www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-kindle-swindle.es.html ...


From: GNUN
Subject: www/proprietary malware-kindle-swindle.es.html ...
Date: Mon, 9 Jan 2017 05:28:44 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     17/01/09 05:28:44

Modified files:
        proprietary    : malware-kindle-swindle.es.html 
                         malware-mobiles.es.html 
                         proprietary-jails.es.html proprietary.es.html 
        proprietary/po : malware-kindle-swindle.es-en.html 
                         malware-mobiles.es-en.html 
                         proprietary-jails.es-en.html 
                         proprietary.es-en.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-kindle-swindle.es.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.es.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-jails.es.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.es.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-kindle-swindle.es-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es-en.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.es-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es-en.html?cvsroot=www&r1=1.9&r2=1.10

Patches:
Index: malware-kindle-swindle.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-kindle-swindle.es.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- malware-kindle-swindle.es.html      18 Nov 2016 07:33:05 -0000      1.8
+++ malware-kindle-swindle.es.html      9 Jan 2017 10:28:44 -0000       1.9
@@ -79,10 +79,22 @@
 
 <h3 id="back-doors">Puertas traseras en el <cite>Kindle Swindle</cite> de 
Amazon</h3>
 <ul>
-  <li><p>El Kindle de Amazon tiene una puerta trasera que ha sido usada para <a
+<li>
+<p>El Kindle-Swindle de Amazon tiene una puerta trasera que ha sido usada para
+<a
 
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/";>
-borrar libros de forma remota</a>.</p>
+borrar libros de forma remota</a>. Uno de los libros borrados fue 1984, de
+George Orwell
+</p>
+
+<p>Amazon respondió  las críticas diciendo que solo borraría libros 
siguiendo
+órdenes del Estado. Sin embargo, eso no duró mucho. En 2012 <a
+href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html";>borró
+el contenido del Kindle-Swindle de un usuario y anuló su cuenta</a>, para
+luego ofrecer sus kafkianas «explicaciones».</p>
+</li>
 
+<li>
   <p>El Kindle también tiene una <a
 href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090";>
 puerta trasera universal</a>.</p>
@@ -170,7 +182,7 @@
 
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright &copy; 2014, 2015, 2016 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc.</p>
 
 <p>Esta página está bajo licencia <a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/deed.es_ES";>Creative
@@ -186,7 +198,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2016/11/18 07:33:05 $
+$Date: 2017/01/09 10:28:44 $
 
 <!-- timestamp end -->
 </p>

Index: malware-mobiles.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.es.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- malware-mobiles.es.html     18 Nov 2016 07:33:05 -0000      1.11
+++ malware-mobiles.es.html     9 Jan 2017 10:28:44 -0000       1.12
@@ -65,11 +65,9 @@
 <!--<li>
 <a href="#interference">Interference</a></li>-->
 <li><a href="#surveillance">Vigilancia</a></li>
-
-<!--<li>
-<a href="#drm">Digital restrictions
-    management</a> or &ldquo;DRM&rdquo; means functionalities designed
-    to restrict what users can do with the data in their computers.</li>-->
+<li><a href="#drm">Gestión Digital de Restricciones</a> o «DRM» significa
+funcionalidades diseñadas para limitar lo que los usuarios pueden hacer con
+los datos que tienen en sus ordenadores.</li>
 <li><a href="#jails">Prisiones</a>: Son sistemas que imponen la censura en los
 programas de aplicación.</li>
 <li><a href="#tyrants">Tiranos</a>: Son sistemas que rechazan cualquier sistema
@@ -245,6 +243,14 @@
   </li>
 </ul>
 
+<h3 id="drm">DRM en los móviles</h3>
+<ul>
+  <li><p>Android <a
+href="https://developer.android.com/reference/android/drm/package-summary.html";>dispone
+de funcionalidades especiales para gestionar el DRM</a>.</p>
+  </li>
+</ul>
+
 <h3 id="jails">Los móviles como prisiones</h3>
 <ul>
   <li><p><a href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/";>Los
@@ -337,7 +343,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2016/11/18 07:33:05 $
+$Date: 2017/01/09 10:28:44 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-jails.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-jails.es.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary-jails.es.html   8 Sep 2016 10:28:38 -0000       1.8
+++ proprietary-jails.es.html   9 Jan 2017 10:28:44 -0000       1.9
@@ -35,29 +35,6 @@
 pero no lo está.</p>
 
 <ul>
-<li>
-<p>Apple ha prohibido las aplicaciones para iCosas que exhiban la bandera
-confederada. <a
-href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html";>
-No solo aquellas que la utilizan como un símbolo de racismo</a>, sino
-incluso juegos de estrategia que la utilizan para representar unidades del
-ejército confederado que luchan en la guerra civil.</p>
-
-<p>Esta ridícula rigurosidad sirve para ilustrar por qué no se le debe 
permitir
-a Apple censurar aplicaciones. Aun cuando Apple llevara a cabo este acto de
-censura con cierto cuidado, seguiría estando mal. La cuestión no es si el
-racismo es malo o si instruir a la gente acerca de los ataques drones es
-malo. Apple no debe tener la capacidad de imponer sus puntos de vista sobre
-ninguno de estos asuntos, o cualquier otro.</p>
-</li>
-
-<li>
-  <p>
-    <a
-href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans";>Más
-ejemplos de censura arbitraria e incoherente por parte de Apple</a>.
-  </p>
-</li>
 
 <li>
 <p><a
@@ -91,6 +68,30 @@
 </li>
 
 <li>
+<p>Apple ha prohibido las aplicaciones para iCosas que exhiban la bandera
+confederada. <a
+href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html";>
+No solo aquellas que la utilizan como un símbolo de racismo</a>, sino
+incluso juegos de estrategia que la utilizan para representar unidades del
+ejército confederado que luchan en la guerra civil.</p>
+
+<p>Esta ridícula rigurosidad sirve para ilustrar por qué no se le debe 
permitir
+a Apple censurar aplicaciones. Aun cuando Apple llevara a cabo este acto de
+censura con cierto cuidado, seguiría estando mal. La cuestión no es si el
+racismo es malo o si instruir a la gente acerca de los ataques drones es
+malo. Apple no debe tener la capacidad de imponer sus puntos de vista sobre
+ninguno de estos asuntos, o cualquier otro.</p>
+</li>
+
+<li>
+  <p>
+    <a
+href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans";>Más
+ejemplos de censura arbitraria e incoherente por parte de Apple</a>.
+  </p>
+</li>
+
+<li>
 <p><a
 
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html";>
 Windows 8 en los «dispositivos móviles» es una prisión</a>.</p>
@@ -165,7 +166,7 @@
 
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright &copy; 2014, 2015, 2016 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc.</p>
 
 <p>Esta página está bajo licencia <a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/deed.es_ES";>Creative
@@ -181,7 +182,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2016/09/08 10:28:38 $
+$Date: 2017/01/09 10:28:44 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.es.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- proprietary.es.html 11 Nov 2016 09:29:18 -0000      1.13
+++ proprietary.es.html 9 Jan 2017 10:28:44 -0000       1.14
@@ -41,6 +41,10 @@
 una práctica habitual. El software privativo moderno es una manera habitual
 de ser engañado.</p>
 
+<p>Hasta enero de 2017, los archivos de este directorio ofrecen una lista de
+alrededor de 260 ejemplos de funcionalidades maliciosas, pero seguramente
+hay miles más que desconocemos.</p>
+
 <div class="toc">
 <div class="companies">
 <ul>
@@ -154,7 +158,7 @@
 
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright &copy; 2013, 2014, 2015, 2016 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, 
Inc.</p>
 
 <p>Esta página está bajo licencia <a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/deed.es_ES";>Creative
@@ -170,7 +174,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2016/11/11 09:29:18 $
+$Date: 2017/01/09 10:28:44 $
 
 <!-- timestamp end -->
 </p>

Index: po/malware-kindle-swindle.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-kindle-swindle.es-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- po/malware-kindle-swindle.es-en.html        18 Nov 2016 07:33:06 -0000      
1.6
+++ po/malware-kindle-swindle.es-en.html        9 Jan 2017 10:28:44 -0000       
1.7
@@ -59,10 +59,21 @@
 
 <h3 id="back-doors">Amazon Kindle Swindle Back Doors</h3>
 <ul>
-  <li><p>The Amazon Kindle has a back door that has been used to <a
-  
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/";>
-  remotely erase books</a>.</p>
+<li>
+<p>The Amazon Kindle-Swindle has a back door that has been used to
+<a 
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/";>
+remotely erase books</a>.  One of the books erased was 1984, by George Orwell.
+</p>
+
+<p>Amazon responded to criticism by saying it would delete books only
+following orders from the state.  However, that policy didn't last.
+In 2012
+it <a 
href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html";>wiped
+a user's Kindle-Swindle and deleted her account</a>, then offered her
+kafkaesque &ldquo;explanations.&rdquo;</p>
+</li>
 
+<li>
   <p>The Kindle also has a
   <a 
href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090";>
   universal back door</a>.</p>
@@ -137,7 +148,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
 
-<p>Copyright &copy; 2014, 2015, 2016 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative
@@ -147,7 +158,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/11/18 07:33:06 $
+$Date: 2017/01/09 10:28:44 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-mobiles.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es-en.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- po/malware-mobiles.es-en.html       18 Nov 2016 07:33:06 -0000      1.9
+++ po/malware-mobiles.es-en.html       9 Jan 2017 10:28:44 -0000       1.10
@@ -48,9 +48,9 @@
 <!--<li><a href="#sabotage">Sabotage</a></li>-->
 <!--<li><a href="#interference">Interference</a></li>-->
 <li><a href="#surveillance">Surveillance</a></li>
-<!--<li><a href="#drm">Digital restrictions
+<li><a href="#drm">Digital restrictions
     management</a> or &ldquo;DRM&rdquo; means functionalities designed
-    to restrict what users can do with the data in their computers.</li>-->
+    to restrict what users can do with the data in their computers.</li>
 <li><a href="#jails">Jails</a>&mdash;systems
     that impose censorship on application programs.</li>
 <li><a href="#tyrants">Tyrants</a>&mdash;systems
@@ -217,6 +217,13 @@
   </li>
 </ul>
 
+<h3 id="drm">Mobile DRM</h3>
+<ul>
+  <li><p>Android <a 
href="https://developer.android.com/reference/android/drm/package-summary.html";>contains
+        facilities specifically to support DRM</a>.</p>
+  </li>
+</ul>
+
 <h3 id="jails">Mobile Jails</h3>
 <ul>
   <li><p><a
@@ -291,7 +298,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/11/18 07:33:06 $
+$Date: 2017/01/09 10:28:44 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-jails.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.es-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- po/proprietary-jails.es-en.html     8 Sep 2016 10:28:38 -0000       1.6
+++ po/proprietary-jails.es-en.html     9 Jan 2017 10:28:44 -0000       1.7
@@ -27,27 +27,6 @@
 isn't.</p>
 
 <ul>
-<li>
-<p>Apple has banned iThing applications that show the confederate flag.
-<a 
href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html";>
-Not only those that use it as a symbol of racism</a>, but even strategic
-games that use it to represent confederate army units fighting in the
-Civil War.</p>
-
-<p>This ludicrous rigidity illustrates the point that Apple should not be
-allowed to censor apps.  Even if Apple carried out this act of
-censorship with some care, it would still be wrong.  Whether racism is
-bad, whether educating people about drone attacks is bad, are not the
-real issue.  Apple should not have the power to impose its views about
-either of these questions, or any other.</p>
-</li>
-
-<li>
-  <p>
-    <a 
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans";>More
-    examples of Apple's arbitrary and inconsistent censorship</a>.
-  </p>
-</li>
 
 <li>
 <p><a 
href="http://boingboing.net/2010/04/02/why-i-wont-buy-an-ipad-and-think-yo.html";>
@@ -79,6 +58,28 @@
 </li>
 
 <li>
+<p>Apple has banned iThing applications that show the confederate flag.
+<a 
href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html";>
+Not only those that use it as a symbol of racism</a>, but even strategic
+games that use it to represent confederate army units fighting in the
+Civil War.</p>
+
+<p>This ludicrous rigidity illustrates the point that Apple should not be
+allowed to censor apps.  Even if Apple carried out this act of
+censorship with some care, it would still be wrong.  Whether racism is
+bad, whether educating people about drone attacks is bad, are not the
+real issue.  Apple should not have the power to impose its views about
+either of these questions, or any other.</p>
+</li>
+
+<li>
+  <p>
+    <a 
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans";>More
+    examples of Apple's arbitrary and inconsistent censorship</a>.
+  </p>
+</li>
+
+<li>
 <p><a
 
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html";>Windows
 8 on &ldquo;mobile devices&rdquo; is a jail.</a></p>
 </li>
@@ -140,7 +141,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
 
-<p>Copyright &copy; 2014, 2015, 2016 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative
@@ -150,7 +151,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/09/08 10:28:38 $
+$Date: 2017/01/09 10:28:44 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es-en.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- po/proprietary.es-en.html   11 Nov 2016 09:29:18 -0000      1.9
+++ po/proprietary.es-en.html   9 Jan 2017 10:28:44 -0000       1.10
@@ -37,6 +37,10 @@
 it is standard practice.  Modern proprietary software is typically
 a way to be had.</p>
 
+<p>As of January, 2017, the files in this directory list around 260
+instances of malicious functionalities, but there are surely thousands
+more we don't know about.</p>
+
 <div class="toc">
 <div class="companies">
 <ul>
@@ -131,7 +135,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
 
-<p>Copyright &copy; 2013, 2014, 2015, 2016 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2013, 2014, 2015, 2016, 2017 Free Software Foundation, 
Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative
@@ -141,7 +145,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/11/11 09:29:18 $
+$Date: 2017/01/09 10:28:44 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]