www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www philosophy/po/right-to-read.ru-en.html phil...


From: GNUN
Subject: www philosophy/po/right-to-read.ru-en.html phil...
Date: Wed, 1 May 2019 04:59:55 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     19/05/01 04:59:54

Modified files:
        philosophy/po  : right-to-read.ru-en.html right-to-read.ru.po 
        proprietary    : malware-amazon.es.html 
                         malware-microsoft.es.html proprietary.es.html 
        proprietary/po : es.po malware-amazon.es-en.html 
                         malware-microsoft.es-en.html 
                         proprietary.es-en.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.ru-en.html?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.ru.po?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-amazon.es.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.es.html?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.es.html?cvsroot=www&r1=1.50&r2=1.51
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.107&r2=1.108
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.es-en.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.es-en.html?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es-en.html?cvsroot=www&r1=1.44&r2=1.45

Patches:
Index: philosophy/po/right-to-read.ru-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.ru-en.html,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- philosophy/po/right-to-read.ru-en.html      23 Mar 2019 17:32:00 -0000      
1.37
+++ philosophy/po/right-to-read.ru-en.html      1 May 2019 08:59:54 -0000       
1.38
@@ -302,7 +302,7 @@
 downgrades.  It can also order all machines running Vista to refuse to
 run a certain device driver.  The main purpose of Vista's clampdown on
 users was to impose DRM that users can't overcome.  Of course, Windows
-10 is no better</p>
+10 is no better.</p>
 </div>
 <div class="column-limit"></div>
 </li>
@@ -546,7 +546,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/03/23 17:32:00 $
+$Date: 2019/05/01 08:59:54 $
 <!-- timestamp end -->
 </p>
 </div>

Index: philosophy/po/right-to-read.ru.po
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.ru.po,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- philosophy/po/right-to-read.ru.po   1 May 2019 08:53:10 -0000       1.75
+++ philosophy/po/right-to-read.ru.po   1 May 2019 08:59:54 -0000       1.76
@@ -17,7 +17,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2019-04-30 19:26+0000\n"
 
 #. type: Content of: <title>
 msgid "The Right to Read - GNU Project - Free Software Foundation"
@@ -441,19 +440,6 @@
 "исключительно на свободных программах и 
отвергаем несвободные."
 
 #. type: Content of: <div><div><ul><li><div><p>
-# | With Windows Vista, Microsoft admitted it had built in a back door:
-# | Microsoft can use it to forcibly install software &ldquo;upgrades,&rdquo;
-# | even if users consider them rather to be downgrades.  It can also order
-# | all machines running Vista to refuse to run a certain device driver.  The
-# | main purpose of Vista's clampdown on users was to impose DRM that users
-# | can't overcome.  Of course, Windows 10 is no better{+.+}
-#| msgid ""
-#| "With Windows Vista, Microsoft admitted it had built in a back door: "
-#| "Microsoft can use it to forcibly install software &ldquo;upgrades,&rdquo; "
-#| "even if users consider them rather to be downgrades.  It can also order "
-#| "all machines running Vista to refuse to run a certain device driver.  The "
-#| "main purpose of Vista's clampdown on users was to impose DRM that users "
-#| "can't overcome.  Of course, Windows 10 is no better"
 msgid ""
 "With Windows Vista, Microsoft admitted it had built in a back door: "
 "Microsoft can use it to forcibly install software &ldquo;upgrades,&rdquo; "

Index: proprietary/malware-amazon.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-amazon.es.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- proprietary/malware-amazon.es.html  4 Mar 2019 13:30:41 -0000       1.19
+++ proprietary/malware-amazon.es.html  1 May 2019 08:59:54 -0000       1.20
@@ -141,6 +141,25 @@
 <h4 id="echo-surveillance">Vigilancia</h4>
 
 <ul class="blurbs">
+  <li id="M201904240">
+    <p>Algunas de las órdenes del usuario al servicio Alexa son <a
+href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html";>grabadas
+por empleados de Amazon para su escucha</a>. Los asistentes de voz de Google
+y Apple hacen cosas similares.</p>
+
+    <p>Una parte del personal encargado de Alexa tiene acceso incluso a <a
+href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788";>la
+localización y otros datos personales</a>.</p>
+
+    <p>Dado que el programa cliente no es libre, y que el procesamiento de los
+datos se hace «<a href="/philosophy/words-to-avoid.html#CloudComputing">en
+la nube</a>» (una expresión tranquilizadora que significa: «No te diremos
+cómo ni dónde se hace»), los usuarios no tienen forma de saber qué sucede
+con las grabaciones a menos que algún empleado <a
+href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033";>rompa
+sus acuerdos de confidencialidad</a>.</p>
+  </li>
+
   <li id="M201808120">
     <p>Unos <cite>crackers</cite> encontraron la manera de sortear las medidas 
de
 seguridad de un dispositivo de Amazon y <a
@@ -283,7 +302,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2019/03/04 13:30:41 $
+$Date: 2019/05/01 08:59:54 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/malware-microsoft.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.es.html,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- proprietary/malware-microsoft.es.html       27 Apr 2019 12:00:16 -0000      
1.65
+++ proprietary/malware-microsoft.es.html       1 May 2019 08:59:54 -0000       
1.66
@@ -300,7 +300,7 @@
 la fuerza un programa de «corrección»</a> en ordenadores con ciertas
 versiones de Windows 10. La corrección, tal como la entiende Microsoft,
 significa <a
-href="https://support.microsoft.com/en-us/help/4023057/update-to-windows-10-versions-1507-1511-1607-1703-1709-and-1803-for-up2019-04-04";>manipular
+href="https://support.microsoft.com/en-us/help/4023057/update-to-windows-10-versions-1507-1511-1607-1703-1709-and-1803-for-up";>manipular
 las Preferencias y archivos de los usuarios</a>, especialmente para
 «reparar» cualquier componente del sistema de actualización que los usuarios
 puedan haber desahabilitado intencionalmente, y así recuperar todo el
@@ -694,7 +694,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2019/04/27 12:00:16 $
+$Date: 2019/05/01 08:59:54 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.es.html,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -b -r1.50 -r1.51
--- proprietary/proprietary.es.html     27 Apr 2019 12:00:18 -0000      1.50
+++ proprietary/proprietary.es.html     1 May 2019 08:59:54 -0000       1.51
@@ -156,9 +156,28 @@
 <h3 id="latest">Añadidos recientes</h3>
 
 <ul class="blurbs">
+  <li id="M201904240">
+    <p>Algunas de las órdenes del usuario al servicio Alexa son <a
+href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html";>grabadas
+por empleados de Amazon para su escucha</a>. Los asistentes de voz de Google
+y Apple hacen cosas similares.</p>
+
+    <p>Una parte del personal encargado de Alexa tiene acceso incluso a <a
+href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788";>la
+localización y otros datos personales</a></p>
+
+    <p>Dado que el programa cliente no es libre, y que el procesamiento de los
+datos se hace «<a href="/philosophy/words-to-avoid.html#CloudComputing">en
+la nube</a>» (una expresión tranquilizadora que significa: «No te diremos
+cómo ni dónde se hace»), los usuarios no tienen forma de saber qué sucede
+con las grabaciones a menos que algún empleado <a
+href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033";>rompa
+sus acuerdos de confidencialidad</a>.</p>
+  </li>
+
   <li id="M201904210">
     <p>Desde abril de 2019, ya <a
-href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk";>no
+href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/";>no
 es posible deshabilitar una descarada funcionalidad de rastreo</a> que <a
 
href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing";>revela
 la IP de los usuarios que siguen un enlace provisto del atributo
@@ -191,7 +210,7 @@
 la fuerza un programa de «corrección»</a> en ordenadores con ciertas
 versiones de Windows 10. La corrección, tal como la entiende Microsoft,
 significa <a
-href="https://support.microsoft.com/en-us/help/4023057/update-to-windows-10-versions-1507-1511-1607-1703-1709-and-1803-for-up2019-04-04";>manipular
+href="https://support.microsoft.com/en-us/help/4023057/update-to-windows-10-versions-1507-1511-1607-1703-1709-and-1803-for-up";>manipular
 las Preferencias y archivos de los usuarios</a>, especialmente para
 «reparar» cualquier componente del sistema de actualización que los usuarios
 puedan haber desahabilitado intencionalmente, y así recuperar todo el
@@ -228,15 +247,6 @@
 
href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison";>encausados
 por este fraude</a>.</p>
   </li>
-
-  <li id="M201904130">
-    <p>Google rastrea los movimientos de los teléfonos Android, y a veces <a
-href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html";>guarda
-los datos durante años</a>.</p>
-
-    <p>Un software privativo presente en el teléfono debe de ser el 
responsable de
-enviar los datos de localización a Google.</p>
-  </li>
 </ul>
 
 
@@ -316,7 +326,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2019/04/27 12:00:18 $
+$Date: 2019/05/01 08:59:54 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.107
retrieving revision 1.108
diff -u -b -r1.107 -r1.108
--- proprietary/po/es.po        27 Apr 2019 20:00:24 -0000      1.107
+++ proprietary/po/es.po        1 May 2019 08:59:54 -0000       1.108
@@ -410,6 +410,10 @@
 "is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
 "The Google and Apple voice assistants do similar things."
 msgstr ""
+"Algunas de las órdenes del usuario al servicio Alexa son <a href=\"https://";
+"www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-"
+"someone-is-20190411-p51d4g.html\">grabadas por empleados de Amazon para su "
+"escucha</a>. Los asistentes de voz de Google y Apple hacen cosas similares."
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -417,6 +421,9 @@
 "www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
 "addresses-1.1248788\"> location and other personal data</a>."
 msgstr ""
+"Una parte del personal encargado de Alexa tiene acceso incluso a <a href="
+"\"https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-";
+"home-addresses-1.1248788\">la localización y otros datos personales</a>."
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -428,6 +435,13 @@
 "cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
 "disclosure agreements</a>."
 msgstr ""
+"Dado que el programa cliente no es libre, y que el procesamiento de los "
+"datos se hace «<a href=\"/philosophy/words-to-avoid.html#CloudComputing\">en 
"
+"la nube</a>» (una expresión tranquilizadora que significa: «No te diremos "
+"cómo ni dónde se hace»), los usuarios no tienen forma de saber qué sucede 
"
+"con las grabaciones a menos que algún empleado <a href=\"https://www.";
+"bnnbloomberg.ca/three-cheers-for-amazon-s-human-"
+"eavesdroppers-1.1243033\">rompa sus acuerdos de confidencialidad</a>."
 
 #. type: Content of: <ul><li><p>
 msgid ""

Index: proprietary/po/malware-amazon.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.es-en.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary/po/malware-amazon.es-en.html    4 Mar 2019 13:30:43 -0000       
1.18
+++ proprietary/po/malware-amazon.es-en.html    1 May 2019 08:59:54 -0000       
1.19
@@ -131,6 +131,25 @@
 <h4 id="echo-surveillance">Surveillance</h4>
 
 <ul class="blurbs">
+  <li id="M201904240">
+    <p>Some of users' commands to the Alexa service are <a
+    
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html";>
+    recorded for Amazon employees to listen to</a>. The Google and Apple
+    voice assistants do similar things.</p>
+
+    <p>A fraction of the Alexa service staff even has access to <a
+    
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788";>
+    location and other personal data</a>.</p>
+
+    <p>Since the client program is nonfree, and data processing is done
+    &ldquo;<a href="/philosophy/words-to-avoid.html#CloudComputing">in
+    the cloud</a>&rdquo; (a soothing way of saying &ldquo;We won't
+    tell you how and where it's done&rdquo;), users have no way
+    to know what happens to the recordings unless human eavesdroppers <a
+    
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033";>
+    break their non-disclosure agreements</a>.</p>
+  </li>
+
   <li id="M201808120">
     <p>Crackers found a way to break the security of an Amazon device,
     and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html";>
@@ -252,7 +271,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/03/04 13:30:43 $
+$Date: 2019/05/01 08:59:54 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-microsoft.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.es-en.html,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- proprietary/po/malware-microsoft.es-en.html 27 Apr 2019 12:00:18 -0000      
1.62
+++ proprietary/po/malware-microsoft.es-en.html 1 May 2019 08:59:54 -0000       
1.63
@@ -286,7 +286,7 @@
     force-installing a &ldquo;remediation&rdquo;
     program</a> on computers running certain
     versions of Windows 10. Remediation, in Microsoft's view, means <a
-    
href="https://support.microsoft.com/en-us/help/4023057/update-to-windows-10-versions-1507-1511-1607-1703-1709-and-1803-for-up2019-04-04";>
+    
href="https://support.microsoft.com/en-us/help/4023057/update-to-windows-10-versions-1507-1511-1607-1703-1709-and-1803-for-up";>
     tampering with users' settings and files</a>, notably to
     &ldquo;repair&rdquo; any components of the updating system that users
     may have intentionally disabled, and thus regain full power over
@@ -657,7 +657,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/04/27 12:00:18 $
+$Date: 2019/05/01 08:59:54 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es-en.html,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- proprietary/po/proprietary.es-en.html       27 Apr 2019 12:00:18 -0000      
1.44
+++ proprietary/po/proprietary.es-en.html       1 May 2019 08:59:54 -0000       
1.45
@@ -146,9 +146,28 @@
 <h3 id="latest">Latest additions</h3>
 
 <ul class="blurbs">
+  <li id="M201904240">
+    <p>Some of users' commands to the Alexa service are <a
+    
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html";>
+    recorded for Amazon employees to listen to</a>. The Google and Apple
+    voice assistants do similar things.</p>
+
+    <p>A fraction of the Alexa service staff even has access to <a
+    
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788";>
+    location and other personal data</a>.</p>
+
+    <p>Since the client program is nonfree, and data processing is done
+    &ldquo;<a href="/philosophy/words-to-avoid.html#CloudComputing">in
+    the cloud</a>&rdquo; (a soothing way of saying &ldquo;We won't
+    tell you how and where it's done&rdquo;), users have no way
+    to know what happens to the recordings unless human eavesdroppers <a
+    
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033";>
+    break their non-disclosure agreements</a>.</p>
+  </li>
+
   <li id="M201904210">
     <p>As of April 2019, it is <a
-    
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk";>no
+    
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/";>no
     longer possible to disable an
     unscrupulous tracking anti-feature</a> that <a
     
href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing";>reports
@@ -180,7 +199,7 @@
     force-installing a &ldquo;remediation&rdquo;
     program</a> on computers running certain
     versions of Windows 10. Remediation, in Microsoft's view, means <a
-    
href="https://support.microsoft.com/en-us/help/4023057/update-to-windows-10-versions-1507-1511-1607-1703-1709-and-1803-for-up2019-04-04";>
+    
href="https://support.microsoft.com/en-us/help/4023057/update-to-windows-10-versions-1507-1511-1607-1703-1709-and-1803-for-up";>
     tampering with users' settings and files</a>, notably to
     &ldquo;repair&rdquo; any components of the updating system that users
     may have intentionally disabled, and thus regain full power over
@@ -215,15 +234,6 @@
     
href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison";>
     sued over this fraud</a>.</p>
   </li>
-
-  <li id="M201904130">
-    <p>Google tracks the movements of Android phones, and sometimes <a
-    
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html";>
-    saves the data for years</a>.</p>
-
-    <p>Nonfree software in the phone has to be responsible for sending
-    the location data to Google.</p>
-  </li>
 </ul>
 
 
@@ -284,7 +294,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/04/27 12:00:18 $
+$Date: 2019/05/01 08:59:54 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]