www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-amazon.es.html malware-...


From: GNUN
Subject: www/proprietary malware-amazon.es.html malware-...
Date: Sat, 25 Feb 2017 06:33:26 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     17/02/25 06:33:26

Modified files:
        proprietary    : malware-amazon.es.html 
                         malware-microsoft.es.html proprietary.es.html 
        proprietary/po : malware-amazon.es-en.html 
                         malware-microsoft.es-en.html 
                         proprietary.es-en.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-amazon.es.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.es.html?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.es.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.es-en.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.es-en.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es-en.html?cvsroot=www&r1=1.11&r2=1.12

Patches:
Index: malware-amazon.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-amazon.es.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- malware-amazon.es.html      24 Feb 2017 14:06:50 -0000      1.1
+++ malware-amazon.es.html      25 Feb 2017 11:33:25 -0000      1.2
@@ -4,7 +4,7 @@
 <!-- Parent-Version: 1.79 -->
 
 <!-- This file is automatically generated by GNUnited Nations! -->
-<title>Malware en el Kindle Swindle - Proyecto GNU - Free Software 
Foundation</title>
+<title>El software de Amazon es malware - Proyecto GNU - Free Software 
Foundation</title>
  
 <!--#include virtual="/proprietary/po/malware-amazon.translist" -->
 <style type="text/css" media="print,screen">
@@ -16,19 +16,10 @@
 </style>
 
 <!--#include virtual="/server/banner.es.html" -->
-<h2><cite>Malware</cite> en el Kindle Swindle</h2>
+<h2>El software de Amazon es <cite>malware</cite></h2>
 
-<a href="/proprietary/proprietary.html">Más ejemplos de <cite>malware</cite>
-en el software privativo</a>
-
-<p>Nos referimos a este producto como el <a
-href="/philosophy/why-call-it-the-swindle.html">Swindle de Amazon</a> porque
-tiene <a href="/philosophy/proprietary/proprietary-drm.html">gestión digital
-de restricciones (<abbr title="Digital Restrictions
-Management">DRM</abbr>)</a> y <a href="/philosophy/ebooks.html"> otras
-funcionalidades maliciosas</a>.</p>
-<p>Esta página se centra en el Swindle de Amazon, pero se ocupa también de
-otros productos de Amazon.</p>
+<p><a href="/proprietary/proprietary.html">Más ejemplos de 
<cite>malware</cite>
+en el software privativo</a></p>
 
 <div class="highlight-para">
 <p>
@@ -50,9 +41,28 @@
 
 <div class="toc">
 <div class="malfunctions">
-<ul>
-<li><strong>Tipo de <cite>malware</cite></strong></li>
-<li><a href="#swindle-back-doors">Puertas traseras</a></li>
+  <ul>
+    <li><strong>Tipo de producto</strong></li>
+    <li><a href="#swindle"><cite>Malware</cite> en el Kindle Swindle</a></li>
+    <li><a href="#echo">Malware en el Echo</a></li>
+  </ul>
+</div>
+</div>
+
+<h2 id="swindle"><cite>Malware</cite> en el Kindle Swindle</h2>
+
+<p>Nos referimos a este producto como el <a
+href="/philosophy/why-call-it-the-swindle.html">Swindle de Amazon</a> porque
+tiene <a href="/philosophy/proprietary/proprietary-drm.html">gestión digital
+de restricciones (<abbr title="Digital Restrictions
+Management">DRM</abbr>)</a> y <a href="/philosophy/ebooks.html"> otras
+funcionalidades maliciosas</a>.</p>
+
+<div class="toc">
+  <div class="malfunctions">
+    <ul>
+      <li><strong>Tipo de <cite>malware</cite></strong></li>
+      <li><a href="#back-doors">Puertas traseras</a></li>
 
 <!--<li>
 <a href="#censorship">Censorship</a></li>-->
@@ -63,7 +73,7 @@
 <!--<li>
 <a href="#interference">Interference</a></li>-->
 <li><a href="#surveillance">Vigilancia</a></li>
-<li><a href="#drm">Gestión digital de restricciones («<abbr title="Digital
+      <li><a href="#drm">Gestión digital de restricciones («<abbr 
title="Digital
 Restrictions Management">DRM</abbr>»)</a>: Son funcionalidades diseñadas
 para restringir  lo que los usuarios pueden hacer con los datos en sus
 ordenadores.</li>
@@ -75,30 +85,28 @@
 <a href="#tyrants">Tyrants</a>&mdash;systems
     that reject any operating system not &ldquo;authorized&rdquo; by the
     manufacturer.</li>-->
-<li><strong>Otros productos de Amazon</strong></li>
-<li><a href="#echo-back-doors">Puertas traseras en el Amazon Echo</a></li>
 </ul>
-</div>
+  </div>
 </div>
 
-<h3 id="swindle-back-doors">Puertas traseras en el <cite>Kindle Swindle</cite> 
de Amazon</h3>
+<h3 id="back-doors">Puertas traseras en el <cite>Kindle Swindle</cite> de 
Amazon</h3>
 <ul>
-<li>
-<p>El Kindle-Swindle de Amazon tiene una puerta trasera que ha sido usada para
+  <li>
+    <p>El Kindle-Swindle de Amazon tiene una puerta trasera que ha sido usada 
para
 <a
 
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/";>
 borrar libros de forma remota</a>. Uno de los libros borrados fue 1984, de
 George Orwell
-</p>
+    </p>
 
-<p>Amazon respondió  las críticas diciendo que solo borraría libros 
siguiendo
+    <p>Amazon respondió  las críticas diciendo que solo borraría libros 
siguiendo
 órdenes del Estado. Sin embargo, eso no duró mucho. En 2012 <a
 
href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html";>borró
 el contenido del Kindle-Swindle de un usuario y anuló su cuenta</a>, para
 luego ofrecer sus kafkianas «explicaciones».</p>
-</li>
+  </li>
 
-<li>
+  <li>
   <p>El Kindle también tiene una <a
 href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090";>
 puerta trasera universal</a>.</p>
@@ -127,9 +135,9 @@
 obstante, sirve de referencia a los hechos.</p></li>
 </ul>
 
-<h2>Otros productos de Amazon</h2>
+<h2 id="echo"><cite>Malware</cite> en el Echo</h2>
 
-<h3 id="echo-back-doors">Puertas traseras en el Amazon Echo</h3>
+<h3>Puertas traseras en el Amazon Echo</h3>
 <ul>
     <li><p>El Amazon Echo parece tener una puerta trasera universal, ya que <a
 href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates";> instala
@@ -216,7 +224,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2017/02/24 14:06:50 $
+$Date: 2017/02/25 11:33:25 $
 
 <!-- timestamp end -->
 </p>

Index: malware-microsoft.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.es.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- malware-microsoft.es.html   2 Feb 2017 09:59:01 -0000       1.32
+++ malware-microsoft.es.html   25 Feb 2017 11:33:25 -0000      1.33
@@ -267,6 +267,12 @@
 
 <ul>
 
+<li><p>Los archivos DRM de Windows <a
+href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users";>pueden
+utilizarse para identificar a gente que está navegando mediante
+Tor</a>. Esta vulnerabilidad existe únicamente si se utiliza Windows.
+</p></li>
+
 <li><p>Por defecto, Windows 10 <a
 
href="http://betanews.com/2016/11/24/microsoft-shares-windows-10-telemetry-data-with-third-parties";>envía
 información de depuración a Microsoft, volcados de memoria
@@ -482,7 +488,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2017/02/02 09:59:01 $
+$Date: 2017/02/25 11:33:25 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.es.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- proprietary.es.html 10 Jan 2017 10:29:01 -0000      1.15
+++ proprietary.es.html 25 Feb 2017 11:33:25 -0000      1.16
@@ -55,10 +55,10 @@
 Microsoft</a></li>
   <li><a href="/proprietary/malware-adobe.html">El <cite>malware</cite> de
 Adobe</a></li>
+  <li><a href="/proprietary/malware-amazon.html"><cite>Malware</cite> de
+Amazon</a></li>
   <li><a href="/proprietary/malware-mobiles.html"><cite>Malware</cite> en los
 dispositivos móviles</a></li>
-  <li><a href="/proprietary/malware-kindle-swindle.html"><cite>Malware</cite> 
en
-el Swindle de Amazon</a></li>
   <li><a href="/proprietary/malware-games.html"><cite>Malware</cite> en los
 juegos</a></li>
   <li><a href="/proprietary/malware-appliances.html"><cite>Malware</cite> en 
otros
@@ -175,7 +175,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2017/01/10 10:29:01 $
+$Date: 2017/02/25 11:33:25 $
 
 <!-- timestamp end -->
 </p>

Index: po/malware-amazon.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.es-en.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- po/malware-amazon.es-en.html        24 Feb 2017 14:06:51 -0000      1.1
+++ po/malware-amazon.es-en.html        25 Feb 2017 11:33:26 -0000      1.2
@@ -1,6 +1,6 @@
 <!--#include virtual="/server/header.html" -->
 <!-- Parent-Version: 1.79 -->
-<title>Malware in the Kindle Swindle
+<title>Amazon's Software Is Malware
 - GNU Project - Free Software Foundation</title>
  <!--#include virtual="/proprietary/po/malware-amazon.translist" -->
 <style type="text/css" media="print,screen">
@@ -10,16 +10,9 @@
 -->
 </style>
 <!--#include virtual="/server/banner.html" -->
-<h2>Malware in the Kindle Swindle</h2>
+<h2>Amazon's Software Is Malware</h2>
 
-<a href="/proprietary/proprietary.html">Other examples of proprietary 
malware</a>
-
-<p>We refer to this product as the
-<a href="/philosophy/why-call-it-the-swindle.html">Amazon Swindle</a>
-because it has <a href="/philosophy/proprietary-drm.html">Digital restrictions
-management (DRM)</a>  and <a href="/philosophy/ebooks.html">
-other malicious functionalities</a>.</p>
-<p>This page focuses on the Amazon Swindle but covers other Amazon products 
too.</p>
+<p><a href="/proprietary/proprietary.html">Other examples of proprietary 
malware</a></p>
 
 <div class="highlight-para">
 <p>
@@ -38,45 +31,61 @@
 
 <div class="toc">
 <div class="malfunctions">
-<ul>
-<li><strong>Type&nbsp;of malware</strong></li>
-<li><a href="#swindle-back-doors">Back doors</a></li>
-<!--<li><a href="#censorship">Censorship</a></li>-->
-<!--<li><a href="#insecurity">Insecurity</a></li>-->
-<!--<li><a href="#sabotage">Sabotage</a></li>-->
-<!--<li><a href="#interference">Interference</a></li>-->
-<li><a href="#surveillance">Surveillance</a></li>
-<li><a href="#drm">Digital restrictions
+  <ul>
+    <li><strong>Type&nbsp;of product</strong></li>
+    <li><a href="#swindle">Malware in the Kindle Swindle</a></li>
+    <li><a href="#echo">Malware in the Echo</a></li>
+  </ul>
+</div>
+</div>
+
+<h2 id="swindle">Malware in the Kindle Swindle</h2>
+
+<p>We refer to this product as the
+<a href="/philosophy/why-call-it-the-swindle.html">Amazon Swindle</a>
+because it has <a href="/philosophy/proprietary-drm.html">Digital restrictions
+management (DRM)</a>  and <a href="/philosophy/ebooks.html">
+other malicious functionalities</a>.</p>
+
+<div class="toc">
+  <div class="malfunctions">
+    <ul>
+      <li><strong>Type&nbsp;of malware</strong></li>
+      <li><a href="#back-doors">Back doors</a></li>
+      <!--<li><a href="#censorship">Censorship</a></li>-->
+      <!--<li><a href="#insecurity">Insecurity</a></li>-->
+      <!--<li><a href="#sabotage">Sabotage</a></li>-->
+      <!--<li><a href="#interference">Interference</a></li>-->
+      <li><a href="#surveillance">Surveillance</a></li>
+      <li><a href="#drm">Digital restrictions
     management</a> or &ldquo;DRM&rdquo; means functionalities designed
     to restrict what users can do with the data in their computers.</li>
-<!--<li><a href="#jails">Jails</a>&mdash;systems
+      <!--<li><a href="#jails">Jails</a>&mdash;systems
     that impose censorship on application programs.</li>-->
-<!--<li><a href="#tyrants">Tyrants</a>&mdash;systems
+      <!--<li><a href="#tyrants">Tyrants</a>&mdash;systems
     that reject any operating system not &ldquo;authorized&rdquo; by the
     manufacturer.</li>-->
-<li><strong>Other Amazon Products</strong></li>
-<li><a href="#echo-back-doors">Amazon Echo Back Doors</a></li>
-</ul>
-</div>
+    </ul>
+  </div>
 </div>
 
-<h3 id="swindle-back-doors">Amazon Kindle Swindle Back Doors</h3>
+<h3 id="back-doors">Amazon Kindle Swindle Back Doors</h3>
 <ul>
-<li>
-<p>The Amazon Kindle-Swindle has a back door that has been used to
-<a 
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/";>
-remotely erase books</a>.  One of the books erased was 1984, by George Orwell.
-</p>
-
-<p>Amazon responded to criticism by saying it would delete books only
-following orders from the state.  However, that policy didn't last.
-In 2012
-it <a 
href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html";>wiped
-a user's Kindle-Swindle and deleted her account</a>, then offered her
-kafkaesque &ldquo;explanations.&rdquo;</p>
-</li>
+  <li>
+    <p>The Amazon Kindle-Swindle has a back door that has been used to
+      <a 
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/";>
+       remotely erase books</a>.  One of the books erased was 1984, by George 
Orwell.
+    </p>
+
+    <p>Amazon responded to criticism by saying it would delete books only
+      following orders from the state.  However, that policy didn't last.
+      In 2012
+      it <a 
href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html";>wiped
+       a user's Kindle-Swindle and deleted her account</a>, then offered her
+      kafkaesque &ldquo;explanations.&rdquo;</p>
+  </li>
 
-<li>
+  <li>
   <p>The Kindle also has a
   <a 
href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090";>
   universal back door</a>.</p>
@@ -104,9 +113,9 @@
   facts.</p></li>
 </ul>
 
-<h2>Other Amazon Products</h2>
+<h2 id="echo">Malware in the Echo</h2>
 
-<h3 id="echo-back-doors">Amazon Echo Back Doors</h3>
+<h3>Amazon Echo Back Doors</h3>
 <ul>
     <li><p>The Amazon Echo appears to have a universal back door, since
       <a href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates";>
@@ -174,7 +183,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2017/02/24 14:06:51 $
+$Date: 2017/02/25 11:33:26 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-microsoft.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.es-en.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- po/malware-microsoft.es-en.html     2 Feb 2017 09:59:01 -0000       1.31
+++ po/malware-microsoft.es-en.html     25 Feb 2017 11:33:26 -0000      1.32
@@ -237,6 +237,12 @@
 
 <ul>
 
+<li><p>Windows DRM
+files <a 
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users";>can
+be used to identify people browsing through Tor</a>. The vulnerability
+exists only if you use Windows.
+</p></li>
+
 <li><p>By default, Windows 10 <a 
href="http://betanews.com/2016/11/24/microsoft-shares-windows-10-telemetry-data-with-third-parties";>sends
 debugging information to Microsoft, including core dumps</a>. Microsoft
 now distributes them to another company.</p></li>
@@ -419,7 +425,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2017/02/02 09:59:01 $
+$Date: 2017/02/25 11:33:26 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es-en.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- po/proprietary.es-en.html   10 Jan 2017 10:29:01 -0000      1.11
+++ po/proprietary.es-en.html   25 Feb 2017 11:33:26 -0000      1.12
@@ -48,9 +48,8 @@
   <li><a href="/proprietary/malware-apple.html">Apple Malware</a></li>
   <li><a href="/proprietary/malware-microsoft.html">Microsoft Malware</a></li>
   <li><a href="/proprietary/malware-adobe.html">Adobe Malware</a></li>
+  <li><a href="/proprietary/malware-amazon.html">Amazon Malware</a></li>
   <li><a href="/proprietary/malware-mobiles.html">Malware in mobile 
devices</a></li>
-  <li><a href="/proprietary/malware-kindle-swindle.html">Malware in the Amazon
-      Swindle</a></li>
   <li><a href="/proprietary/malware-games.html">Malware in games</a></li>
   <li><a href="/proprietary/malware-appliances.html">Malware in 
appliances</a></li>
 </ul>
@@ -146,7 +145,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2017/01/10 10:29:01 $
+$Date: 2017/02/25 11:33:26 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]