advanced help
phrase:
attribute:
attribute:
attribute:
order:
per page:
clip:
action:
Results of 0 - 1 of about 0 (0.000 sec.)
surveillance-vs-democracy.it.po
@digest: ecceeec6a3ca8d52692d01cafdbc93e4
@id: 244238
@mdate: 2022-10-14T18:46:03Z
@size: 16573
@type: text/html
content-type: text/html; charset=utf-8
#keywords: rimedio (22182), detroit (17242), telecamere (14900), 20210312235125 (14841), sorveglianza (12937), detroitnews (12797), 109524794 (12268), 4495021 (12093), internment (11794), remedy (11347), terrifying (10769), facial (8562), coprocessor (8378), datenschutz (7900), falkvinge (7688), dispersed (7367), dossiers (7124), upperlimit (6953), victory (6294), aclu (6142), turkey (5605), surveillance (4988), cameras (4649), recognition (4114), federal (3864), national (3646), misused (3570), collected (3508), innocent (3210), punishment (3141), travel (2975), democracy (2924)
surveillance-vs-democracy.it.po Mismatched links: 20. Mismatched ids: 0. # text 13 | [-The-]{+<a href="#upperlimit">The+} Upper Limit on Surveillance in a | [-Democracy-] {+Democracy</a>+} <a href=" #upperlimit ">The Upper Limit on Surveillance in a Democracy</a> Il limite massimo di sorveglianza in una democrazia 14 | [-Information,-]{+<a href="#willbemisused">Information,+} Once | Collected, Will Be [-Misused-] {+Misused</a>+} <a href=" #willbemisused ">Information, Once Collected, Will Be Misused</a> Una volta raccolte, le informazioni saranno usate in modi impropri 15 | [-Robust-]{+<a href="#technical">Robust+} Protection for Privacy Must Be | [-Technical-] {+Technical</a>+} <a href=" #technical ">Robust Protection for Privacy Must Be Technical</a> Una forte tutela della privacy dev'essere tecnica 16 | [-First,-]{+<a href="#commonsense">First,+} Don't Be [-Foolish-] | {+Foolish</a>+} <a href=" #commonsense ">First, Don't Be Foolish</a> Primo, non essere sciocchi 17 | [-We-]{+<a href="#privacybydesign">We+} Must Design Every System for | [-Privacy-] {+Privacy</a>+} <a href=" #privacybydesign ">We Must Design Every System for Privacy</a> Dobbiamo progettare tutti i sistemi tenendo a mente la privacy 18 | [-Remedy-]{+<a href="#dispersal">Remedy+} for Collecting Data: Leaving | It [-Dispersed-] {+Dispersed</a>+} <a href=" #dispersal ">Remedy for Collecting Data: Leaving It Dispersed</a> Un rimedio alla raccolta dei dati: lasciarli dispersi 19 | [-Remedy-]{+<a href="#digitalcash">Remedy+} for Internet Commerce | [-Surveillance-] {+Surveillance</a>+} <a href=" #digitalcash ">Remedy for Internet Commerce Surveillance</a> Un rimedio alla sorveglianza dell'e-commerce 20 | [-Remedy-]{+<a href="#travel">Remedy+} for Travel [-Surveillance-] | {+Surveillance</a>+} <a href=" #travel ">Remedy for Travel Surveillance</a> Un rimedio alla sorveglianza dei trasporti 21 | [-Remedy-]{+<a href="#communications">Remedy+} for Communications | [-Dossiers-] {+Dossiers</a>+} <a href=" #communications ">Remedy for Communications Dossiers</a> Un rimedio ai dossier sulle comunicazioni 22 | [-But-]{+<a href="#necessary">But+} Some Surveillance Is [-Necessary-] | {+Necessary</a>+} <a href=" #necessary ">But Some Surveillance Is Necessary</a> Ma una certa dose di sorveglianza è necessaria 23 <a href=" #conclusion ">Conclusion</a> 32 | Surveillance data will always be used for other purposes, even if this is | prohibited. Once the data has been accumulated and the state has the | possibility of access to it, it can misuse that data in dreadful ways, as | shown by examples from <a | [-href="http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/">Europe</a>,-] | {+href="https://web.archive.org/web/20220619175619/http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/">Europe</a>,+} | <a href="https://en.wikipedia.org/wiki/Japanese_American_internment">the | US</a>, and most recently <a | href="https://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021">Turkey</a>. | (Turkey's confusion about who had really used the Bylock program only | exacerbated the basic deliberate injustice of arbitrarily punishing people | for having used it.) Surveillance data will always be used for other purposes, even if this is prohibited. Once the data has been accumulated and the state has the possibility of access to it, it can misuse that data in dreadful ways, as shown by examples from <a href=" https://web.archive.org/web/20220619175619/http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/ ">Europe</a>, <a href="https://en.wikipedia.org/wiki/Japanese_American_internment">the US</a>, and most recently <a href="https://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021">Turkey</a>. (Turkey's confusion about who had really used the Bylock program only exacerbated the basic deliberate injustice of arbitrarily punishing people for having used it.) I dati di sorveglianza vengono sempre usati per altri scopi, anche se ciò è proibito. Una volta che i dati sono stati accumulati e lo stato ha la possibilità di accedervi, potrà abusarne in modi terribili, come dimostrato da esempi <a href=" http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/ ">in Europa</a>, <a href="https://en.wikipedia.org/wiki/Japanese_American_internment"> negli Stati Uniti</a> e da casi più recenti in <a href="https://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021">Turchia</a> (la confusione in Turchia su chi avesse davvero usato il programma Bylock ha solo peggiorato l'ingiustizia di punire persone per averlo usato). 54 | Nowadays, security cameras have become surveillance cameras: they are | connected to the Internet so recordings can be collected in a data center | and saved forever. In Detroit, the cops pressure businesses to give them | <a | href="https://eu.detroitnews.com/story/news/local/detroit-city/2018/01/23/detroit-green-light/109524794/">unlimited | access to their surveillance cameras</a> so that they can look through | them at any and all times. This is already dangerous, but it is going to | get worse. Advances in [-face recognition-] {+<a | href="#facial-recognition">facial recognition</a>+} may bring the day | when suspected journalists can be tracked on the street all the time to | see who they talk with. Nowadays, security cameras have become surveillance cameras: they are connected to the Internet so recordings can be collected in a data center and saved forever. In Detroit, the cops pressure businesses to give them <a href="https://eu.detroitnews.com/story/news/local/detroit-city/2018/01/23/detroit-green-light/109524794/">unlimited access to their surveillance cameras</a> so that they can look through them at any and all times. This is already dangerous, but it is going to get worse. Advances in <a href=" #facial-recognition ">facial recognition</a> may bring the day when suspected journalists can be tracked on the street all the time to see who they talk with. Oggi le telecamere di sicurezza sono diventate telecamere di sorveglianza: sono connesse a Internet, per cui le registrazioni si possono raccogliere in un data center e archiviare per l'eternità. A Detroit, i poliziotti fanno pressione sugli esercizi commerciali al fine di ottenere <a href="https://eu.detroitnews.com/story/news/local/detroit-city/2018/01/23/detroit-green-light/109524794/">accesso illimitato alle telecamere di sorveglianza</a>, in modo da poterle controllare in qualsiasi momento. Questa situazione è già abbastanza pericolosa, ma è destinato a peggiorare. I progressi nel riconoscimento dei volti potranno far sì che un domani i giornalisti sospetti vengano seguiti per le strade costantemente per scoprire con chi parlano. 68 | The U.S. &ldquo;no-fly&rdquo; list must be abolished because it is <a | [-href="https://www.aclu.org/blog/national-security-technology-and-liberty-racial-justice/victory-federal-court-recognizes">punishment-] | {+href="https://www.aclu.org/news/national-security/victory-federal-court-recognizes-constitutional">punishment+} | without trial</a>. The U.S. &ldquo;no-fly&rdquo; list must be abolished because it is <a href=" https://www.aclu.org/news/national-security/victory-federal-court-recognizes-constitutional ">punishment without trial</a>. La <i>no-fly list</i> degli USA dev'essere abolita in quanto equivale a una <a href=" https://www.aclu.org/blog/national-security-technology-and-liberty-racial-justice/victory-federal-court-recognizes "> pena senza processo</a>. 74 | Internet service providers and telephone companies keep extensive data on | their users' contacts (browsing, phone calls, etc). With mobile phones, | they also <a | href="https://web.archive.org/web/20210312235125/http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz">record | the user's physical location</a>. They keep these dossiers for a long | time: over 30 years, in the case of AT&amp;T. Soon they will even <a | href="https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/">record | the user's body activities</a>. It appears that the <a | [-href="https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location">NSA-] | {+href="https://www.aclu.org/news/national-security/it-sure-sounds-nsa-tracking-our-locations">NSA+} | collects cell phone location data</a> in bulk. Internet service providers and telephone companies keep extensive data on their users' contacts (browsing, phone calls, etc). With mobile phones, they also <a href="https://web.archive.org/web/20210312235125/http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz">record the user's physical location</a>. They keep these dossiers for a long time: over 30 years, in the case of AT&amp;T. Soon they will even <a href="https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/">record the user's body activities</a>. It appears that the <a href=" https://www.aclu.org/news/national-security/it-sure-sounds-nsa-tracking-our-locations ">NSA collects cell phone location data</a> in bulk. I fornitori di servizi Internet e le compagnie telefoniche conservano grandi quantità di dati sui contatti dei loro utenti (cronologia di navigazione, telefonate, etc). Grazie ai cellulari <a href="https://web.archive.org/web/20210312235125/http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz">viene registrata anche la posizione</a> fisica dell'utente. Questi dossier vengono conservati per molto tempo: più di 30 anni, nel caso di AT&amp;T. Presto saranno registrate persino <a href="https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/">le attività fisiche</a> degli utenti. Pare che la NSA <a href=" https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location ">raccolga in massa i dati</a> di localizzazione dei telefoni cellulari. 89 In the 2020s, facial recognition deepens the danger of surveillance cameras. China already identifies people by their faces so as to punish them, and <a href=" https://www.theguardian.com/global-development/2022/sep/05/iran-government-facial-recognition-technology-hijab-law-crackdown ">Iran is planning to use it to punish women who violate religion-imposed dress codes</a>. 93 Please see the <a href="/server/standards/README.translations.html">Translations README</a> for information on coordinating and contributing translations of this article. Le traduzioni italiane sono effettuate ponendo la massima attenzione ai dettagli e alla qualità, ma a volte potrebbero contenere imperfezioni. Se ne riscontrate, inviate i vostri commenti e suggerimenti riguardo le traduzioni a <a href=" mailto:web-translators@gnu.org ">&lt;web-translators@gnu.org&gt;</a> oppure contattate direttamente il <a href=" http://savannah.gnu.org/projects/www-it/ ">gruppo dei traduttori italiani</a>.<br/>Per informazioni su come gestire e inviare traduzioni delle nostre pagine web consultate la <a href="/server/standards/README.translations.html">Guida alle traduzioni</a>. ...
http://www.gnu.org/savannah-checkouts/gnu/gnun/reports/it/philosophy/surveillance-vs-democracy.html - [detail] - [similar]
PREV NEXT
Powered by Hyper Estraier 1.4.13, with 213369 documents and 1081681 words.