www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/philosophy surveillance-vs-democracy.tr.htm...


From: GNUN
Subject: www/philosophy surveillance-vs-democracy.tr.htm...
Date: Sat, 3 Jul 2021 10:59:40 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     21/07/03 10:59:39

Modified files:
        philosophy     : surveillance-vs-democracy.tr.html 
        philosophy/po  : surveillance-vs-democracy.tr-en.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/surveillance-vs-democracy.tr.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.tr-en.html?cvsroot=www&r1=1.7&r2=1.8

Patches:
Index: surveillance-vs-democracy.tr.html
===================================================================
RCS file: /web/www/www/philosophy/surveillance-vs-democracy.tr.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- surveillance-vs-democracy.tr.html   15 Jan 2021 19:34:27 -0000      1.10
+++ surveillance-vs-democracy.tr.html   3 Jul 2021 14:59:39 -0000       1.11
@@ -1,7 +1,8 @@
 <!--#set var="ENGLISH_PAGE" 
value="/philosophy/surveillance-vs-democracy.en.html" -->
 
 <!--#include virtual="/server/header.tr.html" -->
-<!-- Parent-Version: 1.90 -->
+<!-- Parent-Version: 1.96 -->
+<!-- This page is derived from /server/standards/boilerplate.html -->
 
 <!-- This file is automatically generated by GNUnited Nations! -->
 <title>Demokrasi Ne Kadar Gözetime Dayanabilir? - GNU Projesi - Özgür 
Yazılım Vakfı</title>
@@ -21,7 +22,7 @@
 <!--#include virtual="/server/banner.tr.html" -->
 <h2 class="center">Demokrasi Ne Kadar Gözetime Dayanabilir?</h2>
 
-<address class="byline center">yazan <a 
href="http://www.stallman.org/";>Richard Stallman</a></address>
+<address class="byline center">yazan <a 
href="https://www.stallman.org/";>Richard Stallman</a></address>
 
 <!-- rms: I deleted the link because of Wired's announced
      anti-ad-block system -->
@@ -73,13 +74,13 @@
 güvenlik zayıflıkları <a
 
href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm";>kullanır</a>
 ve hatta <a
-href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security";>oluşturur</a>.
+href="https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security";>oluşturur</a>.
 Özgür yazılım bize kendi bilgisayarlarımızı denetleme imkanı sunuyor 
ancak
-<a href="http://www.wired.com/opinion/2013/10/149481/";>bu durum, internette
+<a href="https://www.wired.com/opinion/2013/10/149481/";>bu durum, internette
 dolaştığımızda gizliliğimizi korumuyor</a>.</p>
 
 <p>ABD'deki <a
-href="http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill";>&ldquo;ulusal
+href="https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill";>&ldquo;ulusal
 gözetim güçlerini azaltmak&rdquo; için iki partili mevzuat</a> 
hazırlanıyor,
 ancak bu mevzuat hükûmetin sanal dosyalarımızı kullanmasını 
sınırlamaya
 dayanıyor. Eğer &ldquo;ifşacıyı yakalamak&rdquo; onu teşhis etmek için
@@ -96,21 +97,21 @@
 gözetimdir, demokrasinin dayanabileceğinden daha fazla.</p>
 
 <p>İsimsiz bir ABD hükümeti yetkilisi, 2011’de gazetecilere <a
-href="http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river";>ABD’nin
+href="https://www.rcfp.org/journals/news-media-and-law-summer-2011/lessons-wye-river/";>ABD’nin
 habercilere mahkeme celbi göndermeyeceğini çünkü &ldquo;Kiminle
 konuştuğumuzu bildiklerini&rdquo; söyledi.</a> Bazen <a
-href="http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press";>bunu
+href="https://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press";>bunu
 bulmak için gazetecilerin telefon arama kayıtları için mahkeme celbi</a>
 çıkarılmaktadır ancak Snowden bize ABD’deki herkesin tüm telefon arama
 kayıtları için mahkeme talebi olduğunu ve her zaman <a
 
href="https://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order";>Verizon'dan</a>
 ve <a
-href="http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07";>diğer
+href="https://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07";>diğer
 şirketlerden</a> aldıklarını göstermiştir.</p>
 
 <p>Muhalefet ve muhalif faaliyetlerin, üzerlerinde kirli numaralar oynamaya
 istekli devletlerden sır saklaması gerekiyor. ACLU, ABD hükümetinin <a
-href="http://www.aclu.org/files/assets/Spyfiles_2_0.pdf";>barışçıl muhalif
+href="https://www.aclu.org/files/assets/Spyfiles_2_0.pdf";>barışçıl muhalif
 gruplara aralarında teröristlerin var olduğu bahanesiyle sızma konusundaki
 sistematik uygulamasını</a> göstermiştir. Gözetimin çok fazla olduğu 
nokta,
 devletin bilinen bir gazeteci veya bilinen bir muhalifle kimin konuştuğunu
@@ -124,11 +125,11 @@
 müdahaleleri biriken verilere erişim konusunda sınırlar önermek
 şeklindedir. Bu kulağa hoş geliyor ancak hükümetin kurallara uyduğunu
 varsaysak bile sorunu pek de çözmeyecek. (NSA, <a
-href="http://www.wired.com/threatlevel/2013/09/nsa-violations/";>NSA'yı etkin
-bir şekilde sorumlu tutamadığını</a> söyleyen FISA mahkemesini 
yanıltmıştı.)
-Bir suç şüphesi, erişim için temel teşkil edecektir; bu yüzden bir 
ifşacı
-&ldquo;casusluk&rdquo; ile suçlandığında &ldquo;casus&rdquo;u bulmak,
-biriken malzemeye erişmek için bir bahane olacaktır.</p>
+href="https://www.wired.com/threatlevel/2013/09/nsa-violations/";>NSA'yı
+etkin bir şekilde sorumlu tutamadığını</a> söyleyen FISA mahkemesini
+yanıltmıştı.) Bir suç şüphesi, erişim için temel teşkil edecektir; 
bu yüzden
+bir ifşacı &ldquo;casusluk&rdquo; ile suçlandığında &ldquo;casus&rdquo;u
+bulmak, biriken malzemeye erişmek için bir bahane olacaktır.</p>
 
 <p>Uygulamada devlet kurumlarının gözetim verilerini kullanma kurallarını
 yerine getirmek için bahaneler oluşturmasını bile bekleyemeyiz, çünkü 
ABD
@@ -140,7 +141,7 @@
 
 <p>Ek olarak devletin gözetim personeli, verileri kişisel nedenlerden dolayı
 kötüye kullanacaktır. Bazı NSA ajanları, <a
-href="http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems";>âşıklarını
+href="https://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems";>âşıklarını
 &ldquo;LOVEINT&rdquo; adlı bir uygulamada&mdash;geçmiş, şimdiki veya
 diledikleri gibi&mdash;izlemek için ABD gözetim sistemlerini
 kullandı</a>. NSA bunu birkaç kez yakalayıp cezalandırdığını 
söylüyor; kaç
@@ -152,7 +153,7 @@
 uygulama. Bu uygulama <a
 href="https://theyarewatching.org/issues/risks-increase-once-data-shared";>yeni
 dijital sistemlerle</a> genişletildi. 2016 yılında bir savcı, <a
-href="http://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933";>
+href="https://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933";>
 romantik bir takıntının nesnesi olan birinin telefonunu dinleme</a>
 yetkisini almak için hakimlerin imzalarını almakla suçlandı. AP, <a
 href="https://apnews.com/699236946e3140659fff8a2362e16f43";>ABD'deki birçok
@@ -161,10 +162,10 @@
 
 <p>Gözetim verileri, yasak olsa bile, her zaman başka amaçlar için
 kullanılacaktır. Veriler toplanıp, devletin erişme olanağı olduktan 
sonra <a
-href="http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/";>Avrupa</a>,
+href="https://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/";>Avrupa</a>,
 <a href="https://en.wikipedia.org/wiki/Japanese_American_internment";>ABD</a>
 ve en son <a
-href="http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021";>Türkiye</a>'den
+href="https://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021";>Türkiye</a>'den
 gelen örneklerin gösterdiği gibi bu verileri korkunç şekillerde kötüye
 kullanabilir. (Türkiye'nin Bylock programını gerçekten kimin 
kullandığına
 dair kafa karışıklığı, insanları keyfî olarak kullandıkları için
@@ -178,7 +179,7 @@
 edilmesi olasıdır.</p>
 
 <p>Hükûmetler <a
-href="http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html";>doğrudan
+href="https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html";>doğrudan
 demokrasiyi altüst etmek</a> için kitlesel gözetim kabiliyetini kolaylıkla
 kullanabilirler.</p>
 
@@ -201,7 +202,7 @@
 <p>Bununla birlikte bu tür yasal korumalar güvencesizdir: Yakın tarihin
 gösterdiği gibi yürürlükten kaldırılabilir (FISA Değişiklik 
Yasası'nda
 olduğu gibi), askıya alınabilir veya <a
-href="http://www.nytimes.com/2009/04/16/us/16nsa.html";>göz ardı
+href="https://www.nytimes.com/2009/04/16/us/16nsa.html";>göz ardı
 edilebilir</a>.</p>
 
 <p>Bu arada demagoglar her zamanki bahaneleri kitlesel gözetim için zemin
@@ -245,7 +246,7 @@
 
 <p>Arkadaşlarınızın ve tanıdıklarınızın gizliliğini de koruyun. 
Onlarla nasıl
 iletişim kuracağınız dışında <a
-href="http://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/";>kişisel
+href="https://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/";>kişisel
 bilgilerini vermeyin</a> ve hiçbir web sitesine e-posta veya telefon rehberi
 listenizi asla vermeyin. Facebook gibi bir şirkete arkadaşlarınız hakkında
 bir gazetede yayımlamak istemedikleri hiçbir şey söylemeyin. Daha da iyisi
@@ -333,10 +334,10 @@
 sistematik olarak kullanılabilir durumdadır.</p>
 
 <p>NSA, PRISM aracılığıyla <a
-href="https://www.commondreams.org/headline/2013/08/23-2";>birçok büyük
-İnternet şirketinin veri tabanına girmiştir</a>. AT&amp;T 1987'den beri 
tüm
-telefon kayıtlarını kaydetti ve talep üzerine arama yapmak için <a
-href="http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0";>DEA'nın
+href="https://www.commondreams.org/news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-companies";>birçok
+büyük İnternet şirketinin veri tabanına girmiştir</a>. AT&amp;T 1987'den
+beri tüm telefon kayıtlarını kaydetti ve talep üzerine arama yapmak için 
<a
+href="https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0";>DEA'nın
 kullanımına açtı</a>. Açıkça konuşursak ABD hükûmeti bu verilere 
sahip değil
 ancak uygulamada sahip de olabilir. Bazı şirketler, <a
 
href="https://www.eff.org/who-has-your-back-government-data-requests-2015";>hükûmet
@@ -365,19 +366,19 @@
 <p>Her iki sorunu da anonim ödemeler sistemini (ödemeyi yapanın anonim 
olduğu)
 benimseyerek düzeltebiliriz. (Alacaklıların vergilerinden kaçınmalarına
 yardım etmek istemiyoruz.) <a
-href="http://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/";>Bitcoin
+href="https://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/";>Bitcoin
 anonim değildir</a> ancak Bitcoin ile anonim olarak ödeme yapmanın yolları
 vardır. Bununla birlikte <a
-href="http://www.wired.com/wired/archive/2.12/emoney_pr.html";>dijital para
+href="https://www.wired.com/wired/archive/2.12/emoney_pr.html";>dijital para
 için teknoloji ilk olarak 1980'lerde geliştirilmiştir</a>; bunu yapmak için
-GNU yazılımı, <a href="http://taler.net/";>GNU Taler</a> olarak
+GNU yazılımı, <a href="https://taler.net/";>GNU Taler</a> olarak
 adlandırılır. Şimdi sadece uygun iş düzenlemelerine ve devletin onları
 engellememesine ihtiyacımız var.</p>
 
 <p>Anonim ödemeler için bir başka olası yöntem ise <a
-href="https://stallman.org/articles/anonymous-payments-thru-phones.html";>ön
-ödemeli telefon kartları</a> kullanmaktır. Daha az kullanışlı ancak
-uygulanması çok kolaydır.</p>
+href="/philosophy/phone-anonymous-payment.html">ön ödemeli telefon
+kartları</a> kullanmaktır. Daha az kullanışlı ancak uygulanması çok
+kolaydır.</p>
 
 <p>Sitelerin kişisel veri toplanmasından kaynaklanan diğer bir tehdit; 
güvenlik
 kırıcılarının girebileceği, alabileceği ve kötüye 
kullanabileceğidir. Buna
@@ -449,10 +450,10 @@
 <p>İnternet servis sağlayıcıları ve telefon şirketleri, 
kullanıcılarının
 kişileri (tarama, telefon görüşmeleri vb.) hakkında kapsamlı veri
 tutarlar. Cep telefonlarıyla <a
-href="http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz";>kullanıcının
+href="https://web.archive.org/web/20210312235125/http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz";>kullanıcının
 fiziksel konumunu da kaydederler</a>. Bu dosyaları uzun süre saklarlar:
 AT&amp;T örneğinde 30 yıldan fazla. Yakında <a
-href="http://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/";>kullanıcının
+href="https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/";>kullanıcının
 vücut faaliyetlerini bile kaydedecekler</a>. <a
 
href="https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location";>NSA'nın
 cep telefonu konum verilerini toplu olarak topladığı</a> da 
görülüyor.</p>
@@ -465,7 +466,7 @@
 
 <p>Bu çözüm tamamen ikna edici değildir çünkü hükümetin ürettiği 
tüm bilgileri
 derhâl toplamasını fiziksel olarak engellemeyecektir, bu da <a
-href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order";>ABD’nin
+href="https://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order";>ABD’nin
 bazı veya tüm şirketlerinde yaptığıdır</a>. Bunu yasayla yasaklamaya
 güvenmemiz gerekirdi. Ancak, ilgili yasanın (PAT RIOT Yasası) uygulamayı
 açıkça yasaklamadığı mevcut durumdan daha iyi olurdu. Ayrıca hükümet 
bu tür
@@ -503,14 +504,14 @@
 
href="https://en.wikipedia.org/w/index.php?title=Police_perjury&amp;oldid=552608302";>testilying</a>&rdquo;
 şeklinde kendi jargon terimleri vardır.) Kaliforniya'da, her zaman polisin
 video kamera kullanmasını gerektiren bir şehirde, <a
-href="http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition";>güç
+href="https://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition";>güç
 kullanımlarının %60 oranında düştüğü</a> bulundu. ACLU bundan 
yana.</p>
 
 <p><a
 
href="https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266";>Şirketler
 insan değildir ve insan haklarına sahip değillerdir</a>. İşletmelerin
 kimyasal, biyolojik, nükleer, mali, bilgisayımsal (örneğin; <a
-href="http://DefectiveByDesign.org";>DRM</a>) veya siyasal (örneğin;
+href="https://DefectiveByDesign.org";>DRM</a>) veya siyasal (örneğin;
 lobicilik) tehlikelere neden olabilecek süreçlerin ayrıntılarını topluma,
 halkın refahı için gerekli olan her düzeyde yayımlamasını istemek
 meşrudur. Bu faaliyetlerin tehlikeleri (BP petrol sızıntısını, Fukushima
@@ -560,7 +561,7 @@
 
 <!-- for id="content", starts in the include above -->
 <!--#include virtual="/server/footer.tr.html" -->
-<div id="footer">
+<div id="footer" role="contentinfo">
 <div class="unprintable">
 
 <p>Lütfen FSF ve GNU ile ilgili sorularınızı <a
@@ -581,7 +582,7 @@
 
         &lt;web-translators@gnu.org&gt;</a>.</p>
 
-        <p>For information on coordinating and submitting translations of
+        <p>For information on coordinating and contributing translations of
         our web pages, see <a
         href="/server/standards/README.translations.html">Translations
         README</a>. -->
@@ -613,7 +614,7 @@
      
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman</p>
+<p>Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard 
Stallman</p>
 
 <p>Bu sayfa <a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/deed.tr";>Creative
@@ -634,7 +635,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Son Güncelleme:
 
-$Date: 2021/01/15 19:34:27 $
+$Date: 2021/07/03 14:59:39 $
 
 <!-- timestamp end -->
 </p>

Index: po/surveillance-vs-democracy.tr-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.tr-en.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- po/surveillance-vs-democracy.tr-en.html     15 Jan 2021 19:34:27 -0000      
1.7
+++ po/surveillance-vs-democracy.tr-en.html     3 Jul 2021 14:59:39 -0000       
1.8
@@ -1,5 +1,6 @@
 <!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.90 -->
+<!-- Parent-Version: 1.96 -->
+<!-- This page is derived from /server/standards/boilerplate.html -->
 <title>How Much Surveillance Can Democracy Withstand?
 - GNU Project - Free Software Foundation</title>
 <style type="text/css" media="print,screen"><!--
@@ -17,7 +18,7 @@
 <h2 class="center">How Much Surveillance Can Democracy Withstand?</h2>
 
 <address class="byline center">by
-<a href="http://www.stallman.org/";>Richard Stallman</a></address>
+<a href="https://www.stallman.org/";>Richard Stallman</a></address>
 
 <!-- rms: I deleted the link because of Wired's announced
      anti-ad-block system -->
@@ -70,14 +71,14 @@
 can't trust nonfree software; the NSA
 <a 
href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm";>uses</a>
 and
-even <a 
href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security";>creates</a>
+even <a 
href="https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security";>creates</a>
 security weaknesses in nonfree software to invade our own computers
 and routers.  Free software gives us control of our own computers,
-but <a href="http://www.wired.com/opinion/2013/10/149481/";>that won't
+but <a href="https://www.wired.com/opinion/2013/10/149481/";>that won't
 protect our privacy once we set foot on the Internet</a>.</p>
 
 <p><a
-href="http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill";>Bipartisan
+href="https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill";>Bipartisan
 legislation to &ldquo;curtail the domestic surveillance
 powers&rdquo;</a> in the U.S. is being drawn up, but it relies on
 limiting the government's use of our virtual dossiers.  That won't
@@ -97,22 +98,22 @@
 
 <p>An unnamed U.S. government official ominously told journalists in
 2011 that
-the <a 
href="http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river";>U.S.
 would
+the <a 
href="https://www.rcfp.org/journals/news-media-and-law-summer-2011/lessons-wye-river/";>U.S.
 would
 not subpoena reporters because &ldquo;We know who you're talking
 to.&rdquo;</a>
-Sometimes <a 
href="http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press";>journalists'
+Sometimes <a 
href="https://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press";>journalists'
 phone call records are subpoenaed</a> to find this out, but Snowden
 has shown us that in effect they subpoena all the phone call records
 of everyone in the U.S., all the
 time, <a 
href="https://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order";>from
 Verizon</a>
-and <a 
href="http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07";>from
+and <a 
href="https://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07";>from
 other companies too</a>.</p>
 
 <p>Opposition and dissident activities need to keep secrets from
 states that are willing to play dirty tricks on them.  The ACLU has
 demonstrated the U.S. government's <a
-href="http://www.aclu.org/files/assets/Spyfiles_2_0.pdf";>systematic
+href="https://www.aclu.org/files/assets/Spyfiles_2_0.pdf";>systematic
 practice of infiltrating peaceful dissident groups</a> on the pretext
 that there might be terrorists among them.  The point at which
 surveillance is too much is the point at which the state can find who
@@ -128,7 +129,7 @@
 accumulated data.  That sounds nice, but it won't fix the problem, not
 even slightly, even supposing that the government obeys the rules.
 (The NSA has misled the FISA court, which said it
-was <a href="http://www.wired.com/threatlevel/2013/09/nsa-violations/";>unable
+was <a href="https://www.wired.com/threatlevel/2013/09/nsa-violations/";>unable
 to effectively hold the NSA accountable</a>.) Suspicion of a crime
 will be grounds for access, so once a whistleblower is accused of
 &ldquo;espionage,&rdquo; finding the &ldquo;spy&rdquo; will provide an
@@ -144,7 +145,7 @@
 
 <p>In addition, the state's surveillance staff will misuse the data
 for personal reasons.  Some NSA
-agents <a 
href="http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems";>used
+agents <a 
href="https://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems";>used
 U.S. surveillance systems to track their lovers</a>&mdash;past,
 present, or wished-for&mdash;in a practice called
 &ldquo;LOVEINT.&rdquo; The NSA says it has caught and punished this a
@@ -157,7 +158,7 @@
 with <a 
href="https://theyarewatching.org/issues/risks-increase-once-data-shared";>new
 digital systems</a>.  In 2016, a prosecutor was accused of forging
 judges' signatures to get authorization
-to <a 
href="http://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933";>
+to <a 
href="https://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933";>
 wiretap someone who was the object of a romantic obsession</a>. The AP
 knows
 of <a href="https://apnews.com/699236946e3140659fff8a2362e16f43";>many
@@ -171,7 +172,7 @@
 from <a 
href="http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/";>Europe</a>,
 <a href="https://en.wikipedia.org/wiki/Japanese_American_internment";>the
 US</a>, and most
-recently <a 
href="http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021";>Turkey</a>.
+recently <a 
href="https://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021";>Turkey</a>.
 (Turkey's confusion about who had really used the Bylock program only
 exacerbated the basic deliberate injustice of arbitrarily punishing
 people for having used it.)
@@ -183,7 +184,7 @@
 working for hostile states</a>.</p>
 
 <p>Governments can easily use massive surveillance capability
-to <a 
href="http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html";>subvert
+to <a 
href="https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html";>subvert
 democracy directly</a>.</p>
 
 <p>Total surveillance accessible to the state enables the state to
@@ -207,7 +208,7 @@
 <p>However, such legal protections are precarious: as recent history
 shows, they can be repealed (as in the FISA Amendments Act),
 suspended, or <a
-href="http://www.nytimes.com/2009/04/16/us/16nsa.html";>ignored</a>.</p>
+href="https://www.nytimes.com/2009/04/16/us/16nsa.html";>ignored</a>.</p>
 
 <p>Meanwhile, demagogues will cite the usual excuses as grounds for
 total surveillance; any terrorist attack, even one that kills just a
@@ -250,7 +251,7 @@
 pertinent data to the company's server.</p>
 
 <p>Protect your friends' and acquaintances' privacy,
-too.  <a 
href="http://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/";>Don't
+too.  <a 
href="https://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/";>Don't
 give out their personal information</a> except how to contact them,
 and never give any web site your list of email or phone contacts.
 Don't tell a company such as Facebook anything about your friends that
@@ -343,10 +344,10 @@
 systematically available to the state.</p>
 
 <p>The NSA, through PRISM,
-has <a href="https://www.commondreams.org/headline/2013/08/23-2";>gotten
+has <a 
href="https://www.commondreams.org/news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-companies";>gotten
 into the databases of many large Internet corporations</a>.  AT&amp;T
 has saved all its phone call records since 1987
-and <a 
href="http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0";>makes
+and <a 
href="https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0";>makes
 them available to the DEA</a> to search on request.  Strictly
 speaking, the U.S.  government does not possess that data, but in
 practical terms it may as well possess it.  Some companies are praised
@@ -376,17 +377,17 @@
 <p>We could correct both problems by adopting a system of anonymous
 payments&mdash;anonymous for the payer, that is.  (We don't want to
 help the payee dodge
-taxes.)  <a 
href="http://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/";>Bitcoin
+taxes.)  <a 
href="https://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/";>Bitcoin
 is not anonymous</a>, though there are efforts to develop ways to pay
 anonymously with Bitcoin.  However, technology
-for <a href="http://www.wired.com/wired/archive/2.12/emoney_pr.html";>digital
+for <a href="https://www.wired.com/wired/archive/2.12/emoney_pr.html";>digital
 cash was first developed in the 1980s</a>; the GNU software for doing
-this is called <a href="http://taler.net/";>GNU Taler</a>.  Now we need
+this is called <a href="https://taler.net/";>GNU Taler</a>.  Now we need
 only suitable business arrangements, and for the state not to obstruct
 them.</p>
 
 <p>Another possible method for anonymous payments would
-use <a 
href="https://stallman.org/articles/anonymous-payments-thru-phones.html";>prepaid
+use <a href="/philosophy/phone-anonymous-payment.html">prepaid
 phone cards</a>.  It is less convenient, but very easy to
 implement.</p>
 
@@ -463,10 +464,10 @@
 <p>Internet service providers and telephone companies keep extensive
 data on their users' contacts (browsing, phone calls, etc).  With
 mobile phones, they
-also <a 
href="http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz";>record
+also <a 
href="https://web.archive.org/web/20210312235125/http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz";>record
 the user's physical location</a>.  They keep these dossiers for a long
 time: over 30 years, in the case of AT&amp;T.  Soon they will
-even <a 
href="http://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/";>record
+even <a 
href="https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/";>record
 the user's body activities</a>.  It appears that
 the <a 
href="https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location";>NSA
 collects cell phone location data</a> in bulk.</p>
@@ -479,7 +480,7 @@
 <p>This solution is not entirely satisfactory, because it won't
 physically stop the government from collecting all the information
 immediately as it is generated&mdash;which is what
-the <a 
href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order";>U.S.
 does
+the <a 
href="https://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order";>U.S.
 does
 with some or all phone companies</a>.  We would have to rely on
 prohibiting that by law.  However, that would be better than the
 current situation, where the relevant law (the PAT RIOT Act) does not
@@ -520,7 +521,7 @@
 photographers</a>.)
 One city in California that required police to wear video cameras all
 the time
-found <a 
href="http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition";>their
+found <a 
href="https://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition";>their
 use of force fell by 60%</a>.  The ACLU is in favor of this.</p>
 
 <p><a
@@ -528,7 +529,7 @@
 are not people, and not entitled to human rights</a>.  It is
 legitimate to require businesses to publish the details of processes
 that might cause chemical, biological, nuclear, fiscal, computational
-(e.g., <a href="http://DefectiveByDesign.org";>DRM</a>) or political
+(e.g., <a href="https://DefectiveByDesign.org";>DRM</a>) or political
 (e.g., lobbying) hazards to society, to whatever level is needed for
 public well-being.  The danger of these operations (consider the BP
 oil spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs
@@ -573,7 +574,7 @@
 
 </div><!-- for id="content", starts in the include above -->
 <!--#include virtual="/server/footer.html" -->
-<div id="footer">
+<div id="footer" role="contentinfo">
 <div class="unprintable">
 
 <p>Please send general FSF &amp; GNU inquiries to
@@ -591,13 +592,13 @@
         to <a href="mailto:web-translators@gnu.org";>
         &lt;web-translators@gnu.org&gt;</a>.</p>
 
-        <p>For information on coordinating and submitting translations of
+        <p>For information on coordinating and contributing translations of
         our web pages, see <a
         href="/server/standards/README.translations.html">Translations
         README</a>. -->
 Please see the <a
 href="/server/standards/README.translations.html">Translations
-README</a> for information on coordinating and submitting translations
+README</a> for information on coordinating and contributing translations
 of this article.</p>
 </div>
 
@@ -618,7 +619,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
 
-<p>Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Richard Stallman</p>
+<p>Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020, 2021 Richard 
Stallman</p>
 
 <p>This page is licensed under a <a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative
@@ -628,7 +629,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/01/15 19:34:27 $
+$Date: 2021/07/03 14:59:39 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]