right-to-read.bg.po

Mismatched links: 26.

Mismatched ids: 0.

#text
20  
<a href="https://www.defectivebydesign.org/ebooks.html"> Join our mailing list about the dangers of e-books</a>. 
 
22  
This story is supposedly a historical article that will be written in the future by someone else, describing Dan Halbert's youth under a repressive society shaped by the unjust forces that use &ldquo;pirate&rdquo; as propaganda. So it uses the terminology of that society. I have tried to project it forwards into something more visibly oppressive. See <a href="/philosophy/words-to-avoid.html#Piracy">&ldquo;Piracy&rdquo;</a>. 
 
23  
Computer-enforced restrictions on lending or reading books (and other kinds of published works) are known as DRM, short for &ldquo;Digital Restrictions Management.&rdquo; To eliminate DRM, the Free Software Foundation has established the <a href="https://www.defectivebydesign.org/">Defective by Design</a> campaign. We ask for your support. 
 
30  
Nonfree software tends to have <a href="/proprietary/">abusive features of many kinds</a>, which lead to the conclusion that <a href="/philosophy/free-software-even-more-important.html">you can never trust a nonfree program</a>. We must insist on free (libre) software only, and reject nonfree programs. 
 
33 | The proponents of this scheme [-have given it-] {+gave early versions+}
| names such as &ldquo;trusted computing&rdquo; and
| [-&ldquo;Palladium&rdquo;. We call it <a
| href="/philosophy/can-you-trust.html">&ldquo;treacherous
| computing&rdquo;</a> because the effect is to make your computer obey
| companies even to the extent of disobeying and defying you. This was
| implemented in 2007-] {+&ldquo;Palladium,&rdquo; but+} as [-part of <a
| href="http://badvista.org/">Windows Vista</a>; we expect Apple to do
| something similar. In this scheme,-] {+ultimately put into use,+} it is
| [-the manufacturer that keeps the secret code, but the FBI would have
| little trouble getting it.-] {+called &ldquo;secure boot.&rdquo;+} 
The proponents of this scheme gave early versions names such as &ldquo;trusted computing&rdquo; and &ldquo;Palladium,&rdquo; but as ultimately put into use, it is called &ldquo;secure boot.&rdquo; 
Защитниците на тази схема са ѝ дали имена като „доверено ползване на компютри“<sup><a href="#TransNote6">6</a></sup> (trusted computing) и „Palladium“. Ние я наричаме <a href="/philosophy/can-you-trust.html">„предателско ползване на компютри“</a>, защото същината е да се накара компютъра ви да се подчинява на компании вместо на вас. Това бе реализирано през 2007 г. като част от <a href="http://badvista.org">Уиндоус Виста</a> — очакваме и „Епъл“ да направят нещо подобно. В тази схема, производителят пази тайния код, но ФБР не биха имали проблем да се доберат до него. 
34 | What Microsoft keeps is not exactly a password in the traditional sense;
| no person ever types it on a terminal. Rather, it is a signature and
| encryption key that corresponds to a second key stored in your computer.
| This enables Microsoft, and potentially any web sites that cooperate with
| Microsoft, the ultimate control over what the user can do on [-his-]
| {+per+} own computer. {+Microsoft is likely to use that control on behalf
| of the FBI when asked: it already <a
| href="/proprietary/malware-microsoft.html">shows the NSA security bugs
| in Windows</a> to exploit.+} 
What Microsoft keeps is not exactly a password in the traditional sense; no person ever types it on a terminal. Rather, it is a signature and encryption key that corresponds to a second key stored in your computer. This enables Microsoft, and potentially any web sites that cooperate with Microsoft, the ultimate control over what the user can do on per own computer. Microsoft is likely to use that control on behalf of the FBI when asked: it already <a href="/proprietary/malware-microsoft.html">shows the NSA security bugs in Windows</a> to exploit. 
Това, което „Майкрософт“ пазят, не е точно парола в традиционния смисъл на думата — нито един потребител не я пише директно в терминал. По-скоро това е подпис и ключ за шифриране, който съответства на втори ключ, съхраняван във вашия компютър. Това предоставя на „Майкрософт“, и възможно всички уеб сайтове, които си кооперират с тях, неограничен контрол върху това какво потребителя може да прави със собствения си компютър. 
35 | [-Vista also gives Microsoft additional powers; for instance,
| Microsoft-]{+Secure boot+} can [-forcibly install upgrades, and it can
| order all machines running Vista to refuse to run-] {+be implemented in+}
| a [-certain device driver. The main purpose of Vista's many restrictions
| is to impose DRM (Digital Restrictions Management)-] {+way+} that [-users
| can't overcome. The threat of DRM is why we have established-]
| {+permits+} the [-<a href="http://defectivebydesign.org"> Defective by
| Design</a> campaign.-] {+user to specify the signature key and decide what
| software to sign. In practice, PCs designed for Windows 10 carry only
| Microsoft's key, and whether the machine's owner can install any other
| system (such as GNU/Linux) is under Microsoft's control. We call this
| <em>restricted boot</em>.+} 
Secure boot can be implemented in a way that permits the user to specify the signature key and decide what software to sign. In practice, PCs designed for Windows 10 carry only Microsoft's key, and whether the machine's owner can install any other system (such as GNU/Linux) is under Microsoft's control. We call this <em>restricted boot</em>. 
„Виста“ предоставя на „Майкрософт“ и допълнителна власт. Например, „Майкрософт“ насилствено може да инсталират актуализации на системата, и могат да наредят на всички машини с инсталирана „Виста“ да откажат да заредят определен драйвер за някакво устройство. Основната цел на множеството ограничения на „Виста“ е да наложи DRM („Цифрово управление на ограниченията“), което потребителите да не могат да избегнат. Заплахата от DRM е причината, поради която започнахме кампанията <a href="http://defectivebydesign.org">Defective by Design</a>. 
42 | The [-<a href="#AuthorsNote">author's note</a> talks about the-] battle
| for the right to read [-and electronic surveillance.-] {+is going against
| us so far.+} The [-battle-] {+enemy+} is [-beginning now; here-]
| {+organized, and we+} are [-links to two articles about technologies now
| being developed to deny you the right to read.-] {+not.+} 
The battle for the right to read is going against us so far. The enemy is organized, and we are not. 
В <a href="#AuthorsNote">авторовата бележка</a> се разказва за борбата за правото да четеш, както и електронното наблюдение. Борбата започва сега, а ето и връзки към две статии, за технологии, които се разработват в момента, за да ви отнемат правото да четете. 
43  
Today's commercial e-books <a href="/philosophy/the-danger-of-ebooks.html"> abolish readers' traditional freedoms</a>. Amazon's e-book reader product, which I call the &ldquo;<a href="/philosophy/why-call-it-the-swindle.html">Amazon Swindle</a>&rdquo; because it's designed to swindle readers out of the traditional freedoms of readers of books, is run by software with several demonstrated <a href="/proprietary/malware-kindle-swindle.html">Orwellian functionalities</a>. Any one of them calls for rejecting the product completely: 
 
44 | [-<a
| href="http://www.zdnet.com/article/seybold-opens-chapter-on-digital-books/">Electronic
| Publishing:</a> An article about distribution of books in electronic
| form,-]{+It spies on everything the user does: it reports which book the
| user is reading, and which page, and it reports when the user highlights
| text,+} and [-copyright issues affecting-] {+any notes+} the [-right to
| read a copy.-] {+user enters.+} 
It spies on everything the user does: it reports which book the user is reading, and which page, and it reports when the user highlights text, and any notes the user enters. 
<a href="http://www.zdnet.com/article/seybold-opens-chapter-on-digital-books">Електронното публикуване:</a> Статия за разпространението на книгите в електронен формат и проблемите с авторските права, които засягат правото да се чете копие. 
45 | [-<a
| href="http://news.microsoft.com/1999/08/30/microsoft-announces-new-software-for-reading-on-screen">Books
| inside Computers:</a> Software-]{+It has DRM, which is intended+} to
| [-control who can read books and documents on a PC.-] {+block users from
| sharing copies.+} 
It has DRM, which is intended to block users from sharing copies. 
<a href="http://news.microsoft.com/1999/08/30/microsoft-announces-new-software-for-reading-on-screen">Книги в компютрите:</a> Софтуер за контрола кой може да чете книги и документи на един персонален компютър. 
49  
If we want to stop the bad news and create some good news, we need to organize and fight. Subscribe to the FSF's <a href="https://www.defectivebydesign.org/"> Defective by Design</a> campaign to lend a hand. You can <a href="https://www.fsf.org/associate">join the FSF</a> to support our work more generally. There is also a <a href="/help/help.html">list of ways to participate in our work</a>. 
 
52 | <a
| [-href="http://www.wired.com/wired/archive/4.01/white.paper_pr.html">An-]
| {+href="https://www.wired.com/1996/01/white-paper/">An+} explanation of
| the White Paper: The Copyright Grab</a>, Pamela Samuelson, [-Wired, Jan.
| 1996-] {+<cite>Wired</cite>, January 1st, 1996.+} 
<a href="https://www.wired.com/1996/01/white-paper/">An explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, <cite>Wired</cite>, January 1st, 1996. 
<a href="http://www.wired.com/wired/archive/4.01/white.paper_pr.html">Обяснение на бялата книга: разграбването на авторските права</a>, Памела Самуелсън, сп. Wired, януари 1996 г. 
53 | <a [-href="http://www.law.duke.edu/boylesite/sold_out.htm">Sold-]
| {+href="https://law.duke.edu/boylesite/sold_out.htm">Sold+} Out</a>,
| James Boyle, [-New-] {+<cite>New+} York [-Times, 31-] {+Times</cite>,+}
| March [-1996-] {+31, 1996.+} 
<a href="https://law.duke.edu/boylesite/sold_out.htm">Sold Out</a>, James Boyle, <cite>New York Times</cite>, March 31, 1996. 
<a href="http://www.law.duke.edu/boylesite/sold_out.htm">Продадено</a>, Джеймс Бойл, в. „Ню Йорк Таймс“, 31 март 1996 г. 
54 | <a
| href="http{+s+}://web.archive.org/web/20130508120533/http://www.interesting-people.org/archives/interesting-people/199611/msg00012.html">Public
| Data or Private Data</a>, [-Washington Post, 4 Nov-] {+Dave Farber,
| <cite>Washington Post</cite>, November 4,+} 1996. 
<a href="https://web.archive.org/web/20130508120533/http://www.interesting-people.org/archives/interesting-people/199611/msg00012.html">Public Data or Private Data</a>, Dave Farber, <cite>Washington Post</cite>, November 4, 1996. 
<a href="http://web.archive.org/web/20130508120533/http://www.interesting-people.org/archives/interesting-people/199611/msg00012.html">Обществени данни или частни данни</a>, в. „Вашингтон пост“, 4 ноември 1996 г. 
57 | This essay is published in <a
| href="http{+s+}://shop.fsf.org/product/free-software-free-society/"><cite>Free
| Software, Free Society: The Selected Essays of Richard M.
| Stallman</cite></a>. 
This essay is published in <a href="https://shop.fsf.org/product/free-software-free-society/"><cite>Free Software, Free Society: The Selected Essays of Richard M. Stallman</cite></a>. 
Това есе е публикувано в книгата <a href="http://shop.fsf.org/product/free-software-free-society/"><cite>Свободен софтуер, свободно общество: избрани есета от Ричард М. Столман</cite></a>. 
60 | Please see the <a
| href="/server/standards/README.translations.html">Translations
| README</a> for information on coordinating and [-submitting-]
| {+contributing+} translations of this article. 
Please see the <a href="/server/standards/README.translations.html">Translations README</a> for information on coordinating and contributing translations of this article. 
Моля, докладвайте грешки и предложения относно българския превод чрез <a href="mailto:web-translators@gnu.org">&lt;web-translators@gnu.org&gt;</a>.</p> <p>Вижте <a href="/server/standards/README.translations.html">Документацията за преводачи</a> за информация за координирането и подаването на преводи на тази статия.