proprietary.de.po

Mismatched links: 95.

Mismatched ids: 1.

#text
4 | [-Table-]{+<a href="#TOC">Table+} of [-Contents-] {+contents</a>+} 
<a href="#TOC">Table of contents</a> 
Inhaltsverzeichnis 
5 Förderer (Gold) - Schirmherren
| <a [-href="#patrons" id="TOCpatrons">Patrons</a>-]
| {+href="#latest">Latest additions</a>+} 
<a href="#latest">Latest additions</a> 
<a href="#patrons" id="TOCpatrons">Förderer (Gold)</a> (5.000 $ oder mehr) 
6  
Proprietary software, also called nonfree software, means software that doesn't <a href="/philosophy/free-sw.html">respect users' freedom and community</a>. A proprietary program puts its developer or owner <a href="/philosophy/free-software-even-more-important.html"> in a position of power over its users.</a> This power is in itself an injustice. 
Proprietäre Software, auch unfreie Software genannt, bezeichnet Software, die nicht die <a href="/philosophy/free-sw">Freiheit und Gemeinschaft der Nutzer respektiert</a>. Ein proprietäres Programm hebt seine Entwickler oder <ins>Rechte</ins>inhaber in eine <a href="/philosophy/free-software-even-more-important">Position der Macht gegenüber seinen Nutzern</a>. Diese Macht selbst ist an sich ein Unrecht. 
8  
In this section, we also list <a href="/proprietary/malware-mobiles.html#phone-communications">one other malicious characteristic of mobile phones, location tracking</a> which is caused by the underlying radio system rather than by the specific software in them. 
 
12  
If you want to be notified when we add new items or make other changes, subscribe to the <a href="https://lists.gnu.org/mailman/listinfo/www-malware-commits">mailing list &lt;www-malware-commits@gnu.org&gt;</a>. 
 
15 | <a [-href="/proprietary/proprietary-deception.html">Deception</a>-]
| {+href="/proprietary/proprietary-addictions.html">Addictions</a>+} 
<a href="/proprietary/proprietary-addictions.html">Addictions</a> 
<a href="/proprietary/proprietary-deception">Irreführung</a> 
16 | <a href="/proprietary/proprietary-back-doors.html">Back [-doors</a>-]
| {+doors</a>&nbsp;(<a href="#f1">1</a>)+} 
<a href="/proprietary/proprietary-back-doors.html">Back doors</a>&nbsp;(<a href="#f1">1</a>) 
<a href="/proprietary/proprietary-back-doors">Hintertüren</a> 
17  
<a href="/proprietary/proprietary-censorship.html">Censorship</a> 
<a href="/proprietary/proprietary-censorship">Zensur</a> 
18 || No change detected. The change might only be in amounts of spaces. 
<a href="/proprietary/proprietary-coverups.html">Coverups</a> 
<a href="/proprietary/proprietary-coverups">Verschleierung</a> 
19  
<a href="/proprietary/proprietary-deception.html">Deception</a> 
<a href="/proprietary/proprietary-deception">Irreführung</a> 
20 | <a [-href="/proprietary/proprietary-sabotage.html">Sabotage</a>-]
| {+href="/proprietary/proprietary-drm.html">DRM</a>&nbsp;(<a
| href="#f2">2</a>)+} 
<a href="/proprietary/proprietary-drm.html">DRM</a>&nbsp;(<a href="#f2">2</a>) 
<a href="/proprietary/proprietary-sabotage">Sabotage</a> 
21 | <a [-href="/proprietary/proprietary-coverups.html">Coverups</a>-]
| {+href="/proprietary/proprietary-fraud.html">Fraud</a>+} 
<a href="/proprietary/proprietary-fraud.html">Fraud</a> 
<a href="/proprietary/proprietary-coverups">Verschleierung</a> 
22  
<a href="/proprietary/proprietary-incompatibility.html">Incompatibility</a> 
<a href="/proprietary/proprietary-incompatibility">Inkompatibilität</a> 
23  
<a href="/proprietary/proprietary-insecurity.html">Insecurity</a> 
<a href="/proprietary/proprietary-insecurity">Unsicherheit</a> 
24  
<a href="/proprietary/proprietary-interference.html">Interference</a> 
<a href="/proprietary/proprietary-interference">Eingriff</a> 
25 | <a [-href="/proprietary/proprietary-sabotage.html">Sabotage</a>-]
| {+href="/proprietary/proprietary-jails.html">Jails</a>&nbsp;(<a
| href="#f3">3</a>)+} 
<a href="/proprietary/proprietary-jails.html">Jails</a>&nbsp;(<a href="#f3">3</a>) 
<a href="/proprietary/proprietary-sabotage">Sabotage</a> 
26 | <a [-href="/proprietary/proprietary-deception.html">Deception</a>-]
| {+href="/proprietary/proprietary-manipulation.html">Manipulation</a>+} 
<a href="/proprietary/proprietary-manipulation.html">Manipulation</a> 
<a href="/proprietary/proprietary-deception">Irreführung</a> 
27 | <a [-href="/proprietary/proprietary-deception.html">Deception</a>-]
| {+href="/proprietary/proprietary-obsolescence.html">Obsolescence</a>+} 
<a href="/proprietary/proprietary-obsolescence.html">Obsolescence</a> 
<a href="/proprietary/proprietary-deception">Irreführung</a> 
28  
<a href="/proprietary/proprietary-sabotage.html">Sabotage</a> 
<a href="/proprietary/proprietary-sabotage">Sabotage</a> 
29  
<a href="/proprietary/proprietary-subscriptions.html">Subscriptions</a> 
<a href="/proprietary/proprietary-subscriptions">Abonnements</a> 
30  
<a href="/proprietary/proprietary-surveillance.html">Surveillance</a> 
<a href="/proprietary/proprietary-surveillance">Überwachung</a> 
31 | <a [-href="/proprietary/proprietary-tethers.html">Tethers</a> to
| servers-]
| {+href="/proprietary/proprietary-tethers.html">Tethers</a>&nbsp;(<a
| href="#f4">4</a>)+} 
<a href="/proprietary/proprietary-tethers.html">Tethers</a>&nbsp;(<a href="#f4">4</a>) 
<a href="/proprietary/proprietary-tethers">Server-Bindungen</a> 
32 | <a [-href="/proprietary/proprietary-sabotage.html">Sabotage</a>-]
| {+href="/proprietary/proprietary-tyrants.html">Tyrants</a>&nbsp;(<a
| href="#f5">5</a>)+} 
<a href="/proprietary/proprietary-tyrants.html">Tyrants</a>&nbsp;(<a href="#f5">5</a>) 
<a href="/proprietary/proprietary-sabotage">Sabotage</a> 
33 | <a [-href="/proprietary/potential-malware.html">Potential Malware</a>-]
| {+href="/proprietary/potential-malware.html">In the pipe</a>+} 
<a href="/proprietary/potential-malware.html">In the pipe</a> 
<a href="/proprietary/potential-malware-adobe">Potenzielle Schadsoftware</a> 
34 | <a [-href="/proprietary/malware-appliances.html">Malware in
| appliances</a>-]
| {+href="/proprietary/malware-appliances.html">Appliances</a>+} 
<a href="/proprietary/malware-appliances.html">Appliances</a> 
<a href="/proprietary/malware-appliances">Schadsoftware in Geräten</a> 
35 | <a [-href="/proprietary/malware-cars.html">Malware in cars</a>-]
| {+href="/proprietary/malware-cars.html">Cars</a>+} 
<a href="/proprietary/malware-cars.html">Cars</a> 
<a href="/proprietary/malware-cars">Schadsoftware in Pkws</a> 
36 | <a [-href="/proprietary/malware-cars.html">Malware in cars</a>-]
| {+href="/proprietary/malware-in-online-conferencing.html">Conferencing</a
| >+} 
<a href="/proprietary/malware-in-online-conferencing.html">Conferencing</a> 
<a href="/proprietary/malware-cars">Schadsoftware in Pkws</a> 
37 | <a [-href="/proprietary/malware-amazon.html">Amazon Malware</a>-]
| {+href="/proprietary/malware-edtech.html">Ed Tech</a>+} 
<a href="/proprietary/malware-edtech.html">Ed Tech</a> 
<a href="/proprietary/malware-amazon">Schadsoftware von Amazon</a> 
38 | <a [-href="/proprietary/malware-games.html">Malware in games</a>-]
| {+href="/proprietary/malware-games.html">Games</a>+} 
<a href="/proprietary/malware-games.html">Games</a> 
<a href="/proprietary/malware-games">Schadsoftware in Spielen</a> 
39 | <a [-href="/proprietary/malware-mobiles.html">Malware in mobile
| devices</a>-] {+href="/proprietary/malware-mobiles.html">Mobiles</a>+} 
<a href="/proprietary/malware-mobiles.html">Mobiles</a> 
<a href="/proprietary/malware-mobiles">Schadsoftware in Mobilgeräten</a> 
40 | <a [-href="/proprietary/malware-webpages.html">Malware in webpages</a>-]
| {+href="/proprietary/malware-webpages.html">Webpages</a>+} 
<a href="/proprietary/malware-webpages.html">Webpages</a> 
<a href="/proprietary/malware-webpages">Schadsoftware in Internetdokumentenen</a> 
41 | <a [-href="/proprietary/malware-adobe.html">Adobe Malware</a>-]
| {+href="/proprietary/malware-adobe.html">Adobe</a>+} 
<a href="/proprietary/malware-adobe.html">Adobe</a> 
<a href="/proprietary/malware-adobe">Schadsoftware von Adobe</a> 
42 | <a [-href="/proprietary/malware-amazon.html">Amazon Malware</a>-]
| {+href="/proprietary/malware-amazon.html">Amazon</a>+} 
<a href="/proprietary/malware-amazon.html">Amazon</a> 
<a href="/proprietary/malware-amazon">Schadsoftware von Amazon</a> 
43 | <a [-href="/proprietary/malware-apple.html">Apple Malware</a>-]
| {+href="/proprietary/malware-apple.html">Apple</a>+} 
<a href="/proprietary/malware-apple.html">Apple</a> 
<a href="/proprietary/malware-apple">Schadsoftware von Apple</a> 
44 | <a [-href="/proprietary/malware-google.html">Google Malware</a>-]
| {+href="/proprietary/malware-google.html">Google</a>+} 
<a href="/proprietary/malware-google.html">Google</a> 
<a href="/proprietary/malware-google">Schadsoftware von Google</a> 
45 | <a [-href="/proprietary/malware-microsoft.html">Microsoft Malware</a>-]
| {+href="/proprietary/malware-microsoft.html">Microsoft</a>+} 
<a href="/proprietary/malware-microsoft.html">Microsoft</a> 
<a href="/proprietary/malware-microsoft">Schadsoftware von Microsoft</a> 
47 | [-<a href="/proprietary/proprietary-drm.html">Digital-]{+<em>Digital+}
| restrictions [-management</a>-] {+management,+} or [-&ldquo;DRM&rdquo;
| means-] {+&ldquo;DRM&rdquo;:</em>&nbsp;+} functionalities designed to
| restrict what users can do with the data in their computers. 
<em>Digital restrictions management, or &ldquo;DRM&rdquo;:</em>&nbsp; functionalities designed to restrict what users can do with the data in their computers. 
<a href="/proprietary/proprietary-drm">Digitale Rechte-Minderung (DRM)</a><br />oder <em>Digitale Beschränkungsverwaltung</em><br />
&#8209;&#160;Funktionen, entwickelt um zu beschränken, was Nutzer mit den Daten auf ihren Rechnern tun können. 
48 | [-<a
| href="/proprietary/proprietary-jails.html">Jails</a>&mdash;systems-]{+<em>Jail:</em>&nbsp;
| system+} that impose{+s+} censorship on application programs. 
<em>Jail:</em>&nbsp; system that imposes censorship on application programs. 
<a href="/proprietary/proprietary-jails">Gefängnisse</a><br />&#8209;&#160;Systeme, die Anwendungsprogrammen Zensur auferlegen. 
50 | [-<a
| href="/proprietary/proprietary-tyrants.html">Tyrants</a>&mdash;systems-]{+<em>Tyrant:</em>&nbsp;
| system+} that reject{+s+} any operating system not
| &ldquo;authorized&rdquo; by the manufacturer. 
<em>Tyrant:</em>&nbsp; system that rejects any operating system not &ldquo;authorized&rdquo; by the manufacturer. 
<a href="/proprietary/proprietary-tyrants">Tyrannen</a><br />&#8209;&#160;Systeme, die jedes nicht vom Hersteller „autorisierte“ Betriebssystem zurückweisen. 
51 | Users of proprietary software are defenseless against these forms of
| mistreatment. The way to avoid them is by insisting on <a
| href="/philosophy/free-software-even-more-important.html">free
| (freedom-respecting) [-software.</a>-] {+software</a>.+} Since free
| software is controlled by its users, they have a pretty good defense
| against malicious software functionality. 
Users of proprietary software are defenseless against these forms of mistreatment. The way to avoid them is by insisting on <a href="/philosophy/free-software-even-more-important.html">free (freedom-respecting) software</a>. Since free software is controlled by its users, they have a pretty good defense against malicious software functionality. 
Nutzer proprietärer Software sind solchen Formen der schlechten Behandlung schutzlos ausgeliefert. Um diese zu unterbinden, ist auf <a href="/philosophy/free-software-even-more-important">Freie&#160;&#8209;&#160;Freiheit respektierende&#160;&#8209;&#160;Software</a> zu beharren. Da Freie Software durch deren Nutzer kontrolliert wird, haben sie eine ziemlich gute Verteidigung gegen heimtückische Softwarefunktionen. 
53  
Ed Tech companies use their surveillance power to manipulate students, and direct them into tracks towards various levels of knowledge, power and prestige. The article argues that <a href="https://blogs.lse.ac.uk/medialse/2021/10/25/algorithmic-injustice-in-education-why-tech-companies-should-require-a-license-to-operate-in-childrens-education/">these companies should obtain licenses to operate</a>. That wouldn't hurt, but it doesn't address the root of the problem. All data acquired in a school about any student, teacher, or employee must not leave the school, and must be kept in computers that belong to the school and run free (as in freedom) software. That way, the school district and/or parents can control what is done with those data. 
 
54  
A building in LA, with a supermarket in it, <a href="https://www.latimes.com/business/story/2021-11-09/column-trader-joes-parking-app">demands customers load a particular app to pay for parking in the parking lot</a>, and accept pervasive surveillance. They also have the option of entering their license plate numbers in a kiosk. That is an injustice, too. 
 
55  
Apple's new tactic to restrict users from repairing their own device and impose DRM on people is to <a href="https://www.ifixit.com/News/54829/apples-new-screen-repair-trap-could-change-the-repair-industry-forever">completely disable its Face ID functionality</a> when you replace its screen. 
 
56  
Microsoft is making it harder and harder to <a href="https://www.theverge.com/22630319/microsoft-windows-11-default-browser-changes">replace default apps in its Windows</a> operating system and is pressuring users to use its proprietary programs instead. We believe the best approach to this would be replacing Windows with a free (as in freedom) operating system like GNU. We also maintain a <a href="/distros/free-distros.html">list of fully free distributions of GNU</a>. 
 
57  
Spotify app <a href="https://www.sec.gov/Archives/edgar/data/1639920/000119312518063434/d494294df1.htm">harvests users' data to personally identify and know people</a> through music, their mood, mindset, activities, and tastes. There are over 150 billion events logged daily on the program which contains users' data and personal information. 
 
58 | <a [-href="/proprietary/malware-mobiles.html">Malware in mobile
| devices</a>-] {+href="/proprietary/all.html">More items&hellip;</a>+} 
<a href="/proprietary/all.html">More items&hellip;</a> 
<a href="/proprietary/malware-mobiles">Schadsoftware in Mobilgeräten</a> 
59 !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
! GNU should report facts briefly and crisply! Also resulting !
! consequences should not be swept away by an own opinion! !
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
TRANSLATORS: Use space (SPC) as msgstr if you don't have notes. 
*GNUN-SLOT: TRANSLATOR'S NOTES* 
<!--div class="highlight-para"> <p> Unter <em>Schadprogramm</em> bzw. <em>Schadsoftware</em> (engl. ‚Malware‘, ein Kofferwort aus <i><b>Mal</b>icious</i> ‚bösartig‘ und <i>Soft<b>ware</b></i>) bezeichnet man Software, die entwickelt wurde, um vom Benutzer unerwünschte und gegebenenfalls schädliche Funktionen auszuführen (damit ist nicht Software gemeint, die zufällig Fehler enthält<ins>, obwohl diese auch Schaden anrichten kann</ins>).</p><p>Schadsoftware und unfreie Software sind zwei verschiedene Fragestellungen. Der Unterschied zwischen <a href="/philosophy/free-sw">freier</a> und unfreier Software ist, <a href="/philosophy/free-software-even-more-important">ob die Nutzer das Programm kontrollieren oder umgekehrt</a>. Es ist nicht direkt eine Frage dessen was das Programm <em>macht</em> wenn es ausgeführt wird. In der Praxis ist unfreie Software jedoch oft Schadsoftware, weil die Erkenntnis des Entwicklers, dass die Nutzer machtlos sein würden bösartige Funktionen zu beheben, dazu verführt, einige einzuführen.</p> </div --> 
61 || No change detected. The change might only be in amounts of spaces. 
Please see the <a href="/server/standards/README.translations.html">Translations README</a> for information on coordinating and contributing translations of this article. 
Bei der Übersetzung dieses Werkes wurde mit größter Sorgfalt vorgegangen. Trotzdem können Fehler nicht völlig ausgeschlossen werden. Sollten Sie Fehler bemerken oder Vorschläge, Kommentare oder Fragen zu diesem Dokument haben, wenden Sie sich bitte an unser Übersetzungsteam <a href="mailto:web-translators@gnu.org?cc=www-de-translators@gnu.org">&lt;web-translators@gnu.org&gt;</a>.</p>
<p>Weitere Informationen über die Koordinierung und Einsendung von Übersetzungen unserer Internetpräsenz finden Sie in der <a href="/server/standards/README.translations">LIESMICH für Übersetzungen</a>. 
63  
This page is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</a>. 
Dieses Werk ist lizenziert unter einer <a rel="license" href="//creativecommons.org/licenses/by/4.0/deed.de">Creative Commons Namensnennung 4.0 International</a>-Lizenz.