[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-kindle-swindle.es.html ...
From: |
GNUN |
Subject: |
www/proprietary malware-kindle-swindle.es.html ... |
Date: |
Mon, 9 Jan 2017 05:28:44 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 17/01/09 05:28:44
Modified files:
proprietary : malware-kindle-swindle.es.html
malware-mobiles.es.html
proprietary-jails.es.html proprietary.es.html
proprietary/po : malware-kindle-swindle.es-en.html
malware-mobiles.es-en.html
proprietary-jails.es-en.html
proprietary.es-en.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-kindle-swindle.es.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.es.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-jails.es.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.es.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-kindle-swindle.es-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es-en.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.es-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es-en.html?cvsroot=www&r1=1.9&r2=1.10
Patches:
Index: malware-kindle-swindle.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-kindle-swindle.es.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- malware-kindle-swindle.es.html 18 Nov 2016 07:33:05 -0000 1.8
+++ malware-kindle-swindle.es.html 9 Jan 2017 10:28:44 -0000 1.9
@@ -79,10 +79,22 @@
<h3 id="back-doors">Puertas traseras en el <cite>Kindle Swindle</cite> de
Amazon</h3>
<ul>
- <li><p>El Kindle de Amazon tiene una puerta trasera que ha sido usada para <a
+<li>
+<p>El Kindle-Swindle de Amazon tiene una puerta trasera que ha sido usada para
+<a
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">
-borrar libros de forma remota</a>.</p>
+borrar libros de forma remota</a>. Uno de los libros borrados fue 1984, de
+George Orwell
+</p>
+
+<p>Amazon respondió las crÃticas diciendo que solo borrarÃa libros
siguiendo
+órdenes del Estado. Sin embargo, eso no duró mucho. En 2012 <a
+href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html">borró
+el contenido del Kindle-Swindle de un usuario y anuló su cuenta</a>, para
+luego ofrecer sus kafkianas «explicaciones».</p>
+</li>
+<li>
<p>El Kindle también tiene una <a
href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090">
puerta trasera universal</a>.</p>
@@ -170,7 +182,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2014, 2015, 2016 Free Software Foundation, Inc.</p>
+<p>Copyright © 2014, 2015, 2016, 2017 Free Software Foundation, Inc.</p>
<p>Esta página está bajo licencia <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/deed.es_ES">Creative
@@ -186,7 +198,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2016/11/18 07:33:05 $
+$Date: 2017/01/09 10:28:44 $
<!-- timestamp end -->
</p>
Index: malware-mobiles.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.es.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- malware-mobiles.es.html 18 Nov 2016 07:33:05 -0000 1.11
+++ malware-mobiles.es.html 9 Jan 2017 10:28:44 -0000 1.12
@@ -65,11 +65,9 @@
<!--<li>
<a href="#interference">Interference</a></li>-->
<li><a href="#surveillance">Vigilancia</a></li>
-
-<!--<li>
-<a href="#drm">Digital restrictions
- management</a> or “DRM” means functionalities designed
- to restrict what users can do with the data in their computers.</li>-->
+<li><a href="#drm">Gestión Digital de Restricciones</a> o «DRM» significa
+funcionalidades diseñadas para limitar lo que los usuarios pueden hacer con
+los datos que tienen en sus ordenadores.</li>
<li><a href="#jails">Prisiones</a>: Son sistemas que imponen la censura en los
programas de aplicación.</li>
<li><a href="#tyrants">Tiranos</a>: Son sistemas que rechazan cualquier sistema
@@ -245,6 +243,14 @@
</li>
</ul>
+<h3 id="drm">DRM en los móviles</h3>
+<ul>
+ <li><p>Android <a
+href="https://developer.android.com/reference/android/drm/package-summary.html">dispone
+de funcionalidades especiales para gestionar el DRM</a>.</p>
+ </li>
+</ul>
+
<h3 id="jails">Los móviles como prisiones</h3>
<ul>
<li><p><a href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/">Los
@@ -337,7 +343,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2016/11/18 07:33:05 $
+$Date: 2017/01/09 10:28:44 $
<!-- timestamp end -->
</p>
Index: proprietary-jails.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-jails.es.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary-jails.es.html 8 Sep 2016 10:28:38 -0000 1.8
+++ proprietary-jails.es.html 9 Jan 2017 10:28:44 -0000 1.9
@@ -35,29 +35,6 @@
pero no lo está.</p>
<ul>
-<li>
-<p>Apple ha prohibido las aplicaciones para iCosas que exhiban la bandera
-confederada. <a
-href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html">
-No solo aquellas que la utilizan como un sÃmbolo de racismo</a>, sino
-incluso juegos de estrategia que la utilizan para representar unidades del
-ejército confederado que luchan en la guerra civil.</p>
-
-<p>Esta ridÃcula rigurosidad sirve para ilustrar por qué no se le debe
permitir
-a Apple censurar aplicaciones. Aun cuando Apple llevara a cabo este acto de
-censura con cierto cuidado, seguirÃa estando mal. La cuestión no es si el
-racismo es malo o si instruir a la gente acerca de los ataques drones es
-malo. Apple no debe tener la capacidad de imponer sus puntos de vista sobre
-ninguno de estos asuntos, o cualquier otro.</p>
-</li>
-
-<li>
- <p>
- <a
-href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans">Más
-ejemplos de censura arbitraria e incoherente por parte de Apple</a>.
- </p>
-</li>
<li>
<p><a
@@ -91,6 +68,30 @@
</li>
<li>
+<p>Apple ha prohibido las aplicaciones para iCosas que exhiban la bandera
+confederada. <a
+href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html">
+No solo aquellas que la utilizan como un sÃmbolo de racismo</a>, sino
+incluso juegos de estrategia que la utilizan para representar unidades del
+ejército confederado que luchan en la guerra civil.</p>
+
+<p>Esta ridÃcula rigurosidad sirve para ilustrar por qué no se le debe
permitir
+a Apple censurar aplicaciones. Aun cuando Apple llevara a cabo este acto de
+censura con cierto cuidado, seguirÃa estando mal. La cuestión no es si el
+racismo es malo o si instruir a la gente acerca de los ataques drones es
+malo. Apple no debe tener la capacidad de imponer sus puntos de vista sobre
+ninguno de estos asuntos, o cualquier otro.</p>
+</li>
+
+<li>
+ <p>
+ <a
+href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans">Más
+ejemplos de censura arbitraria e incoherente por parte de Apple</a>.
+ </p>
+</li>
+
+<li>
<p><a
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html">
Windows 8 en los «dispositivos móviles» es una prisión</a>.</p>
@@ -165,7 +166,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2014, 2015, 2016 Free Software Foundation, Inc.</p>
+<p>Copyright © 2014, 2015, 2016, 2017 Free Software Foundation, Inc.</p>
<p>Esta página está bajo licencia <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/deed.es_ES">Creative
@@ -181,7 +182,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2016/09/08 10:28:38 $
+$Date: 2017/01/09 10:28:44 $
<!-- timestamp end -->
</p>
Index: proprietary.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.es.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- proprietary.es.html 11 Nov 2016 09:29:18 -0000 1.13
+++ proprietary.es.html 9 Jan 2017 10:28:44 -0000 1.14
@@ -41,6 +41,10 @@
una práctica habitual. El software privativo moderno es una manera habitual
de ser engañado.</p>
+<p>Hasta enero de 2017, los archivos de este directorio ofrecen una lista de
+alrededor de 260 ejemplos de funcionalidades maliciosas, pero seguramente
+hay miles más que desconocemos.</p>
+
<div class="toc">
<div class="companies">
<ul>
@@ -154,7 +158,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2013, 2014, 2015, 2016 Free Software Foundation, Inc.</p>
+<p>Copyright © 2013, 2014, 2015, 2016, 2017 Free Software Foundation,
Inc.</p>
<p>Esta página está bajo licencia <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/deed.es_ES">Creative
@@ -170,7 +174,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2016/11/11 09:29:18 $
+$Date: 2017/01/09 10:28:44 $
<!-- timestamp end -->
</p>
Index: po/malware-kindle-swindle.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-kindle-swindle.es-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- po/malware-kindle-swindle.es-en.html 18 Nov 2016 07:33:06 -0000
1.6
+++ po/malware-kindle-swindle.es-en.html 9 Jan 2017 10:28:44 -0000
1.7
@@ -59,10 +59,21 @@
<h3 id="back-doors">Amazon Kindle Swindle Back Doors</h3>
<ul>
- <li><p>The Amazon Kindle has a back door that has been used to <a
-
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">
- remotely erase books</a>.</p>
+<li>
+<p>The Amazon Kindle-Swindle has a back door that has been used to
+<a
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">
+remotely erase books</a>. One of the books erased was 1984, by George Orwell.
+</p>
+
+<p>Amazon responded to criticism by saying it would delete books only
+following orders from the state. However, that policy didn't last.
+In 2012
+it <a
href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html">wiped
+a user's Kindle-Swindle and deleted her account</a>, then offered her
+kafkaesque “explanations.”</p>
+</li>
+<li>
<p>The Kindle also has a
<a
href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090">
universal back door</a>.</p>
@@ -137,7 +148,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2014, 2015, 2016 Free Software Foundation, Inc.</p>
+<p>Copyright © 2014, 2015, 2016, 2017 Free Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -147,7 +158,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/11/18 07:33:06 $
+$Date: 2017/01/09 10:28:44 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-mobiles.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es-en.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- po/malware-mobiles.es-en.html 18 Nov 2016 07:33:06 -0000 1.9
+++ po/malware-mobiles.es-en.html 9 Jan 2017 10:28:44 -0000 1.10
@@ -48,9 +48,9 @@
<!--<li><a href="#sabotage">Sabotage</a></li>-->
<!--<li><a href="#interference">Interference</a></li>-->
<li><a href="#surveillance">Surveillance</a></li>
-<!--<li><a href="#drm">Digital restrictions
+<li><a href="#drm">Digital restrictions
management</a> or “DRM” means functionalities designed
- to restrict what users can do with the data in their computers.</li>-->
+ to restrict what users can do with the data in their computers.</li>
<li><a href="#jails">Jails</a>—systems
that impose censorship on application programs.</li>
<li><a href="#tyrants">Tyrants</a>—systems
@@ -217,6 +217,13 @@
</li>
</ul>
+<h3 id="drm">Mobile DRM</h3>
+<ul>
+ <li><p>Android <a
href="https://developer.android.com/reference/android/drm/package-summary.html">contains
+ facilities specifically to support DRM</a>.</p>
+ </li>
+</ul>
+
<h3 id="jails">Mobile Jails</h3>
<ul>
<li><p><a
@@ -291,7 +298,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/11/18 07:33:06 $
+$Date: 2017/01/09 10:28:44 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-jails.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.es-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- po/proprietary-jails.es-en.html 8 Sep 2016 10:28:38 -0000 1.6
+++ po/proprietary-jails.es-en.html 9 Jan 2017 10:28:44 -0000 1.7
@@ -27,27 +27,6 @@
isn't.</p>
<ul>
-<li>
-<p>Apple has banned iThing applications that show the confederate flag.
-<a
href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html">
-Not only those that use it as a symbol of racism</a>, but even strategic
-games that use it to represent confederate army units fighting in the
-Civil War.</p>
-
-<p>This ludicrous rigidity illustrates the point that Apple should not be
-allowed to censor apps. Even if Apple carried out this act of
-censorship with some care, it would still be wrong. Whether racism is
-bad, whether educating people about drone attacks is bad, are not the
-real issue. Apple should not have the power to impose its views about
-either of these questions, or any other.</p>
-</li>
-
-<li>
- <p>
- <a
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans">More
- examples of Apple's arbitrary and inconsistent censorship</a>.
- </p>
-</li>
<li>
<p><a
href="http://boingboing.net/2010/04/02/why-i-wont-buy-an-ipad-and-think-yo.html">
@@ -79,6 +58,28 @@
</li>
<li>
+<p>Apple has banned iThing applications that show the confederate flag.
+<a
href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html">
+Not only those that use it as a symbol of racism</a>, but even strategic
+games that use it to represent confederate army units fighting in the
+Civil War.</p>
+
+<p>This ludicrous rigidity illustrates the point that Apple should not be
+allowed to censor apps. Even if Apple carried out this act of
+censorship with some care, it would still be wrong. Whether racism is
+bad, whether educating people about drone attacks is bad, are not the
+real issue. Apple should not have the power to impose its views about
+either of these questions, or any other.</p>
+</li>
+
+<li>
+ <p>
+ <a
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans">More
+ examples of Apple's arbitrary and inconsistent censorship</a>.
+ </p>
+</li>
+
+<li>
<p><a
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html">Windows
8 on “mobile devices” is a jail.</a></p>
</li>
@@ -140,7 +141,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2014, 2015, 2016 Free Software Foundation, Inc.</p>
+<p>Copyright © 2014, 2015, 2016, 2017 Free Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -150,7 +151,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/09/08 10:28:38 $
+$Date: 2017/01/09 10:28:44 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es-en.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- po/proprietary.es-en.html 11 Nov 2016 09:29:18 -0000 1.9
+++ po/proprietary.es-en.html 9 Jan 2017 10:28:44 -0000 1.10
@@ -37,6 +37,10 @@
it is standard practice. Modern proprietary software is typically
a way to be had.</p>
+<p>As of January, 2017, the files in this directory list around 260
+instances of malicious functionalities, but there are surely thousands
+more we don't know about.</p>
+
<div class="toc">
<div class="companies">
<ul>
@@ -131,7 +135,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2013, 2014, 2015, 2016 Free Software Foundation, Inc.</p>
+<p>Copyright © 2013, 2014, 2015, 2016, 2017 Free Software Foundation,
Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -141,7 +145,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/11/11 09:29:18 $
+$Date: 2017/01/09 10:28:44 $
<!-- timestamp end -->
</p>
</div>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary malware-kindle-swindle.es.html ...,
GNUN <=