malware-cars.de.po

Mismatched links: 46.

Mismatched ids: 1.

#text
8 | {+</a>&nbsp;/+} <a [-href="/proprietary/proprietary.html">Other examples
| of proprietary malware</a>-]
| {+href="/proprietary/proprietary.html">Malware</a>&nbsp;/ By
| product&nbsp;/+} 
</a>&nbsp;/ <a href="/proprietary/proprietary.html">Malware</a>&nbsp;/ By product&nbsp;/ 
<a href="/proprietary/">Weitere Beispiele proprietrer Schadsoftware</a> 
10 | Nonfree (proprietary) software is very often malware (designed to mistreat
| the user). Nonfree software is controlled by its developers, which puts
| them in a position of power over the users; <a
| href="/philosophy/free-software-even-more-important.html">that is the
| basic injustice</a>. The developers {+and manufacturers+} often exercise
| that power to the detriment of the users they ought to serve. 
Nonfree (proprietary) software is very often malware (designed to mistreat the user). Nonfree software is controlled by its developers, which puts them in a position of power over the users; <a href="/philosophy/free-software-even-more-important.html">that is the basic injustice</a>. The developers and manufacturers often exercise that power to the detriment of the users they ought to serve. 
Unfreie (proprietäre) Software entspricht sehr häufig einem Schadprogramm (entworfen, um <ins>unerwünschte und gegebenenfalls schädliche Funktionen auszuführen,</ins> den Benutzer also schlecht behandeln). Unfreie Software wird von den Entwicklern kontrolliert, welches sie in eine Position der Macht gegenüber den Nutzern versetzt. <a href="/philosophy/free-software-even-more-important">Das ist die grundlegende Ungerechtigkeit!</a> Häufig üben Entwickler diese Macht zum Schaden der Benutzer aus, denen sie eigentlich dienen sollte. 
13  
New Toyotas will <a href="https://www.theregister.com/2020/08/18/aws_toyota_alliance/"> upload data to AWS to help create custom insurance premiums</a> based on driver behaviour. 
 
15  
BMW will remotely <a href="https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/"> enable and disable functionality in cars</a> through a universal back door. 
 
16  
Most modern cars now <a href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html"> record and send various kinds of data to the manufacturer</a>. For the user, access to the data is nearly impossible, as it involves cracking the car's computer, which is always hidden and running with proprietary software. 
 
17  
Tesla users claim Tesla <a href="https://www.reuters.com/article/us-tesla-battery/tesla-owner-lawsuit-claims-software-update-fraudulently-cut-battery-capacity-idUSKCN1UY2TW">force-installed software to cut down on battery range</a>, rather than replace the defective batteries. Tesla did this to avoid having to run their warranty. 
 
21  
Former executives of Volkswagen are being <a href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison"> sued over this fraud</a>. 
 
22  
Tesla cars collect lots of personal data, and <a href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html"> when they go to a junkyard the driver's personal data goes with them</a>. 
 
23  
The FordPass Connect feature of some Ford vehicles has <a href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"> near-complete access to the internal car network</a>. It is constantly connected to the cellular phone network and sends Ford a lot of data, including car location. This feature operates even when the ignition key is removed, and users report that they can't disable it. 
 
25  
New GM cars <a href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html"> offer the feature of a universal back door</a>. 
 
27  
In China, it is mandatory for electric cars to be equipped with a terminal that <a href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"> transfers technical data, including car location, to a government-run platform</a>. In practice, <a href="/proprietary/proprietary-surveillance.html#car-spying"> manufacturers collect this data</a> as part of their own spying, then forward it to the government-run platform. 
 
28  
GM <a href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"> tracked the choices of radio programs</a> in its &ldquo;connected&rdquo; cars, minute by minute. 
 
32 | AI-powered driving apps can <a
| [-href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">-]
| {+href="https://www.vice.com/en/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">+}
| track your every move</a>. 
AI-powered driving apps can <a href="https://www.vice.com/en/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"> track your every move</a>. 
KI-gestützte Apps zur Steuerung von Fahrzeugen können <a href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move" title="AI-Powered Driving Apps Can Track Your Every Move, Motherboard 2017.">jede Bewegung verfolgen</a>. 
38  
<a href="http://jalopnik.com/america-figured-out-a-new-way-audi-cheated-on-emissions-1788630969"> Audi's proprietary software used a simple method to cheat on emissions tests</a>: to activate a special low-emission gearshifting mode until the first time the car made a turn. 
Proprietäre <ins>Schummel</ins>software von <a href="https://jalopnik.com/america-figured-out-a-new-way-audi-cheated-on-emissions-1788630969" title="Raphael Orlove, America Figured Out A New Way Audi Cheated on Emissions Testing: Report, unter: Jalopnik.com 2016.">Audi verwendet eine einfache Methode, um bei Emissionsprüfungen zu betrügen</a>: um einen besonders emissionsarmen Modus auf dem Prüfstand zu aktivieren, bis das Kfz bewegt wird. 
39  
Due to weak security, <a href="http://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844">it is easy to open the doors of 100 million cars built by Volkswagen</a>. 
Aufgrund schwacher Sicherheit ist es <a href="https://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844" title="Jason Torchinsky, Almost Every Volkswagen Built Since 1995 Is Vulnerable To Wireless Unlocking Hacks, unter: jalopnik.com 2016.">leicht, die Türen von 100 Millionen von Volkswagen gebauten Autos zu öffnen</a>. 
40  
Computerized cars with nonfree software are <a href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"> snooping devices</a>. 
Rechnergestützte Autos mit unfreier Software <a href="//www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html" title="Your Car's Been Studying You Closely and Everyone Wants the Data, unter: http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html 2016.">schnüffeln Geräte aus</a>. 
42  
That's easy to do because the system has no authentication when accessed through the modem. However, even if it asked for authentication, you couldn't be confident that Nissan has no access. The software in the car is proprietary, <a href="/philosophy/free-software-even-more-important.html">which means it demands blind faith from its users</a>. 
Da das System keine Authentifizierung beim Zugriff auf das Mobilfunkmodem durchführt, ist das recht einfach. Doch selbst wenn diese angefordert würde, könnte man nicht mit Gewissheit sagen, ob Nissan nicht auch Zugang hätte. Die Software im Auto ist proprietär, was bedeutet, sie <a href="/philosophy/free-software-even-more-important">erfordert blindes Vertrauen von seinen Benutzern</a>. 
44 | Caterpillar vehicles come with [-a-] <a
| href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">
| [-back-door-] {+a back door+} to shutoff the engine</a> remotely. 
Caterpillar vehicles come with <a href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it"> a back door to shutoff the engine</a> remotely. 
Fahrzeuge von Caterpillar, weltgrößter US-Baumaschinen-Hersteller, werden mit einer <a href="https://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it" title="Tyler Durden, For Caterpillar The Depression Has Never Been Worse… But It Has A Cunning Plan How To Deal With It, eroHedge.com 2015.">Hintertür zur Abschaltung des Motors via Fernzugriff</a> ausgestattet. 
45  
Security researchers discovered a <a href="http://www.theguardian.com/technology/2015/aug/12/hack-car-brakes-sms-text"> vulnerability in diagnostic dongles used for vehicle tracking and insurance</a> that let them take remote control of a car or lorry using an SMS. 
Sicherheitsforscher entdeckten eine <a href="//www.theguardian.com/technology/2015/aug/12/hack-car-brakes-sms-text" title="Security researchers hack a car and apply the brakes via text, unter: theguardian.com 2015.">Schwachstelle in Diagnose-Dongles für Kraftfahrzeugortung und -versicherung</a>, über die mittels einer SMS die Fernsteuerung eines Autos oder Lastwagens möglich ist. 
46 | Crackers were able to <a
| href="http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/">
| take remote control of the Jeep</a> &ldquo;connected car&rdquo;. {+They
| could track the car, start or stop the engine, and activate or deactivate
| the brakes, and more.+} 
Crackers were able to <a href="http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/"> take remote control of the Jeep</a> &ldquo;connected car&rdquo;. They could track the car, start or stop the engine, and activate or deactivate the brakes, and more. 
Cracker konnten „Vernetzte Fahrzeug“-Technologie <a href="//arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/">eines Jeep fernsteuern und manipulieren</a>.<a href="#tn01" id="tn01-ref" class="transnote">[1]</a> 
50 | Tesla cars allow the company to extract data remotely and determine the
| car's location at any time. (See [-<a
| href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">-]
| Section 2, paragraphs b and [-c.</a>).-] {+c of the <a
| href="https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf">
| privacy statement</a>.)+} The company says it doesn't store this
| information, but if the state orders it to get the data and hand it over,
| the state can store it. 
Tesla cars allow the company to extract data remotely and determine the car's location at any time. (See Section 2, paragraphs b and c of the <a href="https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf"> privacy statement</a>.) The company says it doesn't store this information, but if the state orders it to get the data and hand it over, the state can store it. 
Fahrzeuge des amerikanischen Herstellers Tesla ermöglichen dem Unternehmen Datenmaterial mittels Fernzugriff abzugreifen und jederzeit die Position des Fahrzeugs zu bestimmen (siehe <a href="//www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf" type="application/pdf" hreflang="en">Datenschutzerklärung, Abschnitt 2 Abs. b und c</a>). Das Unternehmen gibt an, dass es diese Informationen nicht speichert, aber wenn staatliche Stellen deren Aushändigung anordnen und die Daten übergeben werden, könnte der Staat sie speichern. 
51  
Proprietary software in cars <a href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"> records information about drivers' movements</a>, which is made available to car manufacturers, insurance companies, and others. 
Proprietäre Software in Autos <a href="//www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/" title="Chris Woodyard and Jayne O'Donnell, Your car may be invading your privacy, unter: www.usatoday.com 2013.">zeichnet Informationen über Fahrzeugbewegungen auf</a>, welche Automobilhersteller, Versicherungsunternehmen und anderen verfügbar gemacht wird. 
53 | It is possible to <a
| href="http://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/">
| take control of some car computers through malware in music files</a>.
| Also <a
| href="http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0">{+
| +}by radio</a>. More information in <a
| href="http://www.autosec.org/faq.html"> Automotive Security And Privacy
| Center</a>. 
It is possible to <a href="http://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/"> take control of some car computers through malware in music files</a>. Also <a href="http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0"> by radio</a>. More information in <a href="http://www.autosec.org/faq.html"> Automotive Security And Privacy Center</a>. 
Es ist möglich, <a href="//www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/" title="With hacking, music can take control of your car, unter: IDG Communications 2013.">durch Musik-Dateien Kontrolle über einige Bordrechner in KFZ durch Schadsoftware</a> zu übernehmen, auch <a href="//www.nytimes.com/2011/03/10/business/10hack.html?_r=0" title="Researchers Show How a Car’s Electronics Can Be Taken Over Remotely, unter: NYTimes.com 2011.">per Funk</a>. Mehr Informationen unter <a href="//www.autosec.org/faq.html" xml:lang="en" lang="en">Automotive Security And Privacy Center</a>. 
56 || No change detected. The change might only be in amounts of spaces. 
Please see the <a href="/server/standards/README.translations.html">Translations README</a> for information on coordinating and contributing translations of this article. 
Bei der Übersetzung dieses Werkes wurde mit größter Sorgfalt vorgegangen. Trotzdem können Fehler nicht völlig ausgeschlossen werden. Sollten Sie Fehler bemerken oder Vorschläge, Kommentare oder Fragen zu diesem Dokument haben, wenden Sie sich bitte an unser Übersetzungsteam <a href="mailto:web-translators@gnu.org?cc=www-de-translators@gnu.org">&lt;web-translators@gnu.org&gt;</a>.</p>
<p>Weitere Informationen über die Koordinierung und Einsendung von Übersetzungen unserer Internetpräsenz finden Sie in der <a href="/server/standards/README.translations">LIESMICH für Übersetzungen</a>. 
58  
This page is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</a>. 
Dieses Werk ist lizenziert unter einer <a rel="license" href="//creativecommons.org/licenses/by/4.0/deed.de">Creative Commons Namensnennung 4.0 International</a>-Lizenz.