proprietary.pl.po

Mismatched links: 87.

Mismatched ids: 1.

#text
4 | [-Table-]{+<a href="#TOC">Table+} of [-Contents-] {+contents</a>+} 
<a href="#TOC">Table of contents</a> 
Spis treści 
5 | <a [-href="#patrons" id="TOCpatrons">Patrons</a>-]
| {+href="#latest">Latest additions</a>+} 
<a href="#latest">Latest additions</a> 
<a href="#patrons" id="TOCpatrons">Mecenasi</a> 
8  
In this section, we also list <a href="/proprietary/malware-mobiles.html#phone-communications">one other malicious characteristic of mobile phones, location tracking</a> which is caused by the underlying radio system rather than by the specific software in them. 
 
12  
If you want to be notified when we add new items or make other changes, subscribe to the <a href="https://lists.gnu.org/mailman/listinfo/www-malware-commits">mailing list &lt;www-malware-commits@gnu.org&gt;</a>. 
 
15 | <a [-href="/philosophy/proprietary-insecurity.html">Insecurity</a>-]
| {+href="/proprietary/proprietary-addictions.html">Addictions</a>+} 
<a href="/proprietary/proprietary-addictions.html">Addictions</a> 
<a href="/philosophy/proprietary-insecurity.html">Brak zabezpieczenia</a> 
16 | <a [-href="/philosophy/proprietary-back-doors.html">Back doors</a>-]
| {+href="/proprietary/proprietary-back-doors.html">Back
| doors</a>&nbsp;(<a href="#f1">1</a>)+} 
<a href="/proprietary/proprietary-back-doors.html">Back doors</a>&nbsp;(<a href="#f1">1</a>) 
<a href="/philosophy/proprietary-back-doors.html">Tylne drzwi</a> [ang. <em>back doors</em>] 
17 | <a
| [-href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a>-]
| {+href="/proprietary/proprietary-censorship.html">Censorship</a>+} 
<a href="/proprietary/proprietary-censorship.html">Censorship</a> 
<a href="/philosophy/proprietary/proprietary-censorship.html">Cenzura</a> 
18 | <a
| [-href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a>-]
| {+href="/proprietary/proprietary-coverups.html">Coverups</a>+} 
<a href="/proprietary/proprietary-coverups.html">Coverups</a> 
<a href="/philosophy/proprietary/proprietary-censorship.html">Cenzura</a> 
19 | <a [-href="/philosophy/proprietary-insecurity.html">Insecurity</a>-]
| {+href="/proprietary/proprietary-deception.html">Deception</a>+} 
<a href="/proprietary/proprietary-deception.html">Deception</a> 
<a href="/philosophy/proprietary-insecurity.html">Brak zabezpieczenia</a> 
20 | <a [-href="/philosophy/proprietary-sabotage.html">Sabotage</a>-]
| {+href="/proprietary/proprietary-drm.html">DRM</a>&nbsp;(<a
| href="#f2">2</a>)+} 
<a href="/proprietary/proprietary-drm.html">DRM</a>&nbsp;(<a href="#f2">2</a>) 
<a href="/philosophy/proprietary-sabotage.html">Sabotaż</a> 
21 | <a
| [-href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a>-]
| {+href="/proprietary/proprietary-fraud.html">Fraud</a>+} 
<a href="/proprietary/proprietary-fraud.html">Fraud</a> 
<a href="/philosophy/proprietary/proprietary-censorship.html">Cenzura</a> 
22 | <a [-href="/philosophy/proprietary-insecurity.html">Insecurity</a>-]
| {+href="/proprietary/proprietary-incompatibility.html">Incompatibility</a
| >+} 
<a href="/proprietary/proprietary-incompatibility.html">Incompatibility</a> 
<a href="/philosophy/proprietary-insecurity.html">Brak zabezpieczenia</a> 
23 | <a [-href="/philosophy/proprietary-insecurity.html">Insecurity</a>-]
| {+href="/proprietary/proprietary-insecurity.html">Insecurity</a>+} 
<a href="/proprietary/proprietary-insecurity.html">Insecurity</a> 
<a href="/philosophy/proprietary-insecurity.html">Brak zabezpieczenia</a> 
24 | <a [-href="/philosophy/proprietary-interference.html">Interference</a>-]
| {+href="/proprietary/proprietary-interference.html">Interference</a>+} 
<a href="/proprietary/proprietary-interference.html">Interference</a> 
<a href="/philosophy/proprietary-interference.html">Ingerencja</a> 
25 | <a [-href="/philosophy/proprietary-sabotage.html">Sabotage</a>-]
| {+href="/proprietary/proprietary-jails.html">Jails</a>&nbsp;(<a
| href="#f3">3</a>)+} 
<a href="/proprietary/proprietary-jails.html">Jails</a>&nbsp;(<a href="#f3">3</a>) 
<a href="/philosophy/proprietary-sabotage.html">Sabotaż</a> 
26 | <a [-href="/philosophy/proprietary-insecurity.html">Insecurity</a>-]
| {+href="/proprietary/proprietary-manipulation.html">Manipulation</a>+} 
<a href="/proprietary/proprietary-manipulation.html">Manipulation</a> 
<a href="/philosophy/proprietary-insecurity.html">Brak zabezpieczenia</a> 
27 | <a [-href="/philosophy/proprietary-insecurity.html">Insecurity</a>-]
| {+href="/proprietary/proprietary-obsolescence.html">Obsolescence</a>+} 
<a href="/proprietary/proprietary-obsolescence.html">Obsolescence</a> 
<a href="/philosophy/proprietary-insecurity.html">Brak zabezpieczenia</a> 
28 | <a [-href="/philosophy/proprietary-sabotage.html">Sabotage</a>-]
| {+href="/proprietary/proprietary-sabotage.html">Sabotage</a>+} 
<a href="/proprietary/proprietary-sabotage.html">Sabotage</a> 
<a href="/philosophy/proprietary-sabotage.html">Sabotaż</a> 
29 | <a [-href="/philosophy/proprietary-insecurity.html">Insecurity</a>-]
| {+href="/proprietary/proprietary-subscriptions.html">Subscriptions</a>+} 
<a href="/proprietary/proprietary-subscriptions.html">Subscriptions</a> 
<a href="/philosophy/proprietary-insecurity.html">Brak zabezpieczenia</a> 
30 | <a [-href="/philosophy/proprietary-surveillance.html">Surveillance</a>-]
| {+href="/proprietary/proprietary-surveillance.html">Surveillance</a>+} 
<a href="/proprietary/proprietary-surveillance.html">Surveillance</a> 
<a href="/philosophy/proprietary-surveillance.html">Inwigilacja</a> 
31 | <a
| [-href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a>-]
| {+href="/proprietary/proprietary-tethers.html">Tethers</a>&nbsp;(<a
| href="#f4">4</a>)+} 
<a href="/proprietary/proprietary-tethers.html">Tethers</a>&nbsp;(<a href="#f4">4</a>) 
<a href="/philosophy/proprietary/proprietary-censorship.html">Cenzura</a> 
32 | <a [-href="/philosophy/proprietary-sabotage.html">Sabotage</a>-]
| {+href="/proprietary/proprietary-tyrants.html">Tyrants</a>&nbsp;(<a
| href="#f5">5</a>)+} 
<a href="/proprietary/proprietary-tyrants.html">Tyrants</a>&nbsp;(<a href="#f5">5</a>) 
<a href="/philosophy/proprietary-sabotage.html">Sabotaż</a> 
33 | <a [-href="/philosophy/malware-apple.html">Apple Malware</a>-]
| {+href="/proprietary/potential-malware.html">In the pipe</a>+} 
<a href="/proprietary/potential-malware.html">In the pipe</a> 
<a href="/philosophy/malware-apple.html">Malware Apple'a</a> 
34 | <a [-href="/philosophy/malware-mobiles.html">Malware in mobile
| devices</a>-]
| {+href="/proprietary/malware-appliances.html">Appliances</a>+} 
<a href="/proprietary/malware-appliances.html">Appliances</a> 
<a href="/philosophy/malware-mobiles.html">Malware w&nbsp;urządzeniach mobilnych</a> 
35 | <a [-href="/philosophy/malware-mobiles.html">Malware in mobile
| devices</a>-] {+href="/proprietary/malware-cars.html">Cars</a>+} 
<a href="/proprietary/malware-cars.html">Cars</a> 
<a href="/philosophy/malware-mobiles.html">Malware w&nbsp;urządzeniach mobilnych</a> 
36 | <a [-href="/philosophy/malware-mobiles.html">Malware in mobile
| devices</a>-]
| {+href="/proprietary/malware-in-online-conferencing.html">Conferencing</a
| >+} 
<a href="/proprietary/malware-in-online-conferencing.html">Conferencing</a> 
<a href="/philosophy/malware-mobiles.html">Malware w&nbsp;urządzeniach mobilnych</a> 
37 | <a [-href="/philosophy/malware-apple.html">Apple Malware</a>-]
| {+href="/proprietary/malware-edtech.html">Ed Tech</a>+} 
<a href="/proprietary/malware-edtech.html">Ed Tech</a> 
<a href="/philosophy/malware-apple.html">Malware Apple'a</a> 
38 | <a [-href="/philosophy/malware-mobiles.html">Malware in mobile
| devices</a>-] {+href="/proprietary/malware-games.html">Games</a>+} 
<a href="/proprietary/malware-games.html">Games</a> 
<a href="/philosophy/malware-mobiles.html">Malware w&nbsp;urządzeniach mobilnych</a> 
39 | <a [-href="/philosophy/malware-mobiles.html">Malware in mobile
| devices</a>-] {+href="/proprietary/malware-mobiles.html">Mobiles</a>+} 
<a href="/proprietary/malware-mobiles.html">Mobiles</a> 
<a href="/philosophy/malware-mobiles.html">Malware w&nbsp;urządzeniach mobilnych</a> 
40 | <a [-href="/philosophy/malware-mobiles.html">Malware in mobile
| devices</a>-] {+href="/proprietary/malware-webpages.html">Webpages</a>+} 
<a href="/proprietary/malware-webpages.html">Webpages</a> 
<a href="/philosophy/malware-mobiles.html">Malware w&nbsp;urządzeniach mobilnych</a> 
41 | <a [-href="/philosophy/malware-apple.html">Apple Malware</a>-]
| {+href="/proprietary/malware-adobe.html">Adobe</a>+} 
<a href="/proprietary/malware-adobe.html">Adobe</a> 
<a href="/philosophy/malware-apple.html">Malware Apple'a</a> 
42 | <a [-href="/philosophy/malware-apple.html">Apple Malware</a>-]
| {+href="/proprietary/malware-amazon.html">Amazon</a>+} 
<a href="/proprietary/malware-amazon.html">Amazon</a> 
<a href="/philosophy/malware-apple.html">Malware Apple'a</a> 
43 | <a [-href="/philosophy/malware-apple.html">Apple Malware</a>-]
| {+href="/proprietary/malware-apple.html">Apple</a>+} 
<a href="/proprietary/malware-apple.html">Apple</a> 
<a href="/philosophy/malware-apple.html">Malware Apple'a</a> 
44 | <a [-href="/philosophy/malware-apple.html">Apple Malware</a>-]
| {+href="/proprietary/malware-google.html">Google</a>+} 
<a href="/proprietary/malware-google.html">Google</a> 
<a href="/philosophy/malware-apple.html">Malware Apple'a</a> 
45 | <a [-href="/philosophy/malware-microsoft.html">Microsoft Malware</a>-]
| {+href="/proprietary/malware-microsoft.html">Microsoft</a>+} 
<a href="/proprietary/malware-microsoft.html">Microsoft</a> 
<a href="/philosophy/malware-microsoft.html">Malware Microsoftu</a> 
47 | [-<a href="/philosophy/proprietary-drm.html">Digital-]{+<em>Digital+}
| restrictions [-management</a>-] {+management,+} or [-&ldquo;DRM&rdquo;
| means-] {+&ldquo;DRM&rdquo;:</em>&nbsp;+} functionalities designed to
| restrict what users can do with the data in their computers. 
<em>Digital restrictions management, or &ldquo;DRM&rdquo;:</em>&nbsp; functionalities designed to restrict what users can do with the data in their computers. 
<a href="/philosophy/proprietary-drm.html">Digital restrictions management</a> [<em>cyfrowe zarządzanie ograniczeniami</em>] lub&nbsp;&bdquo;DRM&rdquo; oznacza funkcjonalność zaprojektowana aby&nbsp;ograniczać co użytkownicy mogą robić z&nbsp;danymi na&nbsp;własnych komputerach. 
48 | [-<a
| href="/philosophy/proprietary-jails.html">Jails</a>&mdash;systems-]{+<em>Jail:</em>&nbsp;
| system+} that impose{+s+} censorship on application programs. 
<em>Jail:</em>&nbsp; system that imposes censorship on application programs. 
<a href="/philosophy/proprietary-jails.html">Więzienia</a>&nbsp;&ndash;systemy, które wymuszają cenzurę na&nbsp;oprogramowanie. 
50 | [-<a
| href="/philosophy/proprietary-tyrants.html">Tyrants</a>&mdash;systems-]{+<em>Tyrant:</em>&nbsp;
| system+} that reject{+s+} any operating system not
| &ldquo;authorized&rdquo; by the manufacturer. 
<em>Tyrant:</em>&nbsp; system that rejects any operating system not &ldquo;authorized&rdquo; by the manufacturer. 
<a href="/philosophy/proprietary-tyrants.html">Tyrany</a>&nbsp;&ndash; systemy, które odrzucają systemy operacyjne nie &bdquo;autoryzowane&rdquo; przez producenta. 
53  
Ed Tech companies use their surveillance power to manipulate students, and direct them into tracks towards various levels of knowledge, power and prestige. The article argues that <a href="https://blogs.lse.ac.uk/medialse/2021/10/25/algorithmic-injustice-in-education-why-tech-companies-should-require-a-license-to-operate-in-childrens-education/">these companies should obtain licenses to operate</a>. That wouldn't hurt, but it doesn't address the root of the problem. All data acquired in a school about any student, teacher, or employee must not leave the school, and must be kept in computers that belong to the school and run free (as in freedom) software. That way, the school district and/or parents can control what is done with those data. 
 
54  
A building in LA, with a supermarket in it, <a href="https://www.latimes.com/business/story/2021-11-09/column-trader-joes-parking-app">demands customers load a particular app to pay for parking in the parking lot</a>, and accept pervasive surveillance. They also have the option of entering their license plate numbers in a kiosk. That is an injustice, too. 
 
55  
Apple's new tactic to restrict users from repairing their own device and impose DRM on people is to <a href="https://www.ifixit.com/News/54829/apples-new-screen-repair-trap-could-change-the-repair-industry-forever">completely disable its Face ID functionality</a> when you replace its screen. 
 
56  
Microsoft is making it harder and harder to <a href="https://www.theverge.com/22630319/microsoft-windows-11-default-browser-changes">replace default apps in its Windows</a> operating system and is pressuring users to use its proprietary programs instead. We believe the best approach to this would be replacing Windows with a free (as in freedom) operating system like GNU. We also maintain a <a href="/distros/free-distros.html">list of fully free distributions of GNU</a>. 
 
57  
Spotify app <a href="https://www.sec.gov/Archives/edgar/data/1639920/000119312518063434/d494294df1.htm">harvests users' data to personally identify and know people</a> through music, their mood, mindset, activities, and tastes. There are over 150 billion events logged daily on the program which contains users' data and personal information. 
 
58 | <a [-href="/philosophy/malware-mobiles.html">Malware in mobile
| devices</a>-] {+href="/proprietary/all.html">More items&hellip;</a>+} 
<a href="/proprietary/all.html">More items&hellip;</a> 
<a href="/philosophy/malware-mobiles.html">Malware w&nbsp;urządzeniach mobilnych</a> 
60  
Please send general FSF &amp; GNU inquiries to <a href="mailto:gnu@gnu.org">&lt;gnu@gnu.org&gt;</a>. There are also <a href="/contact/">other ways to contact</a> the FSF. Broken links and other corrections or suggestions can be sent to <a href="mailto:webmasters@gnu.org">&lt;webmasters@gnu.org&gt;</a>. 
Wszelkie pytania dotyczące GNU i&nbsp;FSF prosimy kierować na&nbsp;adres <a href="mailto:gnu@gnu.org">&lt;gnu@gnu.org&gt;</a>. Inne metody kontaktu z&nbsp;FSF można znaleźć na&nbsp;stronie <a href="/contact/contact.html">kontakt</a> <br /> Informacje o niedziałających odnośnikach oraz&nbsp;inne poprawki (lub propozycje) prosimy wysyłać na&nbsp;adres <a href="mailto:web-translators@gnu.org">&lt;web-translators@gnu.org&gt;</a>. 
61 || No change detected. The change might only be in amounts of spaces. 
Please see the <a href="/server/standards/README.translations.html">Translations README</a> for information on coordinating and contributing translations of this article. 
Staramy się, aby&nbsp;tłumaczenia były wierne i&nbsp;wysokiej jakości, ale&nbsp;nie jesteśmy zwolnieni z&nbsp;niedoskonałości. Komentarze odnośnie tłumaczenia polskiego oraz&nbsp;zgłoszenia dotyczące chęci współpracy w&nbsp;tłumaczeniu prosimy kierować na&nbsp;adres <a href="mailto:www-pl-trans@gnu.org">www-pl-trans@gnu.org</a>. <br /> Więcej informacji na&nbsp;temat koordynacji oraz&nbsp;zgłaszania propozycji tłumaczeń artykułów znajdziecie na&nbsp;<a href="/server/standards/README.translations.html">stronie tłumaczeń</a>. 
63 | This page is licensed under a <a rel="license"
| [-href="http://creativecommons.org/licenses/by-nd/4.0/">Creative-]
| {+href="http://creativecommons.org/licenses/by/4.0/">Creative+} Commons
| [-Attribution-NoDerivatives-] {+Attribution+} 4.0 International
| License</a>. 
This page is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</a>. 
Ta strona jest dostępna na&nbsp;<a rel="license" href="http://creativecommons.org/licenses/by-nd/4.0/deed.pl">licencji Creative Commons Uznanie autorstwa&nbsp;&ndash; Bez&nbsp;utworów zależnych 4.0 Międzynarodowe</a>.