www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-apple.es.html po/malwar...


From: GNUN
Subject: www/proprietary malware-apple.es.html po/malwar...
Date: Wed, 10 Oct 2018 07:57:42 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     18/10/10 07:57:42

Modified files:
        proprietary    : malware-apple.es.html 
        proprietary/po : malware-apple.es-en.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.es.html?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.es-en.html?cvsroot=www&r1=1.52&r2=1.53

Patches:
Index: malware-apple.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.es.html,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- malware-apple.es.html       5 Oct 2018 21:01:53 -0000       1.57
+++ malware-apple.es.html       10 Oct 2018 11:57:41 -0000      1.58
@@ -4,7 +4,8 @@
 <!-- Parent-Version: 1.84 -->
 <!-- 
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- Generated from propr-blurbs.rec. Please do not edit this file manually !
+     Please do not edit lists with items such as <li id="Mnnnnnnnn">
+!
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 -->
 
@@ -19,7 +20,7 @@
 <p><a href="/proprietary/proprietary.html">Más ejemplos de 
<cite>malware</cite>
 en el software privativo</a></p>
 
-<div class="highlight-para">
+<div class="comment">
 <p>
 <em>Malware</em> se refiere al software que es dañino, es decir, que está
 diseñado de tal forma que su funcionamiento maltrata o daña al usuario (no
@@ -42,14 +43,17 @@
 la posibilidad de poner remedio a las funcionalidades maliciosas, se ve
 tentado a imponer algunas.
 </p>
+
+<div class="important" style="margin-bottom: 2em">
 <p>Si conoce algún ejemplo que debería mencionarse en esta página y no 
está,
 escriba por favor a <a
 href="mailto:address@hidden";>&lt;address@hidden&gt;</a> para
 informarnos. Para dar cuenta de los detalles, incluya también como
 referencia la URL de alguna página fiable.</p>
 </div>
+</div>
 
-<div class="summary" style="margin-top: 2em">
+<div class="summary">
 <h3>Tipo de <cite>malware</cite></h3>
 <ul>
   <li><a href="#back-doors">Puertas traseras</a></li>
@@ -78,7 +82,7 @@
 
 <ul class="blurbs">
 
-  <!-- INSERT backdoor -->
+  <!-- INSERT apple-back-door -->
 <li id="M201607284">
     <p>La aplicación Dropbox para Macintosh <a
 
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/";>
@@ -86,6 +90,13 @@
 vez ha inducido a este a introducir la contraseña de administrador</a>.</p>
   </li>
 
+  <li id="M201504090">
+    <p>Mac OS X tuvo una <a
+href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/";>puerta
+trasera local intencional durante cuatro años</a>, que los atacantes podían
+aprovechar para obtener privilegios de root.</p>
+  </li>
+
   <li id="M201011220">
     <p>El iPhone tiene una puerta trasera para el <a
 
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone";>
@@ -113,7 +124,7 @@
 
 <ul class="blurbs">
 
-  <!-- INSERT deception -->
+  <!-- INSERT apple-decept -->
 <li id="M201308290">
     <p>«<cite>Dark patterns</cite>» se refiere a <a
 
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you";>interfaces
@@ -130,7 +141,7 @@
 
 <ul class="blurbs">
 
-  <!-- INSERT DRM -->
+  <!-- INSERT apple-dr -->
 <li id="M201704071">
     <p>El DRM hace que el iPhone 7 sea prácticamente <a
 href="#iphone7-sabotage">irreparable</a> por nadie que no sea Apple.</p>
@@ -177,7 +188,7 @@
 
 <ul class="blurbs">
 
-  <!-- INSERT incompatibility -->
+  <!-- INSERT apple-incompat -->
 <li id="M201803300">
     <p>En MacOS e iOS, el procedimiento para <a
 
href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac";>convertir
@@ -233,6 +244,18 @@
 a un sitio web malicioso obtener todo el historial de mensajes del
 usuario</a>.</p>
   </li>
+
+  <li id="M201311120">
+    <p><a
+href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html";>La
+NSA puede acceder a los datos de los smart phones, incluidos iPhone, Android
+y BlackBerry</a>. Aunque el artículo no ofrece muchos detalles, parece que
+esto no sucede mediante la puerta trasera universal que sabemos que tienen
+casi todos los teléfono móviles. Parece que se hace aprovechando varios
+agujeros. Hay <a
+href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone";>multitud
+de agujeros en el software de radio de los teléfonos</a>.</p>
+  </li>
 </ul>
 
 <!--
@@ -266,7 +289,7 @@
 
 <ul class="blurbs">
 
-  <!-- INSERT jails -->
+  <!-- INSERT apple-jail -->
 <li id="M201710130">
     <p>Apple está <a
 
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet";>
@@ -382,7 +405,7 @@
 
 <ul class="blurbs">
 
-  <!-- INSERT pressuring -->
+  <!-- INSERT apple-press -->
 <li id="M201510270">
     <p>La aplicación Siri de Apple <a
 
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions";>rechaza
@@ -399,7 +422,7 @@
 
 <ul class="blurbs">
 
-  <!-- INSERT sabotage -->
+  <!-- INSERT apple-sab -->
 <li id="M201805310">
     <p>Apple ha <a
 
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia";>bloqueado
@@ -473,13 +496,6 @@
 muchos problemas.</p>
   </li>
 
-  <li id="M201504090">
-    <p>Mac OS X tuvo una <a
-href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/";>puerta
-trasera local intencional durante cuatro años</a>, que los atacantes podían
-aprovechar para obtener privilegios de root.</p>
-  </li>
-
   <li id="M201412040">
     <p>Apple <a
 
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs";>ha
@@ -687,7 +703,7 @@
 
 <ul class="blurbs">
 
-  <!-- INSERT tyrants -->
+  <!-- INSERT apple-tyrant -->
 <li id="M201412010">
     <p>Apple <a
 href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/";>bloquea
@@ -780,7 +796,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2018/10/05 21:01:53 $
+$Date: 2018/10/10 11:57:41 $
 
 <!-- timestamp end -->
 </p>

Index: po/malware-apple.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.es-en.html,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- po/malware-apple.es-en.html 5 Oct 2018 21:01:56 -0000       1.52
+++ po/malware-apple.es-en.html 10 Oct 2018 11:57:41 -0000      1.53
@@ -2,7 +2,7 @@
 <!-- Parent-Version: 1.84 -->
 <!-- 
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- Generated from propr-blurbs.rec. Please do not edit this file manually !
+     Please do not edit lists with items such as <li id="Mnnnnnnnn">!
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 -->
 <title>Apple's Operating Systems are Malware
@@ -13,7 +13,7 @@
 
 <p><a href="/proprietary/proprietary.html">Other examples of proprietary 
malware</a></p>
 
-<div class="highlight-para">
+<div class="comment">
 <p>
 <em>Malware</em> means software designed to function in ways that
 mistreat or harm the user.  (This does not include accidental errors.)
@@ -32,14 +32,17 @@
 because the developer's awareness that the users would be powerless to fix
 any malicious functionalities tempts the developer to impose some.
 </p>
+
+<div class="important" style="margin-bottom: 2em">
 <p>If you know of an example that ought to be in this page but isn't
 here, please write
 to <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>
 to inform us. Please include the URL of a trustworthy reference or two
 to present the specifics.</p>
 </div>
+</div>
 
-<div class="summary" style="margin-top: 2em">
+<div class="summary">
 <h3>Type&nbsp;of malware</h3>
 <ul>
   <li><a href="#back-doors">Back doors</a></li>
@@ -65,7 +68,7 @@
 <h3 id="back-doors">Apple Back Doors</h3>
 
 <ul class="blurbs">
-<!-- INSERT backdoor -->
+<!-- INSERT apple-back-door -->
   <li id="M201607284">
     <p>The Dropbox app for Macintosh <a
     
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/";>
@@ -73,6 +76,13 @@
     entering an admin password</a>.</p>
   </li>
 
+  <li id="M201504090">
+    <p>Mac OS X had an <a
+    
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/";>
+    intentional local back door for 4 years</a>, which could be exploited
+    by attackers to gain root privileges.</p>
+  </li>
+
   <li id="M201011220">
     <p>The iPhone has a back door for <a
     
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone";>
@@ -99,7 +109,7 @@
 <h3 id="deception">Apple Deception</h3>
 
 <ul class="blurbs">
-<!-- INSERT deception -->
+<!-- INSERT apple-decept -->
   <li id="M201308290">
     <p>&ldquo;Dark patterns&rdquo; are <a
     
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you";>user
@@ -116,7 +126,7 @@
 <h3 id="drm">Apple DRM</h3>
 
 <ul class="blurbs">
-<!-- INSERT DRM -->
+<!-- INSERT apple-dr -->
   <li id="M201704071">
     <p>DRM makes the iPhone 7 nearly <a
     href="#iphone7-sabotage">unrepairable</a> by anyone else but Apple.</p>
@@ -161,7 +171,7 @@
 the software runs on.</p>
 
 <ul class="blurbs">
-<!-- INSERT incompatibility -->
+<!-- INSERT apple-incompat -->
   <li id="M201803300">
     <p>In MacOS and iOS, the procedure for <a
     
href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac";>
@@ -217,6 +227,18 @@
     a malicious web site to extract all the user's messaging
     history</a>.</p>
   </li>
+
+  <li id="M201311120">
+    <p><a
+    
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html";>
+    The NSA can tap data in smart phones, including iPhones,
+    Android, and BlackBerry</a>.  While there is not much
+    detail here, it seems that this does not operate via
+    the universal back door that we know nearly all portable
+    phones have. It may involve exploiting various bugs.  There are <a
+    
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone";>
+    lots of bugs in the phones' radio software</a>.</p>
+  </li>
 </ul>
 
 <!--
@@ -249,7 +271,7 @@
 <h4>Examples of censorship by Apple jails</h4>
 
 <ul class="blurbs">
-<!-- INSERT jails -->
+<!-- INSERT apple-jail -->
   <li id="M201710130">
     <p>Apple is <a
     
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet";>
@@ -361,7 +383,7 @@
 <p>Proprietary companies can take advantage of their customers by imposing 
arbitrary limits to their use of the software.  This section reports examples 
of hard sell and other unjust commercial tactics by Apple.</p>
 
 <ul class="blurbs">
-<!-- INSERT pressuring -->
+<!-- INSERT apple-press -->
   <li id="M201510270">
     <p>Apple Siri <a
     
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions";>refuses
@@ -377,7 +399,7 @@
 to directly intervene in ways that harm them or block their work.</p>
 
 <ul class="blurbs">
-<!-- INSERT sabotage -->
+<!-- INSERT apple-sab -->
   <li id="M201805310">
     <p>Apple has <a
     
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia";>blocked
@@ -451,13 +473,6 @@
     of trouble.</p>
   </li>
 
-  <li id="M201504090">
-    <p>Mac OS X had an <a
-    
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/";>
-    intentional local back door for 4 years</a>, which could be exploited
-    by attackers to gain root privileges.</p>
-  </li>
-
   <li id="M201412040">
     <p>Apple <a
     
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs";>
@@ -661,7 +676,7 @@
 <h3 id="tyrants">Apple Tyrants</h3>
 
 <ul class="blurbs">
-<!-- INSERT tyrants -->
+<!-- INSERT apple-tyrant -->
   <li id="M201412010">
     <p>Apple arbitrarily <a
     href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/";>blocks
@@ -735,7 +750,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/05 21:01:56 $
+$Date: 2018/10/10 11:57:41 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]