malware-amazon.de.po

Mismatched links: 43.

Mismatched ids: 0.

#text
8 | {+</a>&nbsp;/+} <a [-href="/proprietary/proprietary.html">Other examples
| of proprietary malware</a>-]
| {+href="/proprietary/proprietary.html">Malware</a>&nbsp;/ By
| company&nbsp;/+} 
</a>&nbsp;/ <a href="/proprietary/proprietary.html">Malware</a>&nbsp;/ By company&nbsp;/ 
<a href="/proprietary/">Weitere Beispiele proprietärer Schadsoftware</a> 
10 | Nonfree (proprietary) software is very often malware (designed to mistreat
| the user). Nonfree software is controlled by its developers, which puts
| them in a position of power over the users; <a
| href="/philosophy/free-software-even-more-important.html">that is the
| basic injustice</a>. The developers {+and manufacturers+} often exercise
| that power to the detriment of the users they ought to serve. 
Nonfree (proprietary) software is very often malware (designed to mistreat the user). Nonfree software is controlled by its developers, which puts them in a position of power over the users; <a href="/philosophy/free-software-even-more-important.html">that is the basic injustice</a>. The developers and manufacturers often exercise that power to the detriment of the users they ought to serve. 
Unfreie (proprietäre) Software entspricht sehr häufig einem Schadprogramm (entworfen, um <ins>unerwünschte und gegebenenfalls schädliche Funktionen auszuführen,</ins> den Benutzer also schlecht behandeln). Unfreie Software wird von den Entwicklern kontrolliert, welches sie in eine Position der Macht gegenüber den Nutzern versetzt. <a href="/philosophy/free-software-even-more-important">Das ist die grundlegende Ungerechtigkeit!</a> Häufig üben Entwickler diese Macht zum Schaden der Benutzer aus, denen sie eigentlich dienen sollte. 
15  
&nbsp;<a href="#misc">Other&nbsp;products</a>&nbsp; 
 
17 * There are, in the meantime, 10 Swindle products! 
We refer to this product as the <a href="/philosophy/why-call-it-the-swindle.html">Amazon Swindle</a> because it has <a href="/proprietary/proprietary-drm.html">Digital restrictions management (DRM)</a> and <a href="/philosophy/ebooks.html"> other malicious functionalities</a>. 
Wir beziehen uns auf dieses Produkt als <em><a href="/philosophy/why-call-it-the-swindle">Amazon Swindle</a></em><a href="#tn1" id="tn1-ref" class="transnote">[*]</a>, weil es über <a href="/proprietary/proprietary-drm">Digitale Rechte-Minderung (DRM)</a><a href="#tn01" id="tn01-ref" class="transnote">[1]</a> und <a href="/philosophy/ebooks">andere schädliche Funktionen</a> verfügt. 
20 | The Amazon Kindle-Swindle has a back door that has been used to <a
| href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">
| remotely erase books</a>. One of the books erased was [-1984,-]
| {+<cite>1984</cite>,+} by George Orwell. 
The Amazon Kindle-Swindle has a back door that has been used to <a href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/"> remotely erase books</a>. One of the books erased was <cite>1984</cite>, by George Orwell. 
Der Amazon Sw(K)indle hat eine Hintertür, die verwendet worden ist, um <a href="//pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/" title="Some E-Books Are More Equal Than Others, unter: nytimes.com 2009.">Bücher per Fernzugriff zu löschen</a><a href="#tn02" id="tn02-ref" class="transnote">[2]</a>. Eines der gelöschten Bücher war <cite>1984</cite> von George Orwell. 
22  
The Kindle also has a <a href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090"> universal back door</a>. 
Außerdem ist eine <a href="//www.amazon.de/gp/help/customer/display.html?nodeId=200774090" title="Kindle Software-Updates, unter: amazon.de.">universelle Hintertür</a><ins> enthalten, die (bei bestehender Internetverbindung) automatisch „Aktualisierungen“ herunterlädt und ausführt</ins>. 
24 | The Amazon [-&ldquo;smart&rdquo; TV is-] {+Ring app does+} <a
| [-href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
| snooping all the time</a>.-]
| {+href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report">
| surveillance for other companies as well as for Amazon</a>.+} 
The Amazon Ring app does <a href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"> surveillance for other companies as well as for Amazon</a>. 
Amazon „Smart“-TV-Geräte <a href="//www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance" title="Amazon’s Echo and the smart TVs that are listening to and watching everything you do, unter: theguardian.com 2014.">schnüffeln die ganze Zeit mit</a>. 
27  
Amazon's monopoly and DRM is <a href="https://www.washingtonpost.com/technology/2021/03/10/amazon-library-ebook-monopoly/">stopping public libraries from lending e-books and audiobooks</a>. Amazon became powerful in e-book world by <a href="/philosophy/why-call-it-the-swindle.html">Swindle</a>, and is now misusing its power and violates people's rights using <a href="https://www.defectivebydesign.org">Digital Restrictions Management</a>. 
 
28  
The article is written in a way that endorses DRM in general, which is unacceptable. <a href="/proprietary/proprietary-drm.html">DRM is an injustice to people</a>. 
 
29 | <a [-href="http://techin.oureverydaylife.com/kindle-drm-17841.html">-]
| {+href="https://itstillworks.com/kindle-drm-17841.html">+} The Amazon
| Kindle has DRM</a>. That article is flawed in that it fails to treat DRM
| as an ethical question; it takes for granted that whatever Amazon might do
| to its users is legitimate. It refers to DRM as digital
| &ldquo;rights&rdquo; management, which is the spin term used to promote
| DRM. Nonetheless it serves as a reference for the facts. 
<a href="https://itstillworks.com/kindle-drm-17841.html"> The Amazon Kindle has DRM</a>. That article is flawed in that it fails to treat DRM as an ethical question; it takes for granted that whatever Amazon might do to its users is legitimate. It refers to DRM as digital &ldquo;rights&rdquo; management, which is the spin term used to promote DRM. Nonetheless it serves as a reference for the facts. 
<a href="//techin.oureverydaylife.com/kindle-drm-17841.html" title="John Lister, What Is Kindle DRM?, unter: techin.oureverydaylife.com 2009.">Amazons Kindle enthält DRM</a>. Der erwähnte Artikel ist insofern fehlerhaft, da DRM nicht als ethische Frage behandelt wird. Was auch immer Amazon mit dessen Benutzern anstellen könnte, wird als selbstverständlich betrachtet&#160;&#8209;&#160;als sei es legitim. Auf DRM wird sich als <em>Digitale „Rechte“verwaltung</em> bezogen, was der gegenteilige Begriff ist, verwendet, um DRM zu fördern. Dennoch dient er dem Sachverhalt als Referenz. 
33  
Amazon Alexa collects a lot more information from users than is necessary for correct functioning (time, location, recordings made without a legitimate prompt), and sends it to Amazon's servers, which store it indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, even if users request deletion of their data from Amazon's servers, <a href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"> the data remain on other servers</a>, where they can be accessed by advertising companies and government agencies. In other words, deleting the collected information doesn't cancel the wrong of collecting it. 
 
35  
Some of users' commands to the Alexa service are <a href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"> recorded for Amazon employees to listen to</a>. The Google and Apple voice assistants do similar things. 
 
36  
A fraction of the Alexa service staff even has access to <a href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"> location and other personal data</a>. 
 
37  
Since the client program is nonfree, and data processing is done &ldquo;<a href="/philosophy/words-to-avoid.html#CloudComputing">in the cloud</a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and where it's done&rdquo;), users have no way to know what happens to the recordings unless human eavesdroppers <a href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"> break their non-disclosure agreements</a>. 
 
38  
Crackers found a way to break the security of an Amazon device, and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"> turn it into a listening device</a> for them. 
 
40  
<small>(These crackers are probably hackers too, but please <a href="https://stallman.org/articles/on-hacking.html"> don't use &ldquo;hacking&rdquo; to mean &ldquo;breaking security&rdquo;</a>.)</small> 
 
42  
Some security breakers (wrongly referred in this article as <a href="/philosophy/words-to-avoid.html#Hacker">&ldquo;hackers&rdquo;</a>) managed to interfere the Amazon Ring proprietary system, and <a href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras">access its camera, speakers and microphones</a>. 
 
43  
The Ring (now Amazon) doorbell camera is designed so that the manufacturer (now Amazon) can watch all the time. Now it turns out that <a href="https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/"> anyone else can also watch, and fake videos too</a>. 
 
44  
The third party vulnerability is presumably unintentional and Amazon will probably fix it. However, we do not expect Amazon to change the design that <a href="/proprietary/proprietary-surveillance.html#M201901100">allows Amazon to watch</a>. 
 
45  
Amazon Ring &ldquo;security&rdquo; devices <a href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"> send the video they capture to Amazon servers</a>, which save it long-term. 
 
49 | The Amazon &ldquo;[-s-]{+S+}mart&rdquo; TV is <a
| href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
| snooping all the time</a>. 
The Amazon &ldquo;Smart&rdquo; TV is <a href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"> snooping all the time</a>. 
Amazon „Smart“-TV-Geräte <a href="//www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance" title="Amazon’s Echo and the smart TVs that are listening to and watching everything you do, unter: theguardian.com 2014.">schnüffeln die ganze Zeit mit</a>. 
50 !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
! GNU should report facts briefly and crisply! Also resulting !
! consequences should not be swept away by an own opinion! !
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
TRANSLATORS: Use space (SPC) as msgstr if you don't have notes. 
*GNUN-SLOT: TRANSLATOR'S NOTES* 
<p><strong>Anmerkungen des Übersetzungsteams:</strong></p>
<ol id="transnote">
<li id="tn1"><a href="#tn1-ref">[*]</a> <em>Swindle</em> (für ‚Schwindel‘, ‚Betrug‘) ist eine Anspielung auf den Namen <em>Kindle</em> (engl. <em>to kindle</em> [ein Interesse] ‚entzünden‘, ‚entfachen‘, ‚wecken‘).
<ol><li><p><strong>Weiterführende Referenzen</strong>:</p>
<ol style="list-style-type:none">
<li id="tn01"><a href="#tn01-ref">[1]</a> Digitale Gesellschaft; Free Software Foundation Europe, <cite><a href="https://digitalegesellschaft.de/wp-content/uploads/2012/08/drm-booklet-digiges-fsfe.de_.pdf" type="application/pdf">DRM oder die merkwürdige, kaputte Welt der Digitalen Rechte-Minderung</a></cite>, unter: digitalegesellschaft.de 2012. (abgerufen 2014-09-10)</li>
<li id="tn02"><a href="#tn02-ref">[2]</a> Heise Online, <cite><a href="//heise.de/-6887">Amazon löscht gekaufte Kindle-eBooks</a></cite>, unter: heise.de 2009. (abgerufen 2014-04-14)</li>
</ol></li>
</ol></li>
</ol> 
52 || No change detected. The change might only be in amounts of spaces. 
Please see the <a href="/server/standards/README.translations.html">Translations README</a> for information on coordinating and contributing translations of this article. 
Bei der Übersetzung dieses Werkes wurde mit größter Sorgfalt vorgegangen. Trotzdem können Fehler nicht völlig ausgeschlossen werden. Sollten Sie Fehler bemerken oder Vorschläge, Kommentare oder Fragen zu diesem Dokument haben, wenden Sie sich bitte an unser Übersetzungsteam <a href="mailto:web-translators@gnu.org?cc=www-de-translators@gnu.org">&lt;web-translators@gnu.org&gt;</a>.</p>
<p>Weitere Informationen über die Koordinierung und Einsendung von Übersetzungen unserer Internetpräsenz finden Sie in der <a href="/server/standards/README.translations">LIESMICH für Übersetzungen</a>. 
54  
This page is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</a>. 
Dieses Werk ist lizenziert unter einer <a rel="license" href="//creativecommons.org/licenses/by/4.0/deed.de">Creative Commons Namensnennung 4.0 International</a>-Lizenz.