potential-malware.de.po

Mismatched links: 16.

Mismatched ids: 0.

#text
8 | {+</a>&nbsp;/+} <a [-href="/proprietary/proprietary.html">Other examples
| of proprietary malware</a>-]
| {+href="/proprietary/proprietary.html">Malware</a>&nbsp;/ By
| type&nbsp;/+} 
</a>&nbsp;/ <a href="/proprietary/proprietary.html">Malware</a>&nbsp;/ By type&nbsp;/ 
<a href="/proprietary/">Weitere Beispiele proprietärer Schadsoftware</a> 
10 | Nonfree (proprietary) software is very often malware (designed to mistreat
| the user). Nonfree software is controlled by its developers, which puts
| them in a position of power over the users; <a
| href="/philosophy/free-software-even-more-important.html">that is the
| basic injustice</a>. The developers {+and manufacturers+} often exercise
| that power to the detriment of the users they ought to serve. 
Nonfree (proprietary) software is very often malware (designed to mistreat the user). Nonfree software is controlled by its developers, which puts them in a position of power over the users; <a href="/philosophy/free-software-even-more-important.html">that is the basic injustice</a>. The developers and manufacturers often exercise that power to the detriment of the users they ought to serve. 
Unfreie (proprietäre) Software entspricht sehr häufig einem Schadprogramm (entworfen, um <ins>unerwünschte und gegebenenfalls schädliche Funktionen auszuführen,</ins> den Benutzer also schlecht behandeln). Unfreie Software wird von den Entwicklern kontrolliert, welches sie in eine Position der Macht gegenüber den Nutzern versetzt. <a href="/philosophy/free-software-even-more-important">Das ist die grundlegende Ungerechtigkeit!</a> Häufig üben Entwickler diese Macht zum Schaden der Benutzer aus, denen sie eigentlich dienen sollte. 
13  
<a href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation"> Advertising companies are experimenting to manipulate people's minds</a>, and impose a new way of advertising by altering their dreams. This &ldquo;targeted dream incubation&rdquo; would trigger &ldquo;refreshing dreams&rdquo; of the product, according to the companies. 
 
14  
Car companies are coming up with a list of clever reasons why <a href="https://www.nytimes.com/2019/03/28/business/autonomous-cars-technology-privacy.html"> they &ldquo;have to&rdquo; put cameras and microphones in the car</a>. 
 
16  
Volvo plans to <a href="https://www.theguardian.com/business/2019/mar/20/volvo-to-install-cameras-in-new-cars-to-reduce-road-deaths"> install cameras inside cars</a> to monitor the driver for signs of impairment that could cause an accident. 
 
18  
Malware installed into the processor in a hard drive could <a href="https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-listening-devices-researchers-find"> use the disk itself as a microphone to detect speech</a>. 
 
19  
The article refers to the &ldquo;Linux operating system&rdquo; but seems to mean <a href="/gnu/linux-and-gnu.html">GNU/Linux</a>. That hack would not require changing Linux itself. 
 
20  
Some portable surveillance devices (&ldquo;phones&rdquo;) now have <a href="https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-s10-launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g"> fingerprint sensors in the display</a>. Does that imply they could take the fingerprint of anyone who operates the touch screen? 
 
24  
Any device that has a microphone and a speaker could be <a href="http://www.washington.edu/news/2017/08/16/computer-scientists-use-music-to-covertly-track-body-movements-activity/">turned into a sonar system that would track the movements of people in the same room or other rooms nearby</a>. 
Jedes Gerät, das über Mikrofon und Lautsprecher verfügt, könnte <a href="https://www.washington.edu/news/2017/08/16/computer-scientists-use-music-to-covertly-track-body-movements-activity/" title="James Urton, Computer scientists use music to covertly track body movements, activity, unter: https://www.washington.edu/news/2017/08/16/computer-scientists-use-music-to-covertly-track-body-movements-activity/, University of Washington 2017.">zu einem Sonarsystem umgewandelt werden, das Bewegungen von Personen im gleichen Raum oder anderen nahegelegenen Räumen verfolgt</a>. 
27 || No change detected. The change might only be in amounts of spaces. 
Please see the <a href="/server/standards/README.translations.html">Translations README</a> for information on coordinating and contributing translations of this article. 
Bei der Übersetzung dieses Werkes wurde mit größter Sorgfalt vorgegangen. Trotzdem können Fehler nicht völlig ausgeschlossen werden. Sollten Sie Fehler bemerken oder Vorschläge, Kommentare oder Fragen zu diesem Dokument haben, wenden Sie sich bitte an unser Übersetzungsteam <a href="mailto:web-translators@gnu.org?cc=www-de-translators@gnu.org">&lt;web-translators@gnu.org&gt;</a>.</p>
<p>Weitere Informationen über die Koordinierung und Einsendung von Übersetzungen unserer Internetpräsenz finden Sie in der <a href="/server/standards/README.translations">LIESMICH für Übersetzungen</a>. 
29  
This page is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</a>. 
Dieses Werk ist lizenziert unter einer <a rel="license" href="//creativecommons.org/licenses/by/4.0/deed.de">Creative Commons Namensnennung 4.0 International</a>-Lizenz.