www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-microsoft.es.html malwa...


From: GNUN
Subject: www/proprietary malware-microsoft.es.html malwa...
Date: Sun, 14 Jan 2018 06:00:04 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     18/01/14 06:00:04

Modified files:
        proprietary    : malware-microsoft.es.html 
                         malware-mobiles.es.html 
        proprietary/po : malware-microsoft.es-en.html 
                         malware-mobiles.es-en.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.es.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.es.html?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.es-en.html?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es-en.html?cvsroot=www&r1=1.26&r2=1.27

Patches:
Index: malware-microsoft.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.es.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- malware-microsoft.es.html   22 Nov 2017 11:30:57 -0000      1.45
+++ malware-microsoft.es.html   14 Jan 2018 11:00:03 -0000      1.46
@@ -57,6 +57,7 @@
 programas de aplicación.</li>
 <li><a href="#tyrants">Tiranos</a>: Son sistemas que rechazan cualquier sistema
 operativo que no esté «autorizado» por el fabricante.</li>
+<li><a href="#subscriptions">Suscripciones</a></li>
 </ul>
 </div>
 
@@ -469,6 +470,14 @@
 usuario instalar sistemas operativos modificados u otros diferentes.</p></li>
 </ul>
 
+<h3 id="subscriptions">Suscripciones de Microsoft</h3>
+
+<ul>
+<li><p>Microsoft Office obliga a los usuarios a <a
+href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html";>suscribirse
+a Office 360 para poder crear o editar documentos</a>.</p>
+</li>
+</ul>
 
 <p>Como queda demostrado en esta página, si lo que quiere es eliminar el
 <cite>malware</cite> de su ordenador, lo primero que tiene que eliminar es
@@ -533,7 +542,7 @@
 
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2014, 2015, 2016, 2017, 2018 Free Software Foundation, 
Inc.</p>
 
 <p>Esta página está bajo licencia <a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/deed.es_ES";>Creative
@@ -549,7 +558,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2017/11/22 11:30:57 $
+$Date: 2018/01/14 11:00:03 $
 
 <!-- timestamp end -->
 </p>

Index: malware-mobiles.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.es.html,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- malware-mobiles.es.html     21 Sep 2017 09:33:39 -0000      1.28
+++ malware-mobiles.es.html     14 Jan 2018 11:00:03 -0000      1.29
@@ -1,7 +1,7 @@
 <!--#set var="ENGLISH_PAGE" value="/proprietary/malware-mobiles.en.html" -->
 
 <!--#include virtual="/server/header.es.html" -->
-<!-- Parent-Version: 1.84 -->
+<!-- Parent-Version: 1.85 -->
 
 <!-- This file is automatically generated by GNUnited Nations! -->
 <title>Malware en los dispositivos móviles - Proyecto GNU - Free Software
@@ -43,6 +43,49 @@
 </p>
 </div>
 
+<div class="highlight-para">
+<p>Casi todos los teléfonos móviles causan dos serios agravios a los 
usuarios:
+rastrear sus movimientos y escuchar sus conversaciones. Por este motivo los
+llamamos «el sueño de Stalin».</p>
+</div>
+
+<ul>
+  <li><p>La red telefónica <a
+href="https://ssd.eff.org/en/module/problem-mobile-phones";>rastrea los
+movimientos de todo teléfono</a>.</p>
+    <p>Esto es consustancial al diseño de la red telefónica: mientras el 
teléfono
+esté en comunicación con la red, no hay manera de impedir que la red
+registre su ubicación. Muchos países (incluidos EE. UU. y la UE) exige que
+la red guarde los datos de esas ubicaciones durante meses o años.</p>
+  </li>
+  <li><p id="universal-back-door">El procesador de comunicaciones de casi 
todos los teléfonos tiene una puerta
+trasera universal que <a
+href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html";>a
+menudo se utiliza para hacer que el teléfono transmita todas las
+conversaciones que escucha</a>.</p>
+    <p>La puerta trasera <a
+href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone";>
+puede producirse en forma de fallos que han permanecido veinte años sin
+corregirse</a>. La decisión de dejar esos agujeros de seguridad es desde el
+punto de vista ético equivalente a colocar una puerta trasera.</p>
+    <p>La puerta trasera se encuentra en el «procesador del módem», cuyo 
cometido
+es comunicarse con la red radiofónica. En la mayoría de los teléfonos, el
+procesador del módem controla el micrófono. En la mayoría de los teléfonos
+tiene, además, la capacidad de reescribir el software del procesador
+principal.</p>
+    <p>Unos pocos modelos de teléfonos están especialmente diseñados para 
que el
+procesador del módem no controle el micrófono ni pueda modificar el software
+del procesador principal. Siguen teniendo la puerta trasera, pero al menos
+no es capaz de convertir el teléfono en un dispositivo de escucha.</p>
+    <p>Al parecer, la puerta trasera universal se utiliza también para hacer 
que
+los teléfonos <a
+href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html";>transmitan
+incluso cuando están apagados</a>. Esto significa que se rastrean sus
+movimientos, y que incluso podría poner en funcionamiento el sistema de
+escucha.</p>
+  </li>
+</ul>
+
 <p>Estos son ejemplos de la presencia de <em>malware</em> en los dispositivos
 móviles. Véase también la <a href="/proprietary/malware-apple.html"> página
 de programas dañinos de Apple</a>, donde se mencionan las funcionalidades
@@ -75,17 +118,9 @@
 <h3 id="back-doors">Puertas traseras en los móviles</h3>
 <ul>
   <li>
-    <p>La puerta trasera universal en los teléfonos móviles <a
-href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html/";>se
-emplea para convertirlos en dispositivos de escucha a través de sus
-micrófonos</a>.</p>
-    <p>La mayoría de los teléfonos móviles tienen esta puerta trasera 
universal,
-que ha sido utilizada para <a
-href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html";>
-convertirlos en maliciosos</a>.</p>
-    <p>Más información acerca de <a
-href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone";>la
-naturaleza de este problema</a>.</p>
+    <p>Vea más arriba acerca de la <a href="#universal-back-door">puerta 
trasera
+universal general</a> presente en prácticamente todos los teléfonos móviles,
+lo que permite convertirlos en dispositivos de escucha a tiempo completo.</p>
   </li>
 
   <li><p><a
@@ -102,16 +137,18 @@
   <li>
   <p>En Android, <a
 
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html";>Google
-tiene una puerta trasera para eliminar aplicaciones remotamente</a> (está en
-un programa llamado GTalkService).
+tiene una puerta trasera para eliminar aplicaciones de forma
+remota</a>. (Estaba en un programa llamado GTalkService, que posteriormente
+parece haber sido integrado en Google Play).
   </p>
 
-<p>Google también puede <a
-href="https://web.archive.org/web/20150520235257/https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/";
-title="en la Wayback Machine (archivado el 20 de mayo de 2015)">instalar
-aplicaciones por la fuerza y remotamente</a> a través de GTalkService (que
-al parecer se fusionó con Google Play después que se escribió ese
-artículo). Se trata en fin de cuentas de una puerta trasera universal. </p>
+  <p>
+  Google también puede <a
+href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/";>instalar
+aplicaciones por la fuerza y de forma remota</a> a través de
+GTalkService. Esto no  equivale a una puerta trasera, pero permite varios
+trucos sucios.
+  </p>
 
   <p>
   Si bien hasta el momento Google no ha <em>ejercido</em> este poder de manera
@@ -539,7 +576,7 @@
 
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2014, 2015, 2016, 2017, 2018 Free Software Foundation, 
Inc.</p>
 
 <p>Esta página está bajo licencia <a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/deed.es_ES";>Creative
@@ -554,7 +591,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2017/09/21 09:33:39 $
+$Date: 2018/01/14 11:00:03 $
 
 <!-- timestamp end -->
 </p>

Index: po/malware-microsoft.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.es-en.html,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- po/malware-microsoft.es-en.html     22 Nov 2017 11:30:57 -0000      1.44
+++ po/malware-microsoft.es-en.html     14 Jan 2018 11:00:04 -0000      1.45
@@ -47,6 +47,7 @@
 <li><a href="#tyrants">Tyrants</a>&mdash;systems
     that reject any operating system not &ldquo;authorized&rdquo; by the
     manufacturer.</li>
+<li><a href="#subscriptions">Subscriptions</a></li>
 </ul>
 </div>
 
@@ -425,6 +426,15 @@
   users from installing other or modified operating systems.</p></li>
 </ul>
 
+<h3 id="subscriptions">Microsoft Subscriptions</h3>
+
+<ul>
+<li><p>Microsoft Office forces
+      users <a 
href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html";>to
+      subscribe to Office 360 to be able to create/edit
+      documents</a>.</p>
+</li>
+</ul>
 
 <p>As this page shows, if you do want to clean your computer of malware,
 the first software to delete is Windows.</p>
@@ -476,7 +486,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
 
-<p>Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2014, 2015, 2016, 2017, 2018 Free Software Foundation, 
Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative
@@ -486,7 +496,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2017/11/22 11:30:57 $
+$Date: 2018/01/14 11:00:04 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-mobiles.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es-en.html,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- po/malware-mobiles.es-en.html       21 Sep 2017 09:33:39 -0000      1.26
+++ po/malware-mobiles.es-en.html       14 Jan 2018 11:00:04 -0000      1.27
@@ -1,5 +1,5 @@
 <!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.84 -->
+<!-- Parent-Version: 1.85 -->
 <title>Malware in Mobile Devices
 - GNU Project - Free Software Foundation</title>
 <style type="text/css" media="print,screen"><!--
@@ -33,6 +33,49 @@
 </p>
 </div>
 
+<div class="highlight-para">
+<p>Nearly all mobile phones do two grievous wrongs to their users:
+tracking their movements, and listening to their conversations.  This
+is why we call them &ldquo;Stalin's dream&rdquo;.</p>
+</div>
+
+<ul>
+  <li><p>The phone network
+    <a href="https://ssd.eff.org/en/module/problem-mobile-phones";>
+      tracks the movements of each phone</a>.</p>
+    <p>This is inherent in the design of the phone network: as long as
+      the phone is in communication with the network, there is no way
+      to stop the network from recording its location.  Many countries
+      (including the US and the EU) require the network to store all
+      these location data for months or years.</p>
+  </li>
+  <li><p id="universal-back-door">Almost every phone's communication processor 
has
+      a universal back door which
+      is <a 
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html";>
+      often used to make a phone transmit all conversations it
+ hears</a>.</p>
+    <p>The back
+      door <a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone";>
+      may take the form of bugs that have gone 20 years unfixed</a>.
+      The choice to leave the security holes in place is morally
+      equivalent to writing a back door.</p>
+    <p>The back door is in the &ldquo;modem processor&rdquo;, whose
+      job is to communicate with the radio network.  In most phones,
+      the modem processor controls the microphone.  In most phones it
+      has the power to rewrite the software for the main processor
+      too.</p>
+    <p>A few phone models are specially designed so that the modem
+      processor does not control the microphone, and so that it can't
+      change the software in the main processor.  They still have the
+      back door, but at least it is unable to turn the phone unto a
+      listening device.</p>
+    <p>The universal back door is apparently also used to make phones
+      <a 
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html";>
+      transmit even when they are turned off</a>.  This means their movements
+      are tracked, and may also make the listening feature work.</p>
+  </li>
+</ul>
+
 <p>Here are examples of malware in mobile devices.  See also
 the <a href="/proprietary/malware-apple.html">the Apple malware
 page</a> for malicious functionalities specific to the Apple iThings.</p>
@@ -60,14 +103,9 @@
 <h3 id="back-doors">Mobile Back Doors</h3>
 <ul>
   <li>
-    <p>The universal back door in portable phones
-      <a 
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html";>
-        is employed to listen through their microphones</a>.</p>
-    <p>Most mobile phones have this universal back door, which has been
-      used to
-      <a 
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html";>
-       turn them malicious</a>.</p>
-    <p>More about <a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone";>the
 nature of this problem</a>.</p>
+    <p>See above for the <a href="#universal-back-door">general universal back
+      door</a> in essentially all mobile phones, which permits converting
+      them into full-time listening devices.</p>
   </li>
 
   <li><p><a 
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor";>
@@ -81,17 +119,20 @@
   </li>
 
   <li>
-  <p>In Android, <a
-  
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html";>
-  Google has a back door to remotely delete apps</a> (it is in a program
-  called GTalkService).
+  <p>In Android,
+  <a 
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html";>
+  Google has a back door to remotely delete apps.</a>  (It was in a
+  program called GTalkService, which seems since then to have been
+  merged into Google Play.)
   </p>
 
-<p>Google can also <a
-href="https://web.archive.org/web/20150520235257/https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/";
-title="at the Wayback Machine (archived May 20, 2015)">forcibly and remotely
-install apps</a> through GTalkService (which seems, since that article, to have
-been merged into Google Play).  This adds up to a universal back door. </p>
+  <p>
+  Google can also
+  <a 
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/";>
+  forcibly and remotely install apps</a> through Google Play.
+  This is not equivalent to a universal back door, but permits various
+  dirty tricks.
+  </p>
 
   <p>
   Although Google's <em>exercise</em> of this power has not been
@@ -481,7 +522,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
 
-<p>Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2014, 2015, 2016, 2017, 2018 Free Software Foundation, 
Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative
@@ -491,7 +532,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2017/09/21 09:33:39 $
+$Date: 2018/01/14 11:00:04 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]