www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www graphics/graphics.es.html graphics/po/graph...


From: GNUN
Subject: www graphics/graphics.es.html graphics/po/graph...
Date: Sat, 29 Sep 2018 06:28:22 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     18/09/29 06:28:22

Modified files:
        graphics       : graphics.es.html 
        graphics/po    : graphics.es-en.html 
        proprietary    : malware-amazon.es.html 
                         proprietary-jails.es.html 
                         proprietary-tyrants.es.html 
        proprietary/po : malware-amazon.es-en.html 
                         proprietary-jails.es-en.html 
                         proprietary-tyrants.es-en.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/graphics/graphics.es.html?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/graphics/po/graphics.es-en.html?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-amazon.es.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-jails.es.html?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-tyrants.es.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.es-en.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.es-en.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.es-en.html?cvsroot=www&r1=1.15&r2=1.16

Patches:
Index: graphics/graphics.es.html
===================================================================
RCS file: /web/www/www/graphics/graphics.es.html,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- graphics/graphics.es.html   30 Aug 2018 08:58:26 -0000      1.67
+++ graphics/graphics.es.html   29 Sep 2018 10:28:21 -0000      1.68
@@ -234,6 +234,14 @@
 -->
 <!--#if expr="$THEME = /^(gnuhead|)$/
                && $TYPE  = /^(logo|)$/" -->
+<tr><td><a href="/graphics/barr-gnu.html">
+    <img src="/graphics/icons/barr-gnu.80.png" alt="X" /></a></td>
+    <td>Septiembre de 2018: Logo de GNU<br />
+    <small>de Paul Barr</small></td></tr>
+<!--#endif
+-->
+<!--#if expr="$THEME = /^(gnuhead|)$/
+               && $TYPE  = /^(logo|)$/" -->
 <tr><td><a href="/graphics/gg3po.html">
     <img src="/graphics/icons/gg3po-newGnu.80.png" alt="X" /></a></td>
     <td>Agosto de 2018: Nuevo GNU<br />
@@ -290,14 +298,6 @@
     <small>de R4sH</small></td></tr>
 <!--#endif
 -->
-<!--#if expr="$THEME = /^$/
-               && $TYPE  = /^(logo|svg|)$/" -->
-<tr><td><a href="/graphics/gnu-linux-logos.html">
-    <img src="/graphics/icons/powered-by-gnu-linux.80.png" alt="X" /></a></td>
-    <td>Junio de 2017: Logo de GNU/Linux<br />
-    <small>de Burkhard Jäckel.</small></td></tr>
-<!--#endif
--->
 </table>
 
 <h3 id="this-site">Imágenes de GNU en este sitio</h3>
@@ -405,6 +405,14 @@
     <small>de Etienne Suvasa</small></td></tr>
 <!--#endif
 -->
+<!--#if expr="$THEME = /^(gnuhead|)$/
+               && $TYPE  = /^(logo|)$/" -->
+<tr><td><a href="/graphics/barr-gnu.html">
+    <img src="/graphics/icons/barr-gnu.80.png" alt="X" /></a></td>
+    <td>Logo de GNU<br />
+    <small>de Paul Barr</small></td></tr>
+<!--#endif
+-->
 <!--#if expr="$THEME = /^(gnuhead|emacs|)$/
                && $TYPE  = /^(logo|)$/" -->
 <tr><td><a href="/graphics/bokma-gnu.html">
@@ -1259,7 +1267,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2018/08/30 08:58:26 $
+$Date: 2018/09/29 10:28:21 $
 
 <!-- timestamp end -->
 </p>

Index: graphics/po/graphics.es-en.html
===================================================================
RCS file: /web/www/www/graphics/po/graphics.es-en.html,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- graphics/po/graphics.es-en.html     30 Aug 2018 08:58:27 -0000      1.44
+++ graphics/po/graphics.es-en.html     29 Sep 2018 10:28:21 -0000      1.45
@@ -162,6 +162,12 @@
 <tr style="display:none"><td></td></tr><!-- Dummy entry for xhtml validation.
 --><!--#if expr="$THEME = /^(gnuhead|)$/
                && $TYPE  = /^(logo|)$/" -->
+<tr><td><a href="/graphics/barr-gnu.html">
+    <img src="/graphics/icons/barr-gnu.80.png" alt="X" /></a></td>
+    <td>September 2018: GNU logo<br />
+    <small>by Paul Barr</small></td></tr><!--#endif
+--><!--#if expr="$THEME = /^(gnuhead|)$/
+               && $TYPE  = /^(logo|)$/" -->
 <tr><td><a href="/graphics/gg3po.html">
     <img src="/graphics/icons/gg3po-newGnu.80.png" alt="X" /></a></td>
     <td>August 2018: New GNU<br />
@@ -203,12 +209,6 @@
     <img src="/graphics/icons/r4sh-gnu-vaporwave.80.png" alt="X" /></a></td>
     <td>September 2017: GNU Vaporwave Design<br />
     <small>by R4sH</small></td></tr><!--#endif
---><!--#if expr="$THEME = /^$/
-               && $TYPE  = /^(logo|svg|)$/" -->
-<tr><td><a href="/graphics/gnu-linux-logos.html">
-    <img src="/graphics/icons/powered-by-gnu-linux.80.png" alt="X" /></a></td>
-    <td>June 2017: GNU/Linux logo<br />
-    <small>by Burkhard Jäckel.</small></td></tr><!--#endif
 -->
 </table>
 
@@ -292,6 +292,12 @@
     <img src="/graphics/icons/baby-gnu.80.png" alt="X" /></a></td>
     <td>Baby Gnu<br />
     <small>by Etienne Suvasa</small></td></tr><!--#endif
+--><!--#if expr="$THEME = /^(gnuhead|)$/
+               && $TYPE  = /^(logo|)$/" -->
+<tr><td><a href="/graphics/barr-gnu.html">
+    <img src="/graphics/icons/barr-gnu.80.png" alt="X" /></a></td>
+    <td>GNU logo<br />
+    <small>by Paul Barr</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnuhead|emacs|)$/
                && $TYPE  = /^(logo|)$/" -->
 <tr><td><a href="/graphics/bokma-gnu.html">
@@ -936,7 +942,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/08/30 08:58:27 $
+$Date: 2018/09/29 10:28:21 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/malware-amazon.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-amazon.es.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary/malware-amazon.es.html  20 Sep 2018 06:57:59 -0000      1.8
+++ proprietary/malware-amazon.es.html  29 Sep 2018 10:28:21 -0000      1.9
@@ -1,7 +1,12 @@
 <!--#set var="ENGLISH_PAGE" value="/proprietary/malware-amazon.en.html" -->
 
 <!--#include virtual="/server/header.es.html" -->
-<!-- Parent-Version: 1.86 -->
+<!-- Parent-Version: 1.84 -->
+<!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ Generated from propr-blurbs.rec. Please do not edit this file manually !
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
 
 <!-- This file is automatically generated by GNUnited Nations! -->
 <title>El software de Amazon es malware - Proyecto GNU - Free Software 
Foundation</title>
@@ -66,14 +71,22 @@
 y <a href="/philosophy/ebooks.html"> otras funcionalidades maliciosas</a>.</p>
 
 <h4 id="back-doors">Puertas traseras en el <cite>Kindle Swindle</cite> de 
Amazon</h4>
-<ul>
-  <li>
+
+<ul class="blurbs">
+  <li id="M201503210">
+    <p>Amazon <a
+href="https://www.techdirt.com/articles/20150321/13350230396/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices.shtml";>hizo
+una actualización regresiva en el software de los dispositivos Swindle de
+los usuarios</a> para impedir completamente el funcionamiento de los que ya
+habían sido desbloqueados. </p>
+  </li>
+
+  <li id="M201210221">
     <p>El Kindle-Swindle de Amazon tiene una puerta trasera que ha sido usada 
para
 <a
 
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/";>
-borrar libros de forma remota</a>. Uno de los libros borrados fue 1984, de
-George Orwell
-    </p>
+borrar libros de forma remota</a>. Uno de los libros borrados fue
+<cite>1984</cite>, de George Orwell</p>
 
     <p>Amazon respondió  las críticas diciendo que solo borraría libros 
siguiendo
 órdenes del Estado. Sin embargo, eso no duró mucho. En 2012 <a
@@ -82,59 +95,71 @@
 luego ofrecer sus kafkianas «explicaciones».</p>
   </li>
   
-  <li>
+  <li id="M200700000">
     <p>El Kindle también tiene una <a
 href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090";>
 puerta trasera universal</a>.</p>
-    
-    <p>Amazon <a
-href="https://www.techdirt.com/articles/20150321/13350230396/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices.shtml";>hizo
-una actualización regresiva en el software de los dispositivos Swindle de
-los usuarios</a> para impedir completamente el funcionamiento de los que ya
-habían sido desbloqueados. </p></li>
+  </li>
 </ul>
 
+
 <h4 id="surveillance">Vigilancia en el <cite>Kindle Swindle</cite> de 
Amazon</h4>
-<ul>
-  <li><p>La <cite>Electronic Frontier Foundation</cite> ha examinado y 
encontrado <a
+
+<ul class="blurbs">
+  <li id="M201212031">
+    <p>La <cite>Electronic Frontier Foundation</cite> ha examinado y 
encontrado <a
 href="https://www.eff.org/pages/reader-privacy-chart-2012";>diversos tipos de
-vigilancia en el Swindle y otros lectores de libros electrónicos</a>.</p></li>
+vigilancia en el Swindle y otros lectores de libros electrónicos</a>.</p>
+  </li>
 </ul>
 
+
 <h4 id="drm">Gestión digital de restricciones en el <cite>Kindle 
Swindle</cite> de Amazon</h4>
-<ul>
-  <li><p><a href="http://techin.oureverydaylife.com/kindle-drm-17841.html";> El 
Kindle
+
+<ul class="blurbs">
+  <li id="M201304050">
+    <p><a href="http://techin.oureverydaylife.com/kindle-drm-17841.html";> El 
Kindle
 de Amazon tiene DRM</a>. Ese artículo es erróneo, ya que no trata el DRM
 como una cuestión ética; da por hecho que todo lo que Amazon podría hacer a
 los usuarios es legítimo. Se refiere al DRM como gestión digital de
 «derechos», que es el término que se ha inventado para promover el DRM. No
-obstante, sirve de referencia a los hechos.</p></li>
+obstante, sirve de referencia a los hechos.</p>
+  </li>
 </ul>
 
+
 <h3 id="echo"><cite>Malware</cite> en el Echo</h3>
 
-<h4 id="echo-back-doors">Puertas traseras en el Amazon Echo</h4>
-<ul>
-    <li><p>El Amazon Echo parece tener una puerta trasera universal, ya que <a
+<h4>Puertas traseras en el Amazon Echo</h4>
+
+<ul class="blurbs">
+  <li id="M201606060">
+    <p>El Amazon Echo parece tener una puerta trasera universal, ya que <a
 href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates";> instala
 «actualizaciones» automáticamente</a>.</p>
+
     <p>No hemos encontrado nada que acredite de forma explícita la 
inexistencia de
 alguna manera de deshabilitar los cambios remotos del software, de modo que
-no estamos completamente seguros de que no exista alguna, pero parece
-bastante claro que no es así. </p>
+no estamos completamente seguros de que no exista alguna, pero esto parece
+evidente. </p>
   </li>
 </ul>
 
-<h4 id="echo-surveillance">Vigilancia en el Amazon Echo</h4>
-<ul>
-  <li><p>Unos <cite>crackers</cite> encontraron la manera de sortear las 
medidas de
+
+<h4>Vigilancia en el Amazon Echo</h4>
+
+<ul class="blurbs">
+  <li id="M201808120">
+    <p>Unos <cite>crackers</cite> encontraron la manera de sortear las medidas 
de
 seguridad de un dispositivo de Amazon y <a
 href="https://boingboing.net/2018/08/12/alexa-bob-carol.html";> convertirlo
 en un dispositivo de escucha</a> a su servicio.</p>
+
     <p>Les costó mucho hacerlo. A Amazon eso le resultaría mucho más 
sencillo. Y si
 algún Gobierno, como China o EE. UU., le dijera a Amazon que lo hiciera, o
 que dejara de vender ese dispositivo en el país, ¿creen que Amazon tendría
 la suficiente integridad moral para negarse?</p>
+
     <p>Estos <cite>crackers</cite> son probablemente también 
<cite>hackers</cite>,
 pero por favor <a href="https://stallman.org/articles/on-hacking.html";> no
 utilice la palabra «hackear» para referirse a «sortear medidas de
@@ -142,6 +167,7 @@
   </li>
 </ul>
 
+
 <div class="translators-notes">
 
 <!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
@@ -217,7 +243,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2018/09/20 06:57:59 $
+$Date: 2018/09/29 10:28:21 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-jails.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-jails.es.html,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- proprietary/proprietary-jails.es.html       24 Jun 2018 11:03:58 -0000      
1.20
+++ proprietary/proprietary-jails.es.html       29 Sep 2018 10:28:21 -0000      
1.21
@@ -2,6 +2,11 @@
 
 <!--#include virtual="/server/header.es.html" -->
 <!-- Parent-Version: 1.85 -->
+<!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ Generated from propr-blurbs.rec. Please do not edit this file manually !
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
 
 <!-- This file is automatically generated by GNUnited Nations! -->
 <title>Los sistemas privativos son prisiones - Proyecto GNU - Free Software
@@ -66,72 +71,78 @@
 grande para que las iCosas hayan dejado de ser prisiones.</p>
 
 <h4>Ejemplos de censura por medio de las prisiones de Apple</h4>
-<ul>
-  <li>
-    <p>Apple <a
-href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html";>
-suprimió varias VPN de su <cite>app store</cite> para China</a>, utilizando
-así su capacidad de censura para reforzar la del Gobierno chino.</p>
-  </li>
 
-  <li>
+<ul class="blurbs">
+  <li id="M201710130">
     <p>Apple también está <a
 
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet";>
 censurando aplicaciones a instancias del Gobierno
 estadounidense</a>. Concretamente, suprime aplicaciones desarrolladas por
 iraníes.</p>
+
     <p>El origen de estos desmanes está en Apple. Si Apple no hubiera 
diseñado los
 iMonstruos para que le permitieran censurar aplicaciones, no habría el
 tenido el poder de impedir a los usuarios instalar cualquier aplicación.</p>
   </li>
 
-  <li>
+  <li id="M201707290">
+    <p>Apple <a
+href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html";>
+suprimió varias VPN de su <cite>app store</cite> para China</a>, utilizando
+así su capacidad de censura para reforzar la del Gobierno chino.</p>
+  </li>
+
+  <li id="M201701064">
     <p>Apple utilizó su sistema de censura para imponer la censura de Rusia <a
 
href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0";>bloqueando
 la distribución de la aplicación de LinkedIn en ese país</a>.</p>
+
     <p>Esto resulta irónico, ya que LinkedIn es por sí mismo un sistema de
 vigilancia. Mientras somete a los usuarios a su propia vigilancia, trata de
 protegerlos de la vigilancia de Rusia, sometiéndose así a la censura 
rusa.</p>
+
     <p>De todos modos, la cuestión aquí es lo injusto de la censura de Apple 
sobre
 sus aplicaciones.</p>
   </li>
 
-  <li>
+  <li id="M201701050">
     <p>Apple utilizó su sistema de censura para imponer la censura de China <a
 
href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china";>bloqueando
 la distribución de la aplicación del New York Times</a>.</p>
   </li>
 
-  <li>
+  <li id="M201605190">
     <p>Apple censura juegos, <a
 
href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game";>excluyendo
 algunos de la App Store</a>debido a los puntos de vista políticos que
 sugieren. Al parecer, unas opiniones políticas son aceptables y otras no.</p>
   </li>
 
-  <li>
+  <li id="M201509290">
     <p>Apple <a href="http://ifixit.org/blog/7401/ifixit-app-pulled/";>excluyó 
un
 programa de la App Store</a> porque sus desarrolladores cometieron la
 atrocidad de desmontar algunas iCosas.</p>
     </li>
 
-  <li>
+  <li id="M201509230">
     <p>Desde 2015, Apple <a
 
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights";>excluye
 sistemáticamente las aplicaciones que apoyan el derecho al aborto o
 ayudarían a las mujeres que quisieran abortar</a>.</p>
+
     <p>Este particular sesgo político <a
 
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions";>
 afecta a otros servicios de Apple</a>.</p>
   </li>
 
-  <li>
+  <li id="M201506250">
     <p>Apple ha prohibido las aplicaciones para iCosas que exhiban la bandera
 confederada. <a
 
href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html";>
 No solo aquellas que la utilizan como un símbolo de racismo</a>, sino
 incluso juegos de estrategia que la utilizan para representar unidades del
 ejército confederado que luchan en la guerra civil.</p>
+
     <p>Esta ridícula rigurosidad sirve para ilustrar por qué no se le debe 
permitir
 a Apple censurar aplicaciones. Aun cuando Apple llevara a cabo este acto de
 censura con cierto cuidado, seguiría estando mal. La cuestión no es si el
@@ -140,16 +151,13 @@
 ninguno de estos asuntos, o cualquier otro.</p>
   </li>
 
-  <li>
-    <p>Apple rechazó una aplicación que mostraba las localizaciones de los
-asesinatos cometidos por drones estadounidenses, ofreciendo varias
-excusas. Cada vez que los desarrolladores arreglaban un «problema», Apple
-señalaba otro. Tras el quinto rechazo de la aplicación, Apple <a
-href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/";>admitió
-que la estaba censurando debido al asunto del que trataba</a>.</p>
+  <li id="M201412110">
+    <p><a
+href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans";>Más
+ejemplos de censura arbitraria e incoherente por parte de Apple</a>.</p>
   </li>
 
-  <li>
+  <li id="M201405250">
     <p>En 2014 Apple utilizó este poder de censura para <a
 href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html";>
 prohibir durante algún tiempo el uso de todas las aplicaciones para
@@ -160,17 +168,21 @@
 más aceptable que cultivar marihuana.</p>
   </li>
 
-  <li>
-    <p><a
-href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans";>Más
-ejemplos de censura arbitraria e incoherente por parte de Apple</a>.</p>
+  <li id="M201402070">
+    <p>Apple rechazó una aplicación que mostraba las localizaciones de los
+asesinatos cometidos por drones estadounidenses, ofreciendo varias
+excusas. Cada vez que los desarrolladores arreglaban un «problema», Apple
+señalaba otro. Tras el quinto rechazo de la aplicación, Apple <a
+href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/";>admitió
+que la estaba censurando debido al asunto del que trataba</a>.</p>
   </li>
 </ul>
 
+
 <h3 id="microsoft">Prisiones de Microsoft</h3>
 
-<ul>
-  <li>
+<ul class="blurbs">
+  <li id="M201706130">
     <p>Windows 10 S era una prisión: <a
 
href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison";>
 solo se podían instalar y ejecutar programas procedentes de la Windows
@@ -180,20 +192,24 @@
 especial de Windows 10 llamada <a
 
href="https://support.microsoft.com/en-gb/help/4020089/windows-10-in-s-mode-faq";>
 modo S</a>. La principal diferencia con Windows 10 S es que existe una
-manera sencilla de salir del modo S.</p></li>
+manera sencilla de salir del modo S.</p>
+  </li>
 
-  <li>
+  <li id="M201210080">
     <p><a
 
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html";>Windows
-8 para «dispositivos móviles» (ya desaparecido) era una 
prisión</a>.</p></li>
+8 para «dispositivos móviles» (ya desaparecido) era una prisión</a>.</p>
+  </li>
 </ul>
 
+
 <h3 id="consoles">Juegos para consolas</h3>
 
 <p>En las consolas no puede ejecutarse ningún juego a menos que el fabricante
 lo haya autorizado. Lamentablemente, no encuentro ningún artículo que citar
 con relación a este hecho. Por favor, infórmenos si conoce alguno.</p>
 
+
 <div class="translators-notes">
 
 <!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
@@ -269,7 +285,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2018/06/24 11:03:58 $
+$Date: 2018/09/29 10:28:21 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-tyrants.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-tyrants.es.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary/proprietary-tyrants.es.html     27 Jul 2018 10:01:00 -0000      
1.17
+++ proprietary/proprietary-tyrants.es.html     29 Sep 2018 10:28:21 -0000      
1.18
@@ -2,6 +2,11 @@
 
 <!--#include virtual="/server/header.es.html" -->
 <!-- Parent-Version: 1.84 -->
+<!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ Generated from propr-blurbs.rec. Please do not edit this file manually !
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
 
 <!-- This file is automatically generated by GNUnited Nations! -->
 <title>Los sistemas privativos son tiranos - Proyecto GNU - Free Software
@@ -35,76 +40,71 @@
 informarnos. Para dar cuenta de los detalles, incluya también como
 referencia la URL de alguna página fiable.</p>
 
-<ul>
-<li>
-<p>Algunos televisores LG <a
-href="http://openlgtv.org.ru/wiki/index.php/Achievements";>son tiranos</a>.</p>
-</li>
-
-<li><a
-href="http://wiki.samygo.tv/index.php5/SamyGO_for_DUMMIES#What_are_Restricted_Firmwares.3F";>Las
-«Smart» TV de Samsung han convertido Linux en la base para un sistema
-tirano</a> a fin de imponer el DRM. Lo que permite a Samsung hacer esto es
-que Linux está publicado bajo la versión 2 de la GPL de GNU, <a
-href="/licenses/rms-why-gplv3.html">no la versión 3</a>, interpretando
-además de manera laxa la versión 2 de la GPL.
-</li>
+<ul class="blurbs">
+  <li id="M201607150">
+    <p>Por descuido, Microsoft dejó abierta una vía que permitía a los 
usuarios
+instalar GNU/Linux en las tabletas con Windows RT. Pero ya ha <a
+href="http://www.securitynewspaper.com/2016/07/15/microsoft-silently-kills-dev-backdoor-boots-linux-locked-windows-rt-slabs/";>
+«subsanado» el «error»</a>. Y tienen el descaro de llamarlo 
«protección» de
+los usuarios. El artículo habla de instalar «Linux», pero por el contexto se
+deduce que lo que instalan los usuarios es en realidad <a
+href="/gnu/linux-and-gnu.html">GNU/Linux</a>.</p>
+  </li>
 
-  <li><p>Apple <a
+  <li id="M201412010">
+    <p>Apple <a
 href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/";> bloquea
 arbitrariamente a los usuarios impidiéndoles que instalen viejas versiones
-de iOS</a>.
-       </p>
+de iOS</a>.</p>
   </li>
 
-<li>
-<p>Las iCosas de Apple son dispositivos tiranos. Existe un puerto en Android
-para las iCosas, pero para instalarlo es necesario <a
-href="https://web.archive.org/web/20150721065208/http://www.idroidproject.org/wiki/Status";>
-encontrar un bug o «exploit»</a> que posibilite la instalación de un sistema
-diferente.
-</p>
-</li>
-
-<li>
-<p><a href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/";> Los
-dispositivos móviles con Windows 8 son tiranos.</a>
-</p>
-</li>
+  <li id="M201403150">
+    <p><a href="http://soylentnews.org/article.pl?sid=14/03/15/1912255";> Los
+procesadores Intel incorporarán software tirano</a>.</p>
+  </li>
 
-<li>
-<p><a
+  <li id="M201304080">
+    <p><a
 
href="http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html";>
 Algunos teléfonos Android son tiranos</a> (aunque alguien encontró una
 manera de saltarse la restricción). Afortunadamente, la mayoría de los
-dispositivos Android no son tiranos.
-</p>
-</li>
+dispositivos Android no son tiranos.</p>
+  </li>
 
-<li>
-<p><a href="http://boycottsony.org";>La Playstation 3 es tirana</a>.
-</p>
-</li>
+  <li id="M201212180">
+    <p>Las «Smart» TV de Samsung han <a
+href="https://wiki.samygo.tv/index.php?title=SamyGO_for_DUMMIES#What_are_Restricted_Firmwares.3F";>convertido
+Linux en la base para un sistema tirano</a> a fin de imponer el DRM. Lo que
+permite a Samsung hacer esto es que Linux está publicado bajo la versión 2
+de la GPL de GNU, <a href="/licenses/rms-why-gplv3.html">no la versión
+3</a>, interpretando además de manera laxa la versión 2 de la GPL.</p>
+  </li>
 
-<li>
-<p><a href="http://soylentnews.org/article.pl?sid=14/03/15/1912255";> Los
-procesadores Intel incorporarán software tirano</a>.
-</p>
-</li>
+  <li id="M201210020">
+    <p>Algunos televisores LG <a
+href="http://openlgtv.org.ru/wiki/index.php/Achievements";>son tiranos</a>.</p>
+  </li>
 
-<li>
-<p>Por descuido, Microsoft dejó abierta una vía que permitía a los usuarios
-instalar GNU/Linux en las tabletas con Windows RT. Pero ya ha <a
-href="http://www.securitynewspaper.com/2016/07/15/microsoft-silently-kills-dev-backdoor-boots-linux-locked-windows-rt-slabs/";>
-«subsanado» el «error»</a>. Y tienen el descaro de llamarlo 
«protección» de
-los usuarios. El artículo habla de instalar «Linux», pero por el contexto se
-deduce que lo que instalan los usuarios es en realidad <a
-href="/gnu/linux-and-gnu.html">GNU/Linux</a>.
-</p>
-</li>
+  <li id="M201205280">
+    <p>Las iCosas de Apple son dispositivos tiranos. Existe un puerto en 
Android
+para las iCosas, pero para instalarlo es necesario <a
+href="https://web.archive.org/web/20150721065208/http://www.idroidproject.org/wiki/Status";>
+encontrar un bug o «exploit»</a> que posibilite la instalación de un sistema
+diferente.</p>
+  </li>
 
+  <li id="M201110110">
+    <p><a href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/";> Los
+dispositivos móviles con Windows 8 son tiranos</a>.</p>
+  </li>
+
+  <li id="M201105070">
+    <p><a href="https://www.defectivebydesign.org/sony";>La Playstation 3 es
+tirana</a>.</p>
+  </li>
 </ul>
 
+
 <div class="translators-notes">
 
 <!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
@@ -180,7 +180,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2018/07/27 10:01:00 $
+$Date: 2018/09/29 10:28:21 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/po/malware-amazon.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.es-en.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary/po/malware-amazon.es-en.html    20 Sep 2018 06:57:59 -0000      
1.8
+++ proprietary/po/malware-amazon.es-en.html    29 Sep 2018 10:28:22 -0000      
1.9
@@ -1,5 +1,10 @@
 <!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.86 -->
+<!-- Parent-Version: 1.84 -->
+<!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ Generated from propr-blurbs.rec. Please do not edit this file manually !
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
 <title>Amazon's Software Is Malware
 - GNU Project - Free Software Foundation</title>
  <!--#include virtual="/proprietary/po/malware-amazon.translist" -->
@@ -56,80 +61,100 @@
 other malicious functionalities</a>.</p>
 
 <h4 id="back-doors">Amazon Kindle Swindle Back Doors</h4>
-<ul>
-  <li>
-    <p>The Amazon Kindle-Swindle has a back door that has been used to
-      <a 
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/";>
-       remotely erase books</a>.  One of the books erased was 1984, by George 
Orwell.
-    </p>
-
-    <p>Amazon responded to criticism by saying it would delete books only
-      following orders from the state.  However, that policy didn't last.
-      In 2012
-      it <a 
href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html";>wiped
-       a user's Kindle-Swindle and deleted her account</a>, then offered her
-      kafkaesque &ldquo;explanations.&rdquo;</p>
-  </li>
-  
-  <li>
-    <p>The Kindle also has a
-      <a 
href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090";>
-       universal back door</a>.</p>
     
-    <p>Amazon <a 
href="https://www.techdirt.com/articles/20150321/13350230396/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices.shtml";>
-       downgraded the software in users' Swindles</a>
-      so that those already rooted would cease to function at all.</p></li>
+<ul class="blurbs">
+  <li id="M201503210">
+    <p>Amazon <a
+    
href="https://www.techdirt.com/articles/20150321/13350230396/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices.shtml";>
+    downgraded the software in users' Swindles</a> so that those already
+    rooted would cease to function at all.</p>
+  </li>
+
+  <li id="M201210221">
+    <p>The Amazon Kindle-Swindle has a back door that has been used to <a
+    
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/";>
+    remotely erase books</a>.  One of the books erased was
+    <cite>1984</cite>, by George Orwell.</p>
+
+    <p>Amazon responded to criticism by saying it
+    would delete books only following orders from the
+    state.  However, that policy didn't last.  In 2012 it <a
+    
href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html";>
+    wiped a user's Kindle-Swindle and deleted her account</a>, then
+    offered her kafkaesque &ldquo;explanations.&rdquo;</p>
+  </li>
+
+  <li id="M200700000">
+    <p>The Kindle also has a <a
+    
href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090";>
+    universal back door</a>.</p>
+  </li>
 </ul>
 
+
 <h4 id="surveillance">Amazon Kindle Swindle Surveillance</h4>
-<ul>
-  <li><p>The Electronic Frontier Foundation has examined and found <a
-  href="https://www.eff.org/pages/reader-privacy-chart-2012";>various kinds of
-       surveillance in the Swindle and other e-readers</a>.</p></li>
+
+<ul class="blurbs">
+  <li id="M201212031">
+    <p>The Electronic Frontier Foundation has examined and found <a
+    href="https://www.eff.org/pages/reader-privacy-chart-2012";>various
+    kinds of surveillance in the Swindle and other e-readers</a>.</p>
+  </li>
 </ul>
 
+
 <h4 id="drm">Amazon Kindle Swindle DRM</h4>
-<ul>
-  <li><p><a href="http://techin.oureverydaylife.com/kindle-drm-17841.html";>
+
+<ul class="blurbs">
+  <li id="M201304050">
+    <p><a href="http://techin.oureverydaylife.com/kindle-drm-17841.html";>
        The Amazon Kindle has DRM</a>. That article is flawed in that it
       fails to treat DRM as an ethical question; it takes for granted that
-      whatever Amazon might do to its users is legitimate. It refers to DRM
-      as digital &ldquo;rights&rdquo; management, which is the spin term
-      used to promote DRM. Nonetheless it serves as a reference for the
-      facts.</p></li>
+    whatever Amazon might do to its users is legitimate.  It refers to
+    DRM as digital &ldquo;rights&rdquo; management, which is the spin
+    term used to promote DRM.  Nonetheless it serves as a reference for
+    the facts.</p>
+  </li>
 </ul>
 
+
 <h3 id="echo">Malware in the Echo</h3>
 
-<h4 id="echo-back-doors">Amazon Echo Back Doors</h4>
-<ul>
-    <li><p>The Amazon Echo appears to have a universal back door, since
-      <a href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates";>
+<h4>Amazon Echo Back Doors</h4>
+
+<ul class="blurbs">
+  <li id="M201606060">
+    <p>The Amazon Echo appears to have a universal back door, since <a
+    href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates";>
       it installs &ldquo;updates&rdquo; automatically</a>.</p>
-    <p>We have found nothing explicitly documenting the lack of any way to
-      disable remote changes to the software, so we are not completely sure
-      there isn't one, but it seems pretty clear.</p>
+
+    <p>We have found nothing explicitly documenting the lack of any way
+    to disable remote changes to the software, so we are not completely
+    sure there isn't one, but this seems pretty clear.</p>
   </li>
 </ul>
 
-<h4 id="echo-surveillance">Amazon Echo Surveillance</h4>
-<ul>
-  <li><p>Crackers found a way to break the security of an Amazon device,
-      and <a
-      href="https://boingboing.net/2018/08/12/alexa-bob-carol.html";>
+
+<h4>Amazon Echo Surveillance</h4>
+
+<ul class="blurbs">
+  <li id="M201808120">
+    <p>Crackers found a way to break the security of an Amazon device,
+    and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html";>
       turn it into a listening device</a> for them.</p>
+
     <p>It was very difficult for them to do this. The job would be much
-      easier for Amazon. And if some government such as China or the
-      US told Amazon to do this, or cease to sell the product in that
-      country, do you think Amazon would have the moral fiber to say
-      no?</p>
+    easier for Amazon. And if some government such as China or the US
+    told Amazon to do this, or cease to sell the product in that country,
+    do you think Amazon would have the moral fiber to say no?</p>
+
     <p>These crackers are probably hackers too, but please <a
-      href="https://stallman.org/articles/on-hacking.html";>
-      don't use &ldquo;hacking&rdquo; to mean &ldquo;breaking
-      security&rdquo;</a>.</p>
+    href="https://stallman.org/articles/on-hacking.html";> don't use
+    &ldquo;hacking&rdquo; to mean &ldquo;breaking security&rdquo;</a>.</p>
   </li>
 </ul>
 
+
 </div><!-- for id="content", starts in the include above -->
 <!--#include virtual="/server/footer.html" -->
 <div id="footer">
@@ -187,7 +212,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/09/20 06:57:59 $
+$Date: 2018/09/29 10:28:22 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-jails.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.es-en.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary/po/proprietary-jails.es-en.html 24 Jun 2018 11:03:58 -0000      
1.18
+++ proprietary/po/proprietary-jails.es-en.html 29 Sep 2018 10:28:22 -0000      
1.19
@@ -1,5 +1,10 @@
 <!--#include virtual="/server/header.html" -->
 <!-- Parent-Version: 1.85 -->
+<!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ Generated from propr-blurbs.rec. Please do not edit this file manually !
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
 <title>Proprietary Jails - GNU Project - Free Software Foundation</title>
  <!--#include virtual="/proprietary/po/proprietary-jails.translist" -->
 <!--#include virtual="/server/banner.html" -->
@@ -58,44 +63,47 @@
 big enough to mean that the iThings are no longer jails.</p>
 
 <h4>Examples of censorship by Apple jails</h4>
-<ul>
-  <li>
-    <p>Apple <a
-      
href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html";>
-      deleted several VPNs from its app store for China</a>, thus using
-      its own censorship power to strengthen that of the Chinese
-      government.</p>
-  </li>
 
-  <li>
+<ul class="blurbs">
+  <li id="M201710130">
     <p>Apple is <a
       
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet";>
-      censoring apps for the US government too</a>. Specifically, it
-      is deleting apps developed by Iranians.</p>
+    censoring apps for the US government too</a>. Specifically, it is
+    deleting apps developed by Iranians.</p>
+
     <p>The root of these wrongs are in Apple. If Apple had not designed
       the iMonsters to let Apple censor applications, Apple would not have
       had the power to stop users from installing whatever kind of apps.</p>
   </li>
 
-  <li>
+  <li id="M201707290">
+    <p>Apple <a
+    
href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html";>
+    deleted several VPNs from its app store for China</a>, thus using its
+    own censorship power to strengthen that of the Chinese government.</p>
+  </li>
+
+  <li id="M201701064">
     <p>Apple used its censorship system to enforce Russian surveillance <a
       
href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0";>
       by blocking distribution of the LinkedIn app in Russia</a>.</p>
+
     <p>This is ironic because LinkedIn is a surveillance system itself.
       While subjecting its users to its own surveillance, it tries to
-      protect its users from Russian surveillance, and is therefore
-      subject to Russian censorship.</p>
+    protect its users from Russian surveillance, and is therefore subject
+    to Russian censorship.</p>
+
     <p>However, the point here is the wrong of Apple's censorship of
       apps.</p>
   </li>
 
-  <li>
+  <li id="M201701050">
     <p>Apple used its censorship system to enforce China's censorship <a 
       
href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china";>
       by blocking distribution of the New York Times app</a>.</p>
   </li>
 
-  <li>
+  <li id="M201605190">
     <p>Apple censors games, <a
     
href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game";>
     banning some games from the cr&hellip;app store</a> because of which
@@ -103,47 +111,46 @@
     considered acceptable.</p>
   </li>
 
-  <li>
+  <li id="M201509290">
     <p>Apple <a href="http://ifixit.org/blog/7401/ifixit-app-pulled/";>
       banned a program from the App Store</a> because its developers
       committed the enormity of disassembling some iThings.</p>
     </li>
 
-  <li>
+  <li id="M201509230">
     <p>As of 2015, Apple <a
       
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights";>
       systematically bans apps that endorse abortion rights or would help
       women find abortions</a>.</p>
+
     <p>This particular political slant <a
       
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions";>
       affects other Apple services</a>.</p>
   </li>
 
-  <li>
-    <p>Apple has banned iThing applications that show the confederate flag.
-      <a 
href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html";>
+  <li id="M201506250">
+    <p>Apple has banned iThing
+    applications that show the confederate flag.  <a
+    
href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html";>
       Not only those that use it as a symbol of racism</a>, but even
       strategic games that use it to represent confederate army units
       fighting in the Civil War.</p>
-    <p>This ludicrous rigidity illustrates the point that Apple should not
-      be allowed to censor apps.  Even if Apple carried out this act of
+
+    <p>This ludicrous rigidity illustrates the point that Apple should
+    not be allowed to censor apps.  Even if Apple carried out this act of
       censorship with some care, it would still be wrong.  Whether racism
       is bad, whether educating people about drone attacks is bad, are not
       the real issue.  Apple should not have the power to impose its views
       about either of these questions, or any other.</p>
   </li>
 
-  <li>
-    <p>Apple rejected an app that displayed the locations of US drone
-      assassinations, giving various excuses. Each time the developers
-      fixed one &ldquo;problem&rdquo;, Apple complained about another.
-      After the fifth rejection, Apple <a 
-      href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/";>
-      admitted it was censoring the app based on the subject
-      matter</a>.</p>
+  <li id="M201412110">
+    <p><a
+    
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans";>
+    More examples of Apple's arbitrary and inconsistent censorship</a>.</p>
   </li>
 
-  <li>
+  <li id="M201405250">
     <p>Apple used this censorship power in 2014 to <a
       
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html";>
       ban all bitcoin apps</a> for the iThings for a time.  It also <a
@@ -153,39 +160,49 @@
       killing more acceptable than marijuana.</p>
   </li>
 
-  <li>
-    <p><a 
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans";>
-      More examples of Apple's arbitrary and inconsistent censorship</a>.</p>
+  <li id="M201402070">
+    <p>Apple rejected an app that displayed the locations
+    of US drone assassinations, giving various excuses. Each
+    time the developers fixed one &ldquo;problem&rdquo;, Apple
+    complained about another.  After the fifth rejection, Apple <a
+    href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/";>
+    admitted it was censoring the app based on the subject matter</a>.</p>
   </li>
 </ul>
 
+
 <h3 id="microsoft">Microsoft jails</h3>
 
-<ul>
-  <li>
+<ul class="blurbs">
+  <li id="M201706130">
     <p>Windows 10 S was a jail: <a      
       
href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison";>
    
-      only programs from the Windows Store could be installed and
-      executed</a>. It was however possible to <a
+    only programs from the Windows Store could be
+    installed and executed</a>. It was however possible to <a
       
href="https://www.theverge.com/2017/6/13/15789998/microsoft-windows-10-s-upgrade-windows-10-pro-guide";>
-      upgrade to Windows 10 Pro</a>. The successor of Windows 10 S is a
-      special configuration of Windows 10 called <a
+    upgrade to Windows 10 Pro</a>. The successor of Windows
+    10 S is a special configuration of Windows 10 called <a
       
href="https://support.microsoft.com/en-gb/help/4020089/windows-10-in-s-mode-faq";>
-      S mode</a>. The major difference with Windows 10 S is that there
-      is an easy way to switch out of S mode.</p></li>
+    S mode</a>. The major difference with Windows 10 S is that there is
+    an easy way to switch out of S mode.</p>
+  </li>
 
-  <li>
-    <p><a 
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html";>
+  <li id="M201210080">
+    <p><a
+    
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html";>
       Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) was a
-      jail</a>.</p></li>
+    jail</a>.</p>
+  </li>
 </ul>
 
+
 <h3 id="consoles">Game consoles</h3>
 
 <p>No game can run on the console unless the console's manufacturer
 has authorized it.  Alas, I can't find a article to cite as a reference
 for this fact.  Please inform us if you know of one.</p>
 
+
 </div><!-- for id="content", starts in the include above -->
 <!--#include virtual="/server/footer.html" -->
 <div id="footer">
@@ -243,7 +260,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/06/24 11:03:58 $
+$Date: 2018/09/29 10:28:22 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-tyrants.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.es-en.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- proprietary/po/proprietary-tyrants.es-en.html       27 Jul 2018 10:01:00 
-0000      1.15
+++ proprietary/po/proprietary-tyrants.es-en.html       29 Sep 2018 10:28:22 
-0000      1.16
@@ -1,5 +1,10 @@
 <!--#include virtual="/server/header.html" -->
 <!-- Parent-Version: 1.84 -->
+<!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ Generated from propr-blurbs.rec. Please do not edit this file manually !
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
 <title>Proprietary Tyrants - GNU Project - Free Software Foundation</title>
  <!--#include virtual="/proprietary/po/proprietary-tyrants.translist" -->
 <!--#include virtual="/server/banner.html" -->
@@ -27,73 +32,72 @@
 to inform us. Please include the URL of a trustworthy reference or two
 to present the specifics.</p>
 
-<ul>
-<li>
-<p>Some LG TVs <a 
href="http://openlgtv.org.ru/wiki/index.php/Achievements";>are tyrants</a>.</p>
-</li>
-
-<li><a
-href="http://wiki.samygo.tv/index.php5/SamyGO_for_DUMMIES#What_are_Restricted_Firmwares.3F";>
-Samsung &ldquo;Smart&rdquo; TVs have turned Linux into the base
-for a tyrant system</a> so as to impose DRM.
-What enables Samsung to do this is that Linux is released under
-GNU GPL version 2, <a href="/licenses/rms-why-gplv3.html">not version 3</a>,
-together with a weak interpretation of GPL version 2.
-</li>
-
-  <li><p>Apple
-         arbitrarily <a 
href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/";>blocks
-         users from installing old versions of iOS</a>.
-       </p>
-  </li>
-
-<li>
-<p>The Apple iThings are tyrant devices.  There is a port of Android
-to the iThings, but installing it
-requires <a 
href="https://web.archive.org/web/20150721065208/http://www.idroidproject.org/wiki/Status";>
 finding a
-bug or &ldquo;exploit&rdquo;</a> to make it possible to install a
-different system.
-</p>
-</li>
+<ul class="blurbs">
+  <li id="M201607150">
+    <p>Microsoft accidentally left a way for users
+    to install GNU/Linux on Windows RT tablets, but now it has <a
+    
href="http://www.securitynewspaper.com/2016/07/15/microsoft-silently-kills-dev-backdoor-boots-linux-locked-windows-rt-slabs/";>
+    &ldquo;fixed&rdquo; the &ldquo;error&rdquo;</a>. They have the gall
+    to call this &ldquo;protecting&rdquo; the users.  The article talks
+    of installing &ldquo;Linux&rdquo;, but the context shows it is really
+    <a href="/gnu/linux-and-gnu.html">GNU/Linux</a> that users install.</p>
+  </li>
 
-<li>
-<p><a href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/";>
-Mobile devices that come with Windows 8 are tyrants.</a>
-</p>
-</li>
+  <li id="M201412010">
+    <p>Apple arbitrarily <a
+    href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/";>blocks
+    users from installing old versions of iOS</a>.</p>
+  </li>
 
-<li>
-<p><a 
href="http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html";>
-Some Android phones are tyrants</a> (though someone found a way to
-crack the restriction).  Fortunately, most Android devices are not tyrants.
-</p>
-</li>
+  <li id="M201403150">
+    <p><a href="http://soylentnews.org/article.pl?sid=14/03/15/1912255";>
+    Intel processors will have tyrant software built in</a>.</p>
+  </li>
 
-<li>
-<p><a href="http://boycottsony.org";>The Playstation 3 is a tyrant</a>.
-</p>
-</li>
+  <li id="M201304080">
+    <p><a
+    
href="http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html";>
+    Some Android phones are tyrants</a> (though someone found a way to
+    crack the restriction).  Fortunately, most Android devices are not
+    tyrants.</p>
+  </li>
 
-<li>
-<p><a href="http://soylentnews.org/article.pl?sid=14/03/15/1912255";>
-Intel processors will have tyrant software built in</a>.
-</p>
-</li>
+  <li id="M201212180">
+    <p>Samsung &ldquo;Smart&rdquo; TVs have <a
+    
href="https://wiki.samygo.tv/index.php?title=SamyGO_for_DUMMIES#What_are_Restricted_Firmwares.3F";>
+    turned Linux into the base for a tyrant system</a> so as to impose
+    DRM.  What enables Samsung to do this is that Linux is released
+    under GNU GPL version 2, <a
+    href="/licenses/rms-why-gplv3.html">not version 3</a>, together with
+    a weak interpretation of GPL version 2.</p>
+  </li>
 
-<li>
-<p>Microsoft accidentally left a way for users to install GNU/Linux
-on Windows RT tablets, but now it has <a
-href="http://www.securitynewspaper.com/2016/07/15/microsoft-silently-kills-dev-backdoor-boots-linux-locked-windows-rt-slabs/";>
-&ldquo;fixed&rdquo; the &ldquo;error&rdquo;</a>. They have the
-gall to call this &ldquo;protecting&rdquo; the users.  The article
-talks of installing &ldquo;Linux&rdquo;, but the context shows it is
-really <a href="/gnu/linux-and-gnu.html">GNU/Linux</a> that users
-install.
-</p>
-</li>
+  <li id="M201210020">
+    <p>Some LG TVs <a
+    href="http://openlgtv.org.ru/wiki/index.php/Achievements";>are
+    tyrants</a>.</p>
+  </li>
+
+  <li id="M201205280">
+    <p>The Apple iThings are tyrant devices.  There is a
+    port of Android to the iThings, but installing it requires <a
+    
href="https://web.archive.org/web/20150721065208/http://www.idroidproject.org/wiki/Status";>
+    finding a bug or &ldquo;exploit&rdquo;</a> to make it possible to
+    install a different system.</p>
+  </li>
 
+  <li id="M201110110">
+    <p><a href="https://fsf.org/campaigns/secure-boot-vs-restricted-boot/";>
+    Mobile devices that come with Windows 8 are tyrants</a>.</p>
+  </li>
+
+  <li id="M201105070">
+    <p><a href="https://www.defectivebydesign.org/sony";>The Playstation
+    3 is a tyrant</a>.</p>
+  </li>
 </ul>
 
+
 </div><!-- for id="content", starts in the include above -->
 <!--#include virtual="/server/footer.html" -->
 <div id="footer">
@@ -151,7 +155,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/07/27 10:01:00 $
+$Date: 2018/09/29 10:28:22 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]