[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-microsoft.es.html malwa...
From: |
GNUN |
Subject: |
www/proprietary malware-microsoft.es.html malwa... |
Date: |
Sun, 14 Jan 2018 06:00:04 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 18/01/14 06:00:04
Modified files:
proprietary : malware-microsoft.es.html
malware-mobiles.es.html
proprietary/po : malware-microsoft.es-en.html
malware-mobiles.es-en.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.es.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.es.html?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.es-en.html?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es-en.html?cvsroot=www&r1=1.26&r2=1.27
Patches:
Index: malware-microsoft.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.es.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- malware-microsoft.es.html 22 Nov 2017 11:30:57 -0000 1.45
+++ malware-microsoft.es.html 14 Jan 2018 11:00:03 -0000 1.46
@@ -57,6 +57,7 @@
programas de aplicación.</li>
<li><a href="#tyrants">Tiranos</a>: Son sistemas que rechazan cualquier sistema
operativo que no esté «autorizado» por el fabricante.</li>
+<li><a href="#subscriptions">Suscripciones</a></li>
</ul>
</div>
@@ -469,6 +470,14 @@
usuario instalar sistemas operativos modificados u otros diferentes.</p></li>
</ul>
+<h3 id="subscriptions">Suscripciones de Microsoft</h3>
+
+<ul>
+<li><p>Microsoft Office obliga a los usuarios a <a
+href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html">suscribirse
+a Office 360 para poder crear o editar documentos</a>.</p>
+</li>
+</ul>
<p>Como queda demostrado en esta página, si lo que quiere es eliminar el
<cite>malware</cite> de su ordenador, lo primero que tiene que eliminar es
@@ -533,7 +542,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2014, 2015, 2016, 2017 Free Software Foundation, Inc.</p>
+<p>Copyright © 2014, 2015, 2016, 2017, 2018 Free Software Foundation,
Inc.</p>
<p>Esta página está bajo licencia <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/deed.es_ES">Creative
@@ -549,7 +558,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2017/11/22 11:30:57 $
+$Date: 2018/01/14 11:00:03 $
<!-- timestamp end -->
</p>
Index: malware-mobiles.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.es.html,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- malware-mobiles.es.html 21 Sep 2017 09:33:39 -0000 1.28
+++ malware-mobiles.es.html 14 Jan 2018 11:00:03 -0000 1.29
@@ -1,7 +1,7 @@
<!--#set var="ENGLISH_PAGE" value="/proprietary/malware-mobiles.en.html" -->
<!--#include virtual="/server/header.es.html" -->
-<!-- Parent-Version: 1.84 -->
+<!-- Parent-Version: 1.85 -->
<!-- This file is automatically generated by GNUnited Nations! -->
<title>Malware en los dispositivos móviles - Proyecto GNU - Free Software
@@ -43,6 +43,49 @@
</p>
</div>
+<div class="highlight-para">
+<p>Casi todos los teléfonos móviles causan dos serios agravios a los
usuarios:
+rastrear sus movimientos y escuchar sus conversaciones. Por este motivo los
+llamamos «el sueño de Stalin».</p>
+</div>
+
+<ul>
+ <li><p>La red telefónica <a
+href="https://ssd.eff.org/en/module/problem-mobile-phones">rastrea los
+movimientos de todo teléfono</a>.</p>
+ <p>Esto es consustancial al diseño de la red telefónica: mientras el
teléfono
+esté en comunicación con la red, no hay manera de impedir que la red
+registre su ubicación. Muchos paÃses (incluidos EE. UU. y la UE) exige que
+la red guarde los datos de esas ubicaciones durante meses o años.</p>
+ </li>
+ <li><p id="universal-back-door">El procesador de comunicaciones de casi
todos los teléfonos tiene una puerta
+trasera universal que <a
+href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">a
+menudo se utiliza para hacer que el teléfono transmita todas las
+conversaciones que escucha</a>.</p>
+ <p>La puerta trasera <a
+href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
+puede producirse en forma de fallos que han permanecido veinte años sin
+corregirse</a>. La decisión de dejar esos agujeros de seguridad es desde el
+punto de vista ético equivalente a colocar una puerta trasera.</p>
+ <p>La puerta trasera se encuentra en el «procesador del módem», cuyo
cometido
+es comunicarse con la red radiofónica. En la mayorÃa de los teléfonos, el
+procesador del módem controla el micrófono. En la mayorÃa de los teléfonos
+tiene, además, la capacidad de reescribir el software del procesador
+principal.</p>
+ <p>Unos pocos modelos de teléfonos están especialmente diseñados para
que el
+procesador del módem no controle el micrófono ni pueda modificar el software
+del procesador principal. Siguen teniendo la puerta trasera, pero al menos
+no es capaz de convertir el teléfono en un dispositivo de escucha.</p>
+ <p>Al parecer, la puerta trasera universal se utiliza también para hacer
que
+los teléfonos <a
+href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">transmitan
+incluso cuando están apagados</a>. Esto significa que se rastrean sus
+movimientos, y que incluso podrÃa poner en funcionamiento el sistema de
+escucha.</p>
+ </li>
+</ul>
+
<p>Estos son ejemplos de la presencia de <em>malware</em> en los dispositivos
móviles. Véase también la <a href="/proprietary/malware-apple.html"> página
de programas dañinos de Apple</a>, donde se mencionan las funcionalidades
@@ -75,17 +118,9 @@
<h3 id="back-doors">Puertas traseras en los móviles</h3>
<ul>
<li>
- <p>La puerta trasera universal en los teléfonos móviles <a
-href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html/">se
-emplea para convertirlos en dispositivos de escucha a través de sus
-micrófonos</a>.</p>
- <p>La mayorÃa de los teléfonos móviles tienen esta puerta trasera
universal,
-que ha sido utilizada para <a
-href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
-convertirlos en maliciosos</a>.</p>
- <p>Más información acerca de <a
-href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">la
-naturaleza de este problema</a>.</p>
+ <p>Vea más arriba acerca de la <a href="#universal-back-door">puerta
trasera
+universal general</a> presente en prácticamente todos los teléfonos móviles,
+lo que permite convertirlos en dispositivos de escucha a tiempo completo.</p>
</li>
<li><p><a
@@ -102,16 +137,18 @@
<li>
<p>En Android, <a
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">Google
-tiene una puerta trasera para eliminar aplicaciones remotamente</a> (está en
-un programa llamado GTalkService).
+tiene una puerta trasera para eliminar aplicaciones de forma
+remota</a>. (Estaba en un programa llamado GTalkService, que posteriormente
+parece haber sido integrado en Google Play).
</p>
-<p>Google también puede <a
-href="https://web.archive.org/web/20150520235257/https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"
-title="en la Wayback Machine (archivado el 20 de mayo de 2015)">instalar
-aplicaciones por la fuerza y remotamente</a> a través de GTalkService (que
-al parecer se fusionó con Google Play después que se escribió ese
-artÃculo). Se trata en fin de cuentas de una puerta trasera universal. </p>
+ <p>
+ Google también puede <a
+href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">instalar
+aplicaciones por la fuerza y de forma remota</a> a través de
+GTalkService. Esto no equivale a una puerta trasera, pero permite varios
+trucos sucios.
+ </p>
<p>
Si bien hasta el momento Google no ha <em>ejercido</em> este poder de manera
@@ -539,7 +576,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2014, 2015, 2016, 2017 Free Software Foundation, Inc.</p>
+<p>Copyright © 2014, 2015, 2016, 2017, 2018 Free Software Foundation,
Inc.</p>
<p>Esta página está bajo licencia <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/deed.es_ES">Creative
@@ -554,7 +591,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2017/09/21 09:33:39 $
+$Date: 2018/01/14 11:00:03 $
<!-- timestamp end -->
</p>
Index: po/malware-microsoft.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.es-en.html,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- po/malware-microsoft.es-en.html 22 Nov 2017 11:30:57 -0000 1.44
+++ po/malware-microsoft.es-en.html 14 Jan 2018 11:00:04 -0000 1.45
@@ -47,6 +47,7 @@
<li><a href="#tyrants">Tyrants</a>—systems
that reject any operating system not “authorized” by the
manufacturer.</li>
+<li><a href="#subscriptions">Subscriptions</a></li>
</ul>
</div>
@@ -425,6 +426,15 @@
users from installing other or modified operating systems.</p></li>
</ul>
+<h3 id="subscriptions">Microsoft Subscriptions</h3>
+
+<ul>
+<li><p>Microsoft Office forces
+ users <a
href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html">to
+ subscribe to Office 360 to be able to create/edit
+ documents</a>.</p>
+</li>
+</ul>
<p>As this page shows, if you do want to clean your computer of malware,
the first software to delete is Windows.</p>
@@ -476,7 +486,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2014, 2015, 2016, 2017 Free Software Foundation, Inc.</p>
+<p>Copyright © 2014, 2015, 2016, 2017, 2018 Free Software Foundation,
Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -486,7 +496,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/11/22 11:30:57 $
+$Date: 2018/01/14 11:00:04 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-mobiles.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es-en.html,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- po/malware-mobiles.es-en.html 21 Sep 2017 09:33:39 -0000 1.26
+++ po/malware-mobiles.es-en.html 14 Jan 2018 11:00:04 -0000 1.27
@@ -1,5 +1,5 @@
<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.84 -->
+<!-- Parent-Version: 1.85 -->
<title>Malware in Mobile Devices
- GNU Project - Free Software Foundation</title>
<style type="text/css" media="print,screen"><!--
@@ -33,6 +33,49 @@
</p>
</div>
+<div class="highlight-para">
+<p>Nearly all mobile phones do two grievous wrongs to their users:
+tracking their movements, and listening to their conversations. This
+is why we call them “Stalin's dream”.</p>
+</div>
+
+<ul>
+ <li><p>The phone network
+ <a href="https://ssd.eff.org/en/module/problem-mobile-phones">
+ tracks the movements of each phone</a>.</p>
+ <p>This is inherent in the design of the phone network: as long as
+ the phone is in communication with the network, there is no way
+ to stop the network from recording its location. Many countries
+ (including the US and the EU) require the network to store all
+ these location data for months or years.</p>
+ </li>
+ <li><p id="universal-back-door">Almost every phone's communication processor
has
+ a universal back door which
+ is <a
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
+ often used to make a phone transmit all conversations it
+ hears</a>.</p>
+ <p>The back
+ door <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
+ may take the form of bugs that have gone 20 years unfixed</a>.
+ The choice to leave the security holes in place is morally
+ equivalent to writing a back door.</p>
+ <p>The back door is in the “modem processor”, whose
+ job is to communicate with the radio network. In most phones,
+ the modem processor controls the microphone. In most phones it
+ has the power to rewrite the software for the main processor
+ too.</p>
+ <p>A few phone models are specially designed so that the modem
+ processor does not control the microphone, and so that it can't
+ change the software in the main processor. They still have the
+ back door, but at least it is unable to turn the phone unto a
+ listening device.</p>
+ <p>The universal back door is apparently also used to make phones
+ <a
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
+ transmit even when they are turned off</a>. This means their movements
+ are tracked, and may also make the listening feature work.</p>
+ </li>
+</ul>
+
<p>Here are examples of malware in mobile devices. See also
the <a href="/proprietary/malware-apple.html">the Apple malware
page</a> for malicious functionalities specific to the Apple iThings.</p>
@@ -60,14 +103,9 @@
<h3 id="back-doors">Mobile Back Doors</h3>
<ul>
<li>
- <p>The universal back door in portable phones
- <a
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
- is employed to listen through their microphones</a>.</p>
- <p>Most mobile phones have this universal back door, which has been
- used to
- <a
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
- turn them malicious</a>.</p>
- <p>More about <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">the
nature of this problem</a>.</p>
+ <p>See above for the <a href="#universal-back-door">general universal back
+ door</a> in essentially all mobile phones, which permits converting
+ them into full-time listening devices.</p>
</li>
<li><p><a
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">
@@ -81,17 +119,20 @@
</li>
<li>
- <p>In Android, <a
-
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">
- Google has a back door to remotely delete apps</a> (it is in a program
- called GTalkService).
+ <p>In Android,
+ <a
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">
+ Google has a back door to remotely delete apps.</a> (It was in a
+ program called GTalkService, which seems since then to have been
+ merged into Google Play.)
</p>
-<p>Google can also <a
-href="https://web.archive.org/web/20150520235257/https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"
-title="at the Wayback Machine (archived May 20, 2015)">forcibly and remotely
-install apps</a> through GTalkService (which seems, since that article, to have
-been merged into Google Play). This adds up to a universal back door. </p>
+ <p>
+ Google can also
+ <a
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
+ forcibly and remotely install apps</a> through Google Play.
+ This is not equivalent to a universal back door, but permits various
+ dirty tricks.
+ </p>
<p>
Although Google's <em>exercise</em> of this power has not been
@@ -481,7 +522,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2014, 2015, 2016, 2017 Free Software Foundation, Inc.</p>
+<p>Copyright © 2014, 2015, 2016, 2017, 2018 Free Software Foundation,
Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -491,7 +532,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/09/21 09:33:39 $
+$Date: 2018/01/14 11:00:04 $
<!-- timestamp end -->
</p>
</div>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary malware-microsoft.es.html malwa...,
GNUN <=