[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-apple.es.html malware-m...
From: |
GNUN |
Subject: |
www/proprietary malware-apple.es.html malware-m... |
Date: |
Wed, 12 Jun 2019 07:29:44 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/06/12 07:29:44
Modified files:
proprietary : malware-apple.es.html malware-microsoft.es.html
malware-mobiles.es.html
proprietary-back-doors.es.html
proprietary.es.html
proprietary/po : es.po malware-apple.es-en.html
malware-microsoft.es-en.html
malware-mobiles.es-en.html
proprietary-back-doors.es-en.html
proprietary.es-en.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.es.html?cvsroot=www&r1=1.71&r2=1.72
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.es.html?cvsroot=www&r1=1.66&r2=1.67
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.es.html?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.es.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.es.html?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.132&r2=1.133
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.es-en.html?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.es-en.html?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es-en.html?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.es-en.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es-en.html?cvsroot=www&r1=1.51&r2=1.52
Patches:
Index: malware-apple.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.es.html,v
retrieving revision 1.71
retrieving revision 1.72
diff -u -b -r1.71 -r1.72
--- malware-apple.es.html 9 Jun 2019 11:02:28 -0000 1.71
+++ malware-apple.es.html 12 Jun 2019 11:29:43 -0000 1.72
@@ -534,6 +534,23 @@
obediencia a Apple (como EE.UU. o China).</p>
</li>
+ <li id="M201905280">
+ <p>A pesar del supuesto compromiso de Apple con la privacidad, hay
aplicaciones
+para el iPhone que contienen rastreadores que funcionan por la noche y <a
+href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/">envÃan
+información personal del usuario a terceras partes</a>.</p>
+
+ <p>El artÃculo menciona ejemplos concretos: Microsoft OneDrive, el Mint de
+Intuit, Nike, Spotify, The Washington Post, The Weather Channel (propiedad
+de IBM), el servicio de alerta criminal Citizen, Yelp y DoorDash. Pero es
+probable que la mayorÃa de las aplicaciones que no son libres contengan
+rastreadores. Algunas de ellas envÃan datos de identificación personal tales
+como la huella digital telefónica, la localización exacta, la dirección de
+correo electrónico, el número de teléfono o incluso la dirección de entrega
+(en el caso de DoorDash). Una vez que la compañÃa ha recogido esta
+información, no hay manera de saber para qué va a utilizarla.</p>
+ </li>
+
<li id="M201809070">
<p>Adware Doctor, un bloqueador de anuncios para MacOS, <a
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history">recoge
@@ -803,7 +820,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2019/06/09 11:02:28 $
+$Date: 2019/06/12 11:29:43 $
<!-- timestamp end -->
</p>
Index: malware-microsoft.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.es.html,v
retrieving revision 1.66
retrieving revision 1.67
diff -u -b -r1.66 -r1.67
--- malware-microsoft.es.html 1 May 2019 08:59:54 -0000 1.66
+++ malware-microsoft.es.html 12 Jun 2019 11:29:43 -0000 1.67
@@ -544,7 +544,7 @@
<li id="M201405140">
<p><a
-href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">El
+href="https://web.archive.org/web/20190421070310/https://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">El
SkyDrive de Micrososft permite que la NSA examine directamente los datos de
los usuarios</a>.</p>
</li>
@@ -694,7 +694,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2019/05/01 08:59:54 $
+$Date: 2019/06/12 11:29:43 $
<!-- timestamp end -->
</p>
Index: malware-mobiles.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.es.html,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- malware-mobiles.es.html 9 Jun 2019 11:02:28 -0000 1.56
+++ malware-mobiles.es.html 12 Jun 2019 11:29:43 -0000 1.57
@@ -85,7 +85,7 @@
</li>
<li id="M201311120.1">
- <p id="universal-back-door">
+ <p id="universal-back-door-phone-modem">
El procesador de comunicaciones de casi todos los teléfonos tiene una
puerta
trasera universal que <a
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">a
@@ -142,15 +142,14 @@
<h3 id="back-doors">Puertas traseras</h3>
-<ul>
- <li>
- <p>Vea más arriba acerca de la <a href="#universal-back-door">puerta
trasera
-universal general</a> presente en prácticamente todos los teléfonos móviles,
-lo que permite convertirlos en dispositivos de escucha a tiempo completo.</p>
+<ul class="blurbs">
+ <li id="M209900001">
+ <p>Vea más arriba acerca de la <a
+href="#universal-back-door-phone-modem">puerta trasera universal general</a>
+presente en prácticamente todos los teléfonos móviles, lo que permite
+convertirlos en dispositivos de escucha a tiempo completo.</p>
</li>
-</ul>
-<ul class="blurbs">
<li id="M201609130">
<p>Los teléfonos Xiaomi contienen <a
href="https://web.archive.org/web/20190424082647/http://blog.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered/">una
@@ -176,12 +175,12 @@
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">Una
versión china de Android contiene una puerta trasera universal</a>. Casi
todos los modelos de teléfonos móviles tienen una <a
-href="#universal-back-door">puerta trasera universal en el chip del
-módem</a>. De modo que ¿por qué se molestó Coolpad en introducir otra?
+href="#universal-back-door-phone-modem">puerta trasera universal en el chip
+del módem</a>. De modo que ¿por qué se molestó Coolpad en introducir otra?
Porque esta la controla Coolpad.</p>
</li>
- <li id="M201403121">
+ <li id="M201403120.1">
<p id="samsung"><a
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">
Los dispositivos Samsung Galaxy que ejecutan versiones privativas de Android
@@ -413,6 +412,23 @@
<h3 id="surveillance">Vigilancia</h3>
<ul class="blurbs">
+ <li id="M201905280">
+ <p>A pesar del supuesto compromiso de Apple con la privacidad, hay
aplicaciones
+para el iPhone que contienen rastreadores que funcionan por la noche y <a
+href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/">envÃan
+información personal del usuario a terceras partes</a>.</p>
+
+ <p>El artÃculo menciona ejemplos concretos: Microsoft OneDrive, el Mint de
+Intuit, Nike, Spotify, The Washington Post, The Weather Channel (propiedad
+de IBM), el servicio de alerta criminal Citizen, Yelp y DoorDash. Pero es
+probable que la mayorÃa de las aplicaciones que no son libres contengan
+rastreadores. Algunas de ellas envÃan datos de identificación personal tales
+como la huella digital telefónica, la localización exacta, la dirección de
+correo electrónico, el número de teléfono o incluso la dirección de entrega
+(en el caso de DoorDash). Una vez que la compañÃa ha recogido esta
+información, no hay manera de saber para qué va a utilizarla.</p>
+ </li>
+
<li id="M201905060">
<p>BlizzCon 2019 imposed a <a
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
@@ -1124,7 +1140,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2019/06/09 11:02:28 $
+$Date: 2019/06/12 11:29:43 $
<!-- timestamp end -->
</p>
Index: proprietary-back-doors.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.es.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary-back-doors.es.html 9 Jun 2019 11:02:28 -0000 1.7
+++ proprietary-back-doors.es.html 12 Jun 2019 11:29:43 -0000 1.8
@@ -435,9 +435,9 @@
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">Una
versión china de Android contiene una puerta trasera universal</a>. Casi
todos los modelos de teléfonos móviles tienen una <a
-href="#universal-back-door">puerta trasera universal en el chip del
-módem</a>. Cabe preguntarse, ¿por qué se molestó Coolpad en introducir
otra?
-Porque esta la controla Coolpad.</p>
+href="#universal-back-door-phone-modem">puerta trasera universal en el chip
+del módem</a>. Cabe preguntarse, ¿por qué se molestó Coolpad en introducir
+otra? Porque esta la controla Coolpad.</p>
</li>
<li id="M201311300">
@@ -462,12 +462,12 @@
</li>
<li id="M200612050">
- <p>El procesador de comunicaciones de casi todos los teléfonos tiene una
puerta
+ <p id="universal-back-door-phone-modem">El procesador de comunicaciones de
casi todos los teléfonos tiene una puerta
trasera universal que <a
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">a
menudo se utiliza para hacer que el teléfono transmita todas las
conversaciones que escucha</a>. Para más información, consulte <a
-href="/proprietary/malware-mobiles.html#universal-back-door"><cite>Malware</cite>
+href="/proprietary/malware-mobiles.html#universal-back-door-phone-modem"><cite>Malware</cite>
en los dispositivos móviles</a>.</p>
</li>
</ul>
@@ -620,7 +620,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2019/06/09 11:02:28 $
+$Date: 2019/06/12 11:29:43 $
<!-- timestamp end -->
</p>
Index: proprietary.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.es.html,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- proprietary.es.html 9 Jun 2019 11:02:28 -0000 1.57
+++ proprietary.es.html 12 Jun 2019 11:29:43 -0000 1.58
@@ -157,6 +157,23 @@
<h3 id="latest">Añadidos recientes</h3>
<ul class="blurbs">
+ <li id="M201905280">
+ <p>A pesar del supuesto compromiso de Apple con la privacidad, hay
aplicaciones
+para el iPhone que contienen rastreadores que funcionan por la noche y <a
+href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/">envÃan
+información personal del usuario a terceras partes</a>.</p>
+
+ <p>El artÃculo menciona ejemplos concretos: Microsoft OneDrive, el Mint de
+Intuit, Nike, Spotify, The Washington Post, The Weather Channel (propiedad
+de IBM), el servicio de alerta criminal Citizen, Yelp y DoorDash. Pero es
+probable que la mayorÃa de las aplicaciones que no son libres contengan
+rastreadores. Algunas de ellas envÃan datos de identificación personal tales
+como la huella digital telefónica, la localización exacta, la dirección de
+correo electrónico, el número de teléfono o incluso la dirección de entrega
+(en el caso de DoorDash). Una vez que la compañÃa ha recogido esta
+información, no hay manera de saber para qué va a utilizarla.</p>
+ </li>
+
<li id="M201906030">
<p>Apple puede <a
href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/">rastrear
@@ -208,19 +225,6 @@
<p>La censura de aplicaciones de Apple es de por sà injusta, y serÃa
también
injustificable aun cuando no representara una amenaza a la seguridad.</p>
</li>
-
- <li id="M201905060">
- <p>BlizzCon 2019 impuso el <a
-href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">requisito
-de ejecutar una aplicación privativa en el teléfono</a> para poder
-participar en el evento.</p>
-
- <p>Esta aplicación es un programa espÃa capaz de husmear en multitud de
datos
-sensibles, incluida la localización del usuario y su lista de contactos, y
-que toma <a
-href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">control
-casi total</a> del teléfono.</p>
- </li>
</ul>
@@ -300,7 +304,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2019/06/09 11:02:28 $
+$Date: 2019/06/12 11:29:43 $
<!-- timestamp end -->
</p>
Index: po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.132
retrieving revision 1.133
diff -u -b -r1.132 -r1.133
--- po/es.po 11 Jun 2019 12:01:39 -0000 1.132
+++ po/es.po 12 Jun 2019 11:29:43 -0000 1.133
@@ -1533,6 +1533,11 @@
"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
"talking-to/\"> sending users' personal information to third parties</a>."
msgstr ""
+"A pesar del supuesto compromiso de Apple con la privacidad, hay aplicaciones "
+"para el iPhone que contienen rastreadores que funcionan por la noche y <a "
+"href=\"https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-"
+"night-do-you-know-who-your-iphone-is-talking-to/\">envÃan información "
+"personal del usuario a terceras partes</a>."
#. type: Content of: <ul><li><p>
msgid ""
@@ -1544,6 +1549,15 @@
"or even delivery address (in the case of DoorDash). Once this information is "
"collected by the company, there is no telling what it will be used for."
msgstr ""
+"El artÃculo menciona ejemplos concretos: Microsoft OneDrive, el Mint de "
+"Intuit, Nike, Spotify, The Washington Post, The Weather Channel (propiedad "
+"de IBM), el servicio de alerta criminal Citizen, Yelp y DoorDash. Pero es "
+"probable que la mayorÃa de las aplicaciones que no son libres contengan "
+"rastreadores. Algunas de ellas envÃan datos de identificación personal
tales "
+"como la huella digital telefónica, la localización exacta, la dirección de
"
+"correo electrónico, el número de teléfono o incluso la dirección de
entrega "
+"(en el caso de DoorDash). Una vez que la compañÃa ha recogido esta "
+"información, no hay manera de saber para qué va a utilizarla."
#. type: Content of: <ul><li><p>
msgid ""
Index: po/malware-apple.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.es-en.html,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- po/malware-apple.es-en.html 9 Jun 2019 11:02:28 -0000 1.65
+++ po/malware-apple.es-en.html 12 Jun 2019 11:29:43 -0000 1.66
@@ -518,6 +518,23 @@
as the US and China).</p>
</li>
+ <li id="M201905280">
+ <p>In spite of Apple's supposed commitment to
+ privacy, iPhone apps contain trackers that are busy at night <a
+
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/">
+ sending users' personal information to third parties</a>.</p>
+
+ <p>The article mentions specific examples: Microsoft OneDrive,
+ Intuitâs Mint, Nike, Spotify, The Washington Post, The Weather
+ Channel (owned by IBM), the crime-alert service Citizen, Yelp
+ and DoorDash. But it is likely that most nonfree apps contain
+ trackers. Some of these send personally identifying data such as phone
+ fingerprint, exact location, email address, phone number or even
+ delivery address (in the case of DoorDash). Once this information
+ is collected by the company, there is no telling what it will be
+ used for.</p>
+ </li>
+
<li id="M201809070">
<p>Adware Doctor, an ad blocker for MacOS, <a
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history">reports
@@ -766,7 +783,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/06/09 11:02:28 $
+$Date: 2019/06/12 11:29:43 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-microsoft.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.es-en.html,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- po/malware-microsoft.es-en.html 1 May 2019 08:59:54 -0000 1.63
+++ po/malware-microsoft.es-en.html 12 Jun 2019 11:29:43 -0000 1.64
@@ -527,7 +527,7 @@
<li id="M201405140">
<p><a
-
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">
+
href="https://web.archive.org/web/20190421070310/https://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">
Microsoft SkyDrive allows the NSA to directly examine users'
data</a>.</p>
</li>
@@ -657,7 +657,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/05/01 08:59:54 $
+$Date: 2019/06/12 11:29:43 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-mobiles.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es-en.html,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- po/malware-mobiles.es-en.html 9 Jun 2019 11:02:28 -0000 1.53
+++ po/malware-mobiles.es-en.html 12 Jun 2019 11:29:43 -0000 1.54
@@ -75,7 +75,7 @@
</li>
<li id="M201311120.1">
- <p id="universal-back-door">
+ <p id="universal-back-door-phone-modem">
Almost every phone's communication processor has
a universal back door which is <a
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
@@ -129,15 +129,13 @@
<h3 id="back-doors">Mobile Back Doors</h3>
-<ul>
- <li>
- <p>See above for the <a href="#universal-back-door">general universal back
+<ul class="blurbs">
+ <li id="M209900001">
+ <p>See above for the <a href="#universal-back-door-phone-modem">general
universal back
door</a> in essentially all mobile phones, which permits converting
them into full-time listening devices.</p>
</li>
-</ul>
-<ul class="blurbs">
<li id="M201609130">
<p>Xiaomi phones come with <a
href="https://web.archive.org/web/20190424082647/http://blog.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered/">
@@ -162,12 +160,12 @@
<p><a
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
A Chinese version of Android has a universal back door</a>. Nearly
- all models of mobile phones have a <a href="#universal-back-door">
+ all models of mobile phones have a <a
href="#universal-back-door-phone-modem">
universal back door in the modem chip</a>. So why did Coolpad bother
to introduce another? Because this one is controlled by Coolpad.</p>
</li>
- <li id="M201403121">
+ <li id="M201403120.1">
<p id="samsung"><a
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">
Samsung Galaxy devices running proprietary Android versions come with
@@ -394,6 +392,23 @@
<h3 id="surveillance">Mobile Surveillance</h3>
<ul class="blurbs">
+ <li id="M201905280">
+ <p>In spite of Apple's supposed commitment to
+ privacy, iPhone apps contain trackers that are busy at night <a
+
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/">
+ sending users' personal information to third parties</a>.</p>
+
+ <p>The article mentions specific examples: Microsoft OneDrive,
+ Intuitâs Mint, Nike, Spotify, The Washington Post, The Weather
+ Channel (owned by IBM), the crime-alert service Citizen, Yelp
+ and DoorDash. But it is likely that most nonfree apps contain
+ trackers. Some of these send personally identifying data such as phone
+ fingerprint, exact location, email address, phone number or even
+ delivery address (in the case of DoorDash). Once this information
+ is collected by the company, there is no telling what it will be
+ used for.</p>
+ </li>
+
<li id="M201905060">
<p>BlizzCon 2019 imposed a <a
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
@@ -1064,7 +1079,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/06/09 11:02:28 $
+$Date: 2019/06/12 11:29:43 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-back-doors.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.es-en.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- po/proprietary-back-doors.es-en.html 9 Jun 2019 11:02:29 -0000
1.5
+++ po/proprietary-back-doors.es-en.html 12 Jun 2019 11:29:43 -0000
1.6
@@ -428,7 +428,7 @@
<p><a
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
A Chinese version of Android has a universal back door</a>. Nearly
- all models of mobile phones have a <a href="#universal-back-door">
+ all models of mobile phones have a <a
href="#universal-back-door-phone-modem">
universal back door in the modem chip</a>. So why did Coolpad bother
to introduce another? Because this one is controlled by Coolpad.</p>
</li>
@@ -455,11 +455,11 @@
</li>
<li id="M200612050">
- <p>Almost every phone's communication
+ <p id="universal-back-door-phone-modem">Almost every phone's communication
processor has a universal back door which is <a
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
often used to make a phone transmit all conversations it hears</a>. See
- <a href="/proprietary/malware-mobiles.html#universal-back-door">Malware
+ <a
href="/proprietary/malware-mobiles.html#universal-back-door-phone-modem">Malware
in Mobile Devices</a> for more info.</p>
</li>
</ul>
@@ -595,7 +595,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/06/09 11:02:29 $
+$Date: 2019/06/12 11:29:43 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es-en.html,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -b -r1.51 -r1.52
--- po/proprietary.es-en.html 9 Jun 2019 11:02:29 -0000 1.51
+++ po/proprietary.es-en.html 12 Jun 2019 11:29:43 -0000 1.52
@@ -147,6 +147,23 @@
<h3 id="latest">Latest additions</h3>
<ul class="blurbs">
+ <li id="M201905280">
+ <p>In spite of Apple's supposed commitment to
+ privacy, iPhone apps contain trackers that are busy at night <a
+
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/">
+ sending users' personal information to third parties</a>.</p>
+
+ <p>The article mentions specific examples: Microsoft OneDrive,
+ Intuitâs Mint, Nike, Spotify, The Washington Post, The Weather
+ Channel (owned by IBM), the crime-alert service Citizen, Yelp
+ and DoorDash. But it is likely that most nonfree apps contain
+ trackers. Some of these send personally identifying data such as phone
+ fingerprint, exact location, email address, phone number or even
+ delivery address (in the case of DoorDash). Once this information
+ is collected by the company, there is no telling what it will be
+ used for.</p>
+ </li>
+
<li id="M201906030">
<p>Apple can <a
href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/">
@@ -199,18 +216,6 @@
<p>Apple's censorship of apps is fundamentally unjust, and would be
inexcusable even if it didn't lead to security threats as well.</p>
</li>
-
- <li id="M201905060">
- <p>BlizzCon 2019 imposed a <a
-
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
- requirement to run a proprietary phone app</a> to be allowed into
- the event.</p>
-
- <p>This app is a spyware that can snoop on a lot of
- sensitive data, including user's location and contact list, and has <a
-
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
- near-complete control</a> over the phone.</p>
- </li>
</ul>
@@ -271,7 +276,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/06/09 11:02:29 $
+$Date: 2019/06/12 11:29:43 $
<!-- timestamp end -->
</p>
</div>