GNU Savannah Evaluation for Terminocheck

Generated on Sun Dec 3 17:54:14 2017
Source: /tmp/gnu_eval.oietUe/./terminocheck
Detection script version: 0.1.1

NOTE:
This auto-generated report is in alpha-stage, and may contain incorrectly detected items.
Information here should be considered as informal suggestions and guidelines.
The official GNU Savannah Hosting Requirements can be found here: https://savannah.gnu.org/register/requirements.php

The following files are missing both copyright and license statement.

A copyright statement should be of form:
Copyright YEARS NAME
An optional "(C)" and/or contact addresses can be added if you wish, such as:
Copyright (C) YEARS NAME (email)

  1. If these are source code files for your project, consider using the standard license text at the beginning of your file. For GNU licenses, See How to GNU licenses for your own software
  2. If these are supporting/auxiliary files (such as Makefile, ini files), consider adding the GNU All Permissive License.

Projects hosted on GNU Savannah must carry a copyright and license statements.

NOTE:
If these files contain a legally acceptable copyright/license statement, they are acceptable for hosting on GNU Savannah (even if this auto-generated report failed to detect it).
Revising is not a strict requirement, but is highly recommended.
A recognizable copyright and license statements will speed-up project approval on GNU Savannah.

ABOUT
examples/security/de.text
examples/security/device-security/en.text
examples/security/device-security/fr.text
examples/security/device-security/pt.text
examples/security/en.text
examples/security/es.text
examples/security/fr.text
examples/security/human-security/de.text
examples/security/human-security/en.text
examples/security/human-security/fr.text
examples/security/human-security/pt.text
examples/security/human-security/zh.text
examples/security/message-security/de.text
examples/security/message-security/en.text
examples/security/message-security/fr.text
examples/security/message-security/openpgp/de.text
examples/security/message-security/openpgp/en.text
examples/security/message-security/openpgp/enigmail/de.text
examples/security/message-security/openpgp/enigmail/en.text
examples/security/message-security/openpgp/enigmail/fr.text
examples/security/message-security/openpgp/fr.text
examples/security/message-security/openpgp/gpg-best-practices/de.text
examples/security/message-security/openpgp/gpg-best-practices/en.text
examples/security/message-security/openpgp/gpg-best-practices/es.text
examples/security/message-security/openpgp/gpg-best-practices/fr.text
examples/security/message-security/otr/de.text
examples/security/message-security/otr/en.text
examples/security/message-security/otr/fr.text
examples/security/message-security/pt.text
examples/security/network-security/better-web-browsing/browser-score-card/_table.en.haml
examples/security/network-security/better-web-browsing/browser-score-card/en.text
examples/security/network-security/better-web-browsing/disabled.de.text
examples/security/network-security/better-web-browsing/en.text
examples/security/network-security/better-web-browsing/fr.text
examples/security/network-security/better-web-browsing/pt.text
examples/security/network-security/certificates/de.text
examples/security/network-security/certificates/en.text
examples/security/network-security/certificates/riseup-signed-certificate-fingerprints.txt
examples/security/network-security/mac-address.de.text
examples/security/network-security/mac-address.en.text
examples/security/network-security/riseup-ca/RiseupCA.pem
examples/security/network-security/riseup-ca/de.text
examples/security/network-security/riseup-ca/en.text
examples/security/network-security/riseup-ca/riseupCA-signed-sha1.txt
examples/security/network-security/secure-connections.de.text
examples/security/network-security/secure-connections.en.text
examples/security/network-security/secure-connections.fr.text
examples/security/network-security/starttls/de.text
examples/security/network-security/starttls/en.text
examples/security/network-security/tor/de.text
examples/security/network-security/tor/en.text
examples/security/network-security/tor/hs-addresses-signed.txt
examples/security/network-security/tor/onionservices-best-practices/en.text
examples/security/network-security/tor/pt.text
examples/security/pt.text
examples/security/resources/de.text
examples/security/resources/en.text
examples/security/resources/pt.text
examples/security/resources/radical-servers/de.text
examples/security/resources/radical-servers/en.text
examples/security/resources/zh.text
examples/security/zh.text
examples/vpn/el.text
examples/vpn/en.text
examples/vpn/es.text
examples/vpn/faq/de.text
examples/vpn/faq/en.text
examples/vpn/faq/fr.text
examples/vpn/faq/pt.text
examples/vpn/fr.text
examples/vpn/how-to/android/en.md
examples/vpn/how-to/android/fr.md
examples/vpn/how-to/gnu-linux/en.md
examples/vpn/how-to/gnu-linux/es.md
examples/vpn/how-to/gnu-linux/fr.md
examples/vpn/how-vpn-works/en.text
examples/vpn/how-vpn-works/fr.text
examples/vpn/how-vpn-works/zh.text
examples/vpn/legacy/vpn-howto/_vpnautoconnect.en.text
examples/vpn/legacy/vpn-howto/en.text
examples/vpn/legacy/vpn-howto/gnu-linux/en.text
examples/vpn/legacy/vpn-howto/mac/en.text
examples/vpn/legacy/vpn-howto/riseup.ovpn
examples/vpn/legacy/vpn-howto/troubleshooting.en.text
examples/vpn/legacy/vpn-howto/windows/en.text
examples/vpn/security-issues/en.text
examples/vpn/security-issues/fr.text
examples/vpn/security-issues/zh.text
examples/vpn/troubleshooting/en.md
examples/vpn/troubleshooting/fr.md
examples/vpn/zh.text

A recognizable copyright statement was not detected in the following files.
A copyright statement should be of form:
Copyright YEARS NAME
An optional "(C)" and/or contact addresses can be added if you wish, such as:
Copyright (C) YEARS NAME (email)

Projects hosted on GNU Savannah must carry a copyright statement.

For more information, see How to Apply GPL License to your source code.

NOTE:
If these files contain a legally acceptable copyright statement, they are acceptable for hosting on GNU Savannah (even if this auto-generated report failed to detect it).
Revising is not a strict requirement, but is highly recommended.
A recognizable copyright statement will speed-up project approval on GNU Savannah.

examples/vpn/legacy/vpn-howto/update-resolv.conf
examples/security/message-security/openpgp/gpg-keys/en.text

The following files possibly contain a copyright statement in non-canonical form.
A recognizable copyright statement in this script should be of form:
Copyright (C) YEAR NAME (email)
It is possible these files contain a valid yet unrecognizable form of the copyright statement (usually due to different formatting).

Please consider revising the copyright statement, to make it easy for future users and contributers of your project.

NOTE:
If these files contain a legally acceptable copyright statement, they are acceptable for hosting on GNU Savannah (even if this auto-generated report failed to detect it).
Revising is not a strict requirement, but is highly recommended.
A recognizable copyright statement will speed-up project approval on GNU Savannah.

examples/vpn/legacy/en.text: Internet service providers are breaking the internet too. They happily cooperate with government rep [trimmed]
examples/vpn/why-is-needed/en.text: Internet service providers are breaking the internet too. They happily cooperate with government rep [trimmed]
examples/vpn/why-is-needed/fr.text: Des multinationales ont dcouvert comment faire de l'argent sur internet : grce  la surveillanc [trimmed]
terminocheck.pl: # Copyright 2016 (C) Felicien PILLOT <felicien.pillot@member.fsf.org> # and copyright/license inform [trimmed]

Files without License Statement

A license statement was not detected in the following files.

It is possible these files contain a valid yet unrecognizable form of the license statement (usually due to different formatting).

  1. If these are source code files for your project, consider using the standard license text at the beginning of your file. For GNU licenses, See How to GNU licenses for your own software
  2. If these are supporting/auxiliary files (such as Makefile, ini files), consider adding the GNU All Permissive License.

Projects hosted on GNU Savannah must carry a license statement.

NOTE:
If these files contain any legally acceptable license statement, they are acceptable for hosting on GNU Savannah (even if this auto-generated report failed to detect it).
Revising is not a strict requirement, but is highly recommended.
Using a standard license statement will speed-up project approval on GNU Savannah.

examples/vpn/why-is-needed/fr.text
examples/vpn/why-is-needed/en.text
examples/vpn/legacy/en.text

Files without canonical license statement

The following files contains statement that is possibly a valid license, but is not the caninocal statement text. For example:
This file is part of PACKAGE and is under the same license as PACKAGE
While this is legally a valid statement, it is better to include one of the canonical full license statements.

Another common reason for mis-detection is putting the license statement at the bottom of the file (it is recommended to put the license statement at the top of the source code file, right after the copyright statement).

Projects hosted on GNU Savannah must carry a license statement.

Please consider revising the license statement, to make it easy for future users and contributers of your project.

  1. If these are source code files for your project, consider using the standard license text at the beginning of your file. For GNU licenses, See How to GNU licenses for your own software
  2. If these are supporting/auxiliary files (such as Makefile, ini files), consider adding the GNU All Permissive License.

NOTE:
If these files contain any legally acceptable license statement, they are acceptable for hosting on GNU Savannah (even if this auto-generated report failed to detect it).
Revising is not a strict requirement, but is highly recommended.
Using a standard license statement will speed-up project approval on GNU Savannah.

examples/security/message-security/openpgp/gpg-keys/en.text: "Gpg4win":http://www.gpg4win.org" is the recommended OpenPGP implementation for windows. It is Free  [trimmed]
examples/vpn/legacy/vpn-howto/update-resolv.conf: # Licensed under the GNU GPL
terminocheck.pl: # under the terms of the GNU General Public License as published by # WITHOUT ANY WARRANTY; without  [trimmed]

Small Source Code files without Copyright/License

The following small files were missing a copyright or license statement. Because these files are small (25 lines or less), it is possible that such a statement is not required, or a mention in the README file is sufficient.

Please review the list.
If these are source code files, please add a valid license and copyright statement.
If these are auxiliary files (such as Makefiles), consider adding the short GNU All Permissive License.

examples/security/device-security/es.text
examples/security/human-security/riseup-password.de.text
examples/security/human-security/riseup-password.en.text
examples/security/network-security/de.text
examples/security/network-security/en.text
examples/security/network-security/fr.text
examples/security/network-security/pt.text
examples/vpn/legacy/vpn-secret.en.text

Possible misue of Linux vs GNU/Linux

The following files use the term Linux.

Linux is a Kernel, not a whole operating system. Please consider using the correct term GNU/Linux if the context is operating system and not Kernel-specific topic.

For more information, see Why GNU/Linux, Linux and GNU, and Words to Avoid.

terminocheck.pl: my $badTerm = "linux";
examples/vpn/legacy/vpn-howto/en.text: * [[vpn-howto/linux]]
examples/vpn/legacy/vpn-howto/gnu-linux/en.text: p(alert alert-warning). *IF YOU RUN DEBIAN, UBUNTU OR ANOTHER DEBIAN DERIVATIVE, WE STRONGLY SUGGEST THAT YOU SWITCH TO OUR [[NEW VPN SERVICES -> vpn/how-to/linux ]].*
examples/vpn/how-to/gnu-linux/fr.md: Si le résultat de cette commande est 'x86_64' ou 'amd64' alors téléchargez la dernière version disponible sur [https://dl.bitmask.net/client/linux/Bitmask-linux64-latest.tar.bz2](https://dl.bitmask.net/client/linux/Bitmask-linux64-latest.tar.bz2) et sa signature OpenPGP sur [https://dl.bitmask.net/client/linux/Bitmask-linux64-latest.tar.bz2.asc](https://dl.bitmask.net/client/linux/Bitmask-linux64-latest.tar.bz2.asc). 
examples/vpn/how-to/gnu-linux/fr.md: Si le résultat de cette commande est 'i686' ou 'i386' alors téléchargez la dernière version disponible sur [https://dl.bitmask.net/client/linux/Bitmask-linux32-latest.tar.bz2](https://dl.bitmask.net/client/linux/Bitmask-linux32-latest.tar.bz2) et sa signature OpenPGP sur [https://dl.bitmask.net/client/linux/Bitmask-linux32-latest.tar.bz2.asc](https://dl.bitmask.net/client/linux/Bitmask-linux32-latest.tar.bz2.asc).
examples/vpn/how-to/gnu-linux/en.md: If the output of that command was 'x86_64' or 'amd64' then download the lastest version avaiable from [https://dl.bitmask.net/client/linux/Bitmask-linux64-latest.tar.bz2](https://dl.bitmask.net/client/linux/Bitmask-linux64-latest.tar.bz2) and its OpenPGP signature from [https://dl.bitmask.net/client/linux/Bitmask-linux64-latest.tar.bz2.asc](https://dl.bitmask.net/client/linux/Bitmask-linux64-latest.tar.bz2.asc). 
examples/vpn/how-to/gnu-linux/en.md:    curl -O https://dl.bitmask.net/client/linux/Bitmask-linux64-latest.tar.bz2
examples/vpn/how-to/gnu-linux/en.md:    curl -O https://dl.bitmask.net/client/linux/Bitmask-linux64-latest.tar.bz2.asc
examples/vpn/how-to/gnu-linux/en.md:    curl -O https://dl.bitmask.net/client/linux/Bitmask-linux32-latest.tar.bz2
examples/vpn/how-to/gnu-linux/en.md:    curl -O https://dl.bitmask.net/client/linux/Bitmask-linux32-latest.tar.bz2.asc
examples/vpn/how-to/gnu-linux/es.md: Si el resultado de ese comando contiene 'x86_64' ó 'amd64' entonces debes descargar la última versión disponible desde [https://dl.bitmask.net/client/linux/Bitmask-linux64-latest.tar.bz2](https://dl.bitmask.net/client/linux/Bitmask-linux64-latest.tar.bz2) y su firma OpenPGP desde [https://dl.bitmask.net/client/linux/Bitmask-linux64-latest.tar.bz2.asc](https://dl.bitmask.net/client/linux/Bitmask-linux64-latest.tar.bz2.asc). 
examples/vpn/how-to/gnu-linux/es.md:     curl -O https://dl.bitmask.net/client/linux/Bitmask-linux64-latest.tar.bz2
examples/vpn/how-to/gnu-linux/es.md:     curl -O https://dl.bitmask.net/client/linux/Bitmask-linux64-latest.tar.bz2.asc
examples/vpn/how-to/gnu-linux/es.md:     tar xfj https://dl.bitmask.net/client/linux/Bitmask-linux64-latest.tar.bz2
examples/vpn/how-to/gnu-linux/es.md: Si el resultado de ese comando contiene 'i686' or 'i386' entonces debes descargar la última versión disponible desde [https://dl.bitmask.net/client/linux/Bitmask-linux32-latest.tar.bz2](https://dl.bitmask.net/client/linux/Bitmask-linux32-latest.tar.bz2) y su firma OpenPGP desde [https://dl.bitmask.net/client/linux/Bitmask-linux32-latest.tar.bz2.asc](https://dl.bitmask.net/client/linux/Bitmask-linux32-latest.tar.bz2.asc). 
examples/vpn/how-to/gnu-linux/es.md:     curl -O https://dl.bitmask.net/client/linux/Bitmask-linux32-latest.tar.bz2
examples/vpn/how-to/gnu-linux/es.md:     curl -O https://dl.bitmask.net/client/linux/Bitmask-linux32-latest.tar.bz2.asc
examples/vpn/how-to/gnu-linux/es.md: ![Step 1](linux/Bitmask-1.png)
examples/vpn/how-to/gnu-linux/es.md: ![Step 2](linux/Bitmask-2.png)
examples/vpn/how-to/gnu-linux/es.md: ![Step 3](linux/Bitmask-3.png)
examples/vpn/how-to/gnu-linux/es.md: ![Step 4](linux/Bitmask-4.png)
examples/vpn/how-to/gnu-linux/es.md: ![Step 5](linux/Bitmask-5.png)
examples/vpn/how-to/gnu-linux/es.md: ![Step 6](linux/Bitmask-6.png)
examples/vpn/how-to/gnu-linux/es.md: ![Step 6](linux/Bitmask-7.png)
examples/vpn/how-to/gnu-linux/es.md: ![Step 7](linux/Bitmask-8.png)
examples/security/network-security/mac-address.en.text: h2. Arch Linux and most up-to-date Linux distributions using systemd
examples/security/network-security/mac-address.en.text: This tactic can easily be adapted to different linux/BSD setups and possibly OS X and Windows--if you create a new implementation, add it here!
examples/security/message-security/openpgp/enigmail/fr.text: # Téléchargez "Enigmail":https://www.enigmail.net **Sur Linux** - Il est préférable d'installer l'extension plutôt que d'utiliser le paquet fournir par votre gestionnaire de programmes, qui risque de ne pas être à jour. Thunderbird met à jour Enigmail automatiquement.
examples/security/message-security/otr/fr.text: Dans ce tutoriel, nous utiliserons OTR avec [[pidgin -> https://pidgin.im]]. Pidgin a l'implémentation la plus mature d'OTR et fonctionne sur Windows, Linux et Mac.
examples/security/message-security/otr/fr.text: h3. Linux
ABOUT: ## I/ Linux and GNU
ABOUT: called “Linux”, and many of its users are not aware that it is
ABOUT: There really is a Linux, and these people are using it, but it
ABOUT: context of a complete operating system. Linux is normally used in
ABOUT: is Linux, and the whole system, which they also call “Linux”. The
ABOUT: generally heard the whole system called “Linux” as well, they often
ABOUT: original plans for the GNU system. By the time Linux was started, GNU was
ABOUT: would we conclude? One CD-ROM vendor found that in their “Linux
ABOUT: Linux itself was about 3%. (The proportions in 2008 are similar: in
ABOUT: the “main” repository of gNewSense, Linux is 1.5% and GNU packages are
ABOUT: Fortunately, we didn't have to wait for the Hurd, because of Linux. Once
ABOUT: Torvalds freed Linux in 1992, it fit into the last major gap in the GNU
ABOUT: system. People could then combine Linux with the GNU system to make a
ABOUT: components(3) needed substantial change to work with Linux.
ABOUT: The FSF funded the rewriting of the Linux-related extensions to the GNU C
ABOUT: follow the philosophy associated with Linux rather than that of GNU. But
ABOUT: version of Linux contains non-free programs too. These
ABOUT: distributions now entails maintaining a free version of Linux too.
ABOUT: basically the GNU system, with Linux added. When you're talking about
ABOUT: reference, http://foldoc.org/linux is a good URL to use.
ABOUT: companies teach them to call it “Linux”. Indeed, GNU users often say
ABOUT: they are “running Linux”, which is like saying you are “driving your
ABOUT: If you call our operating system Linux, that conveys a mistaken idea of
ABOUT: much good work has been done in the name of Linux also. But the term
ABOUT: “Linux” has been associated ever since it was first coined with a
ABOUT: tendency of the “Linux” distribution companies to add nonfree
ABOUT: software and add it to the system. Some outrageously advertise “Linux”
ABOUT: “popularity of Linux”—in effect, valuing popularity above freedom.
ABOUT: that Robert McMillan, editor of Linux Magazine, “feels that the move
ABOUT: goal of freedom and work instead for the “popularity of Linux”.
ABOUT: something to stand firm for; the organizations that speak of “Linux”
ABOUT: normally don't say this. The magazines about “Linux” are typically full
ABOUT: of ads for nonfree software; the companies that package “Linux” add
ABOUT: nonfree software to the system; other companies “support Linux” by
ABOUT: for “Linux” typically invite salesman to present those applications. The
ABOUT: consider themselves “Linux users”, and believe that the GNU Project
ABOUT: “developed tools which proved to be useful in Linux”, typically

Possible misue of Open Source vs Free Software

The following files use the term Open Source.

Please use Free Software to refer to software which respects Your Freedom.

For more information, see Why 'Open Source' misses the point of Free Software, and Words to Avoid.

examples/vpn/security-issues/fr.text: PPTP et LT2P ont été désactivés à cause de "vulnérabilités":http://openvpn.net/index.php/open-source/339-why-ssl-vpn.html:
examples/vpn/security-issues/en.text: PPTP and LT2P have been disabled because of "vulnerabilities":https://openvpn.net/index.php/open-source/339-why-ssl-vpn.html:
examples/vpn/security-issues/zh.text: 由于[[漏洞攻击 => https://openvpn.net/index.php/open-source/339-why-ssl-vpn.html]],PPTP和LT2P已被禁用:
examples/vpn/legacy/vpn-howto/windows/en.text: Download the OpenVPN Windows installer from [[this website -> http://openvpn.net/index.php/open-source/downloads.html]] and run it. You should download the *current stable* release from this page and verify the signature. You want the "Windows installer."
examples/security/network-security/better-web-browsing/fr.text: Voici les extensions de navigateur essentielles que tout le monde devrait utiliser de tout temps. Elles sont stables, open-source, et n'altèrent la navigation que très rarement.
examples/security/network-security/better-web-browsing/fr.text: * [[Disconnect => https://disconnect.me/disconnect]] fonctionne comme uBlock et est open-source. Si vous utilisez uBlock, Disconnect n'est pas nécessaire, malgré qu'il ait quelques fonctionnalités que uBlock n'a pas.
examples/security/network-security/better-web-browsing/en.text: These are absolutely essential browser extensions that everyone should be using all the time. They are stable, open source, and rarely cause websites to break.
examples/security/network-security/better-web-browsing/en.text: * [[CanvasFingerPrintBlock => https://chrome.google.com/webstore/detail/canvasfingerprintblock/ipmjngkmngdcdpmgmiebdmfbkcecdndc]] will block most HTML5 Canvas fingerprinting (not open source).
examples/security/network-security/better-web-browsing/en.text: * [[Disconnect => https://disconnect.me/disconnect]] works like uBlock, and is open source. If you are running uBlock, Disconnect is unnecessary, although it has some visualization features that uBlock does not.
examples/security/resources/radical-servers/de.text: [[Taharar!->http://www.taharar.org/]] (liberate yourself! in Arabic) is an autonomous project that aims to empower individuals, collectives, and groups working on issues of social justice in West Asia and North Africa by providing them with alternative communication and technical services, information, resources, and support. Taharar!'s vision is to combat the digital censorship prevalent in West Asia and North Africa by providing an accessible pool of resources in local languages (including Arabic, Farsi, Hebrew, Kurdish, etc.) that people to create democratic alternatives by controlling their own secure means of communications through the use and proliferation of free, open source software and technologies.
examples/security/resources/radical-servers/en.text: [[Taharar!->http://www.taharar.org/]] (liberate yourself! in Arabic) is an autonomous project that aims to empower individuals, collectives, and groups working on issues of social justice in West Asia and North Africa by providing them with alternative communication and technical services, information, resources, and support. Taharar!'s vision is to combat the digital censorship prevalent in West Asia and North Africa by providing an accessible pool of resources in local languages (including Arabic, Farsi, Hebrew, Kurdish, etc.) that people to create democratic alternatives by controlling their own secure means of communications through the use and proliferation of free, open source software and technologies.
examples/security/human-security/de.text: OS X leidet an den selben Problemen, an denen auch Windows leidet. Obwohl es auf Unix – von dem auch GNU/Linux abstammt – basiert, sind große Teile des Betriebsystems nicht Open Source und damit auch nicht für eine Prüfung durch andere zugänglich. Die erhöhte Popularität resultierte in einer Reihe von Viren und Sicherheitslücken (es sind aber immer noch deutlich weniger als bei Windows). Apples autoritaristische Firmen Kultur zeigt sich auch in der Struktur des Betriebsystems. OS X verfügt über ein eingebautes „Feature“, das eine Aktivierung der Webcam von einem anderen Computer aus erlaubt; eine solche Funktion wurde unabhängig vom Betriebsystem schon mehrmals für andere Zwecke missbraucht.
examples/security/human-security/en.text: OS X suffers from similar issues that windows does. While it is based on Unix (of which GNU/Linux is a “clone”), a large portion of the operating system is not open source and thus not available for third party review. Its increasing popularity has been resulting in increasing viruses and exploits (though still far fewer than windows) and its corporate culture of authoritarianism is reflected in the structure of the operating system. OS X also includes the built-in “feature” to remotely activate the webcam which, as a feature regardless of the OS its on, has been shown to be used for other purposes.
ABOUT: If they don't search, they may encounter them anyway. The “open source”
ABOUT: toward open source software should be fueled by technical, rather than

Problematic Filenames

The following file names contains potentially problematic characters (such as space, tab, single and double quotes, or other non-printable characters).
Such files tend to cause problems on many computer systems, and are best avoided.

NOTE:
Renaming these files is not a strict requirement, but is highly recommended.

examples/vpn/legacy/vpn-howto/vpnautoconnect 72_small.png

Binary Data Files

The following files are binary data files (not textual source code files).

Some binary formats allow adding copyright and license information inside the file. For others, it is recommended to specify the copyright and license information in the README file.

  1. If you authored these files, please add copyright and license information in each file, or mention them in the README file.
  2. If you obtained these files from another source, you must verify and state their copyright and license information.
  3. Often times files that are free to download (as in 'no cost') are not Free to use (as in respect your freedom to usage, modify and distribute the files). Project hosted on GNU Savannah must not include non-free files.

NOTE:
This auto-generated report cannot detect if the README already mention these files.
If all data files in your project are properly copyrighted and licenses, please disregard this item.

Projects hosted on GNU Savannah must have a valid copyright and statement information for all data files.

examples/security/message-security/openpgp/enigmail/enigmail-create-rule.gif
examples/security/message-security/openpgp/enigmail/regeln-bearbeiten.png
examples/security/message-security/openpgp/gpg-keys/img/gpg11-seahorse-search-results.gif
examples/security/message-security/openpgp/gpg-keys/img/gpg12-seahorse-other-keys.gif
examples/security/message-security/openpgp/gpg-keys/img/gpg13-seahorse-trust-tab.gif
examples/security/message-security/openpgp/gpg-keys/img/gpg14-seahorse-sign-key.gif
examples/security/message-security/openpgp/gpg-keys/img/gpg3-seahorse2-crop.gif
examples/security/message-security/openpgp/gpg-keys/img/gpg4-select-new-key-crop.gif
examples/security/message-security/openpgp/gpg-keys/img/gpg4win1-install-welcome.gif
examples/security/message-security/openpgp/gpg-keys/img/gpg4win2-components.gif
examples/security/message-security/openpgp/gpg-keys/img/gpg5-key-information-crop.gif
examples/security/message-security/openpgp/gpg-keys/img/gpg6-password-crop.gif
examples/security/message-security/openpgp/gpg-keys/img/gpg8-publish-key-menu.gif
examples/security/message-security/openpgp/gpg-keys/img/gpg9-seahorse-import.gif
examples/security/message-security/openpgp/gpg-keys/img/kleopatra1-name-email-advanced.gif
examples/security/network-security/better-web-browsing/img/badger-128.png
examples/security/network-security/better-web-browsing/img/badger-64.png
examples/security/network-security/better-web-browsing/img/https-128.png
examples/security/network-security/better-web-browsing/img/https-64.png
examples/security/network-security/better-web-browsing/img/ublock-128.png
examples/security/network-security/better-web-browsing/img/ublock-64.png
examples/security/network-security/starttls/smtp-01.png
examples/security/network-security/starttls/smtp-01_large.png
examples/security/network-security/starttls/smtp-02.png
examples/security/network-security/starttls/smtp-02_large.png
examples/security/network-security/starttls/smtp-03.png
examples/security/network-security/starttls/smtp-03_large.png
examples/security/network-security/tor/screenshot-osx-torbrowser-icon.png
examples/security/network-security/tor/tbb-screenshot1.jpg
examples/security/network-security/tor/tbb-screenshot2.jpg
examples/security/network-security/tor/tbb-screenshot3a.jpg
examples/vpn/how-to/android/Bitmask-android-1.png
examples/vpn/how-to/android/Bitmask-android-2.png
examples/vpn/how-to/android/Bitmask-android-3.png
examples/vpn/how-to/android/Bitmask-android-4.png
examples/vpn/how-to/android/Bitmask-android-5.png
examples/vpn/how-to/android/Bitmask-android-6.png
examples/vpn/how-to/android/Bitmask-android-7.png
examples/vpn/how-to/android/Bitmask-direct.png
examples/vpn/how-to/android/Bitmask-play.png
examples/vpn/how-to/gnu-linux/Bitmask-1.png
examples/vpn/how-to/gnu-linux/Bitmask-2.png
examples/vpn/how-to/gnu-linux/Bitmask-3.png
examples/vpn/how-to/gnu-linux/Bitmask-4.png
examples/vpn/how-to/gnu-linux/Bitmask-5.png
examples/vpn/how-to/gnu-linux/Bitmask-6.png
examples/vpn/how-to/gnu-linux/Bitmask-7.png
examples/vpn/how-to/gnu-linux/Bitmask-8.png
examples/vpn/how-vpn-works/vpn-01_large.png
examples/vpn/how-vpn-works/vpn-02_large.png
examples/vpn/how-vpn-works/vpn-03_large.png
examples/vpn/legacy/vpn-howto/autoconnect-tabs.png
examples/vpn/legacy/vpn-howto/openvpn-logo.png
examples/vpn/legacy/vpn-howto/vpnautoconnect 72_small.png
examples/vpn/legacy/vpn-howto/vpnautoconnect-select.png
examples/vpn/legacy/vpn-howto/windows/win7-run-as-admin.jpg

Summary of Licenses

License Type no. files
Free-BSD(2-clause) 1
skipped (non-code) 3
skipped (not-text) 56
skipped (too-short) 5
no license detected 106

Summary of Analyzed Files

File Type no. lines Detected License Detected Copyright
COPYING text/plain skipped (non-code) skipped (non-code)
terminocheck.pl text/x-perl 348 (possible copyright) # Copyright 2016 (C) Felicien PILLOT <felicien.pillot@member.fsf.org> # and copyright/license inform [trimmed]
examples/vpn/why-is-needed/fr.text text/plain 66 (possible copyright) Des multinationales ont dcouvert comment faire de l'argent sur internet : grce  la surveillanc [trimmed]
examples/vpn/why-is-needed/en.text text/plain 42 (possible copyright) Internet service providers are breaking the internet too. They happily cooperate with government rep [trimmed]
examples/vpn/es.text text/plain 51
examples/vpn/fr.text text/plain 52
examples/vpn/how-vpn-works/vpn-03_large.png image/png skipped (not-text) skipped (not-text)
examples/vpn/how-vpn-works/fr.text text/plain 36
examples/vpn/how-vpn-works/en.text text/plain 37
examples/vpn/how-vpn-works/vpn-02_large.png image/png skipped (not-text) skipped (not-text)
examples/vpn/how-vpn-works/vpn-01_large.png image/png skipped (not-text) skipped (not-text)
examples/vpn/how-vpn-works/zh.text text/plain 40
examples/vpn/en.text text/plain 53
examples/vpn/security-issues/fr.text text/plain 38
examples/vpn/security-issues/en.text text/plain 38
examples/vpn/security-issues/zh.text text/plain 38
examples/vpn/faq/pt.text text/plain 29
examples/vpn/faq/fr.text text/plain 32
examples/vpn/faq/de.text text/plain 29
examples/vpn/faq/en.text text/plain 29
examples/vpn/legacy/vpn-howto/troubleshooting.en.text text/plain 56
examples/vpn/legacy/vpn-howto/autoconnect-tabs.png image/png skipped (not-text) skipped (not-text)
examples/vpn/legacy/vpn-howto/en.text text/plain 61
examples/vpn/legacy/vpn-howto/riseup.ovpn text/plain 35
examples/vpn/legacy/vpn-howto/vpnautoconnect-select.png image/png skipped (not-text) skipped (not-text)
examples/vpn/legacy/vpn-howto/gnu-linux/en.text text/plain 139
examples/vpn/legacy/vpn-howto/update-resolv.conf text/x-shellscript 47
examples/vpn/legacy/vpn-howto/python-autovpn-script text/x-python 188 Free-BSD(2-clause) 2011 Domen Kozar. All rights reserved.
examples/vpn/legacy/vpn-howto/windows/win7-run-as-admin.jpg image/jpeg skipped (not-text) skipped (not-text)
examples/vpn/legacy/vpn-howto/windows/windows-riseup.ovpn text/plain 8 skipped (too-short) skipped (too-short)
examples/vpn/legacy/vpn-howto/windows/en.text text/plain 66
examples/vpn/legacy/vpn-howto/_vpnautoconnect.en.text text/plain 30
examples/vpn/legacy/vpn-howto/openvpn-logo.png image/png skipped (not-text) skipped (not-text)
examples/vpn/legacy/vpn-howto/mac/en.text text/plain 55
examples/vpn/legacy/vpn-howto/mac/mac-riseup.ovpn text/plain 7 skipped (too-short) skipped (too-short)
examples/vpn/legacy/vpn-howto/vpnautoconnect 72_small.png image/png skipped (not-text) skipped (not-text)
examples/vpn/legacy/en.text text/plain 73 (possible copyright) Internet service providers are breaking the internet too. They happily cooperate with government rep [trimmed]
examples/vpn/legacy/_vpn-servers.en.text text/plain 4 skipped (too-short) skipped (too-short)
examples/vpn/legacy/vpn-secret.en.text text/plain 19 (no copyright, perhaps too-small?)
examples/vpn/el.text text/plain 54
examples/vpn/how-to/fr.text text/plain 4 skipped (too-short) skipped (too-short)
examples/vpn/how-to/en.text text/plain 4 skipped (too-short) skipped (too-short)
examples/vpn/how-to/gnu-linux/Bitmask-6.png image/png skipped (not-text) skipped (not-text)
examples/vpn/how-to/gnu-linux/fr.md text/plain 146
examples/vpn/how-to/gnu-linux/Bitmask-8.png image/png skipped (not-text) skipped (not-text)
examples/vpn/how-to/gnu-linux/Bitmask-2.png image/png skipped (not-text) skipped (not-text)
examples/vpn/how-to/gnu-linux/Bitmask-5.png image/png skipped (not-text) skipped (not-text)
examples/vpn/how-to/gnu-linux/Bitmask-1.png image/png skipped (not-text) skipped (not-text)
examples/vpn/how-to/gnu-linux/en.md text/plain 144
examples/vpn/how-to/gnu-linux/Bitmask-7.png image/png skipped (not-text) skipped (not-text)
examples/vpn/how-to/gnu-linux/es.md text/plain 155
examples/vpn/how-to/gnu-linux/Bitmask-3.png image/png skipped (not-text) skipped (not-text)
examples/vpn/how-to/gnu-linux/Bitmask-4.png image/png skipped (not-text) skipped (not-text)
examples/vpn/how-to/android/Bitmask-android-7.png image/png skipped (not-text) skipped (not-text)
examples/vpn/how-to/android/Bitmask-play.png image/png skipped (not-text) skipped (not-text)
examples/vpn/how-to/android/fr.md text/plain 59
examples/vpn/how-to/android/Bitmask-android-4.png image/png skipped (not-text) skipped (not-text)
examples/vpn/how-to/android/Bitmask-android-3.png image/png skipped (not-text) skipped (not-text)
examples/vpn/how-to/android/Bitmask-android-2.png image/png skipped (not-text) skipped (not-text)
examples/vpn/how-to/android/Bitmask-android-5.png image/png skipped (not-text) skipped (not-text)
examples/vpn/how-to/android/Bitmask-android-6.png image/png skipped (not-text) skipped (not-text)
examples/vpn/how-to/android/en.md text/plain 59
examples/vpn/how-to/android/Bitmask-android-1.png image/png skipped (not-text) skipped (not-text)
examples/vpn/how-to/android/Bitmask-direct.png image/png skipped (not-text) skipped (not-text)
examples/vpn/zh.text text/plain 52
examples/vpn/troubleshooting/fr.md text/plain 53
examples/vpn/troubleshooting/en.md text/plain 53
examples/security/pt.text text/html 57
examples/security/network-security/pt.text text/plain 18 (no copyright, perhaps too-small?)
examples/security/network-security/secure-connections.en.text text/plain 99
examples/security/network-security/mac-address.en.text text/plain 102
examples/security/network-security/tor/pt.text text/plain 74
examples/security/network-security/tor/onionservices-best-practices/en.text text/plain 106
examples/security/network-security/tor/tbb-screenshot1.jpg image/jpeg skipped (not-text) skipped (not-text)
examples/security/network-security/tor/hs-addresses-signed.txt text/plain 37
examples/security/network-security/tor/de.text text/plain 83
examples/security/network-security/tor/en.text text/plain 77
examples/security/network-security/tor/screenshot-osx-torbrowser-icon.png image/png skipped (not-text) skipped (not-text)
examples/security/network-security/tor/tbb-screenshot3a.jpg image/jpeg skipped (not-text) skipped (not-text)
examples/security/network-security/tor/tbb-screenshot2.jpg image/jpeg skipped (not-text) skipped (not-text)
examples/security/network-security/riseup-ca/RiseupCA.pem text/plain 34
examples/security/network-security/riseup-ca/de.text text/plain 82
examples/security/network-security/riseup-ca/en.text text/plain 83
examples/security/network-security/riseup-ca/riseupCA-signed-sha1.txt text/plain 25
examples/security/network-security/fr.text text/plain 18 (no copyright, perhaps too-small?)
examples/security/network-security/certificates/riseup-signed-certificate-fingerprints.txt text/plain 47
examples/security/network-security/certificates/de.text text/plain 83
examples/security/network-security/certificates/en.text text/plain 82
examples/security/network-security/de.text text/plain 18 (no copyright, perhaps too-small?)
examples/security/network-security/en.text text/plain 18 (no copyright, perhaps too-small?)
examples/security/network-security/secure-connections.fr.text text/plain 99
examples/security/network-security/starttls/de.text text/plain 31
examples/security/network-security/starttls/en.text text/plain 31
examples/security/network-security/starttls/smtp-03.png image/png skipped (not-text) skipped (not-text)
examples/security/network-security/starttls/smtp-01.png image/png skipped (not-text) skipped (not-text)
examples/security/network-security/starttls/smtp-01_large.png image/png skipped (not-text) skipped (not-text)
examples/security/network-security/starttls/smtp-02.png image/png skipped (not-text) skipped (not-text)
examples/security/network-security/starttls/smtp-02_large.png image/png skipped (not-text) skipped (not-text)
examples/security/network-security/starttls/smtp-03_large.png image/png skipped (not-text) skipped (not-text)
examples/security/network-security/better-web-browsing/pt.text text/html 121
examples/security/network-security/better-web-browsing/fr.text text/html 120
examples/security/network-security/better-web-browsing/disabled.de.text text/plain 65
examples/security/network-security/better-web-browsing/en.text text/html 129
examples/security/network-security/better-web-browsing/img/badger-128.png image/png skipped (not-text) skipped (not-text)
examples/security/network-security/better-web-browsing/img/https-128.png image/png skipped (not-text) skipped (not-text)
examples/security/network-security/better-web-browsing/img/ublock-128.png image/png skipped (not-text) skipped (not-text)
examples/security/network-security/better-web-browsing/img/ublock-64.png image/png skipped (not-text) skipped (not-text)
examples/security/network-security/better-web-browsing/img/badger-64.png image/png skipped (not-text) skipped (not-text)
examples/security/network-security/better-web-browsing/img/https-64.png image/png skipped (not-text) skipped (not-text)
examples/security/network-security/better-web-browsing/browser-score-card/en.text text/plain 67
examples/security/network-security/better-web-browsing/browser-score-card/_table.en.haml text/html 37
examples/security/network-security/mac-address.de.text text/plain 90
examples/security/network-security/secure-connections.de.text text/plain 113
examples/security/es.text text/html 58
examples/security/fr.text text/html 55
examples/security/de.text text/html 57
examples/security/en.text text/html 58
examples/security/device-security/pt.text text/plain 27
examples/security/device-security/es.text text/plain 22 (no copyright, perhaps too-small?)
examples/security/device-security/fr.text text/plain 25
examples/security/device-security/en.text text/plain 25
examples/security/message-security/pt.text text/plain 43
examples/security/message-security/fr.text text/plain 43
examples/security/message-security/de.text text/plain 73
examples/security/message-security/en.text text/plain 43
examples/security/message-security/openpgp/fr.text text/plain 75
examples/security/message-security/openpgp/de.text text/plain 73
examples/security/message-security/openpgp/en.text text/plain 75
examples/security/message-security/openpgp/enigmail/fr.text text/plain 44
examples/security/message-security/openpgp/enigmail/de.text text/plain 40
examples/security/message-security/openpgp/enigmail/en.text text/plain 44
examples/security/message-security/openpgp/enigmail/regeln-bearbeiten.png image/png skipped (not-text) skipped (not-text)
examples/security/message-security/openpgp/enigmail/enigmail-create-rule.gif image/gif skipped (not-text) skipped (not-text)
examples/security/message-security/openpgp/gpg-best-practices/es.text text/plain 229
examples/security/message-security/openpgp/gpg-best-practices/fr.text text/plain 309
examples/security/message-security/openpgp/gpg-best-practices/de.text text/plain 257
examples/security/message-security/openpgp/gpg-best-practices/en.text text/plain 276
examples/security/message-security/openpgp/gpg-keys/en.text text/plain 266
examples/security/message-security/openpgp/gpg-keys/img/gpg4win2-components.gif image/gif skipped (not-text) skipped (not-text)
examples/security/message-security/openpgp/gpg-keys/img/gpg12-seahorse-other-keys.gif image/gif skipped (not-text) skipped (not-text)
examples/security/message-security/openpgp/gpg-keys/img/gpg5-key-information-crop.gif image/gif skipped (not-text) skipped (not-text)
examples/security/message-security/openpgp/gpg-keys/img/gpg14-seahorse-sign-key.gif image/gif skipped (not-text) skipped (not-text)
examples/security/message-security/openpgp/gpg-keys/img/gpg4-select-new-key-crop.gif image/gif skipped (not-text) skipped (not-text)
examples/security/message-security/openpgp/gpg-keys/img/kleopatra1-name-email-advanced.gif image/gif skipped (not-text) skipped (not-text)
examples/security/message-security/openpgp/gpg-keys/img/gpg6-password-crop.gif image/gif skipped (not-text) skipped (not-text)
examples/security/message-security/openpgp/gpg-keys/img/gpg4win1-install-welcome.gif image/gif skipped (not-text) skipped (not-text)
examples/security/message-security/openpgp/gpg-keys/img/gpg13-seahorse-trust-tab.gif image/gif skipped (not-text) skipped (not-text)
examples/security/message-security/openpgp/gpg-keys/img/gpg9-seahorse-import.gif image/gif skipped (not-text) skipped (not-text)
examples/security/message-security/openpgp/gpg-keys/img/gpg11-seahorse-search-results.gif image/gif skipped (not-text) skipped (not-text)
examples/security/message-security/openpgp/gpg-keys/img/gpg3-seahorse2-crop.gif image/gif skipped (not-text) skipped (not-text)
examples/security/message-security/openpgp/gpg-keys/img/gpg8-publish-key-menu.gif image/gif skipped (not-text) skipped (not-text)
examples/security/message-security/otr/fr.text text/plain 74
examples/security/message-security/otr/de.text text/plain 74
examples/security/message-security/otr/en.text text/plain 75
examples/security/zh.text text/html 57
examples/security/resources/pt.text text/plain 38
examples/security/resources/radical-servers/de.text text/plain 275
examples/security/resources/radical-servers/en.text text/plain 283
examples/security/resources/de.text text/plain 26
examples/security/resources/en.text text/plain 38
examples/security/resources/zh.text text/plain 26
examples/security/human-security/pt.text text/plain 31
examples/security/human-security/fr.text text/plain 31
examples/security/human-security/de.text text/plain 31
examples/security/human-security/en.text text/plain 31
examples/security/human-security/riseup-password.de.text text/plain 13 (no copyright, perhaps too-small?)
examples/security/human-security/zh.text text/plain 33
examples/security/human-security/riseup-password.en.text text/plain 13 (no copyright, perhaps too-small?)
README text/plain skipped (non-code) skipped (non-code)
TODO text/plain skipped (non-code) skipped (non-code)
ABOUT text/plain 322

END OF EVALUATION REPORT