - GNU Project - Free Software Foundation"
msgstr "Tiranni Proprietari - Progetto GNU - Free Software Foundation"
@@ -9720,12 +9768,12 @@
"Tutto questo era apparentemente intenzionale."
#. type: Content of: <div><p>
-# | Copyright © 2013, [-2015-] {+2015-2023+} Free Software Foundation,
-# | Inc.
+# | Copyright © 2013, [-2015, 2016-] {+2015-2024+} Free Software
+# | Foundation, Inc.
#, fuzzy
-#| msgid "Copyright © 2013, 2015 Free Software Foundation, Inc."
-msgid "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
-msgstr "Copyright © 2013, 2015 Free Software Foundation, Inc."
+#| msgid "Copyright © 2013, 2015, 2016 Free Software Foundation, Inc."
+msgid "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
+msgstr "Copyright © 2013, 2015, 2016 Free Software Foundation, Inc."
#. type: Content of: <title>
# | Malware [-in Mobile Devices-] {+In Cars+} - GNU Project - Free Software
@@ -15014,13 +15062,6 @@
"\">backdoor universale nel processore del modem</a> che può essere usata "
"dalla compagnia telefonica locale."
-#. type: Content of: <div><p>
-# | Copyright © [-2014-] {+2014-2024+} Free Software Foundation, Inc.
-#, fuzzy
-#| msgid "Copyright © 2014 Free Software Foundation, Inc."
-msgid "Copyright © 2014-2024 Free Software Foundation, Inc."
-msgstr "Copyright © 2014 Free Software Foundation, Inc."
-
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
msgstr "Software Proprietario - Progetto GNU - Free Software Foundation"
@@ -16812,6 +16853,11 @@
"<a href=\"/proprietary/malware-microsoft.html\">Malware di Microsoft</a>"
#, fuzzy
+#~| msgid "Copyright © 2013, 2015 Free Software Foundation, Inc."
+#~ msgid "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
+#~ msgstr "Copyright © 2013, 2015 Free Software Foundation, Inc."
+
+#, fuzzy
#~| msgid "Copyright © 2014, 2015 Free Software Foundation, Inc."
#~ msgid "Copyright © 2013-2023 Free Software Foundation, Inc."
#~ msgstr "Copyright © 2014, 2015 Free Software Foundation, Inc."
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.504
retrieving revision 1.505
diff -u -b -r1.504 -r1.505
--- ja.po 3 Jan 2024 10:31:21 -0000 1.504
+++ ja.po 3 Jan 2024 12:03:40 -0000 1.505
@@ -271,6 +271,47 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.bleepingcomputer.com/news/security/logofail-attack-can-"
+"install-uefi-bootkits-through-bootup-logos/\">x86 and ARM based computers "
+"shipped with UEFI are potentially vulnerable to a design omission called "
+"LogoFAIL</a>. A cracker can replace the BIOS logo with a fake one that "
+"contains malicious code. Users can't fix this omission because it is in the "
+"nonfree UEFI firmware that users can't replace."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-"
+"hardware-hacking/\">Newag, a Polish railway manufacturer, puts DRM inside "
+"trains to prevent third-party repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some time. "
+"If yes, the train will be “locked up” (i.e. bricked). It was "
+"also possible to unlock it by pressing a secret combination of buttons in "
+"the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent autos offer a feature by which the drivers can connect their snoop-"
"phones to the car. That feature <a href=\"https://therecord.media/class-"
"action-lawsuit-cars-text-messages-privacy\"> snoops on the calls and texts</"
@@ -7214,6 +7255,12 @@
"purchased</a>."
msgstr ""
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid "Copyright © 2014 Free Software Foundation, Inc."
+msgid "Copyright © 2014-2024 Free Software Foundation, Inc."
+msgstr "Copyright © 2014 Free Software Foundation, Inc."
+
#. type: Content of: <title>
msgid "Proprietary Tyrants - GNU Project - Free Software Foundation"
msgstr ""
@@ -8350,7 +8397,7 @@
#. type: Content of: <div><p>
#, fuzzy
#| msgid "Copyright © 2014, 2015 Free Software Foundation, Inc."
-msgid "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
+msgid "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
msgstr "Copyright © 2014, 2015 Free Software Foundation, Inc."
#. type: Content of: <title>
@@ -12443,12 +12490,6 @@
"\"#universal-back-door-phone-modem\"> full-time listening devices</a>."
msgstr ""
-#. type: Content of: <div><p>
-#, fuzzy
-#| msgid "Copyright © 2014 Free Software Foundation, Inc."
-msgid "Copyright © 2014-2024 Free Software Foundation, Inc."
-msgstr "Copyright © 2014 Free Software Foundation, Inc."
-
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
msgstr ""
@@ -13711,6 +13752,11 @@
msgstr "<a
href=\"/proprietary/malware-microsoft.html\">ãã¤ã¯ãã½ãã</a>"
#, fuzzy
+#~| msgid "Copyright © 2014, 2015 Free Software Foundation, Inc."
+#~ msgid "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
+#~ msgstr "Copyright © 2014, 2015 Free Software Foundation, Inc."
+
+#, fuzzy
#~| msgid "Copyright © 2013 Free Software Foundation, Inc."
#~ msgid "Copyright © 2013-2023 Free Software Foundation, Inc."
#~ msgstr "Copyright © 2013 Free Software Foundation, Inc."
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.497
retrieving revision 1.498
diff -u -b -r1.497 -r1.498
--- nl.po 3 Jan 2024 10:31:22 -0000 1.497
+++ nl.po 3 Jan 2024 12:03:41 -0000 1.498
@@ -288,6 +288,47 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.bleepingcomputer.com/news/security/logofail-attack-can-"
+"install-uefi-bootkits-through-bootup-logos/\">x86 and ARM based computers "
+"shipped with UEFI are potentially vulnerable to a design omission called "
+"LogoFAIL</a>. A cracker can replace the BIOS logo with a fake one that "
+"contains malicious code. Users can't fix this omission because it is in the "
+"nonfree UEFI firmware that users can't replace."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-"
+"hardware-hacking/\">Newag, a Polish railway manufacturer, puts DRM inside "
+"trains to prevent third-party repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some time. "
+"If yes, the train will be “locked up” (i.e. bricked). It was "
+"also possible to unlock it by pressing a secret combination of buttons in "
+"the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent autos offer a feature by which the drivers can connect their snoop-"
"phones to the car. That feature <a href=\"https://therecord.media/class-"
"action-lawsuit-cars-text-messages-privacy\"> snoops on the calls and texts</"
@@ -6681,6 +6722,14 @@
"purchased</a>."
msgstr ""
+#. type: Content of: <div><p>
+# | Copyright © [-2015, 2016-] {+2014-2024+} Free Software Foundation,
+# | Inc.
+#, fuzzy
+#| msgid "Copyright © 2015, 2016 Free Software Foundation, Inc."
+msgid "Copyright © 2014-2024 Free Software Foundation, Inc."
+msgstr "Copyright © 2015, 2016 Free Software Foundation, Inc."
+
#. type: Content of: <title>
# | Proprietary [-Software-] {+Tyrants+} - GNU Project - Free Software
# | Foundation
@@ -7590,11 +7639,11 @@
# type: Content of: <div><p>
#. type: Content of: <div><p>
-# | Copyright © [-2011-] {+2013, 2015-2023+} Free Software Foundation,
+# | Copyright © [-2011-] {+2013, 2015-2024+} Free Software Foundation,
# | Inc.
#, fuzzy
#| msgid "Copyright © 2011 Free Software Foundation, Inc."
-msgid "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
+msgid "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
msgstr "Copyright © 2011 Free Software Foundation, Inc."
#. type: Content of: <title>
@@ -10928,14 +10977,6 @@
"\"#universal-back-door-phone-modem\"> full-time listening devices</a>."
msgstr ""
-#. type: Content of: <div><p>
-# | Copyright © [-2015, 2016-] {+2014-2024+} Free Software Foundation,
-# | Inc.
-#, fuzzy
-#| msgid "Copyright © 2015, 2016 Free Software Foundation, Inc."
-msgid "Copyright © 2014-2024 Free Software Foundation, Inc."
-msgstr "Copyright © 2015, 2016 Free Software Foundation, Inc."
-
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
msgstr "Niet-vrije software - GNU-project - Free Software Foundation"
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.496
retrieving revision 1.497
diff -u -b -r1.496 -r1.497
--- pl.po 3 Jan 2024 10:31:22 -0000 1.496
+++ pl.po 3 Jan 2024 12:03:41 -0000 1.497
@@ -277,6 +277,47 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.bleepingcomputer.com/news/security/logofail-attack-can-"
+"install-uefi-bootkits-through-bootup-logos/\">x86 and ARM based computers "
+"shipped with UEFI are potentially vulnerable to a design omission called "
+"LogoFAIL</a>. A cracker can replace the BIOS logo with a fake one that "
+"contains malicious code. Users can't fix this omission because it is in the "
+"nonfree UEFI firmware that users can't replace."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-"
+"hardware-hacking/\">Newag, a Polish railway manufacturer, puts DRM inside "
+"trains to prevent third-party repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some time. "
+"If yes, the train will be “locked up” (i.e. bricked). It was "
+"also possible to unlock it by pressing a secret combination of buttons in "
+"the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent autos offer a feature by which the drivers can connect their snoop-"
"phones to the car. That feature <a href=\"https://therecord.media/class-"
"action-lawsuit-cars-text-messages-privacy\"> snoops on the calls and texts</"
@@ -6433,6 +6474,14 @@
"purchased</a>."
msgstr ""
+#. type: Content of: <div><p>
+# | Copyright © [-2013, 2014, 2015-] {+2014-2024+} Free Software
+# | Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright © 2013, 2014, 2015 Free Software Foundation, Inc."
+msgid "Copyright © 2014-2024 Free Software Foundation, Inc."
+msgstr "Copyright © 2013, 2014, 2015 Free Software Foundation, Inc."
+
#. type: Content of: <title>
# | Proprietary [-Software-] {+Tyrants+} - GNU Project - Free Software
# | Foundation
@@ -7189,11 +7238,11 @@
msgstr ""
#. type: Content of: <div><p>
-# | Copyright © 2013, [-2014, 2015-] {+2015-2023+} Free Software
+# | Copyright © 2013, [-2014, 2015-] {+2015-2024+} Free Software
# | Foundation, Inc.
#, fuzzy
#| msgid "Copyright © 2013, 2014, 2015 Free Software Foundation, Inc."
-msgid "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
+msgid "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
msgstr "Copyright © 2013, 2014, 2015 Free Software Foundation, Inc."
#. type: Content of: <title>
@@ -10179,14 +10228,6 @@
"\"#universal-back-door-phone-modem\"> full-time listening devices</a>."
msgstr ""
-#. type: Content of: <div><p>
-# | Copyright © [-2013, 2014, 2015-] {+2014-2024+} Free Software
-# | Foundation, Inc.
-#, fuzzy
-#| msgid "Copyright © 2013, 2014, 2015 Free Software Foundation, Inc."
-msgid "Copyright © 2014-2024 Free Software Foundation, Inc."
-msgstr "Copyright © 2013, 2014, 2015 Free Software Foundation, Inc."
-
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
msgstr ""
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.495
retrieving revision 1.496
diff -u -b -r1.495 -r1.496
--- pot 3 Jan 2024 10:31:22 -0000 1.495
+++ pot 3 Jan 2024 12:03:41 -0000 1.496
@@ -204,6 +204,47 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.bleepingcomputer.com/news/security/logofail-attack-can-"
+"install-uefi-bootkits-through-bootup-logos/\">x86 and ARM based computers "
+"shipped with UEFI are potentially vulnerable to a design omission called "
+"LogoFAIL</a>. A cracker can replace the BIOS logo with a fake one that "
+"contains malicious code. Users can't fix this omission because it is in the "
+"nonfree UEFI firmware that users can't replace."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-"
+"hardware-hacking/\">Newag, a Polish railway manufacturer, puts DRM inside "
+"trains to prevent third-party repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some time. "
+"If yes, the train will be “locked up” (i.e. bricked). It was "
+"also possible to unlock it by pressing a secret combination of buttons in "
+"the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent autos offer a feature by which the drivers can connect their snoop-"
"phones to the car. That feature <a href=\"https://therecord.media/class-"
"action-lawsuit-cars-text-messages-privacy\"> snoops on the calls and texts</"
@@ -6158,6 +6199,10 @@
"purchased</a>."
msgstr ""
+#. type: Content of: <div><p>
+msgid "Copyright © 2014-2024 Free Software Foundation, Inc."
+msgstr ""
+
#. type: Content of: <title>
msgid "Proprietary Tyrants - GNU Project - Free Software Foundation"
msgstr ""
@@ -6871,7 +6916,7 @@
msgstr ""
#. type: Content of: <div><p>
-msgid "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
+msgid "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
msgstr ""
#. type: Content of: <title>
@@ -9676,10 +9721,6 @@
"\"#universal-back-door-phone-modem\"> full-time listening devices</a>."
msgstr ""
-#. type: Content of: <div><p>
-msgid "Copyright © 2014-2024 Free Software Foundation, Inc."
-msgstr ""
-
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
msgstr ""
Index: proprietary-drm.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.de-diff.html,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- proprietary-drm.de-diff.html 20 Dec 2023 13:05:19 -0000 1.67
+++ proprietary-drm.de-diff.html 3 Jan 2024 12:03:41 -0000 1.68
@@ -75,12 +75,8 @@
to <a href="http://DefectiveByDesign.org/">abolish DRM</a>.
</p>
-<span class="removed"><del><strong><ul>
-<li><p>DRM does more nastiness</strong></del></span>
-
<span class="inserted"><ins><em><div class="important">
-<p>If you know of an example that ought</em></ins></span> to <span
class="removed"><del><strong>published works than merely stopping
-people</strong></del></span> <span class="inserted"><ins><em>be in this page
but isn't
+<p>If you know of an example that ought to be in this page but isn't
here, please write
to <a
href="mailto:webmasters@gnu.org"><webmasters@gnu.org></a>
to inform us. Please include the URL of a trustworthy reference or two
@@ -90,6 +86,36 @@
<div class="column-limit" id="proprietary-drm"></div>
<ul class="blurbs">
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary-drm.html.
-->
+ <li id="M202312130">
+ <!--#set var="DATE" value='<small
class="date-tag">2023-12</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-hardware-hacking/">Newag,
+ a Polish railway manufacturer, puts DRM inside trains to prevent
+ third-party repairs</a>.</p></em></ins></span>
+
+ <ul>
+<span class="removed"><del><strong><li><p>DRM does more
nastiness</strong></del></span>
+ <span class="inserted"><ins><em><li><p>The train's software
contains code</em></ins></span> to <span class="removed"><del><strong>published
works than merely stopping
+people</strong></del></span> <span class="inserted"><ins><em>detect if the GPS
+ coordinates are near some third party repairers, or the train has not
+ been running for some time. If yes, the train will be “locked
+ up” (i.e. bricked). It was also possible to unlock it by
+ pressing a secret combination of buttons in the cockpit, but this
+ ability was removed by a manufacturer's software
update.</p></li>
+
+ <li><p>The train will also lock up after a certain date,
which is
+ hardcoded in the software.</p></li>
+
+ <li><p>The company pushes a software update that detects if
the
+ DRM code has been bypassed, i.e. the lock should have been engaged
+ but the train is still operational. If yes, the controller cabin
+ screen will display a scary message warning about “copyright
+ violation”.</p></li>
+ </ul>
+ </li>
+
<!-- Copied</em></ins></span> from <span
class="removed"><del><strong>looking at and/or copying them. Even
when</strong></del></span> <span class="inserted"><ins><em>workshop/mal.rec. Do
not edit in proprietary-drm.html. -->
<li id="M202311301">
<!--#set var="DATE" value='<small
class="date-tag">2023-11</small>'
@@ -203,24 +229,24 @@
<p id="m1"><small>[1] We thank the free software supporter who
translated</em></ins></span> this <span
class="removed"><del><strong>harassment,</strong></del></span> <span
class="inserted"><ins><em>article from Japanese,</em></ins></span> and <span
class="removed"><del><strong>the fundamental wrong</strong></del></span> <span
class="inserted"><ins><em>shared his experience</em></ins></span> of
- <span class="inserted"><ins><em>B-CAS with us.
(Unfortunately,</em></ins></span> the <span class="inserted"><ins><em>article
presents</em></ins></span> DRM <span class="inserted"><ins><em>as a good
+ <span class="inserted"><ins><em>B-CAS with us.
(Unfortunately,</em></ins></span> the <span class="inserted"><ins><em>article
presents DRM as a good
thing.)</small></p>
</li>
-<!-- Copied from workshop/mal.rec. Do not edit</em></ins></span> in <span
class="removed"><del><strong>DVDs,</strong></del></span> <span
class="inserted"><ins><em>proprietary-drm.html. -->
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary-drm.html.
-->
<li id="M202203210">
<!--#set var="DATE" value='<small
class="date-tag">2022-03</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Apple prevents people from upgrading their Mac hardware <a
href="https://www.theverge.com/2022/3/21/22989226/apple-mac-studios-removable-ssd-blocked-software-replacement">by
- imposing DRM on its removable SSD storage</a>.</p>
+ imposing</em></ins></span> DRM <span class="inserted"><ins><em>on its
removable SSD storage</a>.</p>
</li>
-<!-- Copied from workshop/mal.rec. Do not edit in proprietary-drm.html.
-->
+<!-- Copied from workshop/mal.rec. Do not edit</em></ins></span> in <span
class="removed"><del><strong>DVDs,</strong></del></span> <span
class="inserted"><ins><em>proprietary-drm.html. -->
<li id="M202202190">
<!--#set var="DATE" value='<small
class="date-tag">2022-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Hewlett-Packard is <a
+ <p>Hewlett-Packard</em></ins></span> is <span
class="inserted"><ins><em><a
href="https://www.theguardian.com/money/2022/feb/19/how-cheap-ink-cartridges-can-cost-you-dear">
implementing DRM in its printers</a> so they refuse to print with
ink cartridges from another supplier.</p>
@@ -232,7 +258,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://www.eff.org/deeplinks/2022/02/worst-timeline-printer-company-putting-drm-paper-now">
- Dymo</em></ins></span> is <span class="inserted"><ins><em>now embedding
DRM in</em></ins></span> the <span
class="removed"><del><strong>requirement</strong></del></span> <span
class="inserted"><ins><em>paper rolls for its label
+ Dymo is now embedding DRM in</em></ins></span> the <span
class="removed"><del><strong>requirement</strong></del></span> <span
class="inserted"><ins><em>paper rolls for its label
printers</a></em></ins></span> to <span
class="removed"><del><strong>use nonfree software</strong></del></span> <span
class="inserted"><ins><em>make those printers reject equivalent paper rolls made
by other companies. This is implemented by an RFID tag, which keeps
track of how many labels remain on the roll, and blocks further
@@ -262,12 +288,12 @@
<p>Adobe <a
href="https://web.archive.org/web/20211014123717/https://pluralistic.net/2021/10/13/theres-an-app-for-that/#gnash">has
licensed its Flash Player to China's Zhong Cheng Network</a> who is
- offering the program bundled with spyware and a back door that can
+ offering</em></ins></span> the <span class="inserted"><ins><em>program
bundled with spyware and a back door that can
remotely deactivate it.</p>
<p>Adobe is responsible for this since they gave Zhong Cheng
- Network permission to do this. This injustice involves
“misuse” of</em></ins></span>
- the <span class="inserted"><ins><em>DMCA, but “proper,”
intended</em></ins></span> use of <span class="removed"><del><strong>Google
DNS</a>. This</strong></del></span> <span class="inserted"><ins><em>the
DMCA</em></ins></span> is <span
class="removed"><del><strong>one</strong></del></span> <span
class="inserted"><ins><em>a much bigger
+ Network permission to do this. This injustice involves
“misuse” of
+ the DMCA, but “proper,” intended</em></ins></span> use of
<span class="removed"><del><strong>Google DNS</a>.
This</strong></del></span> <span class="inserted"><ins><em>the
DMCA</em></ins></span> is <span
class="removed"><del><strong>one</strong></del></span> <span
class="inserted"><ins><em>a much bigger
injustice. There is <a href="/philosophy/right-to-read.html">a
series</em></ins></span>
of <span class="removed"><del><strong>the methods that Netflix
uses</strong></del></span> <span class="inserted"><ins><em>errors
related</em></ins></span> to <span
class="removed"><del><strong>enforce</strong></del></span> <span
class="inserted"><ins><em>DMCA</a>.</p>
@@ -341,17 +367,17 @@
<p>Ebooks “bought” from Microsoft's store check that
their DRM is valid by connecting to</em></ins></span> the
<span class="removed"><del><strong>processor</strong></del></span> <span
class="inserted"><ins><em>store every time their
- “owner” wants to read them. Microsoft is going to close
+ “owner” wants</em></ins></span> to <span
class="inserted"><ins><em>read them. Microsoft is going to close
this store, <a href="https://www.bbc.com/news/technology-47810367">
bricking all DRM'ed ebooks it has ever “sold”</a>. (The
- article additionally highlights the pitfalls of DRM.)</p>
+ article additionally highlights</em></ins></span> the <span
class="removed"><del><strong>monitor. It</strong></del></span> <span
class="inserted"><ins><em>pitfalls of DRM.)</p>
- <p>This is another proof that a DRM-encumbered product doesn't
belong</em></ins></span>
- to the <span class="removed"><del><strong>monitor.
It</strong></del></span> <span class="inserted"><ins><em>person who bought it.
Microsoft said it will refund customers,
- but this</em></ins></span> is <span
class="removed"><del><strong>implemented mainly</strong></del></span> <span
class="inserted"><ins><em>no excuse for selling them restricted books.</p>
+ <p>This</em></ins></span> is <span
class="removed"><del><strong>implemented mainly in
hardware,</strong></del></span> <span class="inserted"><ins><em>another proof
that a DRM-encumbered product doesn't belong
+ to the person who bought it. Microsoft said it will refund
customers,</em></ins></span>
+ but <span class="inserted"><ins><em>this is no excuse for selling them
restricted books.</p>
</li>
-<!-- Copied from workshop/mal.rec. Do not edit</em></ins></span> in <span
class="removed"><del><strong>hardware, but</strong></del></span> <span
class="inserted"><ins><em>proprietary-drm.html. -->
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary-drm.html.
-->
<li id="M201902080">
<!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -436,14 +462,15 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a href="https://itstillworks.com/kindle-drm-17841.html">
The Amazon Kindle has DRM</a>. That article is flawed in that it
- fails to treat DRM as an ethical question; it takes for granted that
+ fails to treat</em></ins></span> DRM
+<span class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>as an ethical question; it takes for granted that
whatever Amazon might do to its users is legitimate. It refers to
DRM as digital “rights” management, which is the spin
term used to promote DRM. Nonetheless it serves as a reference for
the facts.</p>
- <p>We refer to that product as the <a
- href="/philosophy/why-call-it-the-swindle.html"> Amazon
Swindle</a>
+ <p>We refer to that product as the</em></ins></span> <a <span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users">can</strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/why-call-it-the-swindle.html">
Amazon Swindle</a>
because of this and <a href="/philosophy/ebooks.html"> other
malicious
functionalities</a>.</p>
</li>
@@ -453,9 +480,8 @@
<!--#set var="DATE" value='<small
class="date-tag">2017-04</small>'
--><!--#echo encoding="none" var="DATE" -->
<p id="iphone7-sabotage">The
- iPhone 7 contains</em></ins></span> DRM
-<span class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>specifically designed to</em></ins></span> <a
<span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users">can</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock">
+ iPhone 7 contains DRM specifically designed to <a
+
href="https://www.vice.com/en/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock">
brick it if an “unauthorized” repair shop fixes it</a>.
“Unauthorized” essentially means anyone besides
Apple.</p>
@@ -826,7 +852,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © <span class="removed"><del><strong>2014, 2015, 2016,
2017, 2018</strong></del></span> <span
class="inserted"><ins><em>2014-2023</em></ins></span> Free Software Foundation,
Inc.</p>
+<p>Copyright © <span class="removed"><del><strong>2014, 2015, 2016,
2017, 2018</strong></del></span> <span
class="inserted"><ins><em>2014-2024</em></ins></span> Free Software Foundation,
Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by/4.0/">Creative
@@ -836,7 +862,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2023/12/20 13:05:19 $
+$Date: 2024/01/03 12:03:41 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-drm.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.de.po,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -b -r1.103 -r1.104
--- proprietary-drm.de.po 20 Dec 2023 13:05:20 -0000 1.103
+++ proprietary-drm.de.po 3 Jan 2024 12:03:41 -0000 1.104
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-drm.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2023-12-20 12:56+0000\n"
+"POT-Creation-Date: 2024-01-03 11:55+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -176,6 +176,37 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-"
+"hardware-hacking/\">Newag, a Polish railway manufacturer, puts DRM inside "
+"trains to prevent third-party repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some time. "
+"If yes, the train will be “locked up” (i.e. bricked). It was "
+"also possible to unlock it by pressing a secret combination of buttons in "
+"the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://web.archive.org/web/20231213150111/https://www.nytimes."
"com/2023/11/12/technology/iphone-repair-apple-control.html\">To block non-"
"Apple repairs, Apple encodes the iMonster serial number in the original "
@@ -1234,10 +1265,10 @@
"standards/README.translations\">LIESMICH für Ãbersetzungen</a>."
#. type: Content of: <div><p>
-# | Copyright © [-2014-] {+2014-2023+} Free Software Foundation, Inc.
+# | Copyright © [-2014-] {+2014-2024+} Free Software Foundation, Inc.
#, fuzzy
#| msgid "Copyright © 2014 Free Software Foundation, Inc."
-msgid "Copyright © 2014-2023 Free Software Foundation, Inc."
+msgid "Copyright © 2014-2024 Free Software Foundation, Inc."
msgstr "Copyright © 2014 Free Software Foundation, Inc."
#. type: Content of: <div><p>
Index: proprietary-drm.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.es.po,v
retrieving revision 1.86
retrieving revision 1.87
diff -u -b -r1.86 -r1.87
--- proprietary-drm.es.po 3 Jan 2024 11:55:26 -0000 1.86
+++ proprietary-drm.es.po 3 Jan 2024 12:03:41 -0000 1.87
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-drm.html\n"
-"POT-Creation-Date: 2023-12-20 12:56+0000\n"
+"POT-Creation-Date: 2024-01-03 11:55+0000\n"
"PO-Revision-Date: 2022-04-13 11:01+0200\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2024-01-03 11:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
"X-Generator: Poedit 2.4.2\n"
@@ -126,6 +127,37 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-"
+"hardware-hacking/\">Newag, a Polish railway manufacturer, puts DRM inside "
+"trains to prevent third-party repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some time. "
+"If yes, the train will be “locked up” (i.e. bricked). It was "
+"also possible to unlock it by pressing a secret combination of buttons in "
+"the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://web.archive.org/web/20231213150111/https://www.nytimes."
"com/2023/11/12/technology/iphone-repair-apple-control.html\">To block non-"
"Apple repairs, Apple encodes the iMonster serial number in the original "
@@ -1039,8 +1071,8 @@
"coordinación y el envÃo de traducciones de las páginas de este sitio web."
#. type: Content of: <div><p>
-msgid "Copyright © 2014-2023 Free Software Foundation, Inc."
-msgstr "Copyright © 2014-2023 Free Software Foundation, Inc."
+msgid "Copyright © 2014-2024 Free Software Foundation, Inc."
+msgstr "Copyright © 2014-2024 Free Software Foundation, Inc."
#. type: Content of: <div><p>
msgid ""
@@ -1063,9 +1095,8 @@
msgid "Updated:"
msgstr "Ãltima actualización:"
-#. type: Content of: <div><p>
-msgid "Copyright © 2014-2024 Free Software Foundation, Inc."
-msgstr "Copyright © 2014-2024 Free Software Foundation, Inc."
+#~ msgid "Copyright © 2014-2023 Free Software Foundation, Inc."
+#~ msgstr "Copyright © 2014-2023 Free Software Foundation, Inc."
#~ msgid ""
#~ "Since the software in receivers is nonfree, and tuner cards are designed "
Index: proprietary-drm.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.fr.po,v
retrieving revision 1.135
retrieving revision 1.136
diff -u -b -r1.135 -r1.136
--- proprietary-drm.fr.po 3 Jan 2024 11:55:26 -0000 1.135
+++ proprietary-drm.fr.po 3 Jan 2024 12:03:42 -0000 1.136
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-drm.html\n"
-"POT-Creation-Date: 2023-12-20 12:56+0000\n"
+"POT-Creation-Date: 2024-01-03 11:55+0000\n"
"PO-Revision-Date: 2023-12-21 10:05+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2024-01-03 11:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary DRM - GNU Project - Free Software Foundation"
@@ -118,6 +119,37 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-"
+"hardware-hacking/\">Newag, a Polish railway manufacturer, puts DRM inside "
+"trains to prevent third-party repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some time. "
+"If yes, the train will be “locked up” (i.e. bricked). It was "
+"also possible to unlock it by pressing a secret combination of buttons in "
+"the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://web.archive.org/web/20231213150111/https://www.nytimes."
"com/2023/11/12/technology/iphone-repair-apple-control.html\">To block non-"
"Apple repairs, Apple encodes the iMonster serial number in the original "
@@ -1028,8 +1060,8 @@
"traduction</a> les infos nécessaires."
#. type: Content of: <div><p>
-msgid "Copyright © 2014-2023 Free Software Foundation, Inc."
-msgstr "Copyright © 2014-2023 Free Software Foundation, Inc."
+msgid "Copyright © 2014-2024 Free Software Foundation, Inc."
+msgstr "Copyright © 2014-2024 Free Software Foundation, Inc."
#. type: Content of: <div><p>
msgid ""
@@ -1053,6 +1085,5 @@
msgid "Updated:"
msgstr "Dernière mise à jour :"
-#. type: Content of: <div><p>
-msgid "Copyright © 2014-2024 Free Software Foundation, Inc."
-msgstr "Copyright © 2014-2024 Free Software Foundation, Inc."
+#~ msgid "Copyright © 2014-2023 Free Software Foundation, Inc."
+#~ msgstr "Copyright © 2014-2023 Free Software Foundation, Inc."
Index: proprietary-drm.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.it-diff.html,v
retrieving revision 1.78
retrieving revision 1.79
diff -u -b -r1.78 -r1.79
--- proprietary-drm.it-diff.html 20 Dec 2023 13:05:22 -0000 1.78
+++ proprietary-drm.it-diff.html 3 Jan 2024 12:03:42 -0000 1.79
@@ -87,6 +87,34 @@
<ul class="blurbs">
<!-- Copied from workshop/mal.rec. Do not edit in proprietary-drm.html.
-->
+ <li id="M202312130">
+ <!--#set var="DATE" value='<small
class="date-tag">2023-12</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-hardware-hacking/">Newag,
+ a Polish railway manufacturer, puts DRM inside trains to prevent
+ third-party repairs</a>.</p></em></ins></span>
+
+ <ul>
+ <li><p>The <span class="inserted"><ins><em>train's software
contains code to detect if the GPS
+ coordinates are near some third party repairers, or the train has not
+ been running for some time. If yes, the train will be “locked
+ up” (i.e. bricked). It was also possible to unlock it by
+ pressing a secret combination of buttons in the cockpit, but this
+ ability was removed by a manufacturer's software
update.</p></li>
+
+ <li><p>The train will also lock up after a certain date,
which is
+ hardcoded in the software.</p></li>
+
+ <li><p>The company pushes a software update that detects if
the
+ DRM code has been bypassed, i.e. the lock should have been engaged
+ but the train is still operational. If yes, the controller cabin
+ screen will display a scary message warning about “copyright
+ violation”.</p></li>
+ </ul>
+ </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary-drm.html.
-->
<li id="M202311301">
<!--#set var="DATE" value='<small
class="date-tag">2023-11</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -143,11 +171,10 @@
that plugs into a compatible receiver, or alternatively by a tuner
card that plugs into a computer. Beside implementing drastic copying
and viewing restrictions, this system gives broadcasters full power
- over users, through back doors among other means. For
example:</p></em></ins></span>
+ over users, through back doors among other means. For example:</p>
<ul>
-<span class="removed"><del><strong><li><p>The</strong></del></span>
- <span class="inserted"><ins><em><li>It can force messages to the
user's TV screen, and the user
+ <li>It can force messages to the user's TV screen, and the user
can't turn them off.</li>
<li>It can collect viewing information and send it to other
@@ -806,7 +833,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © <span class="removed"><del><strong>2014, 2015, 2016,
2017</strong></del></span> <span
class="inserted"><ins><em>2014-2023</em></ins></span> Free Software Foundation,
Inc.</p>
+<p>Copyright © <span class="removed"><del><strong>2014, 2015, 2016,
2017</strong></del></span> <span
class="inserted"><ins><em>2014-2024</em></ins></span> Free Software Foundation,
Inc.</p>
<p>This page is licensed under a <a rel="license"
<span
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/">Creative</strong></del></span>
@@ -817,7 +844,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2023/12/20 13:05:22 $
+$Date: 2024/01/03 12:03:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-drm.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.it.po,v
retrieving revision 1.92
retrieving revision 1.93
diff -u -b -r1.92 -r1.93
--- proprietary-drm.it.po 20 Dec 2023 13:05:24 -0000 1.92
+++ proprietary-drm.it.po 3 Jan 2024 12:03:42 -0000 1.93
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-drm.html\n"
-"POT-Creation-Date: 2023-12-20 12:56+0000\n"
+"POT-Creation-Date: 2024-01-03 11:55+0000\n"
"PO-Revision-Date: 2017-12-30 14:17+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -165,6 +165,37 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-"
+"hardware-hacking/\">Newag, a Polish railway manufacturer, puts DRM inside "
+"trains to prevent third-party repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some time. "
+"If yes, the train will be “locked up” (i.e. bricked). It was "
+"also possible to unlock it by pressing a secret combination of buttons in "
+"the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://web.archive.org/web/20231213150111/https://www.nytimes."
"com/2023/11/12/technology/iphone-repair-apple-control.html\">To block non-"
"Apple repairs, Apple encodes the iMonster serial number in the original "
@@ -1115,10 +1146,10 @@
"traduzioni</a>."
#. type: Content of: <div><p>
-# | Copyright © [-2014-] {+2014-2023+} Free Software Foundation, Inc.
+# | Copyright © [-2014-] {+2014-2024+} Free Software Foundation, Inc.
#, fuzzy
#| msgid "Copyright © 2014 Free Software Foundation, Inc."
-msgid "Copyright © 2014-2023 Free Software Foundation, Inc."
+msgid "Copyright © 2014-2024 Free Software Foundation, Inc."
msgstr "Copyright © 2014 Free Software Foundation, Inc."
#. type: Content of: <div><p>
Index: proprietary-drm.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.ja-diff.html,v
retrieving revision 1.81
retrieving revision 1.82
diff -u -b -r1.81 -r1.82
--- proprietary-drm.ja-diff.html 20 Dec 2023 13:05:26 -0000 1.81
+++ proprietary-drm.ja-diff.html 3 Jan 2024 12:03:42 -0000 1.82
@@ -87,6 +87,35 @@
<ul class="blurbs">
<!-- Copied from workshop/mal.rec. Do not edit in proprietary-drm.html.
-->
+ <li id="M202312130">
+ <!--#set var="DATE" value='<small
class="date-tag">2023-12</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-hardware-hacking/">Newag,
+ a Polish railway manufacturer, puts DRM inside trains to prevent
+ third-party repairs</a>.</p></em></ins></span>
+
+ <ul>
+<span
class="removed"><del><strong><li><p>Android</strong></del></span>
+ <span class="inserted"><ins><em><li><p>The train's software
contains code to detect if the GPS
+ coordinates are near some third party repairers, or the train has not
+ been running for some time. If yes, the train will be “locked
+ up” (i.e. bricked). It was also possible to unlock it by
+ pressing a secret combination of buttons in the cockpit, but this
+ ability was removed by a manufacturer's software
update.</p></li>
+
+ <li><p>The train will also lock up after a certain date,
which is
+ hardcoded in the software.</p></li>
+
+ <li><p>The company pushes a software update that detects if
the
+ DRM code has been bypassed, i.e. the lock should have been engaged
+ but the train is still operational. If yes, the controller cabin
+ screen will display a scary message warning about “copyright
+ violation”.</p></li>
+ </ul>
+ </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary-drm.html.
-->
<li id="M202311301">
<!--#set var="DATE" value='<small
class="date-tag">2023-11</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -105,8 +134,9 @@
<!--#set var="DATE" value='<small
class="date-tag">2023-05</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>HP delivers printers with a
- universal back door, and recently used it to <a
-
href="https://www.theguardian.com/money/2023/may/10/how-can-hp-block-me-from-using-a-cheaper-printer-cartridge">
+ universal back door, and recently used it to</em></ins></span> <a <span
class="removed"><del><strong>href="https://developer.android.com/reference/android/drm/package-summary.html">contains
+facilities</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/money/2023/may/10/how-can-hp-block-me-from-using-a-cheaper-printer-cartridge">
sabotage them by remotely installing malware</a>. The malware makes
the
printer refuse to function with non-HP ink cartrides, and even with old
HP cartridges which HP now declares to have “expired.”
@@ -143,11 +173,10 @@
that plugs into a compatible receiver, or alternatively by a tuner
card that plugs into a computer. Beside implementing drastic copying
and viewing restrictions, this system gives broadcasters full power
- over users, through back doors among other means. For
example:</p></em></ins></span>
+ over users, through back doors among other means. For example:</p>
<ul>
-<span
class="removed"><del><strong><li><p>Android</strong></del></span>
- <span class="inserted"><ins><em><li>It can force messages to the
user's TV screen, and the user
+ <li>It can force messages to the user's TV screen, and the user
can't turn them off.</li>
<li>It can collect viewing information and send it to other
@@ -198,9 +227,8 @@
<li id="M202203210">
<!--#set var="DATE" value='<small
class="date-tag">2022-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Apple prevents people from upgrading their Mac
hardware</em></ins></span> <a <span
class="removed"><del><strong>href="https://developer.android.com/reference/android/drm/package-summary.html">contains
-facilities</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2022/3/21/22989226/apple-mac-studios-removable-ssd-blocked-software-replacement">by
+ <p>Apple prevents people from upgrading their Mac hardware <a
+
href="https://www.theverge.com/2022/3/21/22989226/apple-mac-studios-removable-ssd-blocked-software-replacement">by
imposing DRM on its removable SSD storage</a>.</p>
</li>
@@ -423,22 +451,22 @@
<p><small>(The article uses the term “lock”
to describe the DRM, but we prefer to use the term <a
href="/philosophy/words-to-avoid.html#DigitalLocks"> digital
- handcuffs</a>.)</small></p></em></ins></span>
+ handcuffs</a>.)</small></p>
</li>
-<span
class="removed"><del><strong><li><p>HP's</strong></del></span>
-
-<span class="inserted"><ins><em><!-- Copied from workshop/mal.rec. Do not
edit in proprietary-drm.html. -->
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary-drm.html.
-->
<li id="M201702020">
<!--#set var="DATE" value='<small
class="date-tag">2017-02</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>DRM-restricted files can be used to <a
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users">
identify people browsing through Tor</a>. The vulnerability exists
- only if you use Windows.</p>
+ only if you use Windows.</p></em></ins></span>
</li>
-<!-- Copied from workshop/mal.rec. Do not edit in proprietary-drm.html.
-->
+<span
class="removed"><del><strong><li><p>HP's</strong></del></span>
+
+<span class="inserted"><ins><em><!-- Copied from workshop/mal.rec. Do not
edit in proprietary-drm.html. -->
<li id="M201701300">
<!--#set var="DATE" value='<small
class="date-tag">2017-01</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -695,8 +723,8 @@
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm">
DRM (digital restrictions mechanisms) in MacOS</a>. This article
focuses on the fact that a new model of Macbook introduced a
- requirement</em></ins></span> for <span
class="removed"><del><strong>id="content", starts</strong></del></span> <span
class="inserted"><ins><em>monitors to have malicious hardware, but DRM
software</em></ins></span>
- in <span class="inserted"><ins><em>MacOS is involved in
activating</em></ins></span> the <span class="removed"><del><strong>include
above</strong></del></span> <span class="inserted"><ins><em>hardware. The
software for
+ requirement</em></ins></span> for <span
class="removed"><del><strong>id="content", starts</strong></del></span> <span
class="inserted"><ins><em>monitors to have malicious hardware, but DRM software
+ in MacOS is involved</em></ins></span> in <span
class="inserted"><ins><em>activating</em></ins></span> the <span
class="removed"><del><strong>include above</strong></del></span> <span
class="inserted"><ins><em>hardware. The software for
accessing iTunes is also responsible.</p>
</li>
@@ -795,7 +823,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © <span class="removed"><del><strong>2014, 2015,
2016</strong></del></span> <span
class="inserted"><ins><em>2014-2023</em></ins></span> Free Software Foundation,
Inc.</p>
+<p>Copyright © <span class="removed"><del><strong>2014, 2015,
2016</strong></del></span> <span
class="inserted"><ins><em>2014-2024</em></ins></span> Free Software Foundation,
Inc.</p>
<p>This page is licensed under a <a rel="license"
<span
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/">Creative</strong></del></span>
@@ -806,7 +834,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2023/12/20 13:05:26 $
+$Date: 2024/01/03 12:03:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-drm.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.ja.po,v
retrieving revision 1.89
retrieving revision 1.90
diff -u -b -r1.89 -r1.90
--- proprietary-drm.ja.po 20 Dec 2023 13:05:27 -0000 1.89
+++ proprietary-drm.ja.po 3 Jan 2024 12:03:42 -0000 1.90
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-drm.html\n"
-"POT-Creation-Date: 2023-12-20 12:56+0000\n"
+"POT-Creation-Date: 2024-01-03 11:55+0000\n"
"PO-Revision-Date: 2016-12-20 14:55+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -139,6 +139,37 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-"
+"hardware-hacking/\">Newag, a Polish railway manufacturer, puts DRM inside "
+"trains to prevent third-party repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some time. "
+"If yes, the train will be “locked up” (i.e. bricked). It was "
+"also possible to unlock it by pressing a secret combination of buttons in "
+"the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://web.archive.org/web/20231213150111/https://www.nytimes."
"com/2023/11/12/technology/iphone-repair-apple-control.html\">To block non-"
"Apple repairs, Apple encodes the iMonster serial number in the original "
@@ -865,7 +896,7 @@
#. type: Content of: <div><p>
#, fuzzy
#| msgid "Copyright © 2014 Free Software Foundation, Inc."
-msgid "Copyright © 2014-2023 Free Software Foundation, Inc."
+msgid "Copyright © 2014-2024 Free Software Foundation, Inc."
msgstr "Copyright © 2014 Free Software Foundation, Inc."
#. type: Content of: <div><p>
Index: proprietary-drm.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.pot,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- proprietary-drm.pot 20 Dec 2023 13:05:27 -0000 1.69
+++ proprietary-drm.pot 3 Jan 2024 12:03:42 -0000 1.70
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-drm.html\n"
-"POT-Creation-Date: 2023-12-20 12:56+0000\n"
+"POT-Creation-Date: 2024-01-03 11:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -98,6 +98,38 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
"<a "
+"href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-hardware-hacking/\">Newag,
"
+"a Polish railway manufacturer, puts DRM inside trains to prevent third-party "
+"repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some "
+"time. If yes, the train will be “locked up” (i.e. bricked). It "
+"was also possible to unlock it by pressing a secret combination of buttons "
+"in the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"<a "
"href=\"https://web.archive.org/web/20231213150111/https://www.nytimes.com/2023/11/12/technology/iphone-repair-apple-control.html\">To
"
"block non-Apple repairs, Apple encodes the iMonster serial number in the "
"original parts</a>. This is called “parts pairing”. Swapping "
@@ -691,7 +723,7 @@
msgstr ""
#. type: Content of: <div><p>
-msgid "Copyright © 2014-2023 Free Software Foundation, Inc."
+msgid "Copyright © 2014-2024 Free Software Foundation, Inc."
msgstr ""
#. type: Content of: <div><p>
Index: proprietary-drm.pt-br-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.pt-br-diff.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- proprietary-drm.pt-br-diff.html 20 Dec 2023 13:05:28 -0000 1.14
+++ proprietary-drm.pt-br-diff.html 3 Jan 2024 12:03:42 -0000 1.15
@@ -85,6 +85,34 @@
<ul class="blurbs">
<span class="inserted"><ins><em><!-- Copied from workshop/mal.rec. Do not
edit in proprietary-drm.html. -->
+ <li id="M202312130">
+ <!--#set var="DATE" value='<small
class="date-tag">2023-12</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-hardware-hacking/">Newag,
+ a Polish railway manufacturer, puts DRM inside trains to prevent
+ third-party repairs</a>.</p>
+
+ <ul>
+ <li><p>The train's software contains code to detect if the
GPS
+ coordinates are near some third party repairers, or the train has not
+ been running for some time. If yes, the train will be “locked
+ up” (i.e. bricked). It was also possible to unlock it by
+ pressing a secret combination of buttons in the cockpit, but this
+ ability was removed by a manufacturer's software
update.</p></li>
+
+ <li><p>The train will also lock up after a certain date,
which is
+ hardcoded in the software.</p></li>
+
+ <li><p>The company pushes a software update that detects if
the
+ DRM code has been bypassed, i.e. the lock should have been engaged
+ but the train is still operational. If yes, the controller cabin
+ screen will display a scary message warning about “copyright
+ violation”.</p></li>
+ </ul>
+ </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary-drm.html.
-->
<li id="M202311301">
<!--#set var="DATE" value='<small
class="date-tag">2023-11</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -724,7 +752,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © <span
class="removed"><del><strong>2014-2021</strong></del></span> <span
class="inserted"><ins><em>2014-2023</em></ins></span> Free Software Foundation,
Inc.</p>
+<p>Copyright © <span
class="removed"><del><strong>2014-2021</strong></del></span> <span
class="inserted"><ins><em>2014-2024</em></ins></span> Free Software Foundation,
Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by/4.0/">Creative
@@ -734,7 +762,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2023/12/20 13:05:28 $
+$Date: 2024/01/03 12:03:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-drm.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.pt-br.po,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary-drm.pt-br.po 3 Jan 2024 11:55:26 -0000 1.30
+++ proprietary-drm.pt-br.po 3 Jan 2024 12:03:42 -0000 1.31
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-drm.html\n"
-"POT-Creation-Date: 2023-12-20 12:56+0000\n"
+"POT-Creation-Date: 2024-01-03 11:55+0000\n"
"PO-Revision-Date: 2021-06-26 09:40-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -117,6 +117,37 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-"
+"hardware-hacking/\">Newag, a Polish railway manufacturer, puts DRM inside "
+"trains to prevent third-party repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some time. "
+"If yes, the train will be “locked up” (i.e. bricked). It was "
+"also possible to unlock it by pressing a secret combination of buttons in "
+"the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://web.archive.org/web/20231213150111/https://www.nytimes."
"com/2023/11/12/technology/iphone-repair-apple-control.html\">To block non-"
"Apple repairs, Apple encodes the iMonster serial number in the original "
@@ -973,8 +1004,8 @@
"contribuição com traduções das páginas deste site."
#. type: Content of: <div><p>
-msgid "Copyright © 2014-2023 Free Software Foundation, Inc."
-msgstr "Copyright © 2014-2023 Free Software Foundation, Inc."
+msgid "Copyright © 2014-2024 Free Software Foundation, Inc."
+msgstr "Copyright © 2014-2024 Free Software Foundation, Inc."
#. type: Content of: <div><p>
msgid ""
@@ -1001,9 +1032,8 @@
msgid "Updated:"
msgstr "Ãltima atualização:"
-#. type: Content of: <div><p>
-msgid "Copyright © 2014-2024 Free Software Foundation, Inc."
-msgstr "Copyright © 2014-2024 Free Software Foundation, Inc."
+#~ msgid "Copyright © 2014-2023 Free Software Foundation, Inc."
+#~ msgstr "Copyright © 2014-2023 Free Software Foundation, Inc."
#~ msgid "Copyright © 2014-2022 Free Software Foundation, Inc."
#~ msgstr "Copyright © 2014-2022 Free Software Foundation, Inc."
Index: proprietary-drm.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.ru.po,v
retrieving revision 1.158
retrieving revision 1.159
diff -u -b -r1.158 -r1.159
--- proprietary-drm.ru.po 3 Jan 2024 11:55:26 -0000 1.158
+++ proprietary-drm.ru.po 3 Jan 2024 12:03:42 -0000 1.159
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2023-12-20 12:56+0000\n"
+"POT-Creation-Date: 2024-01-03 11:55+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2024-01-03 11:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary DRM - GNU Project - Free Software Foundation"
@@ -121,6 +122,37 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-"
+"hardware-hacking/\">Newag, a Polish railway manufacturer, puts DRM inside "
+"trains to prevent third-party repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some time. "
+"If yes, the train will be “locked up” (i.e. bricked). It was "
+"also possible to unlock it by pressing a secret combination of buttons in "
+"the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://web.archive.org/web/20231213150111/https://www.nytimes."
"com/2023/11/12/technology/iphone-repair-apple-control.html\">To block non-"
"Apple repairs, Apple encodes the iMonster serial number in the original "
@@ -1040,8 +1072,8 @@
"translations.html\">“Ð ÑководÑÑве по
пеÑеводам”</a>."
#. type: Content of: <div><p>
-msgid "Copyright © 2014-2023 Free Software Foundation, Inc."
-msgstr "Copyright © 2014-2023 Free Software Foundation, Inc."
+msgid "Copyright © 2014-2024 Free Software Foundation, Inc."
+msgstr "Copyright © 2014-2024 Free Software Foundation, Inc."
#. type: Content of: <div><p>
msgid ""
@@ -1067,9 +1099,8 @@
msgid "Updated:"
msgstr "Ðбновлено:"
-#. type: Content of: <div><p>
-msgid "Copyright © 2014-2024 Free Software Foundation, Inc."
-msgstr "Copyright © 2014-2024 Free Software Foundation, Inc."
+#~ msgid "Copyright © 2014-2023 Free Software Foundation, Inc."
+#~ msgstr "Copyright © 2014-2023 Free Software Foundation, Inc."
#~ msgid ""
#~ "Since the software in receivers is nonfree, and tuner cards are designed "
Index: proprietary-insecurity.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.es.po,v
retrieving revision 1.196
retrieving revision 1.197
diff -u -b -r1.196 -r1.197
--- proprietary-insecurity.es.po 3 Jan 2024 11:55:26 -0000 1.196
+++ proprietary-insecurity.es.po 3 Jan 2024 12:03:42 -0000 1.197
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2023-08-19 09:25+0000\n"
+"POT-Creation-Date: 2024-01-03 11:55+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: \n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2024-01-03 11:55+0000\n"
"X-Generator: Poedit 2.4.2\n"
#. type: Content of: <title>
@@ -199,6 +200,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.bleepingcomputer.com/news/security/logofail-attack-can-"
+"install-uefi-bootkits-through-bootup-logos/\">x86 and ARM based computers "
+"shipped with UEFI are potentially vulnerable to a design omission called "
+"LogoFAIL</a>. A cracker can replace the BIOS logo with a fake one that "
+"contains malicious code. Users can't fix this omission because it is in the "
+"nonfree UEFI firmware that users can't replace."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Hackers discovered <a href=\"https://samcurry.net/web-hackers-vs-the-auto-"
"industry/\"> dozens of flaws in the security (in the usual narrow sense) of "
"many brands of automobiles</a>."
@@ -2168,8 +2179,8 @@
"coordinación y el envÃo de traducciones de las páginas de este sitio web."
#. type: Content of: <div><p>
-msgid "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
-msgstr "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
+msgid "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
+msgstr "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
#. type: Content of: <div><p>
msgid ""
@@ -2192,9 +2203,8 @@
msgid "Updated:"
msgstr "Ãltima actualización:"
-#. type: Content of: <div><p>
-msgid "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
-msgstr "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
+#~ msgid "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
+#~ msgstr "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
#~ msgid ""
#~ "Some security breakers (wrongly referred in this article as <a href=\"/"
Index: proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.337
retrieving revision 1.338
diff -u -b -r1.337 -r1.338
--- proprietary-insecurity.fr.po 3 Jan 2024 11:55:26 -0000 1.337
+++ proprietary-insecurity.fr.po 3 Jan 2024 12:03:42 -0000 1.338
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2023-08-19 09:25+0000\n"
+"POT-Creation-Date: 2024-01-03 11:55+0000\n"
"PO-Revision-Date: 2023-08-19 11:38+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2024-01-03 11:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -195,6 +196,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.bleepingcomputer.com/news/security/logofail-attack-can-"
+"install-uefi-bootkits-through-bootup-logos/\">x86 and ARM based computers "
+"shipped with UEFI are potentially vulnerable to a design omission called "
+"LogoFAIL</a>. A cracker can replace the BIOS logo with a fake one that "
+"contains malicious code. Users can't fix this omission because it is in the "
+"nonfree UEFI firmware that users can't replace."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Hackers discovered <a href=\"https://samcurry.net/web-hackers-vs-the-auto-"
"industry/\"> dozens of flaws in the security (in the usual narrow sense) of "
"many brands of automobiles</a>."
@@ -2161,8 +2172,8 @@
"traduction</a> les infos nécessaires."
#. type: Content of: <div><p>
-msgid "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
-msgstr "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
+msgid "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
+msgstr "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
#. type: Content of: <div><p>
msgid ""
@@ -2186,6 +2197,5 @@
msgid "Updated:"
msgstr "Dernière mise à jour :"
-#. type: Content of: <div><p>
-msgid "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
-msgstr "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
+#~ msgid "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
+#~ msgstr "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
Index: proprietary-insecurity.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it-diff.html,v
retrieving revision 1.133
retrieving revision 1.134
diff -u -b -r1.133 -r1.134
--- proprietary-insecurity.it-diff.html 19 Aug 2023 09:32:11 -0000 1.133
+++ proprietary-insecurity.it-diff.html 3 Jan 2024 12:03:42 -0000 1.134
@@ -80,24 +80,23 @@
<p>This doesn't imply that free software is immune</em></ins></span> to
<span class="removed"><del><strong>compare</strong></del></span> <span
class="inserted"><ins><em>bugs or insecurities.
The difference between</em></ins></span> free <span
class="inserted"><ins><em>and proprietary</em></ins></span> software <span
class="removed"><del><strong>with a fictitious idea</strong></del></span> <span
class="inserted"><ins><em>in this respect is
-the handling</em></ins></span> of
-<span class="removed"><del><strong>proprietary</strong></del></span> <span
class="inserted"><ins><em>the bugs: free</em></ins></span> software <span
class="inserted"><ins><em>users are able to study the
-program and/or fix the bugs they find, often in communities</em></ins></span>
as <span class="removed"><del><strong>perfect, but</strong></del></span> <span
class="inserted"><ins><em>they are
-able to share</em></ins></span> the <span
class="removed"><del><strong>press</strong></del></span> <span
class="inserted"><ins><em>program, while proprietary program users are forced to
+the handling</em></ins></span> of <span class="inserted"><ins><em>the bugs:
free software users are able to study the
+program and/or fix the bugs they find, often in communities as they are
+able to share the program, while</em></ins></span> proprietary <span
class="inserted"><ins><em>program users are forced to
rely on the program's developer for fixes.</p>
-<p>If the developer does not care to fix the problem
—</em></ins></span> often <span
class="removed"><del><strong>implicitly</strong></del></span> <span
class="inserted"><ins><em>the case for
-embedded software and old releases — the users are sunk. But if the
-developer</em></ins></span> does <span class="inserted"><ins><em>send a
corrected version, it may contain new malicious
-functionalities as well as bug fixes.</p>
+<p>If the developer does not care to fix the problem — often the
case for
+embedded</em></ins></span> software <span class="inserted"><ins><em>and old
releases — the users are sunk. But if the
+developer does send a corrected version, it may contain new malicious
+functionalities as well</em></ins></span> as <span
class="removed"><del><strong>perfect,</strong></del></span> <span
class="inserted"><ins><em>bug fixes.</p>
<div class="important">
-<p>If you know of an example</em></ins></span> that <span
class="removed"><del><strong>whenever</strong></del></span> <span
class="inserted"><ins><em>ought to be in this page but isn't
+<p>If you know of an example that ought to be in this
page</em></ins></span> but <span class="inserted"><ins><em>isn't
here, please write
to <a
href="mailto:webmasters@gnu.org"><webmasters@gnu.org></a>
-to inform us. Please include the URL of</em></ins></span> a <span
class="removed"><del><strong>security hole</strong></del></span> <span
class="inserted"><ins><em>trustworthy reference or two
+to inform us. Please include</em></ins></span> the <span
class="removed"><del><strong>press often implicitly</strong></del></span> <span
class="inserted"><ins><em>URL of a trustworthy reference or two
to serve as specific substantiation.</p>
</div>
@@ -112,12 +111,12 @@
technical details</a>.</p>
<p>Kaspersky discovered this example by chance, but is unable to
-check in general for the presence of such rootkits</em></ins></span> in <span
class="inserted"><ins><em>computers.</p>
+check in general for the presence of such rootkits in computers.</p>
-<p>Nonfree software does not make your computer secure—it does the
-opposite: it prevents you from trying to secure it. UEFI is</em></ins></span>
a <span class="removed"><del><strong>free</strong></del></span> <span
class="inserted"><ins><em>nonfree</em></ins></span>
-program <span class="inserted"><ins><em>required for booting which is
impossible to replace; in
-effect, a low-level rootkit. All the things that Intel has done to
+<p>Nonfree software</em></ins></span> does <span
class="inserted"><ins><em>not make your computer secure—it does the
+opposite: it prevents you from trying to secure it. UEFI is a nonfree
+program required for booting which is impossible to replace; in
+effect, a low-level rootkit. All the things</em></ins></span> that <span
class="removed"><del><strong>whenever</strong></del></span> <span
class="inserted"><ins><em>Intel has done to
make its power over you secure against you also protect UEFI-level
rootkits against you.</p>
@@ -132,35 +131,47 @@
<ul class="blurbs">
<!-- Copied from workshop/mal.rec. Do not edit in
proprietary-insecurity.html. -->
+ <li id="M202312131">
+ <!--#set var="DATE" value='<small
class="date-tag">2023-12</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.bleepingcomputer.com/news/security/logofail-attack-can-install-uefi-bootkits-through-bootup-logos/">x86
+ and ARM based computers shipped with UEFI are potentially vulnerable
+ to</em></ins></span> a <span class="inserted"><ins><em>design omission
called LogoFAIL</a>. A cracker can replace the
+ BIOS logo with a fake one that contains malicious code. Users can't
+ fix this omission because it is in the nonfree UEFI firmware that
+ users can't replace.</p>
+ </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in
proprietary-insecurity.html. -->
<li id="M202211301">
<!--#set var="DATE" value='<small
class="date-tag">2022-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Hackers discovered <a
href="https://samcurry.net/web-hackers-vs-the-auto-industry/"> dozens
- of flaws in the security (in the usual narrow sense) of many brands
+ of flaws in the</em></ins></span> security <span
class="removed"><del><strong>hole</strong></del></span> <span
class="inserted"><ins><em>(in the usual narrow sense) of many brands
of automobiles</a>.</p>
<p>Security in the usual narrow sense means security against unknown
third parties. We are more concerned with security in the broader
sense—against the manufacturer as well as against unknown
- third parties. It</em></ins></span> is <span
class="removed"><del><strong>discovered.</strong></del></span> <span
class="inserted"><ins><em>clear that each of these vulnerabilities can
+ third parties. It is clear that each of these vulnerabilities can
be exploited by the manufacturer too, and by any government that
can threaten the manufacturer enough to compel the manufacturer's
cooperation.</p>
</li>
-<!-- Copied from workshop/mal.rec. Do not edit in
proprietary-insecurity.html. -->
+<!-- Copied from workshop/mal.rec. Do not edit</em></ins></span> in <span
class="inserted"><ins><em>proprietary-insecurity.html. -->
<li id="M202210140">
<!--#set var="DATE" value='<small
class="date-tag">2022-10</small>'
--><!--#echo encoding="none" var="DATE" -->
<p><a
-
href="https://www.bleepingcomputer.com/news/security/microsoft-office-365-email-encryption-could-expose-message-content/"></em></ins></span>
- The
-<span class="removed"><del><strong>examples below show</strong></del></span>
<span class="inserted"><ins><em>Microsoft Office encryption is weak</a>,
and susceptible to
+
href="https://www.bleepingcomputer.com/news/security/microsoft-office-365-email-encryption-could-expose-message-content/">
+ The Microsoft Office encryption is weak</a>, and susceptible to
attack.</p>
- <p>Encryption is a tricky field, and easy to mess up. It is wise
- to insist on encryption software</em></ins></span> that <span
class="removed"><del><strong>proprietary</strong></del></span> <span
class="inserted"><ins><em>is (1) free</em></ins></span> software <span
class="removed"><del><strong>isn't perfect,</strong></del></span> and <span
class="inserted"><ins><em>(2)
+ <p>Encryption is</em></ins></span> a <span
class="inserted"><ins><em>tricky field, and easy to mess up. It is wise
+ to insist on encryption software that is (1)</em></ins></span> free <span
class="removed"><del><strong>program</strong></del></span> <span
class="inserted"><ins><em>software and (2)
studied by experts.</p>
</li>
@@ -172,20 +183,19 @@
href="https://www.theguardian.com/technology/2022/aug/24/tiktok-can-track-users-every-tap-as-they-visit-other-sites-through-ios-app-new-research-shows">
injects keylogger-like JavaScript code into outside web pages</a>.
This
code has the ability to track all users' activities, and to
- retrieve any personal data that</em></ins></span> is <span
class="removed"><del><strong>often quite sloppy.</p>
-
-<p>It</strong></del></span> <span class="inserted"><ins><em>entered on
the pages. We have
+ retrieve any personal data that is entered on the pages. We have
no way of verifying TikTok's claim that the keylogger-like code
only serves purely technical functions. Some of the accessed data
could well be saved to the company's servers, and even sent to
third parties. This would open the door to extensive surveillance,
including by the Chinese government (to which TikTok has indirect
- ties). There is also a risk that the data</em></ins></span> would be <span
class="removed"><del><strong>equally incorrect</strong></del></span> <span
class="inserted"><ins><em>stolen by crackers,
- and used</em></ins></span> to <span class="removed"><del><strong>compare
proprietary</strong></del></span> <span class="inserted"><ins><em>launch
malware attacks.</p>
+ ties). There</em></ins></span> is <span
class="removed"><del><strong>discovered.</strong></del></span> <span
class="inserted"><ins><em>also a risk that the data would be stolen by crackers,
+ and used to launch malware attacks.</p>
<p>The iOS in-app browsers of Instagram and Facebook
- behave essentially the same way as TikTok's. The main
- difference is that Instagram and Facebook allow users
+ behave essentially the same way as TikTok's.</em></ins></span> The
+<span class="removed"><del><strong>examples below show</strong></del></span>
<span class="inserted"><ins><em>main
+ difference is</em></ins></span> that <span
class="inserted"><ins><em>Instagram and Facebook allow users
to access third-party sites with their default browser, whereas <a
href="https://web.archive.org/web/20221201065621/https://www.reddit.com/r/Tiktokhelp/comments/jlep5d/how_do_i_make_urls_open_in_my_browser_instead_of/">
TikTok makes it nearly impossible</a>.</p>
@@ -202,7 +212,7 @@
<li id="M202207040">
<!--#set var="DATE" value='<small
class="date-tag">2022-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A bug in Tesla cars</em></ins></span> software <span
class="inserted"><ins><em><a
+ <p>A bug in Tesla cars software <a
href="https://www.tweaktown.com/news/86780/new-app-allows-hackers-to-steal-teslas-by-making-their-own-keys/index.html">
lets crackers install new car keys</a>, unlock cars, start engines,
and even prevent real owners from accessing their cars.</p>
@@ -222,7 +232,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p>A security failure in Microsoft's Windows is <a
href="https://www.bleepingcomputer.com/news/security/fake-windows-11-upgrade-installers-infect-you-with-redline-malware/">infecting
- people's computers</em></ins></span> with <span
class="inserted"><ins><em>RedLine stealer malware</a>
using</em></ins></span> a <span class="removed"><del><strong>fictitious
idea</strong></del></span> <span class="inserted"><ins><em>fake
+ people's computers with RedLine stealer malware</a> using a fake
Windows 11 upgrade installer.</p>
</li>
@@ -242,7 +252,7 @@
<li id="M202111200">
<!--#set var="DATE" value='<small
class="date-tag">2021-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Hundreds</em></ins></span> of <span
class="removed"><del><strong>free</strong></del></span> <span
class="inserted"><ins><em>Tesla drivers <a
+ <p>Hundreds of Tesla drivers <a
href="https://www.theguardian.com/technology/2021/nov/20/tesla-app-outage-elon-musk-apologises">were
locked out of their cars as a result of Tesla's app suffering from an
outage</a>, which happened because the app is tethered to the
company's
@@ -268,7 +278,7 @@
<!--#set var="DATE" value='<small
class="date-tag">2021-08</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Various models of security cameras, DVRs,
- and baby monitors that run proprietary</em></ins></span> software <span
class="inserted"><ins><em><a
+ and baby monitors that run</em></ins></span> proprietary software <span
class="removed"><del><strong>isn't perfect,</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.wired.com/story/kalay-iot-bug-video-feeds/">are
affected by a security vulnerability that could give attackers access
to live feeds</a>.</p>
@@ -292,8 +302,7 @@
fix the problems.</p>
<p><small>Please note that the article
- wrongly refers to crackers</em></ins></span> as <span
class="removed"><del><strong>perfect. Every nontrivial
-program</strong></del></span> <span class="inserted"><ins><em>“<a
+ wrongly refers to crackers as “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
</li>
@@ -322,7 +331,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-voiceprints/">TikTok
- apps collect biometric identifiers and biometric information from
+ apps collect biometric identifiers</em></ins></span> and <span
class="inserted"><ins><em>biometric information from
users' smartphones</a>. The company behind it does whatever it wants
and collects whatever data it can.</p>
</li>
@@ -332,8 +341,10 @@
<!--#set var="DATE" value='<small
class="date-tag">2021-05</small>'
--><!--#echo encoding="none" var="DATE" -->
<p><a
-
href="https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-to-chinese-government-conflicts-with-apples-privacy-first-focus/">Apple
- is moving its Chinese customers' iCloud data to a datacenter controlled
+
href="https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-to-chinese-government-conflicts-with-apples-privacy-first-focus/">Apple</em></ins></span>
+ is <span class="removed"><del><strong>often quite sloppy.</p>
+
+<p>It would</strong></del></span> <span class="inserted"><ins><em>moving
its Chinese customers' iCloud data to a datacenter controlled
by the Chinese government</a>. Apple is already storing the
encryption
keys on these servers, obeying Chinese authority, making all Chinese
user data available to the government.</p>
@@ -373,8 +384,8 @@
<!--#set var="DATE" value='<small
class="date-tag">2021-04</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>A zero-day vulnerability in Zoom which <a
-
href="https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-code-execution-without-user-input/">can
- be used to launch remote code execution (RCE)
attacks</a></em></ins></span> has <span
class="removed"><del><strong>bugs,</strong></del></span> <span
class="inserted"><ins><em>been
+
href="https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-code-execution-without-user-input/">can</em></ins></span>
+ be <span class="removed"><del><strong>equally
incorrect</strong></del></span> <span
class="inserted"><ins><em>used</em></ins></span> to <span
class="removed"><del><strong>compare</strong></del></span> <span
class="inserted"><ins><em>launch remote code execution (RCE) attacks</a>
has been
disclosed by researchers. The researchers demonstrated a three-bug
attack chain that caused an RCE on a target machine, all this without
any form of user interaction.</p>
@@ -385,15 +396,15 @@
<!--#set var="DATE" value='<small
class="date-tag">2021-03</small>'
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach-of-150-000-security-cams">Over
150 thousand security cameras that used Verkada
- company's proprietary software are cracked</a> by a major security
- breach. Crackers have had access to security archives of various
+ company's</em></ins></span> proprietary software <span
class="removed"><del><strong>with</strong></del></span> <span
class="inserted"><ins><em>are cracked</a> by</em></ins></span> a <span
class="removed"><del><strong>fictitious idea</strong></del></span> <span
class="inserted"><ins><em>major security
+ breach. Crackers have had access to security archives</em></ins></span> of
<span class="inserted"><ins><em>various
gyms, hospitals, jails, schools, and police stations that have used
Verkada's cameras.</p>
<p><a href="/philosophy/surveillance-vs-democracy.html">It is
injustice
- to the public</a> for gyms, stores, hospitals,
jails,</em></ins></span> and <span class="inserted"><ins><em>schools to
+ to the public</a> for gyms, stores, hospitals, jails, and schools to
hand “security” footage to a company from which the government
can
- collect it at</em></ins></span> any <span
class="removed"><del><strong>system, free</strong></del></span> <span
class="inserted"><ins><em>time, without even telling them.</p>
+ collect it at any time, without even telling them.</p>
<p><small>Please note that the article
wrongly refers to crackers as “<a
@@ -410,7 +421,7 @@
href="https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-newly-hacked-via-holes-in-microsofts-email-software/">holes
in Microsoft's proprietary email software, named Microsoft 365</a>.
It
is unclear whether there are other holes and vulnerabilities in the
- program</em></ins></span> or <span
class="removed"><del><strong>proprietary,</strong></del></span> <span
class="inserted"><ins><em>not but history and experience tells us it wouldn't be
+ program or not but history and experience tells us it wouldn't be
the last disaster with proprietary programs.</p>
</li>
@@ -421,7 +432,7 @@
<p>Researchers at the security firm SentinelOne discovered a <a
href="https://www.wired.com/story/windows-defender-vulnerability-twelve-years/">security
flaw in proprietary program Microsoft Windows Defender that lurked
- undetected for 12 years</a>. If the program was free (as in freedom),
+ undetected for 12 years</a>. If the program was</em></ins></span>
free <span class="inserted"><ins><em>(as in freedom),
more people would have had a chance to notice the problem, therefore,
it could've been fixed a lot sooner.</p>
</li>
@@ -473,13 +484,14 @@
<p>United States officials are facing
one of biggest crackings against them in years, when <a
href="https://www.theguardian.com/technology/2020/dec/15/orion-hack-solar-winds-explained-us-treasury-commerce-department">malicious
- code was sneaked into SolarWinds' proprietary software named
+ code was sneaked into SolarWinds' proprietary</em></ins></span> software
<span class="inserted"><ins><em>named
Orion</a>. Crackers got access to networks when users downloaded
a tainted software update. Crackers were able to monitor internal
emails at some of the top agencies in the US.</p>
<p><small>(Please note that the article
- wrongly refers to crackers as "<a
+ wrongly refers to crackers</em></ins></span> as <span
class="removed"><del><strong>perfect. Every nontrivial
+program has bugs,</strong></del></span> <span class="inserted"><ins><em>"<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>".)</small></p>
</li>
@@ -491,9 +503,9 @@
href="https://www.zdnet.com/article/baidus-android-apps-caught-collecting-sensitive-user-details/">
caught collecting sensitive personal data</a> that can be used for
lifetime tracking of users, and putting them in danger. More than 1.4
- billion people worldwide are affected by these proprietary apps, and
- users' privacy is jeopardized by this surveillance tool. Data collected
- by Baidu</em></ins></span> may <span class="inserted"><ins><em>be handed
over to the Chinese government, possibly
+ billion people worldwide are affected by these proprietary
apps,</em></ins></span> and
+ <span class="inserted"><ins><em>users' privacy is jeopardized by this
surveillance tool. Data collected
+ by Baidu may be handed over to the Chinese government, possibly
putting Chinese people in danger.</p>
</li>
@@ -501,21 +513,21 @@
<li id="M202011230">
<!--#set var="DATE" value='<small
class="date-tag">2020-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Some Wavelink and JetStream wifi routers</em></ins></span> have
- <span class="inserted"><ins><em>universal back doors that enable
unauthenticated
+ <p>Some Wavelink and JetStream wifi routers have
+ universal back doors that enable unauthenticated
users to remotely control not only the routers, but
- also any devices connected to the network. There is evidence that <a
+ also</em></ins></span> any <span
class="removed"><del><strong>system,</strong></del></span> <span
class="inserted"><ins><em>devices connected to the network. There is evidence
that <a
href="https://cybernews.com/security/walmart-exclusive-routers-others-made-in-china-contain-backdoors-to-control-devices/">
this vulnerability is actively exploited</a>.</p>
<p>If you consider buying a router, we encourage you to get one
- that <a href="https://ryf.fsf.org/categories/routers">runs on free
- software</a>. Any attempts at introducing malicious functionalities
in
+ that <a href="https://ryf.fsf.org/categories/routers">runs
on</em></ins></span> free <span class="removed"><del><strong>or
proprietary,</strong></del></span>
+ <span class="inserted"><ins><em>software</a>. Any attempts at
introducing malicious functionalities in
it (e.g., through a firmware update) will be detected by the community,
and soon corrected.</p>
<p>If unfortunately you own a router that runs on
- proprietary software, don't panic! You may be able to
+ proprietary software, don't panic! You</em></ins></span> may <span
class="removed"><del><strong>have</strong></del></span> <span
class="inserted"><ins><em>be able to
replace its firmware with a free operating system such as <a
href="https://librecmc.org">libreCMC</a>. If you don't know how,
you can get help from a nearby GNU/Linux user group.</p>
@@ -584,9 +596,9 @@
<li id="M202004150">
<!--#set var="DATE" value='<small
class="date-tag">2020-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Riot Games' new anti-cheat</em></ins></span> is <span
class="removed"><del><strong>human,</strong></del></span> <span
class="inserted"><ins><em>malware; <a
+ <p>Riot Games' new anti-cheat is malware; <a
href="https://www.extremetech.com/gaming/309320-riot-games-new-anti-cheat-system-runs-at-system-boot-uses-kernel-driver">runs
- on system boot at kernel level</a> on Windows. It is insecure
software
+ on system boot at kernel level</a> on Windows. It</em></ins></span>
is <span class="removed"><del><strong>human,</strong></del></span> <span
class="inserted"><ins><em>insecure software
that increases the attack surface of the operating system.</p>
</li>
@@ -908,16 +920,16 @@
enables malware authors to capture keystrokes without taking the risk
of being classified as malicious task by AV
<span class="removed"><del><strong>heuristics”.
- </p></strong></del></span> <span
class="inserted"><ins><em>heuristics”.</p></em></ins></span>
- </li>
-<span class="removed"><del><strong><li>
+ </p>
+</li>
+<li>
<p>The proprietary code that runs pacemakers, insulin pumps, and other
medical devices is <a
href="http://www.bbc.co.uk/news/technology-40042584">
-full of gross security faults</a>.</p>
-</li>
+full of gross security faults</a>.</p></strong></del></span> <span
class="inserted"><ins><em>heuristics”.</p></em></ins></span>
+ </li>
-<li></strong></del></span>
+<span class="removed"><del><strong><li></strong></del></span>
<span class="inserted"><ins><em><!-- Copied from workshop/mal.rec. Do not
edit in proprietary-insecurity.html. -->
<li id="M201705120">
@@ -1170,12 +1182,10 @@
href="https://techcrunch.com/2016/07/29/research-shows-deleted-whatsapp-messages-arent-actually-deleted/">“Deleted”
WhatsApp messages are not entirely deleted</a>. They can be recovered
in various <span class="removed"><del><strong>ways.
-</p></strong></del></span> <span
class="inserted"><ins><em>ways.</p></em></ins></span>
+</p></strong></del></span> <span
class="inserted"><ins><em>ways.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
-<span class="inserted"><ins><em><!-- Copied from workshop/mal.rec. Do not
edit in proprietary-insecurity.html. -->
+<!-- Copied from workshop/mal.rec. Do not edit in
proprietary-insecurity.html. -->
<li id="M201607280">
<!--#set var="DATE" value='<small
class="date-tag">2016-07</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -1187,10 +1197,12 @@
This “service” is for suckers!</p>
<p>The server surely has a “privacy policy,” and surely
- it is worthless since nearly all of them are.</p>
+ it is worthless since nearly all of them are.</p></em></ins></span>
</li>
-<!-- Copied from workshop/mal.rec. Do not edit in
proprietary-insecurity.html. -->
+<span class="removed"><del><strong><li></strong></del></span>
+
+<span class="inserted"><ins><em><!-- Copied from workshop/mal.rec. Do not
edit in proprietary-insecurity.html. -->
<li id="M201607220">
<!--#set var="DATE" value='<small
class="date-tag">2016-07</small>'
--><!--#echo encoding="none" var="DATE" --></em></ins></span>
@@ -1795,7 +1807,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2013, <span class="removed"><del><strong>2015, 2016,
2017</strong></del></span> <span
class="inserted"><ins><em>2015-2023</em></ins></span> Free Software Foundation,
Inc.</p>
+<p>Copyright © 2013, <span class="removed"><del><strong>2015, 2016,
2017</strong></del></span> <span
class="inserted"><ins><em>2015-2024</em></ins></span> Free Software Foundation,
Inc.</p>
<p>This page is licensed under a <a rel="license"
<span
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/">Creative</strong></del></span>
@@ -1806,7 +1818,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2023/08/19 09:32:11 $
+$Date: 2024/01/03 12:03:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.234
retrieving revision 1.235
diff -u -b -r1.234 -r1.235
--- proprietary-insecurity.it.po 19 Aug 2023 09:32:11 -0000 1.234
+++ proprietary-insecurity.it.po 3 Jan 2024 12:03:42 -0000 1.235
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2023-08-19 09:25+0000\n"
+"POT-Creation-Date: 2024-01-03 11:55+0000\n"
"PO-Revision-Date: 2017-12-31 13:13+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -203,6 +203,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.bleepingcomputer.com/news/security/logofail-attack-can-"
+"install-uefi-bootkits-through-bootup-logos/\">x86 and ARM based computers "
+"shipped with UEFI are potentially vulnerable to a design omission called "
+"LogoFAIL</a>. A cracker can replace the BIOS logo with a fake one that "
+"contains malicious code. Users can't fix this omission because it is in the "
+"nonfree UEFI firmware that users can't replace."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Hackers discovered <a href=\"https://samcurry.net/web-hackers-vs-the-auto-"
"industry/\"> dozens of flaws in the security (in the usual narrow sense) of "
"many brands of automobiles</a>."
@@ -2314,11 +2324,11 @@
"traduzioni</a>."
#. type: Content of: <div><p>
-# | Copyright © 2013, [-2015-] {+2015-2023+} Free Software Foundation,
+# | Copyright © 2013, [-2015-] {+2015-2024+} Free Software Foundation,
# | Inc.
#, fuzzy
#| msgid "Copyright © 2013, 2015 Free Software Foundation, Inc."
-msgid "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
+msgid "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
msgstr "Copyright © 2013, 2015 Free Software Foundation, Inc."
#. type: Content of: <div><p>
Index: proprietary-insecurity.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja-diff.html,v
retrieving revision 1.154
retrieving revision 1.155
diff -u -b -r1.154 -r1.155
--- proprietary-insecurity.ja-diff.html 19 Aug 2023 09:32:12 -0000 1.154
+++ proprietary-insecurity.ja-diff.html 3 Jan 2024 12:03:42 -0000 1.155
@@ -76,12 +76,11 @@
<p>It would be incorrect</strong></del></span> <span
class="inserted"><ins><em>noteworthy. Even
though most of these security flaws are unintentional, thus are not
malicious functionalities in a strict sense, we report them</em></ins></span>
to <span class="removed"><del><strong>compare</strong></del></span> <span
class="inserted"><ins><em>show that</em></ins></span>
-proprietary software <span class="removed"><del><strong>with a
-fictitious idea</strong></del></span> <span class="inserted"><ins><em>is not
as secure as mainstream media may say.</p>
+proprietary software <span class="inserted"><ins><em>is not as secure as
mainstream media may say.</p>
<p>This doesn't imply that free software is immune to bugs or
insecurities.
The difference between free and proprietary software in this respect is
-the handling</em></ins></span> of <span class="inserted"><ins><em>the
bugs:</em></ins></span> free software <span class="inserted"><ins><em>users are
able to study the
+the handling of the bugs: free software users are able to study the
program and/or fix the bugs they find, often in communities as they are
able to share the program, while proprietary program users are forced to
rely on the program's developer for fixes.</p>
@@ -90,7 +89,7 @@
<p>If the developer does not care to fix the problem — often the
case for
embedded software and old releases — the users are sunk. But if the
developer does send a corrected version, it may contain new malicious
-functionalities as well</em></ins></span> as <span
class="removed"><del><strong>perfect. Every nontrivial</strong></del></span>
<span class="inserted"><ins><em>bug fixes.</p>
+functionalities as well as bug fixes.</p>
<div class="important">
@@ -115,8 +114,8 @@
check in general for the presence of such rootkits in computers.</p>
<p>Nonfree software does not make your computer secure—it does the
-opposite: it prevents you from trying to secure it. UEFI is a
nonfree</em></ins></span>
-program <span class="inserted"><ins><em>required for booting which is
impossible to replace; in
+opposite: it prevents you from trying to secure it. UEFI is a nonfree
+program required for booting which is impossible to replace; in
effect, a low-level rootkit. All the things that Intel has done to
make its power over you secure against you also protect UEFI-level
rootkits against you.</p>
@@ -132,12 +131,26 @@
<ul class="blurbs">
<!-- Copied from workshop/mal.rec. Do not edit in
proprietary-insecurity.html. -->
+ <li id="M202312131">
+ <!--#set var="DATE" value='<small
class="date-tag">2023-12</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.bleepingcomputer.com/news/security/logofail-attack-can-install-uefi-bootkits-through-bootup-logos/">x86
+ and ARM based computers shipped</em></ins></span> with <span
class="inserted"><ins><em>UEFI are potentially vulnerable
+ to</em></ins></span> a
+<span class="removed"><del><strong>fictitious idea</strong></del></span> <span
class="inserted"><ins><em>design omission called LogoFAIL</a>. A cracker
can replace the
+ BIOS logo with a fake one that contains malicious code. Users can't
+ fix this omission because it is in the nonfree UEFI firmware that
+ users can't replace.</p>
+ </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in
proprietary-insecurity.html. -->
<li id="M202211301">
<!--#set var="DATE" value='<small
class="date-tag">2022-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Hackers discovered <a
- href="https://samcurry.net/web-hackers-vs-the-auto-industry/"> dozens
- of flaws in the security (in the usual narrow sense) of many brands
+ href="https://samcurry.net/web-hackers-vs-the-auto-industry/">
dozens</em></ins></span>
+ of <span class="inserted"><ins><em>flaws in the security (in the usual
narrow sense) of many brands
of automobiles</a>.</p>
<p>Security in the usual narrow sense means security against unknown
@@ -159,7 +172,7 @@
attack.</p>
<p>Encryption is a tricky field, and easy to mess up. It is wise
- to insist on encryption software that is (1) free software and (2)
+ to insist on encryption software that is (1)</em></ins></span> free
software <span class="inserted"><ins><em>and (2)
studied by experts.</p>
</li>
@@ -181,7 +194,7 @@
and used to launch malware attacks.</p>
<p>The iOS in-app browsers of Instagram and Facebook
- behave essentially the same way as TikTok's. The main
+ behave essentially the same way</em></ins></span> as <span
class="removed"><del><strong>perfect. Every nontrivial
program</strong></del></span> <span class="inserted"><ins><em>TikTok's. The main
difference is that Instagram and Facebook allow users
to access third-party sites with their default browser, whereas <a
href="https://web.archive.org/web/20221201065621/https://www.reddit.com/r/Tiktokhelp/comments/jlep5d/how_do_i_make_urls_open_in_my_browser_instead_of/">
@@ -581,9 +594,9 @@
<li id="M202004150">
<!--#set var="DATE" value='<small
class="date-tag">2020-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Riot Games' new anti-cheat is malware; <a
+ <p>Riot Games' new anti-cheat</em></ins></span> is <span
class="inserted"><ins><em>malware; <a
href="https://www.extremetech.com/gaming/309320-riot-games-new-anti-cheat-system-runs-at-system-boot-uses-kernel-driver">runs
- on system boot at kernel level</a> on Windows. It</em></ins></span>
is <span class="inserted"><ins><em>insecure software
+ on system boot at kernel level</a> on Windows. It is insecure
software
that increases the attack surface of the operating system.</p>
</li>
@@ -642,9 +655,10 @@
<!--#set var="DATE" value='<small
class="date-tag">2019-07</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Many Android apps can track
- users' movements even when the user says <a
+ users' movements</em></ins></span> even <span
class="removed"><del><strong>introduce</strong></del></span> <span
class="inserted"><ins><em>when the user says <a
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
- not to allow them access to locations</a>.</p>
+ not to allow</em></ins></span> them
+<span class="removed"><del><strong>deliberately,</strong></del></span> <span
class="inserted"><ins><em>access to locations</a>.</p>
<p>This involves an apparently unintentional weakness in Android,
exploited intentionally by malicious apps.</p>
@@ -656,11 +670,11 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Users caught in the jail of an iMonster are <a
href="https://boingboing.net/2019/05/15/brittle-security.html"> sitting
- ducks for other attackers</a>, and the app censorship prevents
security
+ ducks for other attackers</a>,</em></ins></span> and <span
class="removed"><del><strong><em>the</strong></del></span> <span
class="inserted"><ins><em>the app censorship prevents security
companies from figuring out how those attacks work.</p>
<p>Apple's censorship of apps is fundamentally unjust, and would be
- inexcusable</em></ins></span> even <span
class="removed"><del><strong>introduce</strong></del></span> <span
class="inserted"><ins><em>if it didn't lead to security threats as
well.</p>
+ inexcusable even if it didn't lead to security threats as well.</p>
</li>
<!-- Copied from workshop/mal.rec. Do not edit in
proprietary-insecurity.html. -->
@@ -834,8 +848,7 @@
<p>That is a malicious functionality, but in addition it
is a gross insecurity since anyone, including malicious crackers, <a
href="https://arstechnica.com/information-technology/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">can
- find those accounts and use</em></ins></span> them
-<span class="removed"><del><strong>deliberately,</strong></del></span> <span
class="inserted"><ins><em>to get into users' cameras</a>.</p>
+ find those accounts and use them to get into users'
cameras</a>.</p>
</li>
<!-- Copied from workshop/mal.rec. Do not edit in
proprietary-insecurity.html. -->
@@ -844,7 +857,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Many models of Internet-connected cameras
are tremendously insecure. They have login
- accounts with hard-coded passwords, which can't be
changed,</em></ins></span> and <span
class="removed"><del><strong><em>the</strong></del></span> <span
class="inserted"><ins><em><a
+ accounts with hard-coded passwords, which can't be changed, and <a
href="https://arstechnica.com/information-technology/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">there
is no way to delete these accounts either</a>.</p>
</li>
@@ -1095,10 +1108,12 @@
href="https://techcrunch.com/2016/07/29/research-shows-deleted-whatsapp-messages-arent-actually-deleted/">“Deleted”
WhatsApp messages are not entirely deleted</a>. They can be recovered
in various <span class="removed"><del><strong>ways.
-</p></strong></del></span> <span
class="inserted"><ins><em>ways.</p>
+</p></strong></del></span> <span
class="inserted"><ins><em>ways.</p></em></ins></span>
</li>
-<!-- Copied from workshop/mal.rec. Do not edit in
proprietary-insecurity.html. -->
+<span class="removed"><del><strong><li></strong></del></span>
+
+<span class="inserted"><ins><em><!-- Copied from workshop/mal.rec. Do not
edit in proprietary-insecurity.html. -->
<li id="M201607280">
<!--#set var="DATE" value='<small
class="date-tag">2016-07</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -1110,12 +1125,10 @@
This “service” is for suckers!</p>
<p>The server surely has a “privacy policy,” and surely
- it is worthless since nearly all of them are.</p></em></ins></span>
+ it is worthless since nearly all of them are.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
-<span class="inserted"><ins><em><!-- Copied from workshop/mal.rec. Do not
edit in proprietary-insecurity.html. -->
+<!-- Copied from workshop/mal.rec. Do not edit in
proprietary-insecurity.html. -->
<li id="M201607220">
<!--#set var="DATE" value='<small
class="date-tag">2016-07</small>'
--><!--#echo encoding="none" var="DATE" --></em></ins></span>
@@ -1316,19 +1329,19 @@
can't trust it. Western Digital's “My Passport” drives <a
<span
class="removed"><del><strong>href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">have</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.vice.com/en/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">
have</em></ins></span> a back <span
class="removed"><del><strong>door</a>.
-</p>
-</li>
+</p></strong></del></span> <span
class="inserted"><ins><em>door</a>.</p></em></ins></span>
+ </li>
-<li>
+<span class="removed"><del><strong><li>
<p>
Mac OS X had an
<a
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
intentional local back door for 4 years</a>, which could be
exploited by attackers to gain root privileges.
-</p></strong></del></span> <span
class="inserted"><ins><em>door</a>.</p></em></ins></span>
- </li>
+</p>
+</li>
-<span class="removed"><del><strong><li></strong></del></span>
+<li></strong></del></span>
<span class="inserted"><ins><em><!-- Copied from workshop/mal.rec. Do not
edit in proprietary-insecurity.html. -->
<li id="M201508120">
@@ -1522,21 +1535,21 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Lots of <a
href="https://www.wired.com/2014/04/hospital-equipment-vulnerable/">
- hospital equipment has lousy security</a>, and it can be
fatal.</p></em></ins></span>
+ hospital equipment has lousy security</a>, and it can be
fatal.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
-<span class="inserted"><ins><em><!-- Copied from workshop/mal.rec. Do not
edit in proprietary-insecurity.html. -->
+<!-- Copied from workshop/mal.rec. Do not edit in
proprietary-insecurity.html. -->
<li id="M201402210">
<!--#set var="DATE" value='<small
class="date-tag">2014-02</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The <a
href="https://arstechnica.com/information-technology/2014/02/crypto-weaknesses-in-whatsapp-the-kind-of-stuff-the-nsa-would-love/">insecurity
- of WhatsApp</a> makes eavesdropping a snap.</p>
+ of WhatsApp</a> makes eavesdropping a
snap.</p></em></ins></span>
</li>
-<!-- Copied from workshop/mal.rec. Do not edit in
proprietary-insecurity.html. -->
+<span class="removed"><del><strong><li></strong></del></span>
+
+<span class="inserted"><ins><em><!-- Copied from workshop/mal.rec. Do not
edit in proprietary-insecurity.html. -->
<li id="M201312290">
<!--#set var="DATE" value='<small
class="date-tag">2013-12</small>'
--><!--#echo encoding="none" var="DATE" --></em></ins></span>
@@ -1720,7 +1733,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2013, <span class="removed"><del><strong>2015,
2016</strong></del></span> <span
class="inserted"><ins><em>2015-2023</em></ins></span> Free Software Foundation,
Inc.</p>
+<p>Copyright © 2013, <span class="removed"><del><strong>2015,
2016</strong></del></span> <span
class="inserted"><ins><em>2015-2024</em></ins></span> Free Software Foundation,
Inc.</p>
<p>This page is licensed under a <a rel="license"
<span
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/">Creative</strong></del></span>
@@ -1731,7 +1744,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2023/08/19 09:32:12 $
+$Date: 2024/01/03 12:03:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja.po,v
retrieving revision 1.206
retrieving revision 1.207
diff -u -b -r1.206 -r1.207
--- proprietary-insecurity.ja.po 19 Aug 2023 09:32:13 -0000 1.206
+++ proprietary-insecurity.ja.po 3 Jan 2024 12:03:42 -0000 1.207
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2023-08-19 09:25+0000\n"
+"POT-Creation-Date: 2024-01-03 11:55+0000\n"
"PO-Revision-Date: 2016-10-31 12:56+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -179,6 +179,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.bleepingcomputer.com/news/security/logofail-attack-can-"
+"install-uefi-bootkits-through-bootup-logos/\">x86 and ARM based computers "
+"shipped with UEFI are potentially vulnerable to a design omission called "
+"LogoFAIL</a>. A cracker can replace the BIOS logo with a fake one that "
+"contains malicious code. Users can't fix this omission because it is in the "
+"nonfree UEFI firmware that users can't replace."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Hackers discovered <a href=\"https://samcurry.net/web-hackers-vs-the-auto-"
"industry/\"> dozens of flaws in the security (in the usual narrow sense) of "
"many brands of automobiles</a>."
@@ -1798,7 +1808,7 @@
#. type: Content of: <div><p>
#, fuzzy
#| msgid "Copyright © 2014, 2015 Free Software Foundation, Inc."
-msgid "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
+msgid "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
msgstr "Copyright © 2014, 2015 Free Software Foundation, Inc."
#. type: Content of: <div><p>
Index: proprietary-insecurity.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pot,v
retrieving revision 1.172
retrieving revision 1.173
diff -u -b -r1.172 -r1.173
--- proprietary-insecurity.pot 19 Aug 2023 09:32:13 -0000 1.172
+++ proprietary-insecurity.pot 3 Jan 2024 12:03:42 -0000 1.173
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2023-08-19 09:25+0000\n"
+"POT-Creation-Date: 2024-01-03 11:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -144,6 +144,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a "
+"href=\"https://www.bleepingcomputer.com/news/security/logofail-attack-can-install-uefi-bootkits-through-bootup-logos/\">x86
"
+"and ARM based computers shipped with UEFI are potentially vulnerable to a "
+"design omission called LogoFAIL</a>. A cracker can replace the BIOS logo "
+"with a fake one that contains malicious code. Users can't fix this omission "
+"because it is in the nonfree UEFI firmware that users can't replace."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Hackers discovered <a "
"href=\"https://samcurry.net/web-hackers-vs-the-auto-industry/\"> dozens of "
"flaws in the security (in the usual narrow sense) of many brands of "
@@ -1413,7 +1423,7 @@
msgstr ""
#. type: Content of: <div><p>
-msgid "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
+msgid "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
msgstr ""
#. type: Content of: <div><p>
Index: proprietary-insecurity.pt-br-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pt-br-diff.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- proprietary-insecurity.pt-br-diff.html 19 Aug 2023 09:32:14 -0000
1.24
+++ proprietary-insecurity.pt-br-diff.html 3 Jan 2024 12:03:42 -0000
1.25
@@ -126,6 +126,19 @@
<ul class="blurbs">
<span class="inserted"><ins><em><!-- Copied from workshop/mal.rec. Do not
edit in proprietary-insecurity.html. -->
+ <li id="M202312131">
+ <!--#set var="DATE" value='<small
class="date-tag">2023-12</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.bleepingcomputer.com/news/security/logofail-attack-can-install-uefi-bootkits-through-bootup-logos/">x86
+ and ARM based computers shipped with UEFI are potentially vulnerable
+ to a design omission called LogoFAIL</a>. A cracker can replace the
+ BIOS logo with a fake one that contains malicious code. Users can't
+ fix this omission because it is in the nonfree UEFI firmware that
+ users can't replace.</p>
+ </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in
proprietary-insecurity.html. -->
<li id="M202211301">
<!--#set var="DATE" value='<small
class="date-tag">2022-11</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -1572,7 +1585,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2013, <span
class="removed"><del><strong>2015-2021</strong></del></span> <span
class="inserted"><ins><em>2015-2023</em></ins></span> Free Software Foundation,
Inc.</p>
+<p>Copyright © 2013, <span
class="removed"><del><strong>2015-2021</strong></del></span> <span
class="inserted"><ins><em>2015-2024</em></ins></span> Free Software Foundation,
Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by/4.0/">Creative
@@ -1582,7 +1595,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2023/08/19 09:32:14 $
+$Date: 2024/01/03 12:03:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pt-br.po,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -b -r1.51 -r1.52
--- proprietary-insecurity.pt-br.po 3 Jan 2024 11:55:26 -0000 1.51
+++ proprietary-insecurity.pt-br.po 3 Jan 2024 12:03:42 -0000 1.52
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2023-08-19 09:25+0000\n"
+"POT-Creation-Date: 2024-01-03 11:55+0000\n"
"PO-Revision-Date: 2021-06-26 09:40-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -173,6 +173,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.bleepingcomputer.com/news/security/logofail-attack-can-"
+"install-uefi-bootkits-through-bootup-logos/\">x86 and ARM based computers "
+"shipped with UEFI are potentially vulnerable to a design omission called "
+"LogoFAIL</a>. A cracker can replace the BIOS logo with a fake one that "
+"contains malicious code. Users can't fix this omission because it is in the "
+"nonfree UEFI firmware that users can't replace."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Hackers discovered <a href=\"https://samcurry.net/web-hackers-vs-the-auto-"
"industry/\"> dozens of flaws in the security (in the usual narrow sense) of "
"many brands of automobiles</a>."
@@ -2365,8 +2375,8 @@
"contribuição com traduções das páginas deste site."
#. type: Content of: <div><p>
-msgid "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
-msgstr "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
+msgid "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
+msgstr "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
#. type: Content of: <div><p>
msgid ""
@@ -2393,9 +2403,8 @@
msgid "Updated:"
msgstr "Ãltima atualização:"
-#. type: Content of: <div><p>
-msgid "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
-msgstr "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
+#~ msgid "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
+#~ msgstr "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
#~ msgid ""
#~ "Some security breakers (wrongly referred in this article as <a href=\"/"
Index: proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.377
retrieving revision 1.378
diff -u -b -r1.377 -r1.378
--- proprietary-insecurity.ru.po 3 Jan 2024 11:55:26 -0000 1.377
+++ proprietary-insecurity.ru.po 3 Jan 2024 12:03:43 -0000 1.378
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2023-08-19 09:25+0000\n"
+"POT-Creation-Date: 2024-01-03 11:55+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2024-01-03 11:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -195,6 +196,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.bleepingcomputer.com/news/security/logofail-attack-can-"
+"install-uefi-bootkits-through-bootup-logos/\">x86 and ARM based computers "
+"shipped with UEFI are potentially vulnerable to a design omission called "
+"LogoFAIL</a>. A cracker can replace the BIOS logo with a fake one that "
+"contains malicious code. Users can't fix this omission because it is in the "
+"nonfree UEFI firmware that users can't replace."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Hackers discovered <a href=\"https://samcurry.net/web-hackers-vs-the-auto-"
"industry/\"> dozens of flaws in the security (in the usual narrow sense) of "
"many brands of automobiles</a>."
@@ -2139,8 +2150,8 @@
"translations.html\">“Ð ÑководÑÑве по
пеÑеводам”</a>."
#. type: Content of: <div><p>
-msgid "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
-msgstr "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
+msgid "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
+msgstr "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
#. type: Content of: <div><p>
msgid ""
@@ -2166,9 +2177,8 @@
msgid "Updated:"
msgstr "Ðбновлено:"
-#. type: Content of: <div><p>
-msgid "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
-msgstr "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
+#~ msgid "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
+#~ msgstr "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
#~ msgid ""
#~ "Some security breakers (wrongly referred in this article as <a href=\"/"
Index: proprietary-sabotage.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.de-diff.html,v
retrieving revision 1.98
retrieving revision 1.99
diff -u -b -r1.98 -r1.99
--- proprietary-sabotage.de-diff.html 30 Dec 2023 10:00:53 -0000 1.98
+++ proprietary-sabotage.de-diff.html 3 Jan 2024 12:03:43 -0000 1.99
@@ -77,6 +77,37 @@
<ul class="blurbs">
<!-- Copied from workshop/mal.rec. Do not edit in
proprietary-sabotage.html. -->
+ <li id="M202312130">
+ <!--#set var="DATE" value='<small
class="date-tag">2023-12</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-hardware-hacking/">Newag,
+ a Polish railway manufacturer, puts DRM inside trains to prevent
+ third-party repairs</a>.</p>
+
+ <ul>
+ <li><p>The train's software contains code to detect
if</em></ins></span> the <span class="removed"><del><strong>specifics.</p>
+
+<p>Here</strong></del></span> <span class="inserted"><ins><em>GPS
+ coordinates</em></ins></span> are <span
class="removed"><del><strong>examples</strong></del></span> <span
class="inserted"><ins><em>near some third party repairers, or the train has not
+ been running for some time. If yes, the train will be “locked
+ up” (i.e. bricked). It was also possible to unlock it by
+ pressing a secret combination</em></ins></span> of <span
class="removed"><del><strong>proprietary</strong></del></span> <span
class="inserted"><ins><em>buttons in the cockpit, but this
+ ability was removed by a manufacturer's</em></ins></span> software <span
class="inserted"><ins><em>update.</p></li>
+
+ <li><p>The train will also lock up after a certain date,
which is
+ hardcoded in the software.</p></li>
+
+ <li><p>The company pushes a software
update</em></ins></span> that <span class="inserted"><ins><em>detects if the
+ DRM code</em></ins></span> has <span
class="removed"><del><strong>something
+worse than</strong></del></span> <span class="inserted"><ins><em>been
bypassed, i.e. the lock should have been engaged
+ but the train is still operational. If yes, the controller cabin
+ screen will display a scary message warning about “copyright
+ violation”.</p></li>
+ </ul>
+ </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in
proprietary-sabotage.html. -->
<li id="M202311301">
<!--#set var="DATE" value='<small
class="date-tag">2023-11</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -107,8 +138,8 @@
<li id="M202305100">
<!--#set var="DATE" value='<small
class="date-tag">2023-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>HP delivers printers with a
- universal back door, and recently used it to <a
+ <p>HP delivers printers with</em></ins></span> a
+ <span class="inserted"><ins><em>universal back door, and recently used it
to <a
href="https://www.theguardian.com/money/2023/may/10/how-can-hp-block-me-from-using-a-cheaper-printer-cartridge">
sabotage them by remotely installing malware</a>. The malware makes
the
printer refuse to function with non-HP ink cartrides, and even with old
@@ -172,8 +203,11 @@
href="https://arstechnica.com/information-technology/2021/11/locked-out-of-god-mode-runners-are-hacking-their-treadmills/">limits
what people can watch, and recently disabled a feature</a> that was
originally functional. This happened through automatic update and
- probably involved a universal back door.</p>
- </li>
+ probably involved a universal</em></ins></span> back door.</p>
+
+<span class="removed"><del><strong><ul>
+ <li></strong></del></span>
+ <span class="inserted"><ins><em></li>
<!-- Copied from workshop/mal.rec. Do not edit in
proprietary-sabotage.html. -->
<li id="M202110130">
@@ -301,9 +335,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Adobe has <a
href="https://www.bleepingcomputer.com/news/software/adobe-to-ban-users-from-venezuela-due-to-us-executive-order/">
- cancelled</em></ins></span> the <span
class="removed"><del><strong>specifics.</p>
-
-<p>Here</strong></del></span> <span class="inserted"><ins><em>software
subscriptions of all users in
+ cancelled the software subscriptions of all users in
Venezuela</a>. This demonstrates how a requirement for subscription
can be
turned into a tool for sabotage.</p>
</li>
@@ -358,7 +390,7 @@
revoked the license of some older versions</a> of its applications,
and warned customers that they can get sued for using them.</p>
- <p>This is further proof that users of nonfree
software</em></ins></span> are <span
class="removed"><del><strong>examples</strong></del></span> <span
class="inserted"><ins><em>in the
+ <p>This is further proof that users of nonfree software are in the
hands of its developer.</p>
</li>
@@ -389,13 +421,13 @@
tampering with users' settings and files</a>, notably to
“repair” any components of the updating system that users
may have intentionally disabled, and thus regain full power over
- them. Microsoft repeatedly pushed faulty versions</em></ins></span> of
<span class="inserted"><ins><em>this program to
+ them. Microsoft repeatedly pushed faulty versions of this program to
users' machines, causing numerous problems, some of which <a
href="https://www.windowsmode.com/microsoft-suspends-windows-10-october-2018-update-rollout-due-to-critical-bugs/">
critical</a>.</p>
<p>This exemplifies the arrogant and manipulative attitude
- that</em></ins></span> proprietary software <span
class="inserted"><ins><em>developers have learned to adopt
+ that proprietary software developers have learned to adopt
toward the people they are supposedly serving. Migrate to a <a
href="/distros/free-distros.html">free operating system</a> if you
can!</p>
@@ -409,11 +441,11 @@
<li id="M201904040">
<!--#set var="DATE" value='<small
class="date-tag">2019-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Ebooks “bought” from Microsoft's store
check</em></ins></span> that
- <span class="inserted"><ins><em>their DRM is valid by connecting to the
store every time their
+ <p>Ebooks “bought” from Microsoft's store check that
+ their DRM is valid by connecting to the store every time their
“owner” wants to read them. Microsoft is going to close
this store, <a href="https://www.bbc.com/news/technology-47810367">
- bricking all DRM'ed ebooks it</em></ins></span> has <span
class="inserted"><ins><em>ever “sold”</a>. (The
+ bricking all DRM'ed ebooks it has ever “sold”</a>. (The
article additionally highlights the pitfalls of DRM.)</p>
<p>This is another proof that a DRM-encumbered product doesn't belong
@@ -501,9 +533,8 @@
<p>The article focuses on a further nasty fillip, that sales of the
broken devices continued. But we think that is a secondary issue;
it made the nasty consequences extend to some additional people.
- The fundamental wrong was to design the devices to depend
on</em></ins></span> something
-<span class="removed"><del><strong>worse than</strong></del></span>
- <span class="inserted"><ins><em>else that didn't respect users'
freedom.</p>
+ The fundamental wrong was to design the devices to depend on something
+ else that didn't respect users' freedom.</p>
</li>
<!-- Copied from workshop/mal.rec. Do not edit in
proprietary-sabotage.html. -->
@@ -511,10 +542,7 @@
<!--#set var="DATE" value='<small
class="date-tag">2018-06</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The game Metal Gear Rising for
- MacOS was tethered to</em></ins></span> a <span
class="removed"><del><strong>back door.</p>
-
-<ul>
- <li></strong></del></span> <span class="inserted"><ins><em>server.
The company <a
+ MacOS was tethered to a server. The company <a
href="https://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm">
shut down the server, and all copies stopped working</a>.</p>
</li>
@@ -610,9 +638,9 @@
Another</em></ins></span> article</a> says they won't forcibly
change the software, but
people won't be able to get any upgrades and eventually it will
stop <span class="removed"><del><strong>working.
- </p></strong></del></span> <span
class="inserted"><ins><em>working.</p></em></ins></span>
+ </p>
</li>
- <span class="removed"><del><strong><li>
+ <li>
<p>Revolv is an IoT device which managed “smart home”
operations: switching the lights, operate motion sensors, regulating
temperature, etc. On May 15th, 2016, Google said it would shut down the
@@ -623,9 +651,9 @@
<a href="/philosophy/network-services-arent-free-or-nonfree.html">
Service as a Software Substitute (SaaSS)</a>. That is what gave the
company the power to convert it into a $300 out-of-warranty brick, for
- your “dumb home”.</p>
+ your “dumb home”.</p></strong></del></span> <span
class="inserted"><ins><em>working.</p></em></ins></span>
</li>
- <li></strong></del></span>
+ <span class="removed"><del><strong><li></strong></del></span>
<span class="inserted"><ins><em><!-- Copied from workshop/mal.rec. Do not
edit in proprietary-sabotage.html. -->
<li id="M201706060">
@@ -707,18 +735,18 @@
<span
class="inserted"><ins><em><p><small>(The</em></ins></span> article
uses the term “lock”
to describe the DRM, but we prefer to use the term <a
<span
class="removed"><del><strong>href="https://gnu.org/philosophy/words-to-avoid.html#DigitalLocks"></strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#DigitalLocks"></em></ins></span>
digital <span class="removed"><del><strong>handcuffs</a>.</p>
+ <span
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#DigitalLocks"></em></ins></span>
digital <span
class="removed"><del><strong>handcuffs</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>handcuffs</a>.)</small></p></em></ins></span>
</li>
- <li>
+ <span class="removed"><del><strong><li>
<p>Microsoft has made Windows 7 and 8 cease to
function on certain new computers,
<a
href="https://support.microsoft.com/en-us/help/4012982/the-processor-is-not-supported-together-with-the-windows-version-that">effectively
- forcing their owners to switch to Windows
10</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>handcuffs</a>.)</small></p></em></ins></span>
+ forcing their owners to switch to Windows 10</a>.</p>
</li>
- <span class="removed"><del><strong><li>
+ <li>
<p> The</strong></del></span>
<span class="inserted"><ins><em><!-- Copied from workshop/mal.rec. Do not
edit in proprietary-sabotage.html. -->
@@ -829,10 +857,12 @@
work again, differently, and then have a freedom-respecting home
instead of a “smart” home. Don't let proprietary software
control your devices and turn</em></ins></span> them <span
class="removed"><del><strong>itself.</p></strong></del></span> <span
class="inserted"><ins><em>into $300 out-of-warranty
- bricks. Insist on self-contained computers that run free
software!</p>
+ bricks. Insist on self-contained computers that run free
software!</p></em></ins></span>
</li>
-<!-- Copied from workshop/mal.rec. Do not edit in
proprietary-sabotage.html. -->
+ <span class="removed"><del><strong><li></strong></del></span>
+
+<span class="inserted"><ins><em><!-- Copied from workshop/mal.rec. Do not
edit in proprietary-sabotage.html. -->
<li id="M201603060">
<!--#set var="DATE" value='<small
class="date-tag">2016-03</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -842,12 +872,10 @@
servers. This game was heavily reliant on the company's servers,
and because the software is proprietary, users can't modify it to
make it connect to some other server. If the game were free, people
- could still play what they purchased.</p></em></ins></span>
+ could still play what they purchased.</p>
</li>
- <span class="removed"><del><strong><li></strong></del></span>
-
-<span class="inserted"><ins><em><!-- Copied from workshop/mal.rec. Do not
edit in proprietary-sabotage.html. -->
+<!-- Copied from workshop/mal.rec. Do not edit in
proprietary-sabotage.html. -->
<li id="M201602050">
<!--#set var="DATE" value='<small
class="date-tag">2016-02</small>'
--><!--#echo encoding="none" var="DATE" --></em></ins></span>
@@ -1050,8 +1078,8 @@
<li id="M201503210">
<!--#set var="DATE" value='<small
class="date-tag">2015-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Amazon <a
-
href="https://www.techdirt.com/2015/03/24/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices/">
+ <p>Amazon</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security">The</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.techdirt.com/2015/03/24/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices/">
downgraded the software in users' Swindles</a> so that those already
rooted would cease to function at all.</p>
</li>
@@ -1094,8 +1122,8 @@
<li id="M201401190">
<!--#set var="DATE" value='<small
class="date-tag">2014-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Some proprietary</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security">The</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2014/jan/19/apple-talking-cats-in-app-purchases">
+ <p>Some proprietary <a
+
href="https://www.theguardian.com/technology/2014/jan/19/apple-talking-cats-in-app-purchases">
games lure children to spend their parents' money</a>.</p>
</li>
@@ -1285,7 +1313,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2013, <span class="removed"><del><strong>2015, 2016,
2017, 2018</strong></del></span> <span
class="inserted"><ins><em>2015-2023</em></ins></span> Free Software Foundation,
Inc.</p>
+<p>Copyright © 2013, <span class="removed"><del><strong>2015, 2016,
2017, 2018</strong></del></span> <span
class="inserted"><ins><em>2015-2024</em></ins></span> Free Software Foundation,
Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by/4.0/">Creative
@@ -1295,7 +1323,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2023/12/30 10:00:53 $
+$Date: 2024/01/03 12:03:43 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-sabotage.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.de.po,v
retrieving revision 1.175
retrieving revision 1.176
diff -u -b -r1.175 -r1.176
--- proprietary-sabotage.de.po 30 Dec 2023 10:00:53 -0000 1.175
+++ proprietary-sabotage.de.po 3 Jan 2024 12:03:43 -0000 1.176
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2023-12-30 09:55+0000\n"
+"POT-Creation-Date: 2024-01-03 11:55+0000\n"
"PO-Revision-Date: 2018-08-29 02:40+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -155,6 +155,37 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-"
+"hardware-hacking/\">Newag, a Polish railway manufacturer, puts DRM inside "
+"trains to prevent third-party repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some time. "
+"If yes, the train will be “locked up” (i.e. bricked). It was "
+"also possible to unlock it by pressing a secret combination of buttons in "
+"the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://web.archive.org/web/20231213150111/https://www.nytimes."
"com/2023/11/12/technology/iphone-repair-apple-control.html\">To block non-"
"Apple repairs, Apple encodes the iMonster serial number in the original "
@@ -1900,11 +1931,11 @@
"standards/README.translations\">LIESMICH für Ãbersetzungen</a>."
#. type: Content of: <div><p>
-# | Copyright © 2013, [-2015-] {+2015-2023+} Free Software Foundation,
+# | Copyright © 2013, [-2015-] {+2015-2024+} Free Software Foundation,
# | Inc.
#, fuzzy
#| msgid "Copyright © 2013, 2015 Free Software Foundation, Inc."
-msgid "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
+msgid "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
msgstr "Copyright © 2013-2015 Free Software Foundation, Inc."
#. type: Content of: <div><p>
Index: proprietary-sabotage.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.es.po,v
retrieving revision 1.130
retrieving revision 1.131
diff -u -b -r1.130 -r1.131
--- proprietary-sabotage.es.po 3 Jan 2024 11:55:26 -0000 1.130
+++ proprietary-sabotage.es.po 3 Jan 2024 12:03:43 -0000 1.131
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2023-12-30 09:55+0000\n"
+"POT-Creation-Date: 2024-01-03 11:55+0000\n"
"PO-Revision-Date: 2022-08-25 10:51+0200\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2024-01-03 11:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.4.2\n"
@@ -107,6 +108,37 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-"
+"hardware-hacking/\">Newag, a Polish railway manufacturer, puts DRM inside "
+"trains to prevent third-party repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some time. "
+"If yes, the train will be “locked up” (i.e. bricked). It was "
+"also possible to unlock it by pressing a secret combination of buttons in "
+"the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://web.archive.org/web/20231213150111/https://www.nytimes."
"com/2023/11/12/technology/iphone-repair-apple-control.html\">To block non-"
"Apple repairs, Apple encodes the iMonster serial number in the original "
@@ -1574,8 +1606,8 @@
"coordinación y el envÃo de traducciones de las páginas de este sitio web."
#. type: Content of: <div><p>
-msgid "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
-msgstr "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
+msgid "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
+msgstr "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
#. type: Content of: <div><p>
msgid ""
@@ -1599,9 +1631,8 @@
msgid "Updated:"
msgstr "Ãltima actualización:"
-#. type: Content of: <div><p>
-msgid "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
-msgstr "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
+#~ msgid "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
+#~ msgstr "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
#~ msgid "Copyright © 2013, 2015-2022 Free Software Foundation, Inc."
#~ msgstr "Copyright © 2013, 2015-2022 Free Software Foundation, Inc."
Index: proprietary-sabotage.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.fr.po,v
retrieving revision 1.259
retrieving revision 1.260
diff -u -b -r1.259 -r1.260
--- proprietary-sabotage.fr.po 3 Jan 2024 11:55:26 -0000 1.259
+++ proprietary-sabotage.fr.po 3 Jan 2024 12:03:43 -0000 1.260
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2023-12-30 09:55+0000\n"
+"POT-Creation-Date: 2024-01-03 11:55+0000\n"
"PO-Revision-Date: 2023-12-30 12:29+0100\n"
"Last-Translator: Félicien Pillot <felicien AT gnu.org>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2024-01-03 11:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Sabotage - GNU Project - Free Software Foundation"
@@ -103,6 +104,37 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-"
+"hardware-hacking/\">Newag, a Polish railway manufacturer, puts DRM inside "
+"trains to prevent third-party repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some time. "
+"If yes, the train will be “locked up” (i.e. bricked). It was "
+"also possible to unlock it by pressing a secret combination of buttons in "
+"the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://web.archive.org/web/20231213150111/https://www.nytimes."
"com/2023/11/12/technology/iphone-repair-apple-control.html\">To block non-"
"Apple repairs, Apple encodes the iMonster serial number in the original "
@@ -1582,8 +1614,8 @@
"traduction</a> les infos nécessaires."
#. type: Content of: <div><p>
-msgid "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
-msgstr "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
+msgid "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
+msgstr "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
#. type: Content of: <div><p>
msgid ""
@@ -1607,6 +1639,5 @@
msgid "Updated:"
msgstr "Dernière mise à jour :"
-#. type: Content of: <div><p>
-msgid "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
-msgstr "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
+#~ msgid "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
+#~ msgstr "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
Index: proprietary-sabotage.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it-diff.html,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- proprietary-sabotage.it-diff.html 30 Dec 2023 10:00:53 -0000 1.106
+++ proprietary-sabotage.it-diff.html 3 Jan 2024 12:03:43 -0000 1.107
@@ -68,10 +68,10 @@
consequences for the users. Examples of such situations</em></ins></span> are
<span class="removed"><del><strong>examples</strong></del></span> <span
class="inserted"><ins><em>listed below.</p>
<div class="important">
-<p>If you know of an example that ought to be in this page but isn't
+<p>If you know</em></ins></span> of <span
class="removed"><del><strong>proprietary</strong></del></span> <span
class="inserted"><ins><em>an example that ought to be in this page but isn't
here, please write
to <a
href="mailto:webmasters@gnu.org"><webmasters@gnu.org></a>
-to inform us. Please include the URL</em></ins></span> of <span
class="inserted"><ins><em>a trustworthy reference or two
+to inform us. Please include the URL of a trustworthy reference or two
to serve as specific substantiation.</p>
</div>
@@ -79,6 +79,35 @@
<ul class="blurbs">
<!-- Copied from workshop/mal.rec. Do not edit in
proprietary-sabotage.html. -->
+ <li id="M202312130">
+ <!--#set var="DATE" value='<small
class="date-tag">2023-12</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-hardware-hacking/">Newag,
+ a Polish railway manufacturer, puts DRM inside trains to prevent
+ third-party repairs</a>.</p>
+
+ <ul>
+ <li><p>The train's software contains code to detect if the
GPS
+ coordinates are near some third party repairers, or the train has not
+ been running for some time. If yes, the train will be “locked
+ up” (i.e. bricked). It was also possible to unlock it by
+ pressing a secret combination of buttons in the cockpit, but this
+ ability was removed by a manufacturer's</em></ins></span> software <span
class="inserted"><ins><em>update.</p></li>
+
+ <li><p>The train will also lock up after a certain date,
which is
+ hardcoded in the software.</p></li>
+
+ <li><p>The company pushes a software
update</em></ins></span> that <span class="inserted"><ins><em>detects if the
+ DRM code</em></ins></span> has <span
class="removed"><del><strong>something
+worse than</strong></del></span> <span class="inserted"><ins><em>been
bypassed, i.e. the lock should have been engaged
+ but the train is still operational. If yes, the controller cabin
+ screen will display a scary message warning about “copyright
+ violation”.</p></li>
+ </ul>
+ </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in
proprietary-sabotage.html. -->
<li id="M202311301">
<!--#set var="DATE" value='<small
class="date-tag">2023-11</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -100,7 +129,7 @@
href="https://arstechnica.com/gadgets/2023/11/chamberlain-blocks-smart-garage-door-opener-from-working-with-smart-homes/">blocks
users from using third-party software</a> with its garage
openers. This is an intentional attack on using free software. The
- official garage opener</em></ins></span> proprietary <span
class="inserted"><ins><em>mobile app is now also <a
+ official garage opener proprietary mobile app is now also <a
href="https://pluralistic.net/2023/11/09/lead-me-not-into-temptation/#chamberlain">infested
with ads, including up-selling its other services and
devices.</a></p>
</li>
@@ -147,7 +176,7 @@
<li id="M202207300">
<!--#set var="DATE" value='<small
class="date-tag">2022-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The nonfree</em></ins></span> software <span
class="inserted"><ins><em>in a Tesla artificially <a
+ <p>The nonfree software in a Tesla artificially <a
href="https://www.theguardian.com/business/2022/jul/30/will-connected-cars-persuade-drivers-to-pay-for-a-high-spec-ride">
limits the car's driving range</a>, demanding ransom to unlock the
battery's full charge.</p>
@@ -169,13 +198,12 @@
<li id="M202111201">
<!--#set var="DATE" value='<small
class="date-tag">2021-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>NordicTrack, a company</em></ins></span> that <span
class="removed"><del><strong>has something
-worse than</strong></del></span> <span class="inserted"><ins><em>sells
+ <p>NordicTrack, a company that sells
exercise machines with ability to show videos <a
href="https://arstechnica.com/information-technology/2021/11/locked-out-of-god-mode-runners-are-hacking-their-treadmills/">limits
- what people can watch, and recently disabled</em></ins></span> a <span
class="inserted"><ins><em>feature</a> that was
+ what people can watch, and recently disabled a feature</a> that was
originally functional. This happened through automatic update and
- probably involved a universal</em></ins></span> back door.</p>
+ probably involved</em></ins></span> a <span
class="inserted"><ins><em>universal</em></ins></span> back door.</p>
<span class="removed"><del><strong><ul>
<li></strong></del></span>
@@ -680,18 +708,18 @@
<span
class="inserted"><ins><em><p><small>(The</em></ins></span> article
uses the term “lock”
to describe the DRM, but we prefer to use the term <a
<span
class="removed"><del><strong>href="https://gnu.org/philosophy/words-to-avoid.html#DigitalLocks"></strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#DigitalLocks"></em></ins></span>
digital <span
class="removed"><del><strong>handcuffs</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>handcuffs</a>.)</small></p></em></ins></span>
+ <span
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#DigitalLocks"></em></ins></span>
digital <span class="removed"><del><strong>handcuffs</a>.</p>
</li>
- <span class="removed"><del><strong><li>
+ <li>
<p>Microsoft has made Windows 7 and 8 cease to
function on certain new computers,
<a
href="https://support.microsoft.com/en-us/help/4012982/discusses-an-issue-in-which-you-receive-a-your-pc-uses-a-processor-tha">effectively
- forcing their owners to switch to Windows 10</a>.</p>
+ forcing their owners to switch to Windows
10</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>handcuffs</a>.)</small></p></em></ins></span>
</li>
- <li>
+ <span class="removed"><del><strong><li>
<p> The</strong></del></span>
<span class="inserted"><ins><em><!-- Copied from workshop/mal.rec. Do not
edit in proprietary-sabotage.html. -->
@@ -802,10 +830,12 @@
work again, differently, and then have a freedom-respecting home
instead of a “smart” home. Don't let proprietary software
control your devices and turn</em></ins></span> them <span
class="removed"><del><strong>itself.</p></strong></del></span> <span
class="inserted"><ins><em>into $300 out-of-warranty
- bricks. Insist on self-contained computers that run free
software!</p>
+ bricks. Insist on self-contained computers that run free
software!</p></em></ins></span>
</li>
-<!-- Copied from workshop/mal.rec. Do not edit in
proprietary-sabotage.html. -->
+ <span class="removed"><del><strong><li></strong></del></span>
+
+<span class="inserted"><ins><em><!-- Copied from workshop/mal.rec. Do not
edit in proprietary-sabotage.html. -->
<li id="M201603060">
<!--#set var="DATE" value='<small
class="date-tag">2016-03</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -815,12 +845,10 @@
servers. This game was heavily reliant on the company's servers,
and because the software is proprietary, users can't modify it to
make it connect to some other server. If the game were free, people
- could still play what they purchased.</p></em></ins></span>
+ could still play what they purchased.</p>
</li>
- <span class="removed"><del><strong><li></strong></del></span>
-
-<span class="inserted"><ins><em><!-- Copied from workshop/mal.rec. Do not
edit in proprietary-sabotage.html. -->
+<!-- Copied from workshop/mal.rec. Do not edit in
proprietary-sabotage.html. -->
<li id="M201602050">
<!--#set var="DATE" value='<small
class="date-tag">2016-02</small>'
--><!--#echo encoding="none" var="DATE" --></em></ins></span>
@@ -1023,8 +1051,8 @@
<li id="M201503210">
<!--#set var="DATE" value='<small
class="date-tag">2015-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Amazon <a
-
href="https://www.techdirt.com/2015/03/24/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices/">
+ <p>Amazon</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security">The</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.techdirt.com/2015/03/24/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices/">
downgraded the software in users' Swindles</a> so that those already
rooted would cease to function at all.</p>
</li>
@@ -1067,8 +1095,8 @@
<li id="M201401190">
<!--#set var="DATE" value='<small
class="date-tag">2014-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Some proprietary</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security">The</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2014/jan/19/apple-talking-cats-in-app-purchases">
+ <p>Some proprietary <a
+
href="https://www.theguardian.com/technology/2014/jan/19/apple-talking-cats-in-app-purchases">
games lure children to spend their parents' money</a>.</p>
</li>
@@ -1258,7 +1286,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2013, <span class="removed"><del><strong>2015, 2016,
2017</strong></del></span> <span
class="inserted"><ins><em>2015-2023</em></ins></span> Free Software Foundation,
Inc.</p>
+<p>Copyright © 2013, <span class="removed"><del><strong>2015, 2016,
2017</strong></del></span> <span
class="inserted"><ins><em>2015-2024</em></ins></span> Free Software Foundation,
Inc.</p>
<p>This page is licensed under a <a rel="license"
<span
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/">Creative</strong></del></span>
@@ -1269,7 +1297,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2023/12/30 10:00:53 $
+$Date: 2024/01/03 12:03:43 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-sabotage.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it.po,v
retrieving revision 1.168
retrieving revision 1.169
diff -u -b -r1.168 -r1.169
--- proprietary-sabotage.it.po 30 Dec 2023 10:00:53 -0000 1.168
+++ proprietary-sabotage.it.po 3 Jan 2024 12:03:43 -0000 1.169
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2023-12-30 09:55+0000\n"
+"POT-Creation-Date: 2024-01-03 11:55+0000\n"
"PO-Revision-Date: 2017-07-06 22:45+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -144,6 +144,37 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-"
+"hardware-hacking/\">Newag, a Polish railway manufacturer, puts DRM inside "
+"trains to prevent third-party repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some time. "
+"If yes, the train will be “locked up” (i.e. bricked). It was "
+"also possible to unlock it by pressing a secret combination of buttons in "
+"the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://web.archive.org/web/20231213150111/https://www.nytimes."
"com/2023/11/12/technology/iphone-repair-apple-control.html\">To block non-"
"Apple repairs, Apple encodes the iMonster serial number in the original "
@@ -1646,11 +1677,11 @@
"traduzioni</a>."
#. type: Content of: <div><p>
-# | Copyright © 2013, [-2015, 2016-] {+2015-2023+} Free Software
+# | Copyright © 2013, [-2015, 2016-] {+2015-2024+} Free Software
# | Foundation, Inc.
#, fuzzy
#| msgid "Copyright © 2013, 2015, 2016 Free Software Foundation, Inc."
-msgid "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
+msgid "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
msgstr "Copyright © 2013, 2015, 2016 Free Software Foundation, Inc."
#. type: Content of: <div><p>
Index: proprietary-sabotage.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ja-diff.html,v
retrieving revision 1.112
retrieving revision 1.113
diff -u -b -r1.112 -r1.113
--- proprietary-sabotage.ja-diff.html 30 Dec 2023 10:00:53 -0000 1.112
+++ proprietary-sabotage.ja-diff.html 3 Jan 2024 12:03:43 -0000 1.113
@@ -68,7 +68,7 @@
consequences for the users. Examples of such situations</em></ins></span> are
<span class="removed"><del><strong>examples</strong></del></span> <span
class="inserted"><ins><em>listed below.</p>
<div class="important">
-<p>If you know of an example that ought to be in this page but isn't
+<p>If you know</em></ins></span> of <span
class="removed"><del><strong>proprietary</strong></del></span> <span
class="inserted"><ins><em>an example that ought to be in this page but isn't
here, please write
to <a
href="mailto:webmasters@gnu.org"><webmasters@gnu.org></a>
to inform us. Please include the URL of a trustworthy reference or two
@@ -79,6 +79,35 @@
<ul class="blurbs">
<!-- Copied from workshop/mal.rec. Do not edit in
proprietary-sabotage.html. -->
+ <li id="M202312130">
+ <!--#set var="DATE" value='<small
class="date-tag">2023-12</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-hardware-hacking/">Newag,
+ a Polish railway manufacturer, puts DRM inside trains to prevent
+ third-party repairs</a>.</p>
+
+ <ul>
+ <li><p>The train's software contains code to detect if the
GPS
+ coordinates are near some third party repairers, or the train has not
+ been running for some time. If yes, the train will be “locked
+ up” (i.e. bricked). It was also possible to unlock it by
+ pressing a secret combination of buttons in the cockpit, but this
+ ability was removed by a manufacturer's software
update.</p></li>
+
+ <li><p>The train will also lock up after a certain date,
which is
+ hardcoded in the software.</p></li>
+
+ <li><p>The company pushes a</em></ins></span> software <span
class="inserted"><ins><em>update</em></ins></span> that <span
class="inserted"><ins><em>detects if the
+ DRM code</em></ins></span> has <span
class="removed"><del><strong>something
+worse than</strong></del></span> <span class="inserted"><ins><em>been
bypassed, i.e. the lock should have been engaged
+ but the train is still operational. If yes, the controller cabin
+ screen will display a scary message warning about “copyright
+ violation”.</p></li>
+ </ul>
+ </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in
proprietary-sabotage.html. -->
<li id="M202311301">
<!--#set var="DATE" value='<small
class="date-tag">2023-11</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -86,7 +115,7 @@
href="https://web.archive.org/web/20231213150111/https://www.nytimes.com/2023/11/12/technology/iphone-repair-apple-control.html">To
block non-Apple repairs, Apple encodes the iMonster serial
number in the original parts</a>. This is called “parts
- pairing”. Swapping parts between working iMonsters</em></ins></span>
of <span class="inserted"><ins><em>the same
+ pairing”. Swapping parts between working iMonsters of the same
model causes malfunction or disabling of some functionalities. Part
replacement may also trigger persistent alerts, unless it is done by
an Apple store.</p>
@@ -100,7 +129,7 @@
href="https://arstechnica.com/gadgets/2023/11/chamberlain-blocks-smart-garage-door-opener-from-working-with-smart-homes/">blocks
users from using third-party software</a> with its garage
openers. This is an intentional attack on using free software. The
- official garage opener</em></ins></span> proprietary <span
class="inserted"><ins><em>mobile app is now also <a
+ official garage opener proprietary mobile app is now also <a
href="https://pluralistic.net/2023/11/09/lead-me-not-into-temptation/#chamberlain">infested
with ads, including up-selling its other services and
devices.</a></p>
</li>
@@ -147,7 +176,7 @@
<li id="M202207300">
<!--#set var="DATE" value='<small
class="date-tag">2022-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The nonfree</em></ins></span> software <span
class="inserted"><ins><em>in a Tesla artificially <a
+ <p>The nonfree software in</em></ins></span> a <span
class="inserted"><ins><em>Tesla artificially <a
href="https://www.theguardian.com/business/2022/jul/30/will-connected-cars-persuade-drivers-to-pay-for-a-high-spec-ride">
limits the car's driving range</a>, demanding ransom to unlock the
battery's full charge.</p>
@@ -169,13 +198,12 @@
<li id="M202111201">
<!--#set var="DATE" value='<small
class="date-tag">2021-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>NordicTrack, a company</em></ins></span> that <span
class="removed"><del><strong>has something
-worse than</strong></del></span> <span class="inserted"><ins><em>sells
+ <p>NordicTrack, a company that sells
exercise machines with ability to show videos <a
href="https://arstechnica.com/information-technology/2021/11/locked-out-of-god-mode-runners-are-hacking-their-treadmills/">limits
what people can watch, and recently disabled a feature</a> that was
originally functional. This happened through automatic update and
- probably involved</em></ins></span> a <span
class="inserted"><ins><em>universal</em></ins></span> back door.</p>
+ probably involved a universal</em></ins></span> back door.</p>
<span class="removed"><del><strong><ul>
<li>
@@ -282,7 +310,7 @@
<!--#set var="DATE" value='<small
class="date-tag">2020-07</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The Mellow sous-vide cooker is
- tethered to a server.</em></ins></span> The <span
class="inserted"><ins><em>company suddenly <a
+ tethered to a server. The company suddenly <a
href="https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-subscription-surprise-27630842/">
turned this tethering into a subscription</a>, forbidding users from
taking advantage of the “advanced features” of the cooker
@@ -515,7 +543,7 @@
<!--#set var="DATE" value='<small
class="date-tag">2018-06</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The game Metal Gear Rising for
- MacOS was tethered to a server. The company <a
+ MacOS was tethered to a server.</em></ins></span> The <span
class="inserted"><ins><em>company <a
href="https://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm">
shut down the server, and all copies stopped working</a>.</p>
</li>
@@ -1003,8 +1031,8 @@
<li id="M201503210">
<!--#set var="DATE" value='<small
class="date-tag">2015-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Amazon</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security">The</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.techdirt.com/2015/03/24/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices/">
+ <p>Amazon <a
+
href="https://www.techdirt.com/2015/03/24/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices/">
downgraded the software in users' Swindles</a> so that those already
rooted would cease to function at all.</p>
</li>
@@ -1013,8 +1041,8 @@
<li id="M201412040">
<!--#set var="DATE" value='<small
class="date-tag">2014-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Apple <a
-
href="https://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs">
+ <p>Apple</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security">The</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs">
deleted from iPods the music that users had got from internet music
stores that competed with iTunes</a>.</p>
</li>
@@ -1238,7 +1266,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2013, <span class="removed"><del><strong>2015,
2016</strong></del></span> <span
class="inserted"><ins><em>2015-2023</em></ins></span> Free Software Foundation,
Inc.</p>
+<p>Copyright © 2013, <span class="removed"><del><strong>2015,
2016</strong></del></span> <span
class="inserted"><ins><em>2015-2024</em></ins></span> Free Software Foundation,
Inc.</p>
<p>This page is licensed under a <a rel="license"
<span
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/">Creative</strong></del></span>
@@ -1249,7 +1277,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2023/12/30 10:00:53 $
+$Date: 2024/01/03 12:03:43 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-sabotage.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ja.po,v
retrieving revision 1.161
retrieving revision 1.162
diff -u -b -r1.161 -r1.162
--- proprietary-sabotage.ja.po 30 Dec 2023 10:00:53 -0000 1.161
+++ proprietary-sabotage.ja.po 3 Jan 2024 12:03:43 -0000 1.162
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2023-12-30 09:55+0000\n"
+"POT-Creation-Date: 2024-01-03 11:55+0000\n"
"PO-Revision-Date: 2017-01-04 10:15+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -121,6 +121,37 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-"
+"hardware-hacking/\">Newag, a Polish railway manufacturer, puts DRM inside "
+"trains to prevent third-party repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some time. "
+"If yes, the train will be “locked up” (i.e. bricked). It was "
+"also possible to unlock it by pressing a secret combination of buttons in "
+"the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://web.archive.org/web/20231213150111/https://www.nytimes."
"com/2023/11/12/technology/iphone-repair-apple-control.html\">To block non-"
"Apple repairs, Apple encodes the iMonster serial number in the original "
@@ -1368,7 +1399,7 @@
#. type: Content of: <div><p>
#, fuzzy
#| msgid "Copyright © 2014, 2015 Free Software Foundation, Inc."
-msgid "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
+msgid "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
msgstr "Copyright © 2014, 2015 Free Software Foundation, Inc."
#. type: Content of: <div><p>
Index: proprietary-sabotage.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.pot,v
retrieving revision 1.125
retrieving revision 1.126
diff -u -b -r1.125 -r1.126
--- proprietary-sabotage.pot 30 Dec 2023 10:00:53 -0000 1.125
+++ proprietary-sabotage.pot 3 Jan 2024 12:03:43 -0000 1.126
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2023-12-30 09:55+0000\n"
+"POT-Creation-Date: 2024-01-03 11:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -87,6 +87,38 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
"<a "
+"href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-hardware-hacking/\">Newag,
"
+"a Polish railway manufacturer, puts DRM inside trains to prevent third-party "
+"repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some "
+"time. If yes, the train will be “locked up” (i.e. bricked). It "
+"was also possible to unlock it by pressing a secret combination of buttons "
+"in the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"<a "
"href=\"https://web.archive.org/web/20231213150111/https://www.nytimes.com/2023/11/12/technology/iphone-repair-apple-control.html\">To
"
"block non-Apple repairs, Apple encodes the iMonster serial number in the "
"original parts</a>. This is called “parts pairing”. Swapping "
@@ -1038,7 +1070,7 @@
msgstr ""
#. type: Content of: <div><p>
-msgid "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
+msgid "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
msgstr ""
#. type: Content of: <div><p>
Index: proprietary-sabotage.pt-br-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.pt-br-diff.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary-sabotage.pt-br-diff.html 30 Dec 2023 10:00:53 -0000
1.17
+++ proprietary-sabotage.pt-br-diff.html 3 Jan 2024 12:03:43 -0000
1.18
@@ -75,6 +75,34 @@
<ul class="blurbs">
<span class="inserted"><ins><em><!-- Copied from workshop/mal.rec. Do not
edit in proprietary-sabotage.html. -->
+ <li id="M202312130">
+ <!--#set var="DATE" value='<small
class="date-tag">2023-12</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-hardware-hacking/">Newag,
+ a Polish railway manufacturer, puts DRM inside trains to prevent
+ third-party repairs</a>.</p>
+
+ <ul>
+ <li><p>The train's software contains code to detect if the
GPS
+ coordinates are near some third party repairers, or the train has not
+ been running for some time. If yes, the train will be “locked
+ up” (i.e. bricked). It was also possible to unlock it by
+ pressing a secret combination of buttons in the cockpit, but this
+ ability was removed by a manufacturer's software
update.</p></li>
+
+ <li><p>The train will also lock up after a certain date,
which is
+ hardcoded in the software.</p></li>
+
+ <li><p>The company pushes a software update that detects if
the
+ DRM code has been bypassed, i.e. the lock should have been engaged
+ but the train is still operational. If yes, the controller cabin
+ screen will display a scary message warning about “copyright
+ violation”.</p></li>
+ </ul>
+ </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in
proprietary-sabotage.html. -->
<li id="M202311301">
<!--#set var="DATE" value='<small
class="date-tag">2023-11</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -1121,7 +1149,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2013, <span
class="removed"><del><strong>2015-2021</strong></del></span> <span
class="inserted"><ins><em>2015-2023</em></ins></span> Free Software Foundation,
Inc.</p>
+<p>Copyright © 2013, <span
class="removed"><del><strong>2015-2021</strong></del></span> <span
class="inserted"><ins><em>2015-2024</em></ins></span> Free Software Foundation,
Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by/4.0/">Creative
@@ -1131,7 +1159,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2023/12/30 10:00:53 $
+$Date: 2024/01/03 12:03:43 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-sabotage.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.pt-br.po,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- proprietary-sabotage.pt-br.po 3 Jan 2024 11:55:26 -0000 1.28
+++ proprietary-sabotage.pt-br.po 3 Jan 2024 12:03:43 -0000 1.29
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2023-12-30 09:55+0000\n"
+"POT-Creation-Date: 2024-01-03 11:55+0000\n"
"PO-Revision-Date: 2021-06-26 09:40-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -102,6 +102,37 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-"
+"hardware-hacking/\">Newag, a Polish railway manufacturer, puts DRM inside "
+"trains to prevent third-party repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some time. "
+"If yes, the train will be “locked up” (i.e. bricked). It was "
+"also possible to unlock it by pressing a secret combination of buttons in "
+"the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://web.archive.org/web/20231213150111/https://www.nytimes."
"com/2023/11/12/technology/iphone-repair-apple-control.html\">To block non-"
"Apple repairs, Apple encodes the iMonster serial number in the original "
@@ -1699,8 +1730,8 @@
"contribuição com traduções das páginas deste site."
#. type: Content of: <div><p>
-msgid "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
-msgstr "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
+msgid "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
+msgstr "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
#. type: Content of: <div><p>
msgid ""
@@ -1727,9 +1758,8 @@
msgid "Updated:"
msgstr "Ãltima atualização:"
-#. type: Content of: <div><p>
-msgid "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
-msgstr "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
+#~ msgid "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
+#~ msgstr "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
#~ msgid "Copyright © 2013, 2015-2022 Free Software Foundation, Inc."
#~ msgstr "Copyright © 2013, 2015-2022 Free Software Foundation, Inc."
Index: proprietary-sabotage.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ru.po,v
retrieving revision 1.292
retrieving revision 1.293
diff -u -b -r1.292 -r1.293
--- proprietary-sabotage.ru.po 3 Jan 2024 11:55:26 -0000 1.292
+++ proprietary-sabotage.ru.po 3 Jan 2024 12:03:43 -0000 1.293
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2023-12-30 09:55+0000\n"
+"POT-Creation-Date: 2024-01-03 11:55+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2024-01-03 11:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Sabotage - GNU Project - Free Software Foundation"
@@ -104,6 +105,37 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-"
+"hardware-hacking/\">Newag, a Polish railway manufacturer, puts DRM inside "
+"trains to prevent third-party repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some time. "
+"If yes, the train will be “locked up” (i.e. bricked). It was "
+"also possible to unlock it by pressing a secret combination of buttons in "
+"the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://web.archive.org/web/20231213150111/https://www.nytimes."
"com/2023/11/12/technology/iphone-repair-apple-control.html\">To block non-"
"Apple repairs, Apple encodes the iMonster serial number in the original "
@@ -1573,8 +1605,8 @@
"translations.html\">“Ð ÑководÑÑве по
пеÑеводам”</a>."
#. type: Content of: <div><p>
-msgid "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
-msgstr "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
+msgid "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
+msgstr "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
#. type: Content of: <div><p>
msgid ""
@@ -1600,9 +1632,8 @@
msgid "Updated:"
msgstr "Ðбновлено:"
-#. type: Content of: <div><p>
-msgid "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
-msgstr "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
+#~ msgid "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
+#~ msgstr "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
#~ msgid "Copyright © 2013, 2015-2022 Free Software Foundation, Inc."
#~ msgstr "Copyright © 2013, 2015-2022 Free Software Foundation, Inc."
Index: proprietary-tethers.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.de-diff.html,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- proprietary-tethers.de-diff.html 26 Dec 2023 16:31:41 -0000 1.53
+++ proprietary-tethers.de-diff.html 3 Jan 2024 12:03:43 -0000 1.54
@@ -77,13 +77,43 @@
here, please write
to <a
href="mailto:webmasters@gnu.org"><webmasters@gnu.org></a>
to inform us. Please include the URL of a trustworthy reference or two
-to <span class="removed"><del><strong>present</strong></del></span> <span
class="inserted"><ins><em>serve as specific substantiation.</p>
+to <span class="removed"><del><strong>present the
specifics.</p></strong></del></span> <span
class="inserted"><ins><em>serve as specific substantiation.</p>
</div>
<div class="column-limit" id="proprietary-tethers"></div>
<ul class="blurbs">
<!-- Copied from workshop/mal.rec. Do not edit in proprietary-tethers.html.
-->
+ <li id="M202312130">
+ <!--#set var="DATE" value='<small
class="date-tag">2023-12</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-hardware-hacking/">Newag,
+ a Polish railway manufacturer, puts DRM inside trains to prevent
+ third-party repairs</a>.</p></em></ins></span>
+
+ <ul>
+
+<span class="removed"><del><strong><li></strong></del></span>
+ <span class="inserted"><ins><em><li><p>The train's software
contains code to detect if the GPS
+ coordinates are near some third party repairers, or the train has not
+ been running for some time. If yes, the train will be “locked
+ up” (i.e. bricked). It was also possible to unlock it by
+ pressing a secret combination of buttons in the cockpit, but this
+ ability was removed by a manufacturer's software
update.</p></li>
+
+ <li><p>The train will also lock up after a certain date,
which is
+ hardcoded in the software.</p></li>
+
+ <li><p>The company pushes a software update that detects if
the
+ DRM code has been bypassed, i.e. the lock should have been engaged
+ but the train is still operational. If yes, the controller cabin
+ screen will display a scary message warning about “copyright
+ violation”.</p></li>
+ </ul>
+ </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary-tethers.html.
-->
<li id="M202311100">
<!--#set var="DATE" value='<small
class="date-tag">2023-11</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -151,8 +181,8 @@
<!-- Copied from workshop/mal.rec. Do not edit in proprietary-tethers.html.
-->
<li id="M202201010">
<!--#set var="DATE" value='<small
class="date-tag">2022-01</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>The legacy company that made
+ --><!--#echo encoding="none" var="DATE" --></em></ins></span>
+ <p>The <span class="removed"><del><strong>game Metal Gear
Rising</strong></del></span> <span class="inserted"><ins><em>legacy company
that made
Blackberry phones is about to kill them off <a
href="https://edition.cnn.com/2022/01/01/tech/blackberry-end-of-life/index.html">by
shutting down the server they are tethered to</a>.</p>
@@ -169,19 +199,15 @@
<p>Hundreds of Tesla drivers <a
href="https://www.theguardian.com/technology/2021/nov/20/tesla-app-outage-elon-musk-apologises">were
locked out of their cars as a result of Tesla's app suffering from an
- outage</a>, which happened because the app is tethered
to</em></ins></span> the <span class="removed"><del><strong>specifics.</p>
-
-<ul>
-
-<li></strong></del></span> <span class="inserted"><ins><em>company's
+ outage</a>, which happened because the app is tethered to the
company's
servers.</p>
</li>
<!-- Copied from workshop/mal.rec. Do not edit in proprietary-tethers.html.
-->
<li id="M202007280">
<!--#set var="DATE" value='<small
class="date-tag">2020-07</small>'
- --><!--#echo encoding="none" var="DATE" --></em></ins></span>
- <p>The <span class="removed"><del><strong>game Metal Gear
Rising</strong></del></span> <span class="inserted"><ins><em>Focals eyeglass
display, with snooping
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>The Focals eyeglass display, with snooping
microphone, has been eliminated. Google eliminated
it by buying the manufacturer and shutting it down. It also <a
href="https://www.ctvnews.ca/sci-tech/canadian-smart-glasses-going-offline-weeks-after-company-bought-by-google-1.5042010">shut
@@ -211,8 +237,9 @@
<!--#set var="DATE" value='<small
class="date-tag">2020-05</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Wink sells a “smart” home hub that is tethered
- to a server. In May 2020, it ordered the purchasers to start <a
-
href="https://www.techhive.com/article/578539/wink-users-revolt-following-its-sudden-shift-to-a-subscription-model.html">
+ to a server. In May 2020, it ordered the purchasers to
start</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.techhive.com/article/578539/wink-users-revolt-following-its-sudden-shift-to-a-subscription-model.html">
paying a monthly fee for the use of that server</a>. Because of the
tethering, the hub is useless without that.</p>
</li>
@@ -221,9 +248,8 @@
<li id="M201909061">
<!--#set var="DATE" value='<small
class="date-tag">2019-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Best Buy made controllable appliances and</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-mobile-app-shutdown-november-6"></em></ins></span>
+ <p>Best Buy made controllable appliances and <a
+
href="https://www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-mobile-app-shutdown-november-6"></em></ins></span>
shut down the <span class="inserted"><ins><em>service to control them
through</a>.</p>
<p>Best Buy acknowledged that it was mistreating its customers by
@@ -271,10 +297,12 @@
to Tesco's server for reinstalling default settings. Tesco <a
href="https://www.theguardian.com/money/2019/mar/25/tesco-hudl-tablet-support-kill-fix">
turned off the server for old models</a>, so now if you try to
- reinstall the default settings, it bricks them instead.</p>
+ reinstall the default settings, it bricks them
instead.</p></em></ins></span>
</li>
-<!-- Copied from workshop/mal.rec. Do not edit in proprietary-tethers.html.
-->
+<span class="removed"><del><strong><li></strong></del></span>
+
+<span class="inserted"><ins><em><!-- Copied from workshop/mal.rec. Do not
edit in proprietary-tethers.html. -->
<li id="M201809260">
<!--#set var="DATE" value='<small
class="date-tag">2018-09</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -288,12 +316,10 @@
<p>In addition, setting the desired temperature requires running
nonfree software. With an old-fashioned thermostat, you can do it
- using controls right on the thermostat.</p></em></ins></span>
+ using controls right on the thermostat.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
-<span class="inserted"><ins><em><!-- Copied from workshop/mal.rec. Do not
edit in proprietary-tethers.html. -->
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary-tethers.html.
-->
<li id="M201807050">
<!--#set var="DATE" value='<small
class="date-tag">2018-07</small>'
--><!--#echo encoding="none" var="DATE" --></em></ins></span>
@@ -570,7 +596,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © <span class="removed"><del><strong>2016, 2017,
2018</strong></del></span> <span
class="inserted"><ins><em>2016-2023</em></ins></span> Free Software Foundation,
Inc.</p>
+<p>Copyright © <span class="removed"><del><strong>2016, 2017,
2018</strong></del></span> <span
class="inserted"><ins><em>2016-2024</em></ins></span> Free Software Foundation,
Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by/4.0/">Creative
@@ -580,7 +606,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2023/12/26 16:31:41 $
+$Date: 2024/01/03 12:03:43 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-tethers.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.de.po,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- proprietary-tethers.de.po 26 Dec 2023 16:01:42 -0000 1.59
+++ proprietary-tethers.de.po 3 Jan 2024 12:03:43 -0000 1.60
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-tethers.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2023-12-26 15:55+0000\n"
+"POT-Creation-Date: 2024-01-03 11:55+0000\n"
"PO-Revision-Date: 2018-08-29 02:39+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -173,6 +173,37 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-"
+"hardware-hacking/\">Newag, a Polish railway manufacturer, puts DRM inside "
+"trains to prevent third-party repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some time. "
+"If yes, the train will be “locked up” (i.e. bricked). It was "
+"also possible to unlock it by pressing a secret combination of buttons in "
+"the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"In Australia, people assume that “smart” means “tethered."
"” When people's ISP goes down, <a href=\"https://www.theguardian.com/"
"business/2023/nov/10/optus-went-down-and-the-smart-lights-came-on-and-then-"
@@ -812,10 +843,10 @@
"standards/README.translations\">LIESMICH für Ãbersetzungen</a>."
#. type: Content of: <div><p>
-# | Copyright © [-2016-] {+2016-2023+} Free Software Foundation, Inc.
+# | Copyright © [-2016-] {+2016-2024+} Free Software Foundation, Inc.
#, fuzzy
#| msgid "Copyright © 2016 Free Software Foundation, Inc."
-msgid "Copyright © 2016-2023 Free Software Foundation, Inc."
+msgid "Copyright © 2016-2024 Free Software Foundation, Inc."
msgstr "Copyright © 2016 Free Software Foundation, Inc."
#. type: Content of: <div><p>
Index: proprietary-tethers.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.es.po,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- proprietary-tethers.es.po 3 Jan 2024 11:55:26 -0000 1.63
+++ proprietary-tethers.es.po 3 Jan 2024 12:03:43 -0000 1.64
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2023-12-26 15:55+0000\n"
+"POT-Creation-Date: 2024-01-03 11:55+0000\n"
"PO-Revision-Date: 2022-04-06 12:20+0200\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2024-01-03 11:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
"X-Generator: Poedit 2.4.2\n"
@@ -120,6 +121,37 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-"
+"hardware-hacking/\">Newag, a Polish railway manufacturer, puts DRM inside "
+"trains to prevent third-party repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some time. "
+"If yes, the train will be “locked up” (i.e. bricked). It was "
+"also possible to unlock it by pressing a secret combination of buttons in "
+"the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"In Australia, people assume that “smart” means “tethered."
"” When people's ISP goes down, <a href=\"https://www.theguardian.com/"
"business/2023/nov/10/optus-went-down-and-the-smart-lights-came-on-and-then-"
@@ -748,8 +780,8 @@
"coordinación y el envÃo de traducciones de las páginas de este sitio web."
#. type: Content of: <div><p>
-msgid "Copyright © 2016-2023 Free Software Foundation, Inc."
-msgstr "Copyright © 2016-2023 Free Software Foundation, Inc."
+msgid "Copyright © 2016-2024 Free Software Foundation, Inc."
+msgstr "Copyright © 2016-2024 Free Software Foundation, Inc."
#. type: Content of: <div><p>
msgid ""
@@ -774,9 +806,8 @@
msgid "Updated:"
msgstr "Ãltima actualización:"
-#. type: Content of: <div><p>
-msgid "Copyright © 2016-2024 Free Software Foundation, Inc."
-msgstr "Copyright © 2016-2024 Free Software Foundation, Inc."
+#~ msgid "Copyright © 2016-2023 Free Software Foundation, Inc."
+#~ msgstr "Copyright © 2016-2023 Free Software Foundation, Inc."
#~ msgid ""
#~ "While it is laudable that Best Buy recognized it was mistreating the "
Index: proprietary-tethers.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.fr.po,v
retrieving revision 1.115
retrieving revision 1.116
diff -u -b -r1.115 -r1.116
--- proprietary-tethers.fr.po 3 Jan 2024 11:55:26 -0000 1.115
+++ proprietary-tethers.fr.po 3 Jan 2024 12:03:43 -0000 1.116
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2023-12-26 15:55+0000\n"
+"POT-Creation-Date: 2024-01-03 11:55+0000\n"
"PO-Revision-Date: 2023-12-26 17:33+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2024-01-03 11:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Tethers - GNU Project - Free Software Foundation"
@@ -114,6 +115,37 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-"
+"hardware-hacking/\">Newag, a Polish railway manufacturer, puts DRM inside "
+"trains to prevent third-party repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some time. "
+"If yes, the train will be “locked up” (i.e. bricked). It was "
+"also possible to unlock it by pressing a secret combination of buttons in "
+"the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"In Australia, people assume that “smart” means “tethered."
"” When people's ISP goes down, <a href=\"https://www.theguardian.com/"
"business/2023/nov/10/optus-went-down-and-the-smart-lights-came-on-and-then-"
@@ -738,8 +770,8 @@
"traduction</a> les infos nécessaires."
#. type: Content of: <div><p>
-msgid "Copyright © 2016-2023 Free Software Foundation, Inc."
-msgstr "Copyright © 2016-2023 Free Software Foundation, Inc."
+msgid "Copyright © 2016-2024 Free Software Foundation, Inc."
+msgstr "Copyright © 2016-2024 Free Software Foundation, Inc."
#. type: Content of: <div><p>
msgid ""
@@ -763,6 +795,5 @@
msgid "Updated:"
msgstr "Dernière mise à jour :"
-#. type: Content of: <div><p>
-msgid "Copyright © 2016-2024 Free Software Foundation, Inc."
-msgstr "Copyright © 2016-2024 Free Software Foundation, Inc."
+#~ msgid "Copyright © 2016-2023 Free Software Foundation, Inc."
+#~ msgstr "Copyright © 2016-2023 Free Software Foundation, Inc."
Index: proprietary-tethers.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.ja-diff.html,v
retrieving revision 1.71
retrieving revision 1.72
diff -u -b -r1.71 -r1.72
--- proprietary-tethers.ja-diff.html 26 Dec 2023 16:31:41 -0000 1.71
+++ proprietary-tethers.ja-diff.html 3 Jan 2024 12:03:43 -0000 1.72
@@ -84,6 +84,34 @@
<ul class="blurbs">
<!-- Copied from workshop/mal.rec. Do not edit in proprietary-tethers.html.
-->
+ <li id="M202312130">
+ <!--#set var="DATE" value='<small
class="date-tag">2023-12</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-hardware-hacking/">Newag,
+ a Polish railway manufacturer, puts DRM inside trains to prevent
+ third-party repairs</a>.</p>
+
+ <ul>
+ <li><p>The train's software contains code to detect if the
GPS
+ coordinates are near some third party repairers, or the train has not
+ been running for some time. If yes, the train will be “locked
+ up” (i.e. bricked). It was also possible to unlock it by
+ pressing a secret combination of buttons in the cockpit, but this
+ ability was removed by a manufacturer's software
update.</p></li>
+
+ <li><p>The train will also lock up after a certain date,
which is
+ hardcoded in the software.</p></li>
+
+ <li><p>The company pushes a</em></ins></span> software <span
class="inserted"><ins><em>update that detects if the
+ DRM code has been bypassed, i.e. the lock should have been engaged
+ but the train</em></ins></span> is <span class="inserted"><ins><em>still
operational. If yes, the controller cabin
+ screen will display a scary message warning about “copyright
+ violation”.</p></li>
+ </ul>
+ </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary-tethers.html.
-->
<li id="M202311100">
<!--#set var="DATE" value='<small
class="date-tag">2023-11</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -92,7 +120,7 @@
href="https://www.theguardian.com/business/2023/nov/10/optus-went-down-and-the-smart-lights-came-on-and-then-marayke-was-stranded-in-bed">
all the tethered devices become useless</a>.</p>
- <p>That's in addition to the nasty things tethered devices do when
+ <p>That's in addition to the nasty things</em></ins></span> tethered
<span class="inserted"><ins><em>devices do when
they are “functioning” normally—such as snoop on
the commands sent to the device and the results they report.</p>
@@ -108,8 +136,8 @@
home automation product in the US, is planning to soon <a
href="https://boingboing.net/2023/09/27/philips-hue-to-make-you-create-an-account-and-log-in-to-adjust-your-lightbulbs.html">
force users to log in to the app server</a> in order to be able to
- adjust a lightbulb, or use other functionalities, in what amounts to
- a massive user-tracking data grab.</p>
+ adjust a lightbulb, or use other functionalities, in what
amounts</em></ins></span> to
+ a <span class="inserted"><ins><em>massive user-tracking data
grab.</p>
</li>
<!-- Copied from workshop/mal.rec. Do not edit in proprietary-tethers.html.
-->
@@ -158,9 +186,12 @@
shutting down the server they are tethered to</a>.</p>
<p>If the software on those phones were free (as in freedom),
- people could modify their software so they could talk to some other
+ people could modify their software so they could talk to some
other</em></ins></span>
server.</p>
- </li>
+
+<span class="removed"><del><strong><ul>
+<li></strong></del></span>
+ <span class="inserted"><ins><em></li>
<!-- Copied from workshop/mal.rec. Do not edit in proprietary-tethers.html.
-->
<li id="M202111200">
@@ -224,7 +255,7 @@
<p>Best Buy acknowledged that it was mistreating its customers by
doing so, and offered reimbursement of the affected appliances. The
fact remains, however, that tethering a device to a server is a way
- of restricting and harassing users. The nonfree</em></ins></span>
software <span class="inserted"><ins><em>in the
+ of restricting and harassing users. The nonfree software in the
device is what stops users from cutting the tether.</p>
</li>
@@ -364,12 +395,9 @@
Canary camera is an example</a>.</p>
<p>The article describes wrongdoing by the manufacturer, based on
- the fact that the device</em></ins></span> is tethered to a
server.</p>
-
-<span class="removed"><del><strong><ul>
-<li></strong></del></span>
+ the fact that the device is tethered to a server.</p>
- <span class="inserted"><ins><em><p><a
href="/proprietary/proprietary-tethers.html">More about
+ <p><a href="/proprietary/proprietary-tethers.html">More about
proprietary tethering</a>.</p>
<p>But it also demonstrates that the device gives the company
@@ -552,7 +580,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © <span
class="removed"><del><strong>2016</strong></del></span> <span
class="inserted"><ins><em>2016-2023</em></ins></span> Free Software Foundation,
Inc.</p>
+<p>Copyright © <span
class="removed"><del><strong>2016</strong></del></span> <span
class="inserted"><ins><em>2016-2024</em></ins></span> Free Software Foundation,
Inc.</p>
<p>This page is licensed under a <a rel="license"
<span
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/">Creative</strong></del></span>
@@ -563,7 +591,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2023/12/26 16:31:41 $
+$Date: 2024/01/03 12:03:43 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-tethers.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.ja.po,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- proprietary-tethers.ja.po 26 Dec 2023 16:01:42 -0000 1.57
+++ proprietary-tethers.ja.po 3 Jan 2024 12:03:43 -0000 1.58
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2023-12-26 15:55+0000\n"
+"POT-Creation-Date: 2024-01-03 11:55+0000\n"
"PO-Revision-Date: 2016-11-18 13:34+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -129,6 +129,37 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-"
+"hardware-hacking/\">Newag, a Polish railway manufacturer, puts DRM inside "
+"trains to prevent third-party repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some time. "
+"If yes, the train will be “locked up” (i.e. bricked). It was "
+"also possible to unlock it by pressing a secret combination of buttons in "
+"the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"In Australia, people assume that “smart” means “tethered."
"” When people's ISP goes down, <a href=\"https://www.theguardian.com/"
"business/2023/nov/10/optus-went-down-and-the-smart-lights-came-on-and-then-"
@@ -592,7 +623,7 @@
#. type: Content of: <div><p>
#, fuzzy
#| msgid "Copyright © 2016 Free Software Foundation, Inc."
-msgid "Copyright © 2016-2023 Free Software Foundation, Inc."
+msgid "Copyright © 2016-2024 Free Software Foundation, Inc."
msgstr "Copyright © 2016 Free Software Foundation, Inc."
#. type: Content of: <div><p>
Index: proprietary-tethers.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.pot,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- proprietary-tethers.pot 26 Dec 2023 16:01:42 -0000 1.54
+++ proprietary-tethers.pot 3 Jan 2024 12:03:43 -0000 1.55
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2023-12-26 15:55+0000\n"
+"POT-Creation-Date: 2024-01-03 11:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -94,6 +94,38 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a "
+"href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-hardware-hacking/\">Newag,
"
+"a Polish railway manufacturer, puts DRM inside trains to prevent third-party "
+"repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some "
+"time. If yes, the train will be “locked up” (i.e. bricked). It "
+"was also possible to unlock it by pressing a secret combination of buttons "
+"in the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"In Australia, people assume that “smart” means "
"“tethered.” When people's ISP goes down, <a "
"href=\"https://www.theguardian.com/business/2023/nov/10/optus-went-down-and-the-smart-lights-came-on-and-then-marayke-was-stranded-in-bed\">
"
@@ -507,7 +539,7 @@
msgstr ""
#. type: Content of: <div><p>
-msgid "Copyright © 2016-2023 Free Software Foundation, Inc."
+msgid "Copyright © 2016-2024 Free Software Foundation, Inc."
msgstr ""
#. type: Content of: <div><p>
Index: proprietary-tethers.pt-br-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.pt-br-diff.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary-tethers.pt-br-diff.html 26 Dec 2023 16:31:41 -0000 1.17
+++ proprietary-tethers.pt-br-diff.html 3 Jan 2024 12:03:43 -0000 1.18
@@ -82,6 +82,34 @@
<ul class="blurbs">
<span class="inserted"><ins><em><!-- Copied from workshop/mal.rec. Do not
edit in proprietary-tethers.html. -->
+ <li id="M202312130">
+ <!--#set var="DATE" value='<small
class="date-tag">2023-12</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-hardware-hacking/">Newag,
+ a Polish railway manufacturer, puts DRM inside trains to prevent
+ third-party repairs</a>.</p>
+
+ <ul>
+ <li><p>The train's software contains code to detect if the
GPS
+ coordinates are near some third party repairers, or the train has not
+ been running for some time. If yes, the train will be “locked
+ up” (i.e. bricked). It was also possible to unlock it by
+ pressing a secret combination of buttons in the cockpit, but this
+ ability was removed by a manufacturer's software
update.</p></li>
+
+ <li><p>The train will also lock up after a certain date,
which is
+ hardcoded in the software.</p></li>
+
+ <li><p>The company pushes a software update that detects if
the
+ DRM code has been bypassed, i.e. the lock should have been engaged
+ but the train is still operational. If yes, the controller cabin
+ screen will display a scary message warning about “copyright
+ violation”.</p></li>
+ </ul>
+ </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary-tethers.html.
-->
<li id="M202311100">
<!--#set var="DATE" value='<small
class="date-tag">2023-11</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -539,7 +567,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © <span
class="removed"><del><strong>2016-2021</strong></del></span> <span
class="inserted"><ins><em>2016-2023</em></ins></span> Free Software Foundation,
Inc.</p>
+<p>Copyright © <span
class="removed"><del><strong>2016-2021</strong></del></span> <span
class="inserted"><ins><em>2016-2024</em></ins></span> Free Software Foundation,
Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by/4.0/">Creative
@@ -549,7 +577,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2023/12/26 16:31:41 $
+$Date: 2024/01/03 12:03:43 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-tethers.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.pt-br.po,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- proprietary-tethers.pt-br.po 3 Jan 2024 11:55:26 -0000 1.64
+++ proprietary-tethers.pt-br.po 3 Jan 2024 12:03:44 -0000 1.65
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2023-12-26 15:55+0000\n"
+"POT-Creation-Date: 2024-01-03 11:55+0000\n"
"PO-Revision-Date: 2021-06-26 09:39-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -114,6 +114,37 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-"
+"hardware-hacking/\">Newag, a Polish railway manufacturer, puts DRM inside "
+"trains to prevent third-party repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some time. "
+"If yes, the train will be “locked up” (i.e. bricked). It was "
+"also possible to unlock it by pressing a secret combination of buttons in "
+"the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"In Australia, people assume that “smart” means “tethered."
"” When people's ISP goes down, <a href=\"https://www.theguardian.com/"
"business/2023/nov/10/optus-went-down-and-the-smart-lights-came-on-and-then-"
@@ -735,8 +766,8 @@
"contribuição com traduções das páginas deste site."
#. type: Content of: <div><p>
-msgid "Copyright © 2016-2023 Free Software Foundation, Inc."
-msgstr "Copyright © 2016-2023 Free Software Foundation, Inc."
+msgid "Copyright © 2016-2024 Free Software Foundation, Inc."
+msgstr "Copyright © 2016-2024 Free Software Foundation, Inc."
#. type: Content of: <div><p>
msgid ""
@@ -763,9 +794,8 @@
msgid "Updated:"
msgstr "Ãltima atualização:"
-#. type: Content of: <div><p>
-msgid "Copyright © 2016-2024 Free Software Foundation, Inc."
-msgstr "Copyright © 2016-2024 Free Software Foundation, Inc."
+#~ msgid "Copyright © 2016-2023 Free Software Foundation, Inc."
+#~ msgstr "Copyright © 2016-2023 Free Software Foundation, Inc."
#~ msgid ""
#~ "While it is laudable that Best Buy recognized it was mistreating the "
Index: proprietary-tethers.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.ru.po,v
retrieving revision 1.117
retrieving revision 1.118
diff -u -b -r1.117 -r1.118
--- proprietary-tethers.ru.po 3 Jan 2024 11:55:26 -0000 1.117
+++ proprietary-tethers.ru.po 3 Jan 2024 12:03:44 -0000 1.118
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2023-12-26 15:55+0000\n"
+"POT-Creation-Date: 2024-01-03 11:55+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2024-01-03 11:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Tethers - GNU Project - Free Software Foundation"
@@ -116,6 +117,37 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-"
+"hardware-hacking/\">Newag, a Polish railway manufacturer, puts DRM inside "
+"trains to prevent third-party repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some time. "
+"If yes, the train will be “locked up” (i.e. bricked). It was "
+"also possible to unlock it by pressing a secret combination of buttons in "
+"the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"In Australia, people assume that “smart” means “tethered."
"” When people's ISP goes down, <a href=\"https://www.theguardian.com/"
"business/2023/nov/10/optus-went-down-and-the-smart-lights-came-on-and-then-"
@@ -735,8 +767,8 @@
"translations.html\">“Ð ÑководÑÑве по
пеÑеводам”</a>."
#. type: Content of: <div><p>
-msgid "Copyright © 2016-2023 Free Software Foundation, Inc."
-msgstr "Copyright © 2016-2023 Free Software Foundation, Inc."
+msgid "Copyright © 2016-2024 Free Software Foundation, Inc."
+msgstr "Copyright © 2016-2024 Free Software Foundation, Inc."
#. type: Content of: <div><p>
msgid ""
@@ -762,9 +794,8 @@
msgid "Updated:"
msgstr "Ðбновлено:"
-#. type: Content of: <div><p>
-msgid "Copyright © 2016-2024 Free Software Foundation, Inc."
-msgstr "Copyright © 2016-2024 Free Software Foundation, Inc."
+#~ msgid "Copyright © 2016-2023 Free Software Foundation, Inc."
+#~ msgstr "Copyright © 2016-2023 Free Software Foundation, Inc."
#~ msgid ""
#~ "While it is laudable that Best Buy recognized it was mistreating the "
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.722
retrieving revision 1.723
diff -u -b -r1.722 -r1.723
--- proprietary.es.po 3 Jan 2024 10:31:24 -0000 1.722
+++ proprietary.es.po 3 Jan 2024 12:03:44 -0000 1.723
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2024-01-03 10:25+0000\n"
+"POT-Creation-Date: 2024-01-03 11:55+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Dora Scilipoti <dora AT gnu DOT org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -430,6 +430,47 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.bleepingcomputer.com/news/security/logofail-attack-can-"
+"install-uefi-bootkits-through-bootup-logos/\">x86 and ARM based computers "
+"shipped with UEFI are potentially vulnerable to a design omission called "
+"LogoFAIL</a>. A cracker can replace the BIOS logo with a fake one that "
+"contains malicious code. Users can't fix this omission because it is in the "
+"nonfree UEFI firmware that users can't replace."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-"
+"hardware-hacking/\">Newag, a Polish railway manufacturer, puts DRM inside "
+"trains to prevent third-party repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some time. "
+"If yes, the train will be “locked up” (i.e. bricked). It was "
+"also possible to unlock it by pressing a secret combination of buttons in "
+"the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent autos offer a feature by which the drivers can connect their snoop-"
"phones to the car. That feature <a href=\"https://therecord.media/class-"
"action-lawsuit-cars-text-messages-privacy\"> snoops on the calls and texts</"
@@ -476,48 +517,6 @@
"de los vÃdeos en la «nube», una forma de referirse al ordenador de alguien
"
"diferente del usuario."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://web.archive.org/web/20231213150111/https://www.nytimes."
-"com/2023/11/12/technology/iphone-repair-apple-control.html\">To block non-"
-"Apple repairs, Apple encodes the iMonster serial number in the original "
-"parts</a>. This is called “parts pairing”. Swapping parts "
-"between working iMonsters of the same model causes malfunction or disabling "
-"of some functionalities. Part replacement may also trigger persistent "
-"alerts, unless it is done by an Apple store."
-msgstr ""
-"<a href=\"https://web.archive.org/web/20231213150111/https://www.nytimes."
-"com/2023/11/12/technology/iphone-repair-apple-control.html\">Para impedir "
-"que nadie que no sea la propia Apple repare sus aparatos, Apple codifica el "
-"número de serie de los iMonstruos en las piezas originales</a>. A esto se lo
"
-"denomina <cite>parts pairing</cite> (vinculación de piezas). El intercambio "
-"de piezas entre iMonstruos del mismo modelo provoca fallos o la pérdida de "
-"algunas funcionalidades. La sustitución de piezas también puede provocar "
-"alertas persistentes, a menos que haya sido realizada en un taller de Apple."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://web.archive.org/web/20231011121908/https://www.makeuseof."
-"com/how-to-remove-ads-on-samsung/\">Samsung's Push Service proprietary app</"
-"a> sends notifications to the user's phone about “updates” in "
-"Samsung apps, including the Gaming Hub, but these updates only sometimes "
-"have to do with a new version of the apps. Many times, the notifications "
-"from Gaming Hub are simply ads for games that they think the user should "
-"install based on the data collected from the user. Most importantly, <a href="
-"\"https://getfastanswer.com/3486/how-to-remove-samsung-push-service-on-a-"
-"smartphone\">it cannot be permanently disabled.</a>"
-msgstr ""
-"<a href=\"https://web.archive.org/web/20231011121908/https://www.makeuseof."
-"com/how-to-remove-ads-on-samsung/\">El servicio Push de Samsung, una "
-"aplicación privativa</a>, envÃa al usuario del teléfono notificaciones "
-"acerca de «actualizaciones» de aplicaciones Samsung, incluida la plataforma
"
-"Gaming Hub, pero solo en ocasiones estas actualizaciones corresponden a una "
-"nueva versión de la aplicación. A menudo las notificaciones de Gaming Hub "
-"son simplemente anuncios de juegos que, basándose en los datos recopilados "
-"del usuario, piensan que este podrÃa instalar. Y, lo que es más importante,
"
-"<a href=\"https://getfastanswer.com/3486/how-to-remove-samsung-push-service-"
-"on-a-smartphone\">no pueden deshabilitarse permanentemente.</a>"
-
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr "<a href=\"/proprietary/all.html\">Ver más…</a>"
@@ -593,6 +592,49 @@
msgstr "Ãltima actualización:"
#~ msgid ""
+#~ "<a href=\"https://web.archive.org/web/20231213150111/https://www.nytimes."
+#~ "com/2023/11/12/technology/iphone-repair-apple-control.html\">To block non-"
+#~ "Apple repairs, Apple encodes the iMonster serial number in the original "
+#~ "parts</a>. This is called “parts pairing”. Swapping parts "
+#~ "between working iMonsters of the same model causes malfunction or "
+#~ "disabling of some functionalities. Part replacement may also trigger "
+#~ "persistent alerts, unless it is done by an Apple store."
+#~ msgstr ""
+#~ "<a href=\"https://web.archive.org/web/20231213150111/https://www.nytimes."
+#~ "com/2023/11/12/technology/iphone-repair-apple-control.html\">Para impedir "
+#~ "que nadie que no sea la propia Apple repare sus aparatos, Apple codifica "
+#~ "el número de serie de los iMonstruos en las piezas originales</a>. A esto
"
+#~ "se lo denomina <cite>parts pairing</cite> (vinculación de piezas). El "
+#~ "intercambio de piezas entre iMonstruos del mismo modelo provoca fallos o "
+#~ "la pérdida de algunas funcionalidades. La sustitución de piezas también
"
+#~ "puede provocar alertas persistentes, a menos que haya sido realizada en "
+#~ "un taller de Apple."
+
+#~ msgid ""
+#~ "<a href=\"https://web.archive.org/web/20231011121908/https://www."
+#~ "makeuseof.com/how-to-remove-ads-on-samsung/\">Samsung's Push Service "
+#~ "proprietary app</a> sends notifications to the user's phone about “"
+#~ "updates” in Samsung apps, including the Gaming Hub, but these "
+#~ "updates only sometimes have to do with a new version of the apps. Many "
+#~ "times, the notifications from Gaming Hub are simply ads for games that "
+#~ "they think the user should install based on the data collected from the "
+#~ "user. Most importantly, <a href=\"https://getfastanswer.com/3486/how-to-"
+#~ "remove-samsung-push-service-on-a-smartphone\">it cannot be permanently "
+#~ "disabled.</a>"
+#~ msgstr ""
+#~ "<a href=\"https://web.archive.org/web/20231011121908/https://www."
+#~ "makeuseof.com/how-to-remove-ads-on-samsung/\">El servicio Push de "
+#~ "Samsung, una aplicación privativa</a>, envÃa al usuario del teléfono "
+#~ "notificaciones acerca de «actualizaciones» de aplicaciones Samsung, "
+#~ "incluida la plataforma Gaming Hub, pero solo en ocasiones estas "
+#~ "actualizaciones corresponden a una nueva versión de la aplicación. A "
+#~ "menudo las notificaciones de Gaming Hub son simplemente anuncios de "
+#~ "juegos que, basándose en los datos recopilados del usuario, piensan que "
+#~ "este podrÃa instalar. Y, lo que es más importante, <a href=\"https://"
+#~ "getfastanswer.com/3486/how-to-remove-samsung-push-service-on-a-smartphone"
+#~ "\">no pueden deshabilitarse permanentemente.</a>"
+
+#~ msgid ""
#~ "Chamberlain Group <a href=\"https://arstechnica.com/gadgets/2023/11/"
#~ "chamberlain-blocks-smart-garage-door-opener-from-working-with-smart-homes/"
#~ "\">blocks users from using third-party software</a> with its garage "
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.721
retrieving revision 1.722
diff -u -b -r1.721 -r1.722
--- proprietary.fr.po 3 Jan 2024 10:51:45 -0000 1.721
+++ proprietary.fr.po 3 Jan 2024 12:03:44 -0000 1.722
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2024-01-03 10:25+0000\n"
+"POT-Creation-Date: 2024-01-03 11:55+0000\n"
"PO-Revision-Date: 2024-01-03 11:46+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2024-01-03 11:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -421,6 +422,47 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.bleepingcomputer.com/news/security/logofail-attack-can-"
+"install-uefi-bootkits-through-bootup-logos/\">x86 and ARM based computers "
+"shipped with UEFI are potentially vulnerable to a design omission called "
+"LogoFAIL</a>. A cracker can replace the BIOS logo with a fake one that "
+"contains malicious code. Users can't fix this omission because it is in the "
+"nonfree UEFI firmware that users can't replace."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-"
+"hardware-hacking/\">Newag, a Polish railway manufacturer, puts DRM inside "
+"trains to prevent third-party repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some time. "
+"If yes, the train will be “locked up” (i.e. bricked). It was "
+"also possible to unlock it by pressing a secret combination of buttons in "
+"the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent autos offer a feature by which the drivers can connect their snoop-"
"phones to the car. That feature <a href=\"https://therecord.media/class-"
"action-lawsuit-cars-text-messages-privacy\"> snoops on the calls and texts</"
@@ -473,50 +515,6 @@
"services, en particulier le stockage des vidéos dans le
<i>«â¯cloudâ¯Â»</i> "
"(autre façon de désigner le serveur de quelqu'un d'autre)."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://web.archive.org/web/20231213150111/https://www.nytimes."
-"com/2023/11/12/technology/iphone-repair-apple-control.html\">To block non-"
-"Apple repairs, Apple encodes the iMonster serial number in the original "
-"parts</a>. This is called “parts pairing”. Swapping parts "
-"between working iMonsters of the same model causes malfunction or disabling "
-"of some functionalities. Part replacement may also trigger persistent "
-"alerts, unless it is done by an Apple store."
-msgstr ""
-"Pour interdire la réparation dde matériel Apple par des tiers, <a href="
-"\"https://web.archive.org/web/20231213150111/https://www.nytimes."
-"com/2023/11/12/technology/iphone-repair-apple-control.html\">Apple code le "
-"numéro de série des iMonstres dans les composants d'origine</a>. C'est ce "
-"qu'on appelle <i>parts pairing</i> (appariement des pièces). L'échange de "
-"pièces entre iMonstres du même modèle en état de marche cause des pannes
et "
-"désactive certaines fonctionnalités. Le remplacement de pièces peut aussi "
-"déclencher des alertes persistantes à moins qu'il ne soit effectué par un "
-"atelier agréé par Apple."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://web.archive.org/web/20231011121908/https://www.makeuseof."
-"com/how-to-remove-ads-on-samsung/\">Samsung's Push Service proprietary app</"
-"a> sends notifications to the user's phone about “updates” in "
-"Samsung apps, including the Gaming Hub, but these updates only sometimes "
-"have to do with a new version of the apps. Many times, the notifications "
-"from Gaming Hub are simply ads for games that they think the user should "
-"install based on the data collected from the user. Most importantly, <a href="
-"\"https://getfastanswer.com/3486/how-to-remove-samsung-push-service-on-a-"
-"smartphone\">it cannot be permanently disabled.</a>"
-msgstr ""
-"<a href=\"https://web.archive.org/web/20231011121908/https://www.makeuseof."
-"com/how-to-remove-ads-on-samsung/\">L'appli privatrice <i>Push Service</i> "
-"de Samsung</a> envoie des notifications sur le téléphone de l'utilisateur "
-"concernant les mises à jour d'applis Samsung, en particulier le <i>Gaming "
-"Hub</i>, mais il s'agit rarement de changement de version. Souvent, les "
-"notifications du <i>Gaming Hub</i> sont simplement des pubs pour des jeux "
-"qu'ils pensent susceptibles d'être installés par les utilisateurs, d'après
"
-"les données collectées. Mais le plus important, c'est que <a
href=\"https://"
-"getfastanswer.com/3486/how-to-remove-samsung-push-service-on-a-smartphone"
-"\">ces notifications ne peuvent pas être désactivées de manière
permanente</"
-"a>."
-
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr "<a href=\"/proprietary/all.html\">Voir plus…</a>"
@@ -589,3 +587,46 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "<a href=\"https://web.archive.org/web/20231213150111/https://www.nytimes."
+#~ "com/2023/11/12/technology/iphone-repair-apple-control.html\">To block non-"
+#~ "Apple repairs, Apple encodes the iMonster serial number in the original "
+#~ "parts</a>. This is called “parts pairing”. Swapping parts "
+#~ "between working iMonsters of the same model causes malfunction or "
+#~ "disabling of some functionalities. Part replacement may also trigger "
+#~ "persistent alerts, unless it is done by an Apple store."
+#~ msgstr ""
+#~ "Pour interdire la réparation dde matériel Apple par des tiers, <a href="
+#~ "\"https://web.archive.org/web/20231213150111/https://www.nytimes."
+#~ "com/2023/11/12/technology/iphone-repair-apple-control.html\">Apple code "
+#~ "le numéro de série des iMonstres dans les composants d'origine</a>.
C'est "
+#~ "ce qu'on appelle <i>parts pairing</i> (appariement des pièces).
L'échange "
+#~ "de pièces entre iMonstres du même modèle en état de marche cause des "
+#~ "pannes et désactive certaines fonctionnalités. Le remplacement de
pièces "
+#~ "peut aussi déclencher des alertes persistantes à moins qu'il ne soit "
+#~ "effectué par un atelier agréé par Apple."
+
+#~ msgid ""
+#~ "<a href=\"https://web.archive.org/web/20231011121908/https://www."
+#~ "makeuseof.com/how-to-remove-ads-on-samsung/\">Samsung's Push Service "
+#~ "proprietary app</a> sends notifications to the user's phone about “"
+#~ "updates” in Samsung apps, including the Gaming Hub, but these "
+#~ "updates only sometimes have to do with a new version of the apps. Many "
+#~ "times, the notifications from Gaming Hub are simply ads for games that "
+#~ "they think the user should install based on the data collected from the "
+#~ "user. Most importantly, <a href=\"https://getfastanswer.com/3486/how-to-"
+#~ "remove-samsung-push-service-on-a-smartphone\">it cannot be permanently "
+#~ "disabled.</a>"
+#~ msgstr ""
+#~ "<a href=\"https://web.archive.org/web/20231011121908/https://www."
+#~ "makeuseof.com/how-to-remove-ads-on-samsung/\">L'appli privatrice <i>Push "
+#~ "Service</i> de Samsung</a> envoie des notifications sur le téléphone de "
+#~ "l'utilisateur concernant les mises à jour d'applis Samsung, en "
+#~ "particulier le <i>Gaming Hub</i>, mais il s'agit rarement de changement "
+#~ "de version. Souvent, les notifications du <i>Gaming Hub</i> sont "
+#~ "simplement des pubs pour des jeux qu'ils pensent susceptibles d'être "
+#~ "installés par les utilisateurs, d'après les données collectées. Mais
le "
+#~ "plus important, c'est que <a href=\"https://getfastanswer.com/3486/how-to-"
+#~ "remove-samsung-push-service-on-a-smartphone\">ces notifications ne "
+#~ "peuvent pas être désactivées de manière permanente</a>."
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.407
retrieving revision 1.408
diff -u -b -r1.407 -r1.408
--- proprietary.it-diff.html 3 Jan 2024 10:31:24 -0000 1.407
+++ proprietary.it-diff.html 3 Jan 2024 12:03:44 -0000 1.408
@@ -28,10 +28,10 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%; width: max-content;
overflow: auto;
border: .2em solid #e0dfda;
@@ -58,15 +58,15 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
- #skiplinks a, #skiplinks a:visited</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span>
- <span class="inserted"><ins><em>color: #004caa;
- text-decoration: none;</em></ins></span>
+ #skiplinks a, #skiplinks a:visited {
+ color: #004caa;
+ text-decoration: none;
}
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC a { text-decoration: none; }
+#TOC a { text-decoration: none; }
#TOC a:hover { text-decoration: underline; }
-->
</style>
@@ -263,6 +263,47 @@
<ul class="blurbs">
<!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. -->
+ <li id="M202312131">
+ <!--#set var="DATE" value='<small
class="date-tag">2023-12</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.bleepingcomputer.com/news/security/logofail-attack-can-install-uefi-bootkits-through-bootup-logos/">x86
+ and ARM based computers shipped with UEFI are potentially vulnerable
+ to a design omission called LogoFAIL</a>. A cracker can replace the
+ BIOS logo with a fake one that contains malicious code. Users can't
+ fix this omission because it is in the nonfree UEFI firmware that
+ users can't replace.</p>
+ </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. -->
+ <li id="M202312130">
+ <!--#set var="DATE" value='<small
class="date-tag">2023-12</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-hardware-hacking/">Newag,
+ a Polish railway manufacturer, puts DRM inside trains to prevent
+ third-party repairs</a>.</p>
+
+ <ul>
+ <li><p>The train's software contains code to detect if the
GPS
+ coordinates are near some third party repairers, or the train has not
+ been running for some time. If yes, the train will be “locked
+ up” (i.e. bricked). It was also possible to unlock it by
+ pressing a secret combination of buttons in the cockpit, but this
+ ability was removed by a manufacturer's software
update.</p></li>
+
+ <li><p>The train will also lock up after a certain date,
which is
+ hardcoded in the software.</p></li>
+
+ <li><p>The company pushes a software update that detects if
the
+ DRM code has been bypassed, i.e. the lock should have been engaged
+ but the train is still operational. If yes, the controller cabin
+ screen will display a scary message warning about “copyright
+ violation”.</p></li>
+ </ul>
+ </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. -->
<li id="M202311080">
<!--#set var="DATE" value='<small
class="date-tag">2023-11</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -302,36 +343,6 @@
videos in the “cloud”—another word for someone
else's computer.</p>
</li>
-
-<!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. -->
- <li id="M202311301">
- <!--#set var="DATE" value='<small
class="date-tag">2023-11</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
-
href="https://web.archive.org/web/20231213150111/https://www.nytimes.com/2023/11/12/technology/iphone-repair-apple-control.html">To
- block non-Apple repairs, Apple encodes the iMonster serial
- number in the original parts</a>. This is called “parts
- pairing”. Swapping parts between working iMonsters of the same
- model causes malfunction or disabling of some functionalities. Part
- replacement may also trigger persistent alerts, unless it is done by
- an Apple store.</p>
- </li>
-
-<!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. -->
- <li id="M202311300">
- <!--#set var="DATE" value='<small
class="date-tag">2023-11</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
-
href="https://web.archive.org/web/20231011121908/https://www.makeuseof.com/how-to-remove-ads-on-samsung/">Samsung's
- Push Service proprietary app</a> sends notifications to the user's
- phone about “updates” in Samsung apps, including the
- Gaming Hub, but these updates only sometimes have to do with
- a new version of the apps. Many times, the notifications from
- Gaming Hub are simply ads for games that they think the user should
- install based on the data collected from the user. Most importantly, <a
-
href="https://getfastanswer.com/3486/how-to-remove-samsung-push-service-on-a-smartphone">it
- cannot be permanently disabled.</a></p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -395,7 +406,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2024/01/03 10:31:24 $
+$Date: 2024/01/03 12:03:44 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.419
retrieving revision 1.420
diff -u -b -r1.419 -r1.420
--- proprietary.it.po 3 Jan 2024 10:31:24 -0000 1.419
+++ proprietary.it.po 3 Jan 2024 12:03:44 -0000 1.420
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2024-01-03 10:25+0000\n"
+"POT-Creation-Date: 2024-01-03 11:55+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -576,6 +576,47 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.bleepingcomputer.com/news/security/logofail-attack-can-"
+"install-uefi-bootkits-through-bootup-logos/\">x86 and ARM based computers "
+"shipped with UEFI are potentially vulnerable to a design omission called "
+"LogoFAIL</a>. A cracker can replace the BIOS logo with a fake one that "
+"contains malicious code. Users can't fix this omission because it is in the "
+"nonfree UEFI firmware that users can't replace."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-"
+"hardware-hacking/\">Newag, a Polish railway manufacturer, puts DRM inside "
+"trains to prevent third-party repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some time. "
+"If yes, the train will be “locked up” (i.e. bricked). It was "
+"also possible to unlock it by pressing a secret combination of buttons in "
+"the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent autos offer a feature by which the drivers can connect their snoop-"
"phones to the car. That feature <a href=\"https://therecord.media/class-"
"action-lawsuit-cars-text-messages-privacy\"> snoops on the calls and texts</"
@@ -608,30 +649,6 @@
"another word for someone else's computer."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://web.archive.org/web/20231213150111/https://www.nytimes."
-"com/2023/11/12/technology/iphone-repair-apple-control.html\">To block non-"
-"Apple repairs, Apple encodes the iMonster serial number in the original "
-"parts</a>. This is called “parts pairing”. Swapping parts "
-"between working iMonsters of the same model causes malfunction or disabling "
-"of some functionalities. Part replacement may also trigger persistent "
-"alerts, unless it is done by an Apple store."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://web.archive.org/web/20231011121908/https://www.makeuseof."
-"com/how-to-remove-ads-on-samsung/\">Samsung's Push Service proprietary app</"
-"a> sends notifications to the user's phone about “updates” in "
-"Samsung apps, including the Gaming Hub, but these updates only sometimes "
-"have to do with a new version of the apps. Many times, the notifications "
-"from Gaming Hub are simply ads for games that they think the user should "
-"install based on the data collected from the user. Most importantly, <a href="
-"\"https://getfastanswer.com/3486/how-to-remove-samsung-push-service-on-a-"
-"smartphone\">it cannot be permanently disabled.</a>"
-msgstr ""
-
#. type: Content of: <div><p>
# | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
# | devices</a>-] {+href=\"/proprietary/all.html\">More items…</a>+}
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.412
retrieving revision 1.413
diff -u -b -r1.412 -r1.413
--- proprietary.ja-diff.html 3 Jan 2024 10:31:24 -0000 1.412
+++ proprietary.ja-diff.html 3 Jan 2024 12:03:44 -0000 1.413
@@ -210,10 +210,10 @@
<li><a
href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
- <ul>
- <li><a
href="/proprietary/malware-adobe.html">Adobe</a></li>
- <li><a
href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li>
+ <ul></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li>
+ <li><a
href="/proprietary/malware-amazon.html">Amazon</a></li>
+ <li><a
href="/proprietary/malware-apple.html">Apple</a></li>
<li><a
href="/proprietary/malware-google.html">Google</a></li>
<li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
@@ -236,10 +236,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -268,6 +268,47 @@
<ul class="blurbs">
<!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. -->
+ <li id="M202312131">
+ <!--#set var="DATE" value='<small
class="date-tag">2023-12</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.bleepingcomputer.com/news/security/logofail-attack-can-install-uefi-bootkits-through-bootup-logos/">x86
+ and ARM based computers shipped with UEFI are potentially vulnerable
+ to a design omission called LogoFAIL</a>. A cracker can replace the
+ BIOS logo with a fake one that contains malicious code. Users can't
+ fix this omission because it is in the nonfree UEFI firmware that
+ users can't replace.</p>
+ </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. -->
+ <li id="M202312130">
+ <!--#set var="DATE" value='<small
class="date-tag">2023-12</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-hardware-hacking/">Newag,
+ a Polish railway manufacturer, puts DRM inside trains to prevent
+ third-party repairs</a>.</p>
+
+ <ul>
+ <li><p>The train's software contains code to detect if the
GPS
+ coordinates are near some third party repairers, or the train has not
+ been running for some time. If yes, the train will be “locked
+ up” (i.e. bricked). It was also possible to unlock it by
+ pressing a secret combination of buttons in the cockpit, but this
+ ability was removed by a manufacturer's software
update.</p></li>
+
+ <li><p>The train will also lock up after a certain date,
which is
+ hardcoded in the software.</p></li>
+
+ <li><p>The company pushes a software update that detects if
the
+ DRM code has been bypassed, i.e. the lock should have been engaged
+ but the train is still operational. If yes, the controller cabin
+ screen will display a scary message warning about “copyright
+ violation”.</p></li>
+ </ul>
+ </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. -->
<li id="M202311080">
<!--#set var="DATE" value='<small
class="date-tag">2023-11</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -307,36 +348,6 @@
videos in the “cloud”—another word for someone
else's computer.</p>
</li>
-
-<!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. -->
- <li id="M202311301">
- <!--#set var="DATE" value='<small
class="date-tag">2023-11</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
-
href="https://web.archive.org/web/20231213150111/https://www.nytimes.com/2023/11/12/technology/iphone-repair-apple-control.html">To
- block non-Apple repairs, Apple encodes the iMonster serial
- number in the original parts</a>. This is called “parts
- pairing”. Swapping parts between working iMonsters of the same
- model causes malfunction or disabling of some functionalities. Part
- replacement may also trigger persistent alerts, unless it is done by
- an Apple store.</p>
- </li>
-
-<!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. -->
- <li id="M202311300">
- <!--#set var="DATE" value='<small
class="date-tag">2023-11</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
-
href="https://web.archive.org/web/20231011121908/https://www.makeuseof.com/how-to-remove-ads-on-samsung/">Samsung's
- Push Service proprietary app</a> sends notifications to the user's
- phone about “updates” in Samsung apps, including the
- Gaming Hub, but these updates only sometimes have to do with
- a new version of the apps. Many times, the notifications from
- Gaming Hub are simply ads for games that they think the user should
- install based on the data collected from the user. Most importantly, <a
-
href="https://getfastanswer.com/3486/how-to-remove-samsung-push-service-on-a-smartphone">it
- cannot be permanently disabled.</a></p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -400,7 +411,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2024/01/03 10:31:24 $
+$Date: 2024/01/03 12:03:44 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.402
retrieving revision 1.403
diff -u -b -r1.402 -r1.403
--- proprietary.ja.po 3 Jan 2024 10:31:24 -0000 1.402
+++ proprietary.ja.po 3 Jan 2024 12:03:44 -0000 1.403
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2024-01-03 10:25+0000\n"
+"POT-Creation-Date: 2024-01-03 11:55+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -418,6 +418,47 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.bleepingcomputer.com/news/security/logofail-attack-can-"
+"install-uefi-bootkits-through-bootup-logos/\">x86 and ARM based computers "
+"shipped with UEFI are potentially vulnerable to a design omission called "
+"LogoFAIL</a>. A cracker can replace the BIOS logo with a fake one that "
+"contains malicious code. Users can't fix this omission because it is in the "
+"nonfree UEFI firmware that users can't replace."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-"
+"hardware-hacking/\">Newag, a Polish railway manufacturer, puts DRM inside "
+"trains to prevent third-party repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some time. "
+"If yes, the train will be “locked up” (i.e. bricked). It was "
+"also possible to unlock it by pressing a secret combination of buttons in "
+"the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent autos offer a feature by which the drivers can connect their snoop-"
"phones to the car. That feature <a href=\"https://therecord.media/class-"
"action-lawsuit-cars-text-messages-privacy\"> snoops on the calls and texts</"
@@ -450,30 +491,6 @@
"another word for someone else's computer."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://web.archive.org/web/20231213150111/https://www.nytimes."
-"com/2023/11/12/technology/iphone-repair-apple-control.html\">To block non-"
-"Apple repairs, Apple encodes the iMonster serial number in the original "
-"parts</a>. This is called “parts pairing”. Swapping parts "
-"between working iMonsters of the same model causes malfunction or disabling "
-"of some functionalities. Part replacement may also trigger persistent "
-"alerts, unless it is done by an Apple store."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://web.archive.org/web/20231011121908/https://www.makeuseof."
-"com/how-to-remove-ads-on-samsung/\">Samsung's Push Service proprietary app</"
-"a> sends notifications to the user's phone about “updates” in "
-"Samsung apps, including the Gaming Hub, but these updates only sometimes "
-"have to do with a new version of the apps. Many times, the notifications "
-"from Gaming Hub are simply ads for games that they think the user should "
-"install based on the data collected from the user. Most importantly, <a href="
-"\"https://getfastanswer.com/3486/how-to-remove-samsung-push-service-on-a-"
-"smartphone\">it cannot be permanently disabled.</a>"
-msgstr ""
-
#. type: Content of: <div><p>
#, fuzzy
#| msgid "<a href=\"/proprietary/malware-mobiles.html\">Mobiles</a>"
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.408
retrieving revision 1.409
diff -u -b -r1.408 -r1.409
--- proprietary.nl-diff.html 3 Jan 2024 10:31:24 -0000 1.408
+++ proprietary.nl-diff.html 3 Jan 2024 12:03:44 -0000 1.409
@@ -28,10 +28,10 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%; width: max-content;
overflow: auto;
border: .2em solid #e0dfda;
@@ -58,15 +58,15 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
- #skiplinks a, #skiplinks a:visited</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span>
- <span class="inserted"><ins><em>color: #004caa;
- text-decoration: none;</em></ins></span>
+ #skiplinks a, #skiplinks a:visited {
+ color: #004caa;
+ text-decoration: none;
}
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC a { text-decoration: none; }
+#TOC a { text-decoration: none; }
#TOC a:hover { text-decoration: underline; }
-->
</style>
@@ -263,6 +263,47 @@
<ul class="blurbs">
<!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. -->
+ <li id="M202312131">
+ <!--#set var="DATE" value='<small
class="date-tag">2023-12</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.bleepingcomputer.com/news/security/logofail-attack-can-install-uefi-bootkits-through-bootup-logos/">x86
+ and ARM based computers shipped with UEFI are potentially vulnerable
+ to a design omission called LogoFAIL</a>. A cracker can replace the
+ BIOS logo with a fake one that contains malicious code. Users can't
+ fix this omission because it is in the nonfree UEFI firmware that
+ users can't replace.</p>
+ </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. -->
+ <li id="M202312130">
+ <!--#set var="DATE" value='<small
class="date-tag">2023-12</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-hardware-hacking/">Newag,
+ a Polish railway manufacturer, puts DRM inside trains to prevent
+ third-party repairs</a>.</p>
+
+ <ul>
+ <li><p>The train's software contains code to detect if the
GPS
+ coordinates are near some third party repairers, or the train has not
+ been running for some time. If yes, the train will be “locked
+ up” (i.e. bricked). It was also possible to unlock it by
+ pressing a secret combination of buttons in the cockpit, but this
+ ability was removed by a manufacturer's software
update.</p></li>
+
+ <li><p>The train will also lock up after a certain date,
which is
+ hardcoded in the software.</p></li>
+
+ <li><p>The company pushes a software update that detects if
the
+ DRM code has been bypassed, i.e. the lock should have been engaged
+ but the train is still operational. If yes, the controller cabin
+ screen will display a scary message warning about “copyright
+ violation”.</p></li>
+ </ul>
+ </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. -->
<li id="M202311080">
<!--#set var="DATE" value='<small
class="date-tag">2023-11</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -302,36 +343,6 @@
videos in the “cloud”—another word for someone
else's computer.</p>
</li>
-
-<!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. -->
- <li id="M202311301">
- <!--#set var="DATE" value='<small
class="date-tag">2023-11</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
-
href="https://web.archive.org/web/20231213150111/https://www.nytimes.com/2023/11/12/technology/iphone-repair-apple-control.html">To
- block non-Apple repairs, Apple encodes the iMonster serial
- number in the original parts</a>. This is called “parts
- pairing”. Swapping parts between working iMonsters of the same
- model causes malfunction or disabling of some functionalities. Part
- replacement may also trigger persistent alerts, unless it is done by
- an Apple store.</p>
- </li>
-
-<!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. -->
- <li id="M202311300">
- <!--#set var="DATE" value='<small
class="date-tag">2023-11</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
-
href="https://web.archive.org/web/20231011121908/https://www.makeuseof.com/how-to-remove-ads-on-samsung/">Samsung's
- Push Service proprietary app</a> sends notifications to the user's
- phone about “updates” in Samsung apps, including the
- Gaming Hub, but these updates only sometimes have to do with
- a new version of the apps. Many times, the notifications from
- Gaming Hub are simply ads for games that they think the user should
- install based on the data collected from the user. Most importantly, <a
-
href="https://getfastanswer.com/3486/how-to-remove-samsung-push-service-on-a-smartphone">it
- cannot be permanently disabled.</a></p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -395,7 +406,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2024/01/03 10:31:24 $
+$Date: 2024/01/03 12:03:44 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.393
retrieving revision 1.394
diff -u -b -r1.393 -r1.394
--- proprietary.nl.po 3 Jan 2024 10:31:24 -0000 1.393
+++ proprietary.nl.po 3 Jan 2024 12:03:44 -0000 1.394
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2024-01-03 10:25+0000\n"
+"POT-Creation-Date: 2024-01-03 11:55+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
"Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -479,6 +479,47 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.bleepingcomputer.com/news/security/logofail-attack-can-"
+"install-uefi-bootkits-through-bootup-logos/\">x86 and ARM based computers "
+"shipped with UEFI are potentially vulnerable to a design omission called "
+"LogoFAIL</a>. A cracker can replace the BIOS logo with a fake one that "
+"contains malicious code. Users can't fix this omission because it is in the "
+"nonfree UEFI firmware that users can't replace."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-"
+"hardware-hacking/\">Newag, a Polish railway manufacturer, puts DRM inside "
+"trains to prevent third-party repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some time. "
+"If yes, the train will be “locked up” (i.e. bricked). It was "
+"also possible to unlock it by pressing a secret combination of buttons in "
+"the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent autos offer a feature by which the drivers can connect their snoop-"
"phones to the car. That feature <a href=\"https://therecord.media/class-"
"action-lawsuit-cars-text-messages-privacy\"> snoops on the calls and texts</"
@@ -511,30 +552,6 @@
"another word for someone else's computer."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://web.archive.org/web/20231213150111/https://www.nytimes."
-"com/2023/11/12/technology/iphone-repair-apple-control.html\">To block non-"
-"Apple repairs, Apple encodes the iMonster serial number in the original "
-"parts</a>. This is called “parts pairing”. Swapping parts "
-"between working iMonsters of the same model causes malfunction or disabling "
-"of some functionalities. Part replacement may also trigger persistent "
-"alerts, unless it is done by an Apple store."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://web.archive.org/web/20231011121908/https://www.makeuseof."
-"com/how-to-remove-ads-on-samsung/\">Samsung's Push Service proprietary app</"
-"a> sends notifications to the user's phone about “updates” in "
-"Samsung apps, including the Gaming Hub, but these updates only sometimes "
-"have to do with a new version of the apps. Many times, the notifications "
-"from Gaming Hub are simply ads for games that they think the user should "
-"install based on the data collected from the user. Most importantly, <a href="
-"\"https://getfastanswer.com/3486/how-to-remove-samsung-push-service-on-a-"
-"smartphone\">it cannot be permanently disabled.</a>"
-msgstr ""
-
#. type: Content of: <div><p>
# | <a [-href=\"/proprietary/malware-mobiles.html\">Mobiles</a>-]
# | {+href=\"/proprietary/all.html\">More items…</a>+}
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.426
retrieving revision 1.427
diff -u -b -r1.426 -r1.427
--- proprietary.pl-diff.html 3 Jan 2024 10:31:24 -0000 1.426
+++ proprietary.pl-diff.html 3 Jan 2024 12:03:44 -0000 1.427
@@ -29,9 +29,9 @@
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
-table#TOC {
- display: block;</em></ins></span>
+#about-section { font-size: 1.1em; font-style: italic; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%; width: max-content;
overflow: auto;
border: .2em solid #e0dfda;
@@ -57,14 +57,14 @@
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom:
.5em; margin: 0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
}
#TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
+#TOC a:hover { text-decoration: underline;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -125,7 +125,7 @@
<p>However, most online services require the user to run a nonfree
app. The app <em>is</em> released software, so we do list
malicious
-functionalities of these apps. Mistreatment by the service itself is
+functionalities</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>these apps. Mistreatment by the service
itself is
imposed by use of the app, so sometimes we mention those mistreatments
too—but we try to state explicitly what is done by the app and
what is done by the dis-service.</p>
@@ -143,7 +143,7 @@
them.</p>
</div>
-<p>As</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>December 2023, the pages in this directory
list around 600
+<p>As of December 2023, the pages in this directory list around 600
instances of malicious functionalities (with more than 710 references to
back them up), but there are surely thousands more we don't know
about.</p>
@@ -230,10 +230,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/philosophy/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -262,6 +262,47 @@
<ul class="blurbs">
<!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. -->
+ <li id="M202312131">
+ <!--#set var="DATE" value='<small
class="date-tag">2023-12</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.bleepingcomputer.com/news/security/logofail-attack-can-install-uefi-bootkits-through-bootup-logos/">x86
+ and ARM based computers shipped with UEFI are potentially vulnerable
+ to a design omission called LogoFAIL</a>. A cracker can replace the
+ BIOS logo with a fake one that contains malicious code. Users can't
+ fix this omission because it is in the nonfree UEFI firmware that
+ users can't replace.</p>
+ </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. -->
+ <li id="M202312130">
+ <!--#set var="DATE" value='<small
class="date-tag">2023-12</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-hardware-hacking/">Newag,
+ a Polish railway manufacturer, puts DRM inside trains to prevent
+ third-party repairs</a>.</p>
+
+ <ul>
+ <li><p>The train's software contains code to detect if the
GPS
+ coordinates are near some third party repairers, or the train has not
+ been running for some time. If yes, the train will be “locked
+ up” (i.e. bricked). It was also possible to unlock it by
+ pressing a secret combination of buttons in the cockpit, but this
+ ability was removed by a manufacturer's software
update.</p></li>
+
+ <li><p>The train will also lock up after a certain date,
which is
+ hardcoded in the software.</p></li>
+
+ <li><p>The company pushes a software update that detects if
the
+ DRM code has been bypassed, i.e. the lock should have been engaged
+ but the train is still operational. If yes, the controller cabin
+ screen will display a scary message warning about “copyright
+ violation”.</p></li>
+ </ul>
+ </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. -->
<li id="M202311080">
<!--#set var="DATE" value='<small
class="date-tag">2023-11</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -301,36 +342,6 @@
videos in the “cloud”—another word for someone
else's computer.</p>
</li>
-
-<!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. -->
- <li id="M202311301">
- <!--#set var="DATE" value='<small
class="date-tag">2023-11</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
-
href="https://web.archive.org/web/20231213150111/https://www.nytimes.com/2023/11/12/technology/iphone-repair-apple-control.html">To
- block non-Apple repairs, Apple encodes the iMonster serial
- number in the original parts</a>. This is called “parts
- pairing”. Swapping parts between working iMonsters of the same
- model causes malfunction or disabling of some functionalities. Part
- replacement may also trigger persistent alerts, unless it is done by
- an Apple store.</p>
- </li>
-
-<!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. -->
- <li id="M202311300">
- <!--#set var="DATE" value='<small
class="date-tag">2023-11</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
-
href="https://web.archive.org/web/20231011121908/https://www.makeuseof.com/how-to-remove-ads-on-samsung/">Samsung's
- Push Service proprietary app</a> sends notifications to the user's
- phone about “updates” in Samsung apps, including the
- Gaming Hub, but these updates only sometimes have to do with
- a new version of the apps. Many times, the notifications from
- Gaming Hub are simply ads for games that they think the user should
- install based on the data collected from the user. Most importantly, <a
-
href="https://getfastanswer.com/3486/how-to-remove-samsung-push-service-on-a-smartphone">it
- cannot be permanently disabled.</a></p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -394,7 +405,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2024/01/03 10:31:24 $
+$Date: 2024/01/03 12:03:44 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.385
retrieving revision 1.386
diff -u -b -r1.385 -r1.386
--- proprietary.pl.po 3 Jan 2024 10:31:24 -0000 1.385
+++ proprietary.pl.po 3 Jan 2024 12:03:44 -0000 1.386
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2024-01-03 10:25+0000\n"
+"POT-Creation-Date: 2024-01-03 11:55+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -641,6 +641,47 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.bleepingcomputer.com/news/security/logofail-attack-can-"
+"install-uefi-bootkits-through-bootup-logos/\">x86 and ARM based computers "
+"shipped with UEFI are potentially vulnerable to a design omission called "
+"LogoFAIL</a>. A cracker can replace the BIOS logo with a fake one that "
+"contains malicious code. Users can't fix this omission because it is in the "
+"nonfree UEFI firmware that users can't replace."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-"
+"hardware-hacking/\">Newag, a Polish railway manufacturer, puts DRM inside "
+"trains to prevent third-party repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some time. "
+"If yes, the train will be “locked up” (i.e. bricked). It was "
+"also possible to unlock it by pressing a secret combination of buttons in "
+"the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent autos offer a feature by which the drivers can connect their snoop-"
"phones to the car. That feature <a href=\"https://therecord.media/class-"
"action-lawsuit-cars-text-messages-privacy\"> snoops on the calls and texts</"
@@ -673,30 +714,6 @@
"another word for someone else's computer."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://web.archive.org/web/20231213150111/https://www.nytimes."
-"com/2023/11/12/technology/iphone-repair-apple-control.html\">To block non-"
-"Apple repairs, Apple encodes the iMonster serial number in the original "
-"parts</a>. This is called “parts pairing”. Swapping parts "
-"between working iMonsters of the same model causes malfunction or disabling "
-"of some functionalities. Part replacement may also trigger persistent "
-"alerts, unless it is done by an Apple store."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://web.archive.org/web/20231011121908/https://www.makeuseof."
-"com/how-to-remove-ads-on-samsung/\">Samsung's Push Service proprietary app</"
-"a> sends notifications to the user's phone about “updates” in "
-"Samsung apps, including the Gaming Hub, but these updates only sometimes "
-"have to do with a new version of the apps. Many times, the notifications "
-"from Gaming Hub are simply ads for games that they think the user should "
-"install based on the data collected from the user. Most importantly, <a href="
-"\"https://getfastanswer.com/3486/how-to-remove-samsung-push-service-on-a-"
-"smartphone\">it cannot be permanently disabled.</a>"
-msgstr ""
-
#. type: Content of: <div><p>
# | <a [-href=\"/philosophy/malware-mobiles.html\">Malware in mobile
# | devices</a>-] {+href=\"/proprietary/all.html\">More items…</a>+}
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.382
retrieving revision 1.383
diff -u -b -r1.382 -r1.383
--- proprietary.pot 3 Jan 2024 10:31:25 -0000 1.382
+++ proprietary.pot 3 Jan 2024 12:03:44 -0000 1.383
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2024-01-03 10:25+0000\n"
+"POT-Creation-Date: 2024-01-03 11:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -334,6 +334,48 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a "
+"href=\"https://www.bleepingcomputer.com/news/security/logofail-attack-can-install-uefi-bootkits-through-bootup-logos/\">x86
"
+"and ARM based computers shipped with UEFI are potentially vulnerable to a "
+"design omission called LogoFAIL</a>. A cracker can replace the BIOS logo "
+"with a fake one that contains malicious code. Users can't fix this omission "
+"because it is in the nonfree UEFI firmware that users can't replace."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a "
+"href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-hardware-hacking/\">Newag,
"
+"a Polish railway manufacturer, puts DRM inside trains to prevent third-party "
+"repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some "
+"time. If yes, the train will be “locked up” (i.e. bricked). It "
+"was also possible to unlock it by pressing a secret combination of buttons "
+"in the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent autos offer a feature by which the drivers can connect their "
"snoop-phones to the car. That feature <a "
"href=\"https://therecord.media/class-action-lawsuit-cars-text-messages-privacy\">
"
@@ -367,31 +409,6 @@
"“cloud”—another word for someone else's computer."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a "
-"href=\"https://web.archive.org/web/20231213150111/https://www.nytimes.com/2023/11/12/technology/iphone-repair-apple-control.html\">To
"
-"block non-Apple repairs, Apple encodes the iMonster serial number in the "
-"original parts</a>. This is called “parts pairing”. Swapping "
-"parts between working iMonsters of the same model causes malfunction or "
-"disabling of some functionalities. Part replacement may also trigger "
-"persistent alerts, unless it is done by an Apple store."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a "
-"href=\"https://web.archive.org/web/20231011121908/https://www.makeuseof.com/how-to-remove-ads-on-samsung/\">Samsung's
"
-"Push Service proprietary app</a> sends notifications to the user's phone "
-"about “updates” in Samsung apps, including the Gaming Hub, but "
-"these updates only sometimes have to do with a new version of the apps. Many "
-"times, the notifications from Gaming Hub are simply ads for games that they "
-"think the user should install based on the data collected from the "
-"user. Most importantly, <a "
-"href=\"https://getfastanswer.com/3486/how-to-remove-samsung-push-service-on-a-smartphone\">it
"
-"cannot be permanently disabled.</a>"
-msgstr ""
-
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr ""
Index: proprietary.pt-br-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br-diff.html,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- proprietary.pt-br-diff.html 3 Jan 2024 10:31:25 -0000 1.106
+++ proprietary.pt-br-diff.html 3 Jan 2024 12:03:44 -0000 1.107
@@ -235,118 +235,130 @@
<h3 id="latest">Latest additions</h3>
-<span class="inserted"><ins><em><p style="margin-bottom: .5em">
- <!--#set var="DATE" value='<small
class="date-tag">2022-07</small>'
- --><!--#echo encoding="none" var="DATE" --></p>
+<span class="removed"><del><strong><ul class="blurbs">
+ <li id="M202111201"></strong></del></span>
+
+<span class="inserted"><ins><em><p style="margin-bottom:
.5em"></em></ins></span>
+ <!--#set var="DATE" value='<small <span
class="removed"><del><strong>class="date-tag">2021-11</small>'</strong></del></span>
<span
class="inserted"><ins><em>class="date-tag">2022-07</small>'</em></ins></span>
+ --><!--#echo encoding="none" var="DATE" <span
class="removed"><del><strong>-->
+ <p>NordicTrack, a company that sells
+ exercise machines with ability</strong></del></span> <span
class="inserted"><ins><em>--></p>
<p id="uefi-rootkit" class="important" style="margin-top: 0">
<strong><a
href="/proprietary/proprietary-insecurity.html#uefi-rootkit">
- UEFI makes computers vulnerable to advanced persistent threats that are
almost impossible
- to detect once
installed...</a></strong></p></em></ins></span>
+ UEFI makes computers vulnerable</em></ins></span> to <span
class="removed"><del><strong>show videos <a
+
href="https://arstechnica.com/information-technology/2021/11/locked-out-of-god-mode-runners-are-hacking-their-treadmills/">limits
+ what people can watch, and recently disabled a
feature</a></strong></del></span> <span
class="inserted"><ins><em>advanced persistent threats</em></ins></span> that
<span class="removed"><del><strong>was
+ originally functional. This happened through automatic update and
+ probably involved a universal back door.</p>
+ </li></strong></del></span> <span class="inserted"><ins><em>are almost
impossible
+ to detect once installed...</a></strong></p>
<ul class="blurbs">
-<span class="inserted"><ins><em><!-- Copied from workshop/mal.rec. Do not
edit in proprietary.html. --></em></ins></span>
- <li <span
class="removed"><del><strong>id="M202111201"></strong></del></span> <span
class="inserted"><ins><em>id="M202311080"></em></ins></span>
- <!--#set var="DATE" value='<small <span
class="removed"><del><strong>class="date-tag">2021-11</small>'</strong></del></span>
<span
class="inserted"><ins><em>class="date-tag">2023-11</small>'</em></ins></span>
- --><!--#echo encoding="none" var="DATE" -->
- <span
class="removed"><del><strong><p>NordicTrack,</strong></del></span>
- <span class="inserted"><ins><em><p>Recent autos
offer</em></ins></span> a <span class="removed"><del><strong>company that sells
- exercise machines with ability</strong></del></span> <span
class="inserted"><ins><em>feature by which the drivers
- can connect their snoop-phones</em></ins></span> to <span
class="removed"><del><strong>show videos</strong></del></span> <span
class="inserted"><ins><em>the car. That feature</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://arstechnica.com/information-technology/2021/11/locked-out-of-god-mode-runners-are-hacking-their-treadmills/">limits
- what people can watch,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://therecord.media/class-action-lawsuit-cars-text-messages-privacy">
- snoops on the calls</em></ins></span> and <span
class="removed"><del><strong>recently disabled a feature</a> that was
- originally functional. This happened through automatic
update</strong></del></span> <span
class="inserted"><ins><em>texts</a></em></ins></span> and
- <span class="removed"><del><strong>probably involved a universal back
door.</p></strong></del></span> <span class="inserted"><ins><em>gives the
data to the car
- manufacturer, and to the state.</p>
-
- <p>A good privacy law would prohibit cars recording this data about
- the users' activities. But not just <em>this</em>
data—lots of
- other data too.</p></em></ins></span>
- </li>
-
-<span class="inserted"><ins><em><!-- Copied from workshop/mal.rec. Do not
edit in proprietary.html. --></em></ins></span>
- <li <span
class="removed"><del><strong>id="M202111200"></strong></del></span> <span
class="inserted"><ins><em>id="M201809170"></em></ins></span>
- <!--#set var="DATE" value='<small <span
class="removed"><del><strong>class="date-tag">2021-11</small>'</strong></del></span>
<span
class="inserted"><ins><em>class="date-tag">2018-09</small>'</em></ins></span>
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary.html.
--></em></ins></span>
+ <li <span
class="removed"><del><strong>id="M202111200"></strong></del></span> <span
class="inserted"><ins><em>id="M202312131"></em></ins></span>
+ <!--#set var="DATE" value='<small <span
class="removed"><del><strong>class="date-tag">2021-11</small>'</strong></del></span>
<span
class="inserted"><ins><em>class="date-tag">2023-12</small>'</em></ins></span>
--><!--#echo encoding="none" var="DATE" -->
<span class="removed"><del><strong><p>Hundreds of Tesla drivers <a
href="https://www.theguardian.com/technology/2021/nov/20/tesla-app-outage-elon-musk-apologises">were
- locked out of their cars as a result of Tesla's app suffering from an
- outage</a>, which happened because the app</strong></del></span>
- <span class="inserted"><ins><em><p>Clash Royale</em></ins></span> is
<span class="removed"><del><strong>tethered to company's
- servers.</p></strong></del></span> <span
class="inserted"><ins><em>an online game with an “optimized”
- <a href="/proprietary/proprietary-addictions.html#gacha">
- <i>gacha</i></a> system that makes it <a
-
href="https://web.archive.org/web/20231227125927/https://medium.com/@nikmlnkr/what-makes-clash-royale-so-addictive-1e586815b1f0">
- very addictive for players</a>, and very profitable for its
- developers.</p></em></ins></span>
+ locked out of their cars as</strong></del></span>
+ <span class="inserted"><ins><em><p><a
+
href="https://www.bleepingcomputer.com/news/security/logofail-attack-can-install-uefi-bootkits-through-bootup-logos/">x86
+ and ARM based computers shipped with UEFI are potentially vulnerable
+ to</em></ins></span> a <span class="removed"><del><strong>result of
Tesla's app suffering from an
+ outage</a>, which happened because</strong></del></span> <span
class="inserted"><ins><em>design omission called LogoFAIL</a>. A cracker
can replace</em></ins></span> the <span
class="removed"><del><strong>app</strong></del></span>
+ <span class="inserted"><ins><em>BIOS logo with a fake one that contains
malicious code. Users can't
+ fix this omission because it</em></ins></span> is <span
class="removed"><del><strong>tethered to company's
+ servers.</p></strong></del></span> <span
class="inserted"><ins><em>in the nonfree UEFI firmware that
+ users can't replace.</p></em></ins></span>
</li>
<span class="inserted"><ins><em><!-- Copied from workshop/mal.rec. Do not
edit in proprietary.html. --></em></ins></span>
- <li <span
class="removed"><del><strong>id="M202111110"></strong></del></span> <span
class="inserted"><ins><em>id="M202309050"></em></ins></span>
- <!--#set var="DATE" value='<small <span
class="removed"><del><strong>class="date-tag">2021-11</small>'</strong></del></span>
<span
class="inserted"><ins><em>class="date-tag">2023-09</small>'</em></ins></span>
+ <li <span
class="removed"><del><strong>id="M202111110"></strong></del></span> <span
class="inserted"><ins><em>id="M202312130"></em></ins></span>
+ <!--#set var="DATE" value='<small <span
class="removed"><del><strong>class="date-tag">2021-11</small>'</strong></del></span>
<span
class="inserted"><ins><em>class="date-tag">2023-12</small>'</em></ins></span>
--><!--#echo encoding="none" var="DATE" -->
- <span class="removed"><del><strong><p>Some researchers
at</strong></del></span>
- <span class="inserted"><ins><em><p>Google Nest snooper/surveillance
cameras are always
- tethered to</em></ins></span> Google <span
class="inserted"><ins><em>servers, record videos 24/7, and are</em></ins></span>
- <a <span
class="removed"><del><strong>href="https://www.vice.com/en/article/93bw8y/google-caught-hackers-using-a-mac-zero-day-against-hong-kong-users">found
- a zero-day vulnerability on MacOS,</strong></del></span> <span
class="inserted"><ins><em>href="https://arstechnica.com/gadgets/2023/09/google-nest-cameras-get-a-25-33-subscription-price-hike/">
- subscription-based,</em></ins></span> which <span
class="removed"><del><strong>crackers used</strong></del></span> <span
class="inserted"><ins><em>is an injustice</em></ins></span> to <span
class="removed"><del><strong>target</strong></del></span> people <span
class="removed"><del><strong>visiting</strong></del></span> <span
class="inserted"><ins><em>who
- use them</a>. The article discusses</em></ins></span> the <span
class="removed"><del><strong>websites</a> of
- a media outlet and a pro-democracy labor and political
group</strong></del></span> <span class="inserted"><ins><em>rise in prices for
- “plans” you can buy from Google, which include storing
- videos</em></ins></span> in <span class="removed"><del><strong>Hong
+ <span class="removed"><del><strong><p>Some researchers at Google
<a
href="https://www.vice.com/en/article/93bw8y/google-caught-hackers-using-a-mac-zero-day-against-hong-kong-users">found</strong></del></span>
+ <span class="inserted"><ins><em><p><a
+
href="https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-hardware-hacking/">Newag,</em></ins></span>
+ a <span class="removed"><del><strong>zero-day vulnerability on MacOS,
+ which crackers used</strong></del></span> <span
class="inserted"><ins><em>Polish railway manufacturer, puts DRM inside trains
to prevent
+ third-party repairs</a>.</p>
+
+ <ul>
+ <li><p>The train's software contains code</em></ins></span>
to <span class="removed"><del><strong>target people
visiting</strong></del></span> <span class="inserted"><ins><em>detect if the GPS
+ coordinates are near some third party repairers, or the train has not
+ been running for some time. If yes,</em></ins></span> the <span
class="removed"><del><strong>websites</a></strong></del></span> <span
class="inserted"><ins><em>train will be “locked
+ up” (i.e. bricked). It was also possible to unlock it by
+ pressing a secret combination</em></ins></span> of <span
class="inserted"><ins><em>buttons in the cockpit, but this
+ ability was removed by</em></ins></span> a <span
class="removed"><del><strong>media outlet and</strong></del></span> <span
class="inserted"><ins><em>manufacturer's software update.</p></li>
+
+ <li><p>The train will also lock up after</em></ins></span> a
<span class="removed"><del><strong>pro-democracy labor and political
group</strong></del></span> <span class="inserted"><ins><em>certain date, which
is
+ hardcoded</em></ins></span> in <span class="removed"><del><strong>Hong
Kong.</p>
- <p><small>Please note that</strong></del></span> the <span
class="removed"><del><strong>article wrongly refers
- to crackers as “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p></strong></del></span>
<span class="inserted"><ins><em>“cloud”—another word for
someone
- else's computer.</p></em></ins></span>
+ <p><small>Please note</strong></del></span> <span
class="inserted"><ins><em>the software.</p></li>
+
+ <li><p>The company pushes a software
update</em></ins></span> that <span class="inserted"><ins><em>detects
if</em></ins></span> the <span class="removed"><del><strong>article wrongly
refers
+ to crackers as “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p></strong></del></span>
+ <span class="inserted"><ins><em>DRM code has been bypassed, i.e. the
lock should have been engaged
+ but the train is still operational. If yes, the controller cabin
+ screen will display a scary message warning about “copyright
+ violation”.</p></li>
+ </ul></em></ins></span>
</li>
<span class="inserted"><ins><em><!-- Copied from workshop/mal.rec. Do not
edit in proprietary.html. --></em></ins></span>
- <li <span
class="removed"><del><strong>id="M202110250"></strong></del></span> <span
class="inserted"><ins><em>id="M202311301"></em></ins></span>
+ <li <span
class="removed"><del><strong>id="M202110250"></strong></del></span> <span
class="inserted"><ins><em>id="M202311080"></em></ins></span>
<!--#set var="DATE" value='<small <span
class="removed"><del><strong>class="date-tag">2021-10</small>'</strong></del></span>
<span
class="inserted"><ins><em>class="date-tag">2023-11</small>'</em></ins></span>
--><!--#echo encoding="none" var="DATE" -->
- <span class="removed"><del><strong><p>Ed Tech companies use their
surveillance power to
- manipulate students, and direct them into tracks towards various
+ <span class="removed"><del><strong><p>Ed Tech companies
use</strong></del></span>
+ <span class="inserted"><ins><em><p>Recent autos offer a feature by
which the drivers
+ can connect</em></ins></span> their <span
class="removed"><del><strong>surveillance power</strong></del></span> <span
class="inserted"><ins><em>snoop-phones</em></ins></span> to
+ <span class="removed"><del><strong>manipulate students, and direct them
into tracks towards various
levels of knowledge, power and prestige. The article argues that <a
href="https://blogs.lse.ac.uk/medialse/2021/10/25/algorithmic-injustice-in-education-why-tech-companies-should-require-a-license-to-operate-in-childrens-education/">these
- companies should obtain licenses to operate</a>. That wouldn't hurt,
- but it doesn't address</strong></del></span>
- <span class="inserted"><ins><em><p><a
-
href="https://web.archive.org/web/20231213150111/https://www.nytimes.com/2023/11/12/technology/iphone-repair-apple-control.html">To
- block non-Apple repairs, Apple encodes the iMonster serial
- number in</em></ins></span> the <span
class="removed"><del><strong>root</strong></del></span> <span
class="inserted"><ins><em>original parts</a>. This is called “parts
- pairing”. Swapping parts between working iMonsters</em></ins></span>
of the <span class="removed"><del><strong>problem. All data acquired
- in a school about any student, teacher,</strong></del></span> <span
class="inserted"><ins><em>same
- model causes malfunction</em></ins></span> or <span
class="removed"><del><strong>employee must not leave
- the school, and must be kept in computers that belong to the school
- and run free (as in freedom) software. That way, the school district
- and/or parents can control what</strong></del></span> <span
class="inserted"><ins><em>disabling of some functionalities. Part
- replacement may also trigger persistent alerts, unless
it</em></ins></span> is done <span class="removed"><del><strong>with those
data.</p></strong></del></span> <span class="inserted"><ins><em>by
- an Apple store.</p></em></ins></span>
+ companies should obtain licenses to
operate</a>.</strong></del></span> <span class="inserted"><ins><em>the
car.</em></ins></span> That <span class="removed"><del><strong>wouldn't hurt,
+ but it doesn't address</strong></del></span> <span
class="inserted"><ins><em>feature <a
+
href="https://therecord.media/class-action-lawsuit-cars-text-messages-privacy">
+ snoops on</em></ins></span> the <span class="removed"><del><strong>root
of</strong></del></span> <span class="inserted"><ins><em>calls and
texts</a> and gives</em></ins></span> the <span
class="removed"><del><strong>problem. All</strong></del></span> data <span
class="removed"><del><strong>acquired
+ in a school about any student, teacher, or employee must not
leave</strong></del></span> <span
class="inserted"><ins><em>to</em></ins></span> the <span
class="removed"><del><strong>school,</strong></del></span> <span
class="inserted"><ins><em>car
+ manufacturer,</em></ins></span> and <span
class="removed"><del><strong>must be kept in computers that
belong</strong></del></span> to the <span class="removed"><del><strong>school
+ and run free (as in freedom) software. That way,</strong></del></span>
<span class="inserted"><ins><em>state.</p>
+
+ <p>A good privacy law would prohibit cars recording this data
about</em></ins></span>
+ the <span class="removed"><del><strong>school district
+ and/or parents can control what is done with those
data.</p></strong></del></span> <span class="inserted"><ins><em>users'
activities. But not just <em>this</em> data—lots of
+ other data too.</p></em></ins></span>
</li>
<span class="inserted"><ins><em><!-- Copied from workshop/mal.rec. Do not
edit in proprietary.html. --></em></ins></span>
- <li <span
class="removed"><del><strong>id="M202111090"></strong></del></span> <span
class="inserted"><ins><em>id="M202311300"></em></ins></span>
- <!--#set var="DATE" value='<small <span
class="removed"><del><strong>class="date-tag">2021-11</small>'</strong></del></span>
<span
class="inserted"><ins><em>class="date-tag">2023-11</small>'</em></ins></span>
+ <li <span
class="removed"><del><strong>id="M202111090"></strong></del></span> <span
class="inserted"><ins><em>id="M201809170"></em></ins></span>
+ <!--#set var="DATE" value='<small <span
class="removed"><del><strong>class="date-tag">2021-11</small>'</strong></del></span>
<span
class="inserted"><ins><em>class="date-tag">2018-09</small>'</em></ins></span>
--><!--#echo encoding="none" var="DATE" -->
- <span class="removed"><del><strong><p>A
building</strong></del></span>
- <span class="inserted"><ins><em><p><a
-
href="https://web.archive.org/web/20231011121908/https://www.makeuseof.com/how-to-remove-ads-on-samsung/">Samsung's
- Push Service proprietary app</a> sends notifications to the user's
- phone about “updates”</em></ins></span> in <span
class="removed"><del><strong>LA,</strong></del></span> <span
class="inserted"><ins><em>Samsung apps, including the
- Gaming Hub, but these updates only sometimes have to do</em></ins></span>
with
- a <span class="removed"><del><strong>supermarket in it, <a
-
href="https://www.latimes.com/business/story/2021-11-09/column-trader-joes-parking-app">demands
- customers load a particular app to pay</strong></del></span> <span
class="inserted"><ins><em>new version of the apps. Many times, the
notifications from
- Gaming Hub are simply ads</em></ins></span> for <span
class="removed"><del><strong>parking in</strong></del></span> <span
class="inserted"><ins><em>games that they think</em></ins></span> the <span
class="removed"><del><strong>parking
- lot</a>, and accept pervasive surveillance. They also
have</strong></del></span> <span class="inserted"><ins><em>user should
- install based on</em></ins></span> the
- <span class="removed"><del><strong>option of entering their license plate
numbers in a kiosk. That is
- an injustice, too.</p></strong></del></span> <span
class="inserted"><ins><em>data collected from the user. Most importantly, <a
-
href="https://getfastanswer.com/3486/how-to-remove-samsung-push-service-on-a-smartphone">it
- cannot be permanently disabled.</a></p></em></ins></span>
+ <span class="removed"><del><strong><p>A building in
LA,</strong></del></span>
+ <span class="inserted"><ins><em><p>Clash Royale is an online
game</em></ins></span> with <span class="removed"><del><strong>a supermarket in
it,</strong></del></span> <span class="inserted"><ins><em>an
“optimized”</em></ins></span>
+ <a
+ <span
class="removed"><del><strong>href="https://www.latimes.com/business/story/2021-11-09/column-trader-joes-parking-app">demands
+ customers load a particular app to pay</strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html#gacha">
+ <i>gacha</i></a> system that makes it <a
+
href="https://web.archive.org/web/20231227125927/https://medium.com/@nikmlnkr/what-makes-clash-royale-so-addictive-1e586815b1f0">
+ very addictive</em></ins></span> for <span
class="removed"><del><strong>parking in the parking
+ lot</a>,</strong></del></span> <span
class="inserted"><ins><em>players</a>,</em></ins></span> and <span
class="removed"><del><strong>accept pervasive surveillance. They also have the
+ option of entering their license plate numbers</strong></del></span> <span
class="inserted"><ins><em>very profitable for its
+ developers.</p>
+ </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit</em></ins></span> in <span
class="removed"><del><strong>a kiosk. That</strong></del></span> <span
class="inserted"><ins><em>proprietary.html. -->
+ <li id="M202309050">
+ <!--#set var="DATE" value='<small
class="date-tag">2023-09</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Google Nest snooper/surveillance cameras are always
+ tethered to Google servers, record videos 24/7, and are
+ <a
href="https://arstechnica.com/gadgets/2023/09/google-nest-cameras-get-a-25-33-subscription-price-hike/">
+ subscription-based, which</em></ins></span> is an <span
class="removed"><del><strong>injustice, too.</p></strong></del></span>
<span class="inserted"><ins><em>injustice to people who
+ use them</a>. The article discusses the rise in prices for
+ “plans” you can buy from Google, which include storing
+ videos in the “cloud”—another word for someone
+ else's computer.</p></em></ins></span>
</li>
</ul>
<p class="button right-align">
@@ -410,7 +422,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2024/01/03 10:31:25 $
+$Date: 2024/01/03 12:03:44 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.556
retrieving revision 1.557
diff -u -b -r1.556 -r1.557
--- proprietary.pt-br.po 3 Jan 2024 10:31:25 -0000 1.556
+++ proprietary.pt-br.po 3 Jan 2024 12:03:44 -0000 1.557
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2024-01-03 10:25+0000\n"
+"POT-Creation-Date: 2024-01-03 11:55+0000\n"
"PO-Revision-Date: 2021-06-13 12:11-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -422,6 +422,47 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.bleepingcomputer.com/news/security/logofail-attack-can-"
+"install-uefi-bootkits-through-bootup-logos/\">x86 and ARM based computers "
+"shipped with UEFI are potentially vulnerable to a design omission called "
+"LogoFAIL</a>. A cracker can replace the BIOS logo with a fake one that "
+"contains malicious code. Users can't fix this omission because it is in the "
+"nonfree UEFI firmware that users can't replace."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-"
+"hardware-hacking/\">Newag, a Polish railway manufacturer, puts DRM inside "
+"trains to prevent third-party repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some time. "
+"If yes, the train will be “locked up” (i.e. bricked). It was "
+"also possible to unlock it by pressing a secret combination of buttons in "
+"the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent autos offer a feature by which the drivers can connect their snoop-"
"phones to the car. That feature <a href=\"https://therecord.media/class-"
"action-lawsuit-cars-text-messages-privacy\"> snoops on the calls and texts</"
@@ -454,30 +495,6 @@
"another word for someone else's computer."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://web.archive.org/web/20231213150111/https://www.nytimes."
-"com/2023/11/12/technology/iphone-repair-apple-control.html\">To block non-"
-"Apple repairs, Apple encodes the iMonster serial number in the original "
-"parts</a>. This is called “parts pairing”. Swapping parts "
-"between working iMonsters of the same model causes malfunction or disabling "
-"of some functionalities. Part replacement may also trigger persistent "
-"alerts, unless it is done by an Apple store."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://web.archive.org/web/20231011121908/https://www.makeuseof."
-"com/how-to-remove-ads-on-samsung/\">Samsung's Push Service proprietary app</"
-"a> sends notifications to the user's phone about “updates” in "
-"Samsung apps, including the Gaming Hub, but these updates only sometimes "
-"have to do with a new version of the apps. Many times, the notifications "
-"from Gaming Hub are simply ads for games that they think the user should "
-"install based on the data collected from the user. Most importantly, <a href="
-"\"https://getfastanswer.com/3486/how-to-remove-samsung-push-service-on-a-"
-"smartphone\">it cannot be permanently disabled.</a>"
-msgstr ""
-
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr "<a href=\"/proprietary/all.html\">Mais itensâ¦</a>"
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.724
retrieving revision 1.725
diff -u -b -r1.724 -r1.725
--- proprietary.ru.po 3 Jan 2024 10:31:25 -0000 1.724
+++ proprietary.ru.po 3 Jan 2024 12:03:44 -0000 1.725
@@ -9,7 +9,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2024-01-03 10:25+0000\n"
+"POT-Creation-Date: 2024-01-03 11:55+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -427,6 +427,47 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.bleepingcomputer.com/news/security/logofail-attack-can-"
+"install-uefi-bootkits-through-bootup-logos/\">x86 and ARM based computers "
+"shipped with UEFI are potentially vulnerable to a design omission called "
+"LogoFAIL</a>. A cracker can replace the BIOS logo with a fake one that "
+"contains malicious code. Users can't fix this omission because it is in the "
+"nonfree UEFI firmware that users can't replace."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-"
+"hardware-hacking/\">Newag, a Polish railway manufacturer, puts DRM inside "
+"trains to prevent third-party repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some time. "
+"If yes, the train will be “locked up” (i.e. bricked). It was "
+"also possible to unlock it by pressing a secret combination of buttons in "
+"the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent autos offer a feature by which the drivers can connect their snoop-"
"phones to the car. That feature <a href=\"https://therecord.media/class-"
"action-lawsuit-cars-text-messages-privacy\"> snoops on the calls and texts</"
@@ -472,48 +513,6 @@
"вклÑÑаÑÑ Ñ
Ñанение запиÑей в
“облаке”, пÑедÑÑавлÑÑÑем Ñобой ÑÑжой "
"компÑÑÑеÑ."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://web.archive.org/web/20231213150111/https://www.nytimes."
-"com/2023/11/12/technology/iphone-repair-apple-control.html\">To block non-"
-"Apple repairs, Apple encodes the iMonster serial number in the original "
-"parts</a>. This is called “parts pairing”. Swapping parts "
-"between working iMonsters of the same model causes malfunction or disabling "
-"of some functionalities. Part replacement may also trigger persistent "
-"alerts, unless it is done by an Apple store."
-msgstr ""
-"ЧÑÐ¾Ð±Ñ Ð½Ðµ даÑÑ Ð´ÑÑгим ÑемонÑиÑоваÑÑ
ай-ÑÑдиÑа, <a href=\"https://web.archive."
-"org/web/20231213150111/https://www.nytimes.com/2023/11/12/technology/iphone-"
-"repair-apple-control.html\"> Apple кодиÑÑÐµÑ ÑеÑийнÑй
Ð½Ð¾Ð¼ÐµÑ Ð¾ÑигиналÑнÑÑ
"
-"комплекÑÑÑÑиÑ
</a>. ÐÑо назÑваеÑÑÑ
“ÑвÑзкой комплекÑÑÑÑиÑ
”. "
-"ÐеÑеÑÑановка комплекÑÑÑÑиÑ
междÑ
иÑпÑавнÑми ай-ÑÑдиÑами одной и Ñой же "
-"модели пÑÐ¸Ð²Ð¾Ð´Ð¸Ñ Ðº неиÑпÑавноÑÑи или
оÑклÑÑÐµÐ½Ð¸Ñ ÐºÐ°ÐºÐ¸Ñ
-Ñо ÑÑнкÑий. Ðамена "
-"комплекÑÑÑÑиÑ
Ñакже Ð¼Ð¾Ð¶ÐµÑ Ð²ÑзваÑÑ
поÑÑоÑннÑе ÑведомлениÑ, еÑли ÑÑо не "
-"делаеÑÑÑ Ð² ÑенÑÑе обÑлÑÐ¶Ð¸Ð²Ð°Ð½Ð¸Ñ Apple."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://web.archive.org/web/20231011121908/https://www.makeuseof."
-"com/how-to-remove-ads-on-samsung/\">Samsung's Push Service proprietary app</"
-"a> sends notifications to the user's phone about “updates” in "
-"Samsung apps, including the Gaming Hub, but these updates only sometimes "
-"have to do with a new version of the apps. Many times, the notifications "
-"from Gaming Hub are simply ads for games that they think the user should "
-"install based on the data collected from the user. Most importantly, <a href="
-"\"https://getfastanswer.com/3486/how-to-remove-samsung-push-service-on-a-"
-"smartphone\">it cannot be permanently disabled.</a>"
-msgstr ""
-"ÐеÑвободное пÑиложение <a
href=\"https://web.archive.org/web/20231011121908/"
-"https://www.makeuseof.com/how-to-remove-ads-on-samsung/\">Samsung's Push "
-"Service оÑпÑавлÑÐµÑ Ð½Ð° ÑелеÑон полÑзоваÑелÑ
ÑведомлениÑ</a> об “"
-"обновлениÑÑ
” в пÑиложениÑÑ
Samsung, в Ñом
ÑиÑле Gaming Hub, но ÑÑи "
-"Ð¾Ð±Ð½Ð¾Ð²Ð»ÐµÐ½Ð¸Ñ ÑолÑко иногда ÑвÑÐ·Ð°Ð½Ñ Ñ Ð½Ð¾Ð²Ð¾Ð¹
веÑÑией пÑиложениÑ. ЧаÑÑо "
-"ÑÐ²ÐµÐ´Ð¾Ð¼Ð»ÐµÐ½Ð¸Ñ Ð¸Ð· Gaming Hub пÑедÑÑавлÑÑÑ Ð¿ÑоÑÑо
ÑÐµÐºÐ»Ð°Ð¼Ñ Ð¸Ð³Ñ, коÑоÑÑе, как они "
-"дÑмаÑÑ Ð½Ð° оÑновании ÑобÑаннÑÑ
оÑ
полÑзоваÑÐµÐ»Ñ Ð´Ð°Ð½Ð½ÑÑ
, полÑзоваÑÐµÐ»Ñ Ð½Ñжно "
-"ÑÑÑановиÑÑ. Рглавное, <a
href=\"https://getfastanswer.com/3486/how-to-"
-"remove-samsung-push-service-on-a-smartphone\">ÑÑо нелÑзÑ
оÑклÑÑиÑÑ Ð½Ð°ÑовÑем</"
-"a>."
-
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr "<a href=\"/proprietary/all.html\">Ðалее...</a>"
@@ -591,6 +590,47 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "<a href=\"https://web.archive.org/web/20231213150111/https://www.nytimes."
+#~ "com/2023/11/12/technology/iphone-repair-apple-control.html\">To block non-"
+#~ "Apple repairs, Apple encodes the iMonster serial number in the original "
+#~ "parts</a>. This is called “parts pairing”. Swapping parts "
+#~ "between working iMonsters of the same model causes malfunction or "
+#~ "disabling of some functionalities. Part replacement may also trigger "
+#~ "persistent alerts, unless it is done by an Apple store."
+#~ msgstr ""
+#~ "ЧÑÐ¾Ð±Ñ Ð½Ðµ даÑÑ Ð´ÑÑгим ÑемонÑиÑоваÑÑ
ай-ÑÑдиÑа, <a href=\"https://web."
+#~ "archive.org/web/20231213150111/https://www.nytimes.com/2023/11/12/"
+#~ "technology/iphone-repair-apple-control.html\"> Apple кодиÑÑеÑ
ÑеÑийнÑй "
+#~ "Ð½Ð¾Ð¼ÐµÑ Ð¾ÑигиналÑнÑÑ
комплекÑÑÑÑиÑ
</a>. ÐÑо
назÑваеÑÑÑ “ÑвÑзкой "
+#~ "комплекÑÑÑÑиÑ
”. ÐеÑеÑÑановка
комплекÑÑÑÑиÑ
Ð¼ÐµÐ¶Ð´Ñ Ð¸ÑпÑавнÑми ай-"
+#~ "ÑÑдиÑами одной и Ñой же модели пÑиводиÑ
к неиÑпÑавноÑÑи или оÑклÑÑÐµÐ½Ð¸Ñ "
+#~ "какиÑ
-Ñо ÑÑнкÑий. Ðамена комплекÑÑÑÑиÑ
Ñакже Ð¼Ð¾Ð¶ÐµÑ Ð²ÑзваÑÑ Ð¿Ð¾ÑÑоÑннÑе "
+#~ "ÑведомлениÑ, еÑли ÑÑо не делаеÑÑÑ Ð²
ÑенÑÑе обÑлÑÐ¶Ð¸Ð²Ð°Ð½Ð¸Ñ Apple."
+
+#~ msgid ""
+#~ "<a href=\"https://web.archive.org/web/20231011121908/https://www."
+#~ "makeuseof.com/how-to-remove-ads-on-samsung/\">Samsung's Push Service "
+#~ "proprietary app</a> sends notifications to the user's phone about “"
+#~ "updates” in Samsung apps, including the Gaming Hub, but these "
+#~ "updates only sometimes have to do with a new version of the apps. Many "
+#~ "times, the notifications from Gaming Hub are simply ads for games that "
+#~ "they think the user should install based on the data collected from the "
+#~ "user. Most importantly, <a href=\"https://getfastanswer.com/3486/how-to-"
+#~ "remove-samsung-push-service-on-a-smartphone\">it cannot be permanently "
+#~ "disabled.</a>"
+#~ msgstr ""
+#~ "ÐеÑвободное пÑиложение <a
href=\"https://web.archive.org/"
+#~ "web/20231011121908/https://www.makeuseof.com/how-to-remove-ads-on-samsung/"
+#~ "\">Samsung's Push Service оÑпÑавлÑÐµÑ Ð½Ð° ÑелеÑон
полÑзоваÑÐµÐ»Ñ ÑведомлениÑ</"
+#~ "a> об “обновлениÑÑ
” в пÑиложениÑÑ
Samsung, в Ñом ÑиÑле Gaming "
+#~ "Hub, но ÑÑи Ð¾Ð±Ð½Ð¾Ð²Ð»ÐµÐ½Ð¸Ñ ÑолÑко иногда
ÑвÑÐ·Ð°Ð½Ñ Ñ Ð½Ð¾Ð²Ð¾Ð¹ веÑÑией пÑиложениÑ. "
+#~ "ЧаÑÑо ÑÐ²ÐµÐ´Ð¾Ð¼Ð»ÐµÐ½Ð¸Ñ Ð¸Ð· Gaming Hub пÑедÑÑавлÑÑÑ
пÑоÑÑо ÑÐµÐºÐ»Ð°Ð¼Ñ Ð¸Ð³Ñ, коÑоÑÑе, "
+#~ "как они дÑмаÑÑ Ð½Ð° оÑновании ÑобÑаннÑÑ
оÑ
полÑзоваÑÐµÐ»Ñ Ð´Ð°Ð½Ð½ÑÑ
, "
+#~ "полÑзоваÑÐµÐ»Ñ Ð½Ñжно ÑÑÑановиÑÑ. Ð
главное, <a href=\"https://getfastanswer."
+#~ "com/3486/how-to-remove-samsung-push-service-on-a-smartphone\">ÑÑо
нелÑÐ·Ñ "
+#~ "оÑклÑÑиÑÑ Ð½Ð°ÑовÑем</a>."
+
+#~ msgid ""
#~ "Chamberlain Group <a href=\"https://arstechnica.com/gadgets/2023/11/"
#~ "chamberlain-blocks-smart-garage-door-opener-from-working-with-smart-homes/"
#~ "\">blocks users from using third-party software</a> with its garage "
Index: proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.377
retrieving revision 1.378
diff -u -b -r1.377 -r1.378
--- proprietary.tr.po 3 Jan 2024 10:31:25 -0000 1.377
+++ proprietary.tr.po 3 Jan 2024 12:03:45 -0000 1.378
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2024-01-03 10:25+0000\n"
+"POT-Creation-Date: 2024-01-03 11:55+0000\n"
"PO-Revision-Date: 2023-12-14 22:58+0100\n"
"Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
"Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -428,6 +428,47 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.bleepingcomputer.com/news/security/logofail-attack-can-"
+"install-uefi-bootkits-through-bootup-logos/\">x86 and ARM based computers "
+"shipped with UEFI are potentially vulnerable to a design omission called "
+"LogoFAIL</a>. A cracker can replace the BIOS logo with a fake one that "
+"contains malicious code. Users can't fix this omission because it is in the "
+"nonfree UEFI firmware that users can't replace."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-"
+"hardware-hacking/\">Newag, a Polish railway manufacturer, puts DRM inside "
+"trains to prevent third-party repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some time. "
+"If yes, the train will be “locked up” (i.e. bricked). It was "
+"also possible to unlock it by pressing a secret combination of buttons in "
+"the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent autos offer a feature by which the drivers can connect their snoop-"
"phones to the car. That feature <a href=\"https://therecord.media/class-"
"action-lawsuit-cars-text-messages-privacy\"> snoops on the calls and texts</"
@@ -460,40 +501,6 @@
"another word for someone else's computer."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://web.archive.org/web/20231213150111/https://www.nytimes."
-"com/2023/11/12/technology/iphone-repair-apple-control.html\">To block non-"
-"Apple repairs, Apple encodes the iMonster serial number in the original "
-"parts</a>. This is called “parts pairing”. Swapping parts "
-"between working iMonsters of the same model causes malfunction or disabling "
-"of some functionalities. Part replacement may also trigger persistent "
-"alerts, unless it is done by an Apple store."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://web.archive.org/web/20231011121908/https://www.makeuseof."
-"com/how-to-remove-ads-on-samsung/\">Samsung's Push Service proprietary app</"
-"a> sends notifications to the user's phone about “updates” in "
-"Samsung apps, including the Gaming Hub, but these updates only sometimes "
-"have to do with a new version of the apps. Many times, the notifications "
-"from Gaming Hub are simply ads for games that they think the user should "
-"install based on the data collected from the user. Most importantly, <a href="
-"\"https://getfastanswer.com/3486/how-to-remove-samsung-push-service-on-a-"
-"smartphone\">it cannot be permanently disabled.</a>"
-msgstr ""
-"<a href=\"https://web.archive.org/web/20231011121908/https://www.makeuseof."
-"com/how-to-remove-ads-on-samsung/\">Samsung'un özel mülk Push Service "
-"uygulaması</a>, Oyun Merkezi'ni de içeren Samsung uygulamalarındaki
“"
-"güncelleme” hakkında kullanıcının telefonuna bildirimler
gönderiyor, "
-"ancak bu güncellemeler sadece bazen uygulamaların yeni sürümleriyle
ilgili "
-"oluyor. ÃoÄu zaman Oyun Merkezi'nden gelen bildirimler basitçe
kullanıcıdan "
-"toplanan veriye dayanarak kullanıcıya kurmasını önerdikleri oyunların "
-"reklamları. Daha da önemlisi, <a href=\"https://getfastanswer.com/3486/how-"
-"to-remove-samsung-push-service-on-a-smartphone\">bu özellik kalıcı olarak "
-"devre dıÅı bırakılamıyor.</a>"
-
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr "<a href=\"/proprietary/all.html\">Daha fazlası…</a>"
@@ -575,6 +582,30 @@
msgstr "Son Güncelleme:"
#~ msgid ""
+#~ "<a href=\"https://web.archive.org/web/20231011121908/https://www."
+#~ "makeuseof.com/how-to-remove-ads-on-samsung/\">Samsung's Push Service "
+#~ "proprietary app</a> sends notifications to the user's phone about “"
+#~ "updates” in Samsung apps, including the Gaming Hub, but these "
+#~ "updates only sometimes have to do with a new version of the apps. Many "
+#~ "times, the notifications from Gaming Hub are simply ads for games that "
+#~ "they think the user should install based on the data collected from the "
+#~ "user. Most importantly, <a href=\"https://getfastanswer.com/3486/how-to-"
+#~ "remove-samsung-push-service-on-a-smartphone\">it cannot be permanently "
+#~ "disabled.</a>"
+#~ msgstr ""
+#~ "<a href=\"https://web.archive.org/web/20231011121908/https://www."
+#~ "makeuseof.com/how-to-remove-ads-on-samsung/\">Samsung'un özel mülk Push "
+#~ "Service uygulaması</a>, Oyun Merkezi'ni de içeren Samsung "
+#~ "uygulamalarındaki “güncelleme” hakkında kullanıcının "
+#~ "telefonuna bildirimler gönderiyor, ancak bu güncellemeler sadece bazen "
+#~ "uygulamaların yeni sürümleriyle ilgili oluyor. ÃoÄu zaman Oyun "
+#~ "Merkezi'nden gelen bildirimler basitçe kullanıcıdan toplanan veriye "
+#~ "dayanarak kullanıcıya kurmasını önerdikleri oyunların reklamları.
Daha da "
+#~ "önemlisi, <a href=\"https://getfastanswer.com/3486/how-to-remove-samsung-"
+#~ "push-service-on-a-smartphone\">bu özellik kalıcı olarak devre dıÅı "
+#~ "bırakılamıyor.</a>"
+
+#~ msgid ""
#~ "Chamberlain Group <a href=\"https://arstechnica.com/gadgets/2023/11/"
#~ "chamberlain-blocks-smart-garage-door-opener-from-working-with-smart-homes/"
#~ "\">blocks users from using third-party software</a> with its garage "
Index: proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.457
retrieving revision 1.458
diff -u -b -r1.457 -r1.458
--- proprietary.zh-cn.po 3 Jan 2024 10:31:25 -0000 1.457
+++ proprietary.zh-cn.po 3 Jan 2024 12:03:45 -0000 1.458
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2024-01-03 10:25+0000\n"
+"POT-Creation-Date: 2024-01-03 11:55+0000\n"
"PO-Revision-Date: 2024-01-02 21:06+0800\n"
"Last-Translator: Jing Luo <jing@jing.rocks>\n"
"Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -390,6 +390,47 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.bleepingcomputer.com/news/security/logofail-attack-can-"
+"install-uefi-bootkits-through-bootup-logos/\">x86 and ARM based computers "
+"shipped with UEFI are potentially vulnerable to a design omission called "
+"LogoFAIL</a>. A cracker can replace the BIOS logo with a fake one that "
+"contains malicious code. Users can't fix this omission because it is in the "
+"nonfree UEFI firmware that users can't replace."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-"
+"hardware-hacking/\">Newag, a Polish railway manufacturer, puts DRM inside "
+"trains to prevent third-party repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some time. "
+"If yes, the train will be “locked up” (i.e. bricked). It was "
+"also possible to unlock it by pressing a secret combination of buttons in "
+"the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent autos offer a feature by which the drivers can connect their snoop-"
"phones to the car. That feature <a href=\"https://therecord.media/class-"
"action-lawsuit-cars-text-messages-privacy\"> snoops on the calls and texts</"
@@ -432,42 +473,6 @@
"“订é
è®¡å” çæ¶¨ä»·ï¼å
¶ä¸å
æ¬æè§é¢ä¿åå¨
“äºç«¯”—"
"—ä¸è¿æ¯ä½¿ç¨å
¶ä»äººçè®¡ç®æºçå¦ä¸ç§è¯´æ³ã"
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://web.archive.org/web/20231213150111/https://www.nytimes."
-"com/2023/11/12/technology/iphone-repair-apple-control.html\">To block non-"
-"Apple repairs, Apple encodes the iMonster serial number in the original "
-"parts</a>. This is called “parts pairing”. Swapping parts "
-"between working iMonsters of the same model causes malfunction or disabling "
-"of some functionalities. Part replacement may also trigger persistent "
-"alerts, unless it is done by an Apple store."
-msgstr ""
-"<a href=\"https://web.archive.org/web/20231213150111/https://www.nytimes."
-"com/2023/11/12/technology/iphone-repair-apple-control.html\">为äºé»æ¢é宿¹ç"
-"ä¿®çï¼è¹æå
¬å¸å¨ååé
ä»¶ä¸ç¼ç äº iMonster
åºåå·</a>ãè¿å«å “é¶ä»¶å·å¹"
-"é
”ãå³ä½¿äº¤æ¢ååå·çæ£å¸¸ iMonsters 设å¤çé
ä»¶ä¹ä¼å¯¼è´åè½ç´ä¹±æåè½ä¸¢"
-"失ã妿䏿¯å¨è¹æååºæ¿æ¢é
ä»¶ï¼é£ä¹ä¹ä¼æ¿åé
ä»¶ä¸ä¸è´çè¦åã"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://web.archive.org/web/20231011121908/https://www.makeuseof."
-"com/how-to-remove-ads-on-samsung/\">Samsung's Push Service proprietary app</"
-"a> sends notifications to the user's phone about “updates” in "
-"Samsung apps, including the Gaming Hub, but these updates only sometimes "
-"have to do with a new version of the apps. Many times, the notifications "
-"from Gaming Hub are simply ads for games that they think the user should "
-"install based on the data collected from the user. Most importantly, <a href="
-"\"https://getfastanswer.com/3486/how-to-remove-samsung-push-service-on-a-"
-"smartphone\">it cannot be permanently disabled.</a>"
-msgstr ""
-"<a href=\"https://web.archive.org/web/20231011121908/https://www.makeuseof."
-"com/how-to-remove-ads-on-samsung/\">䏿å
¬å¸çæå¡æ¨é䏿åºç¨</a> åç¨æ·çæ"
-"æºåé䏿åºç¨ç “å级” ä¿¡æ¯ï¼å
¶ä¸å
æ¬ Gaming
Hubï¼ä¸è¿è¿äºå级åª"
-"æå°é¨åæ¯å ä¸ºææ°çæ¬çåºç¨ãå¾å¤æ¶åï¼Gaming Hub
çéç¥åªæ¯æ¸¸æç广åï¼ä»ä»¬"
-"æ ¹æ®æ°æ®æ¶éè®¤ä¸ºç¨æ·å®è£
è¿äºæ¸¸æãæéè¦çæ¯ï¼<a
href=\"https://"
-"getfastanswer.com/3486/how-to-remove-samsung-push-service-on-a-smartphone\">"
-"ä½ æ æ³æ°¸ä¹
ç¦æ¢è¿äºå¹¿åã</a>"
-
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr "<a href=\"/proprietary/all.html\">æ´å¤å
容…</a>"
@@ -542,6 +547,41 @@
msgstr "æåæ´æ°ï¼"
#~ msgid ""
+#~ "<a href=\"https://web.archive.org/web/20231213150111/https://www.nytimes."
+#~ "com/2023/11/12/technology/iphone-repair-apple-control.html\">To block non-"
+#~ "Apple repairs, Apple encodes the iMonster serial number in the original "
+#~ "parts</a>. This is called “parts pairing”. Swapping parts "
+#~ "between working iMonsters of the same model causes malfunction or "
+#~ "disabling of some functionalities. Part replacement may also trigger "
+#~ "persistent alerts, unless it is done by an Apple store."
+#~ msgstr ""
+#~ "<a href=\"https://web.archive.org/web/20231213150111/https://www.nytimes."
+#~
"com/2023/11/12/technology/iphone-repair-apple-control.html\">为äºé»æ¢éå®"
+#~ "æ¹çä¿®çï¼è¹æå
¬å¸å¨ååé
ä»¶ä¸ç¼ç äº iMonster
åºåå·</a>ãè¿å«å “é¶"
+#~ "ä»¶å·å¹é
”ãå³ä½¿äº¤æ¢ååå·çæ£å¸¸ iMonsters 设å¤çé
ä»¶ä¹ä¼å¯¼è´åè½ç´ä¹±"
+#~ "æåè½ä¸¢å¤±ã妿䏿¯å¨è¹æååºæ¿æ¢é
ä»¶ï¼é£ä¹ä¹ä¼æ¿åé
ä»¶ä¸ä¸è´çè¦åã"
+
+#~ msgid ""
+#~ "<a href=\"https://web.archive.org/web/20231011121908/https://www."
+#~ "makeuseof.com/how-to-remove-ads-on-samsung/\">Samsung's Push Service "
+#~ "proprietary app</a> sends notifications to the user's phone about “"
+#~ "updates” in Samsung apps, including the Gaming Hub, but these "
+#~ "updates only sometimes have to do with a new version of the apps. Many "
+#~ "times, the notifications from Gaming Hub are simply ads for games that "
+#~ "they think the user should install based on the data collected from the "
+#~ "user. Most importantly, <a href=\"https://getfastanswer.com/3486/how-to-"
+#~ "remove-samsung-push-service-on-a-smartphone\">it cannot be permanently "
+#~ "disabled.</a>"
+#~ msgstr ""
+#~ "<a href=\"https://web.archive.org/web/20231011121908/https://www."
+#~ "makeuseof.com/how-to-remove-ads-on-samsung/\">䏿å
¬å¸çæå¡æ¨é䏿åºç¨</"
+#~ "a> åç¨æ·çææºåé䏿åºç¨ç “å级” ä¿¡æ¯ï¼å
¶ä¸å
æ¬ Gaming "
+#~ "Hubï¼ä¸è¿è¿äºåçº§åªæå°é¨åæ¯å
ä¸ºææ°çæ¬çåºç¨ãå¾å¤æ¶åï¼Gaming Hub çé"
+#~ "ç¥åªæ¯æ¸¸æç广åï¼ä»ä»¬æ ¹æ®æ°æ®æ¶éè®¤ä¸ºç¨æ·å®è£
è¿äºæ¸¸æãæéè¦çæ¯ï¼<a "
+#~ "href=\"https://getfastanswer.com/3486/how-to-remove-samsung-push-service-"
+#~ "on-a-smartphone\">ä½ æ æ³æ°¸ä¹
ç¦æ¢è¿äºå¹¿åã</a>"
+
+#~ msgid ""
#~ "Chamberlain Group <a href=\"https://arstechnica.com/gadgets/2023/11/"
#~ "chamberlain-blocks-smart-garage-door-opener-from-working-with-smart-homes/"
#~ "\">blocks users from using third-party software</a> with its garage "
Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.387
retrieving revision 1.388
diff -u -b -r1.387 -r1.388
--- proprietary.zh-tw-diff.html 3 Jan 2024 10:31:25 -0000 1.387
+++ proprietary.zh-tw-diff.html 3 Jan 2024 12:03:45 -0000 1.388
@@ -28,10 +28,10 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%; width: max-content;
overflow: auto;
border: .2em solid #e0dfda;
@@ -58,15 +58,15 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
- #skiplinks a, #skiplinks a:visited</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span>
- <span class="inserted"><ins><em>color: #004caa;
- text-decoration: none;</em></ins></span>
+ #skiplinks a, #skiplinks a:visited {
+ color: #004caa;
+ text-decoration: none;
}
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC a { text-decoration: none; }
+#TOC a { text-decoration: none; }
#TOC a:hover { text-decoration: underline; }
-->
</style>
@@ -165,18 +165,18 @@
</tr>
<tr>
<td>
- <ul class="columns">
- <li><a
href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coercion.html">Coercion</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li>
+ <ul class="columns"></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coercion.html">Coercion</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li>
+ <li><a
href="/proprietary/proprietary-interference.html">Interference</a></li>
<li><a
href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
<li><a
href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
<li><a
href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
@@ -263,6 +263,47 @@
<ul class="blurbs">
<!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. -->
+ <li id="M202312131">
+ <!--#set var="DATE" value='<small
class="date-tag">2023-12</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.bleepingcomputer.com/news/security/logofail-attack-can-install-uefi-bootkits-through-bootup-logos/">x86
+ and ARM based computers shipped with UEFI are potentially vulnerable
+ to a design omission called LogoFAIL</a>. A cracker can replace the
+ BIOS logo with a fake one that contains malicious code. Users can't
+ fix this omission because it is in the nonfree UEFI firmware that
+ users can't replace.</p>
+ </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. -->
+ <li id="M202312130">
+ <!--#set var="DATE" value='<small
class="date-tag">2023-12</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-hardware-hacking/">Newag,
+ a Polish railway manufacturer, puts DRM inside trains to prevent
+ third-party repairs</a>.</p>
+
+ <ul>
+ <li><p>The train's software contains code to detect if the
GPS
+ coordinates are near some third party repairers, or the train has not
+ been running for some time. If yes, the train will be “locked
+ up” (i.e. bricked). It was also possible to unlock it by
+ pressing a secret combination of buttons in the cockpit, but this
+ ability was removed by a manufacturer's software
update.</p></li>
+
+ <li><p>The train will also lock up after a certain date,
which is
+ hardcoded in the software.</p></li>
+
+ <li><p>The company pushes a software update that detects if
the
+ DRM code has been bypassed, i.e. the lock should have been engaged
+ but the train is still operational. If yes, the controller cabin
+ screen will display a scary message warning about “copyright
+ violation”.</p></li>
+ </ul>
+ </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. -->
<li id="M202311080">
<!--#set var="DATE" value='<small
class="date-tag">2023-11</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -302,36 +343,6 @@
videos in the “cloud”—another word for someone
else's computer.</p>
</li>
-
-<!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. -->
- <li id="M202311301">
- <!--#set var="DATE" value='<small
class="date-tag">2023-11</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
-
href="https://web.archive.org/web/20231213150111/https://www.nytimes.com/2023/11/12/technology/iphone-repair-apple-control.html">To
- block non-Apple repairs, Apple encodes the iMonster serial
- number in the original parts</a>. This is called “parts
- pairing”. Swapping parts between working iMonsters of the same
- model causes malfunction or disabling of some functionalities. Part
- replacement may also trigger persistent alerts, unless it is done by
- an Apple store.</p>
- </li>
-
-<!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. -->
- <li id="M202311300">
- <!--#set var="DATE" value='<small
class="date-tag">2023-11</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
-
href="https://web.archive.org/web/20231011121908/https://www.makeuseof.com/how-to-remove-ads-on-samsung/">Samsung's
- Push Service proprietary app</a> sends notifications to the user's
- phone about “updates” in Samsung apps, including the
- Gaming Hub, but these updates only sometimes have to do with
- a new version of the apps. Many times, the notifications from
- Gaming Hub are simply ads for games that they think the user should
- install based on the data collected from the user. Most importantly, <a
-
href="https://getfastanswer.com/3486/how-to-remove-samsung-push-service-on-a-smartphone">it
- cannot be permanently disabled.</a></p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -395,7 +406,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2024/01/03 10:31:25 $
+$Date: 2024/01/03 12:03:45 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.372
retrieving revision 1.373
diff -u -b -r1.372 -r1.373
--- proprietary.zh-tw.po 3 Jan 2024 10:31:25 -0000 1.372
+++ proprietary.zh-tw.po 3 Jan 2024 12:03:45 -0000 1.373
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2024-01-03 10:25+0000\n"
+"POT-Creation-Date: 2024-01-03 11:55+0000\n"
"PO-Revision-Date: 2020-02-08 17:12+0800\n"
"Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
"Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -549,6 +549,47 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.bleepingcomputer.com/news/security/logofail-attack-can-"
+"install-uefi-bootkits-through-bootup-logos/\">x86 and ARM based computers "
+"shipped with UEFI are potentially vulnerable to a design omission called "
+"LogoFAIL</a>. A cracker can replace the BIOS logo with a fake one that "
+"contains malicious code. Users can't fix this omission because it is in the "
+"nonfree UEFI firmware that users can't replace."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-"
+"hardware-hacking/\">Newag, a Polish railway manufacturer, puts DRM inside "
+"trains to prevent third-party repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some time. "
+"If yes, the train will be “locked up” (i.e. bricked). It was "
+"also possible to unlock it by pressing a secret combination of buttons in "
+"the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent autos offer a feature by which the drivers can connect their snoop-"
"phones to the car. That feature <a href=\"https://therecord.media/class-"
"action-lawsuit-cars-text-messages-privacy\"> snoops on the calls and texts</"
@@ -581,30 +622,6 @@
"another word for someone else's computer."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://web.archive.org/web/20231213150111/https://www.nytimes."
-"com/2023/11/12/technology/iphone-repair-apple-control.html\">To block non-"
-"Apple repairs, Apple encodes the iMonster serial number in the original "
-"parts</a>. This is called “parts pairing”. Swapping parts "
-"between working iMonsters of the same model causes malfunction or disabling "
-"of some functionalities. Part replacement may also trigger persistent "
-"alerts, unless it is done by an Apple store."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://web.archive.org/web/20231011121908/https://www.makeuseof."
-"com/how-to-remove-ads-on-samsung/\">Samsung's Push Service proprietary app</"
-"a> sends notifications to the user's phone about “updates” in "
-"Samsung apps, including the Gaming Hub, but these updates only sometimes "
-"have to do with a new version of the apps. Many times, the notifications "
-"from Gaming Hub are simply ads for games that they think the user should "
-"install based on the data collected from the user. Most importantly, <a href="
-"\"https://getfastanswer.com/3486/how-to-remove-samsung-push-service-on-a-"
-"smartphone\">it cannot be permanently disabled.</a>"
-msgstr ""
-
#. type: Content of: <div><p>
# | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
# | devices</a>-] {+href=\"/proprietary/all.html\">More items…</a>+}
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.583
retrieving revision 1.584
diff -u -b -r1.583 -r1.584
--- pt-br.po 3 Jan 2024 10:31:25 -0000 1.583
+++ pt-br.po 3 Jan 2024 12:03:45 -0000 1.584
@@ -254,6 +254,47 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.bleepingcomputer.com/news/security/logofail-attack-can-"
+"install-uefi-bootkits-through-bootup-logos/\">x86 and ARM based computers "
+"shipped with UEFI are potentially vulnerable to a design omission called "
+"LogoFAIL</a>. A cracker can replace the BIOS logo with a fake one that "
+"contains malicious code. Users can't fix this omission because it is in the "
+"nonfree UEFI firmware that users can't replace."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-"
+"hardware-hacking/\">Newag, a Polish railway manufacturer, puts DRM inside "
+"trains to prevent third-party repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some time. "
+"If yes, the train will be “locked up” (i.e. bricked). It was "
+"also possible to unlock it by pressing a secret combination of buttons in "
+"the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent autos offer a feature by which the drivers can connect their snoop-"
"phones to the car. That feature <a href=\"https://therecord.media/class-"
"action-lawsuit-cars-text-messages-privacy\"> snoops on the calls and texts</"
@@ -9499,6 +9540,10 @@
"wikipedia.org/wiki/FairPlay\">ditar onde seus clientes podem assistir aos "
"vÃdeos que compraram</a>."
+#. type: Content of: <div><p>
+msgid "Copyright © 2014-2024 Free Software Foundation, Inc."
+msgstr "Copyright © 2014-2024 Free Software Foundation, Inc."
+
#. type: Content of: <title>
msgid "Proprietary Tyrants - GNU Project - Free Software Foundation"
msgstr "Tiranos privativos - Projeto GNU - Free Software Foundation"
@@ -10729,8 +10774,8 @@
"aparentemente intencional."
#. type: Content of: <div><p>
-msgid "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
-msgstr "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
+msgid "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
+msgstr "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
#. type: Content of: <title>
msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -15278,10 +15323,6 @@
"\" href=\"#universal-back-door-phone-modem\"> dispositivos de escuta em "
"tempo integral</a>."
-#. type: Content of: <div><p>
-msgid "Copyright © 2014-2024 Free Software Foundation, Inc."
-msgstr "Copyright © 2014-2024 Free Software Foundation, Inc."
-
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
msgstr "Software privativo - Projeto GNU - Free Software Foundation"
@@ -16631,6 +16672,9 @@
msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
+#~ msgid "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
+#~ msgstr "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
+
#~ msgid "Copyright © 2018-2023 Free Software Foundation, Inc."
#~ msgstr "Copyright © 2018-2023 Free Software Foundation, Inc."
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.1048
retrieving revision 1.1049
diff -u -b -r1.1048 -r1.1049
--- ru.po 3 Jan 2024 10:31:25 -0000 1.1048
+++ ru.po 3 Jan 2024 12:03:45 -0000 1.1049
@@ -259,6 +259,47 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.bleepingcomputer.com/news/security/logofail-attack-can-"
+"install-uefi-bootkits-through-bootup-logos/\">x86 and ARM based computers "
+"shipped with UEFI are potentially vulnerable to a design omission called "
+"LogoFAIL</a>. A cracker can replace the BIOS logo with a fake one that "
+"contains malicious code. Users can't fix this omission because it is in the "
+"nonfree UEFI firmware that users can't replace."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-"
+"hardware-hacking/\">Newag, a Polish railway manufacturer, puts DRM inside "
+"trains to prevent third-party repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some time. "
+"If yes, the train will be “locked up” (i.e. bricked). It was "
+"also possible to unlock it by pressing a secret combination of buttons in "
+"the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent autos offer a feature by which the drivers can connect their snoop-"
"phones to the car. That feature <a href=\"https://therecord.media/class-"
"action-lawsuit-cars-text-messages-privacy\"> snoops on the calls and texts</"
@@ -9436,6 +9477,10 @@
"позволÑÐµÑ Apple <a
href=\"https://en.wikipedia.org/wiki/FairPlay\">дикÑоваÑÑ "
"Ñвоим клиенÑам, на Ñем пÑоÑмаÑÑиваÑÑ
кÑпленнÑе ими видеоÑолики</a>."
+#. type: Content of: <div><p>
+msgid "Copyright © 2014-2024 Free Software Foundation, Inc."
+msgstr "Copyright © 2014-2024 Free Software Foundation, Inc."
+
#. type: Content of: <title>
msgid "Proprietary Tyrants - GNU Project - Free Software Foundation"
msgstr ""
@@ -10509,8 +10554,8 @@
"видимомÑ, Ñделано пÑеднамеÑенно."
#. type: Content of: <div><p>
-msgid "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
-msgstr "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
+msgid "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
+msgstr "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
#. type: Content of: <title>
msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -14518,10 +14563,6 @@
"лазейка</a>, коÑоÑÐ°Ñ ÐµÑÑÑ Ð¿Ð¾ ÑÑÑи во вÑеÑ
мобилÑнÑÑ
ÑелеÑонаÑ
и коÑоÑÐ°Ñ "
"позволÑÐµÑ Ð¿ÑевÑаÑаÑÑ Ð¸Ñ
в ÑÑаÑнÑе
подÑлÑÑиваÑÑие ÑÑÑÑойÑÑва."
-#. type: Content of: <div><p>
-msgid "Copyright © 2014-2024 Free Software Foundation, Inc."
-msgstr "Copyright © 2014-2024 Free Software Foundation, Inc."
-
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
msgstr ""
@@ -15806,6 +15847,9 @@
msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
+#~ msgid "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
+#~ msgstr "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
+
#~ msgid "Copyright © 2018-2023 Free Software Foundation, Inc."
#~ msgstr "Copyright © 2018-2023 Free Software Foundation, Inc."
Index: tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.413
retrieving revision 1.414
diff -u -b -r1.413 -r1.414
--- tr.po 3 Jan 2024 10:31:26 -0000 1.413
+++ tr.po 3 Jan 2024 12:03:45 -0000 1.414
@@ -263,6 +263,47 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.bleepingcomputer.com/news/security/logofail-attack-can-"
+"install-uefi-bootkits-through-bootup-logos/\">x86 and ARM based computers "
+"shipped with UEFI are potentially vulnerable to a design omission called "
+"LogoFAIL</a>. A cracker can replace the BIOS logo with a fake one that "
+"contains malicious code. Users can't fix this omission because it is in the "
+"nonfree UEFI firmware that users can't replace."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-"
+"hardware-hacking/\">Newag, a Polish railway manufacturer, puts DRM inside "
+"trains to prevent third-party repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some time. "
+"If yes, the train will be “locked up” (i.e. bricked). It was "
+"also possible to unlock it by pressing a secret combination of buttons in "
+"the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent autos offer a feature by which the drivers can connect their snoop-"
"phones to the car. That feature <a href=\"https://therecord.media/class-"
"action-lawsuit-cars-text-messages-privacy\"> snoops on the calls and texts</"
@@ -8239,6 +8280,12 @@
"purchased</a>."
msgstr ""
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid "Copyright © 2019, 2020 Free Software Foundation, Inc."
+msgid "Copyright © 2014-2024 Free Software Foundation, Inc."
+msgstr "Copyright © 2019, 2020 Free Software Foundation, Inc."
+
#. type: Content of: <title>
#, fuzzy
#| msgid "Proprietary Addictions - GNU Project - Free Software Foundation"
@@ -8978,7 +9025,7 @@
#. type: Content of: <div><p>
#, fuzzy
#| msgid "Copyright © 2019, 2020 Free Software Foundation, Inc."
-msgid "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
+msgid "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
msgstr "Copyright © 2019, 2020 Free Software Foundation, Inc."
#. type: Content of: <title>
@@ -11870,12 +11917,6 @@
"\"#universal-back-door-phone-modem\"> full-time listening devices</a>."
msgstr ""
-#. type: Content of: <div><p>
-#, fuzzy
-#| msgid "Copyright © 2019, 2020 Free Software Foundation, Inc."
-msgid "Copyright © 2014-2024 Free Software Foundation, Inc."
-msgstr "Copyright © 2019, 2020 Free Software Foundation, Inc."
-
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
msgstr "Ãzel Mülk Yazılım - GNU Projesi - Ãzgür Yazılım Vakfı"
Index: zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.420
retrieving revision 1.421
diff -u -b -r1.420 -r1.421
--- zh-cn.po 3 Jan 2024 10:31:26 -0000 1.420
+++ zh-cn.po 3 Jan 2024 12:03:46 -0000 1.421
@@ -270,6 +270,47 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.bleepingcomputer.com/news/security/logofail-attack-can-"
+"install-uefi-bootkits-through-bootup-logos/\">x86 and ARM based computers "
+"shipped with UEFI are potentially vulnerable to a design omission called "
+"LogoFAIL</a>. A cracker can replace the BIOS logo with a fake one that "
+"contains malicious code. Users can't fix this omission because it is in the "
+"nonfree UEFI firmware that users can't replace."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-"
+"hardware-hacking/\">Newag, a Polish railway manufacturer, puts DRM inside "
+"trains to prevent third-party repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some time. "
+"If yes, the train will be “locked up” (i.e. bricked). It was "
+"also possible to unlock it by pressing a secret combination of buttons in "
+"the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent autos offer a feature by which the drivers can connect their snoop-"
"phones to the car. That feature <a href=\"https://therecord.media/class-"
"action-lawsuit-cars-text-messages-privacy\"> snoops on the calls and texts</"
@@ -7709,6 +7750,16 @@
"purchased</a>."
msgstr ""
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#| "Software Foundation, Inc."
+msgid "Copyright © 2014-2024 Free Software Foundation, Inc."
+msgstr ""
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
+
#. type: Content of: <title>
#, fuzzy
#| msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -8442,7 +8493,7 @@
#| msgid ""
#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
#| "Software Foundation, Inc."
-msgid "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
+msgid "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
msgstr ""
"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
"Software Foundation, Inc."
@@ -11358,16 +11409,6 @@
"\"#universal-back-door-phone-modem\"> full-time listening devices</a>."
msgstr ""
-#. type: Content of: <div><p>
-#, fuzzy
-#| msgid ""
-#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
-#| "Software Foundation, Inc."
-msgid "Copyright © 2014-2024 Free Software Foundation, Inc."
-msgstr ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
-"Software Foundation, Inc."
-
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
msgstr "ä¸æè½¯ä»¶ - GNU å·¥ç¨ - èªç±è½¯ä»¶åºéä¼"
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.496
retrieving revision 1.497
diff -u -b -r1.496 -r1.497
--- zh-tw.po 3 Jan 2024 10:31:26 -0000 1.496
+++ zh-tw.po 3 Jan 2024 12:03:46 -0000 1.497
@@ -278,6 +278,47 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.bleepingcomputer.com/news/security/logofail-attack-can-"
+"install-uefi-bootkits-through-bootup-logos/\">x86 and ARM based computers "
+"shipped with UEFI are potentially vulnerable to a design omission called "
+"LogoFAIL</a>. A cracker can replace the BIOS logo with a fake one that "
+"contains malicious code. Users can't fix this omission because it is in the "
+"nonfree UEFI firmware that users can't replace."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-"
+"hardware-hacking/\">Newag, a Polish railway manufacturer, puts DRM inside "
+"trains to prevent third-party repairs</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train's software contains code to detect if the GPS coordinates are near "
+"some third party repairers, or the train has not been running for some time. "
+"If yes, the train will be “locked up” (i.e. bricked). It was "
+"also possible to unlock it by pressing a secret combination of buttons in "
+"the cockpit, but this ability was removed by a manufacturer's software "
+"update."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The train will also lock up after a certain date, which is hardcoded in the "
+"software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><ul><li><p>
+msgid ""
+"The company pushes a software update that detects if the DRM code has been "
+"bypassed, i.e. the lock should have been engaged but the train is still "
+"operational. If yes, the controller cabin screen will display a scary "
+"message warning about “copyright violation”."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Recent autos offer a feature by which the drivers can connect their snoop-"
"phones to the car. That feature <a href=\"https://therecord.media/class-"
"action-lawsuit-cars-text-messages-privacy\"> snoops on the calls and texts</"
@@ -6449,6 +6490,18 @@
"purchased</a>."
msgstr ""
+#. type: Content of: <div><p>
+# | Copyright © [-2013, 2014, 2015, 2016, 2017, 2018-] {+2014-2024+} Free
+# | Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#| "Foundation, Inc."
+msgid "Copyright © 2014-2024 Free Software Foundation, Inc."
+msgstr ""
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+"Foundation, Inc."
+
#. type: Content of: <title>
# | Proprietary [-Software-] {+Tyrants+} - GNU Project - Free Software
# | Foundation
@@ -7195,13 +7248,13 @@
msgstr ""
#. type: Content of: <div><p>
-# | Copyright © 2013, [-2014, 2015, 2016, 2017, 2018-] {+2015-2023+} Free
+# | Copyright © 2013, [-2014, 2015, 2016, 2017, 2018-] {+2015-2024+} Free
# | Software Foundation, Inc.
#, fuzzy
#| msgid ""
#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
#| "Foundation, Inc."
-msgid "Copyright © 2013, 2015-2023 Free Software Foundation, Inc."
+msgid "Copyright © 2013, 2015-2024 Free Software Foundation, Inc."
msgstr ""
"Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
"Foundation, Inc."
@@ -10186,18 +10239,6 @@
"\"#universal-back-door-phone-modem\"> full-time listening devices</a>."
msgstr ""
-#. type: Content of: <div><p>
-# | Copyright © [-2013, 2014, 2015, 2016, 2017, 2018-] {+2014-2024+} Free
-# | Software Foundation, Inc.
-#, fuzzy
-#| msgid ""
-#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
-#| "Foundation, Inc."
-msgid "Copyright © 2014-2024 Free Software Foundation, Inc."
-msgstr ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
-"Foundation, Inc."
-
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
msgstr "å°æè»é« - GNU å°æ¡ - èªç±è»é«åºéæ"