www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www graphics/license-logos.es.html graphics/po/...


From: GNUN
Subject: www graphics/license-logos.es.html graphics/po/...
Date: Mon, 1 Jul 2019 05:29:18 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     19/07/01 05:29:18

Modified files:
        graphics       : license-logos.es.html 
        graphics/po    : license-logos.es-en.html 
        proprietary    : malware-apple.es.html malware-google.es.html 
                         malware-mobiles.es.html 
                         proprietary-addictions.es.html 
                         proprietary-back-doors.es.html 
                         proprietary.es.html 
        proprietary/po : es.po malware-apple.es-en.html 
                         malware-google.es-en.html 
                         malware-mobiles.es-en.html 
                         proprietary-addictions.es-en.html 
                         proprietary-back-doors.es-en.html 
                         proprietary.es-en.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/graphics/license-logos.es.html?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/graphics/po/license-logos.es-en.html?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.es.html?cvsroot=www&r1=1.72&r2=1.73
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-google.es.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.es.html?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-addictions.es.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.es.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.es.html?cvsroot=www&r1=1.58&r2=1.59
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.140&r2=1.141
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.es-en.html?cvsroot=www&r1=1.66&r2=1.67
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.es-en.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es-en.html?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.es-en.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.es-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es-en.html?cvsroot=www&r1=1.52&r2=1.53

Patches:
Index: graphics/license-logos.es.html
===================================================================
RCS file: /web/www/www/graphics/license-logos.es.html,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- graphics/license-logos.es.html      17 Mar 2019 12:00:55 -0000      1.47
+++ graphics/license-logos.es.html      1 Jul 2019 09:29:15 -0000       1.48
@@ -34,25 +34,30 @@
 <table id="license-logos" class="overflow" style="width: 47em">
 <tr>
   <td>Logotipo de la GFDL<br />de Martin Owens</td>
-  <td colspan="3">Logotipos de la GPL, LGPL y AGPL</td>
+  <td colspan="4">Logotipos de la GPL, LGPL y AGPL</td>
 </tr>
 
 <tr>
   <td>PNG&nbsp; <a href="/graphics/gfdl-logo-large.png">38kB</a> 
(1000x342)</td>
+  <td rowspan="2"><a href="/graphics/gplv3-or-later.png"><img
+    src="/graphics/gplv3-or-later.png"
+    alt="&nbsp;[Large GPLv3-or-later logo]&nbsp;"
+    style="width:7em" /></a>
+    <br />PNG&nbsp; 6.2kB (150x63)</td>
   <td><a href="/graphics/gplv3-with-text-136x68.png"><img
     src="/graphics/gplv3-with-text-136x68.png"
     alt="&nbsp;[Large GPLv3 logo with &ldquo;Free as in Freedom&rdquo;]&nbsp;"
-    style="width:8.5em" /></a>
+    style="width:7em" /></a>
     <br />PNG&nbsp; 6.6kB (136x68)</td>
   <td><a href="/graphics/lgplv3-with-text-154x68.png"><img
     src="/graphics/lgplv3-with-text-154x68.png"
     alt="&nbsp;[Large LGPLv3 logo with &ldquo;Free as in Freedom&rdquo;]&nbsp;"
-    style="width:9.6em" /></a>
+    style="width:8em" /></a>
     <br />PNG&nbsp; 7.3kB (154x68)</td>
   <td><a href="/graphics/agplv3-with-text-162x68.png"><img
     src="/graphics/agplv3-with-text-162x68.png"
     alt="&nbsp;[Large GNU AGPLv3 logo with &ldquo;Free as in 
Freedom&rdquo;]&nbsp;"
-    style="width:10em" /></a>
+    style="width:8.5em" /></a>
     <br />PNG&nbsp; 8.5kB (162x68)</td>
 </tr>
 
@@ -81,20 +86,25 @@
     alt="&nbsp;[Large GFDL logo]&nbsp;"
     style="width:8em" /></a>
     <br />PNG&nbsp; 4.7kB (129x44)</td>
+  <td rowspan="2"><a href="/graphics/gplv3-or-later-sm.png"><img
+    src="/graphics/gplv3-or-later-sm.png"
+    alt="&nbsp;[Small GPLv3-or-later logo]&nbsp;"
+    style="width:5.5em" /></a>
+    <br />PNG&nbsp; 3.7kB (90x38)</td>
   <td><a href="/graphics/gplv3-127x51.png"><img
     src="/graphics/gplv3-127x51.png"
     alt="&nbsp;[Large GPLv3 logo]&nbsp;"
-    style="width:8em" /></a>
+    style="width:6.5em" /></a>
     <br />PNG&nbsp; 3.5kB (127x51)</td>
   <td><a href="/graphics/lgplv3-147x51.png"><img
     src="/graphics/lgplv3-147x51.png"
     alt="&nbsp;[Large LGPLv3 logo]&nbsp;"
-    style="width:9.2em" /></a>
+    style="width:7.7em" /></a>
     <br />PNG&nbsp; 3.3kB (147x51)</td>
   <td><a href="/graphics/agplv3-155x51.png"><img
     src="/graphics/agplv3-155x51.png"
     alt="&nbsp;[Large GNU AGPLv3 logo]&nbsp;"
-    style="width:9.7em" /></a>
+    style="width:8em" /></a>
     <br />PNG&nbsp; 3.6kB (155x51)</td>
 </tr>
 
@@ -123,6 +133,7 @@
 
 <tr>
   <td>SVG&nbsp; <a href="/graphics/gfdl-logo.svg">5.4kB</a></td>
+  <td>SVG&nbsp; <a href="/graphics/gplv3-or-later.svg">109kB</a></td>
   <td>SVG&nbsp; <a href="/graphics/gpl-v3-logo.svg">83kB</a></td>
   <td colspan="2">SVG&nbsp; <a 
href="/graphics/lgpl-agpl-v3-logos.svg">290kB</a></td>
 </tr>
@@ -225,7 +236,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2019/03/17 12:00:55 $
+$Date: 2019/07/01 09:29:15 $
 
 <!-- timestamp end -->
 </p>

Index: graphics/po/license-logos.es-en.html
===================================================================
RCS file: /web/www/www/graphics/po/license-logos.es-en.html,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- graphics/po/license-logos.es-en.html        17 Mar 2019 12:00:55 -0000      
1.28
+++ graphics/po/license-logos.es-en.html        1 Jul 2019 09:29:16 -0000       
1.29
@@ -31,25 +31,30 @@
 <table id="license-logos" class="overflow" style="width: 47em">
 <tr>
   <td>GFDL logo<br />by Martin Owens</td>
-  <td colspan="3">GPL, LGPL and AGPL logos</td>
+  <td colspan="4">GPL, LGPL and AGPL logos</td>
 </tr>
 
 <tr>
   <td>PNG&nbsp; <a href="/graphics/gfdl-logo-large.png">38kB</a> 
(1000x342)</td>
+  <td rowspan="2"><a href="/graphics/gplv3-or-later.png"><img
+    src="/graphics/gplv3-or-later.png"
+    alt="&nbsp;[Large GPLv3-or-later logo]&nbsp;"
+    style="width:7em" /></a>
+    <br />PNG&nbsp; 6.2kB (150x63)</td>
   <td><a href="/graphics/gplv3-with-text-136x68.png"><img
     src="/graphics/gplv3-with-text-136x68.png"
     alt="&nbsp;[Large GPLv3 logo with &ldquo;Free as in Freedom&rdquo;]&nbsp;"
-    style="width:8.5em" /></a>
+    style="width:7em" /></a>
     <br />PNG&nbsp; 6.6kB (136x68)</td>
   <td><a href="/graphics/lgplv3-with-text-154x68.png"><img
     src="/graphics/lgplv3-with-text-154x68.png"
     alt="&nbsp;[Large LGPLv3 logo with &ldquo;Free as in Freedom&rdquo;]&nbsp;"
-    style="width:9.6em" /></a>
+    style="width:8em" /></a>
     <br />PNG&nbsp; 7.3kB (154x68)</td>
   <td><a href="/graphics/agplv3-with-text-162x68.png"><img
     src="/graphics/agplv3-with-text-162x68.png"
     alt="&nbsp;[Large GNU AGPLv3 logo with &ldquo;Free as in 
Freedom&rdquo;]&nbsp;"
-    style="width:10em" /></a>
+    style="width:8.5em" /></a>
     <br />PNG&nbsp; 8.5kB (162x68)</td>
 </tr>
 
@@ -78,20 +83,25 @@
     alt="&nbsp;[Large GFDL logo]&nbsp;"
     style="width:8em" /></a>
     <br />PNG&nbsp; 4.7kB (129x44)</td>
+  <td rowspan="2"><a href="/graphics/gplv3-or-later-sm.png"><img
+    src="/graphics/gplv3-or-later-sm.png"
+    alt="&nbsp;[Small GPLv3-or-later logo]&nbsp;"
+    style="width:5.5em" /></a>
+    <br />PNG&nbsp; 3.7kB (90x38)</td>
   <td><a href="/graphics/gplv3-127x51.png"><img
     src="/graphics/gplv3-127x51.png"
     alt="&nbsp;[Large GPLv3 logo]&nbsp;"
-    style="width:8em" /></a>
+    style="width:6.5em" /></a>
     <br />PNG&nbsp; 3.5kB (127x51)</td>
   <td><a href="/graphics/lgplv3-147x51.png"><img
     src="/graphics/lgplv3-147x51.png"
     alt="&nbsp;[Large LGPLv3 logo]&nbsp;"
-    style="width:9.2em" /></a>
+    style="width:7.7em" /></a>
     <br />PNG&nbsp; 3.3kB (147x51)</td>
   <td><a href="/graphics/agplv3-155x51.png"><img
     src="/graphics/agplv3-155x51.png"
     alt="&nbsp;[Large GNU AGPLv3 logo]&nbsp;"
-    style="width:9.7em" /></a>
+    style="width:8em" /></a>
     <br />PNG&nbsp; 3.6kB (155x51)</td>
 </tr>
 
@@ -120,6 +130,7 @@
 
 <tr>
   <td>SVG&nbsp; <a href="/graphics/gfdl-logo.svg">5.4kB</a></td>
+  <td>SVG&nbsp; <a href="/graphics/gplv3-or-later.svg">109kB</a></td>
   <td>SVG&nbsp; <a href="/graphics/gpl-v3-logo.svg">83kB</a></td>
   <td colspan="2">SVG&nbsp; <a 
href="/graphics/lgpl-agpl-v3-logos.svg">290kB</a></td>
 </tr>
@@ -203,7 +214,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/03/17 12:00:55 $
+$Date: 2019/07/01 09:29:16 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/malware-apple.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.es.html,v
retrieving revision 1.72
retrieving revision 1.73
diff -u -b -r1.72 -r1.73
--- proprietary/malware-apple.es.html   12 Jun 2019 11:29:43 -0000      1.72
+++ proprietary/malware-apple.es.html   1 Jul 2019 09:29:16 -0000       1.73
@@ -666,7 +666,7 @@
 extraer remotamente de los iPhone algunos datos para el Estado</a>.</p>
 
     <p>Esta situación puede haber mejorado con <a
-href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html";>los
+href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/";>los
 recursos de seguridad introducidos en el iOS 8</a>, pero <a
 href="https://firstlook.org/theintercept/2014/09/22/apple-data/";>no tanto
 como Apple afirma</a>.</p>
@@ -820,7 +820,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2019/06/12 11:29:43 $
+$Date: 2019/07/01 09:29:16 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/malware-google.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-google.es.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/malware-google.es.html  19 Apr 2019 15:59:32 -0000      1.4
+++ proprietary/malware-google.es.html  1 Jul 2019 09:29:17 -0000       1.5
@@ -283,6 +283,21 @@
 <h3 id="surveillance">Espionaje</h3>
 
 <ul class="blurbs">
+  <li id="M201906220">
+    <p>Google Chrome es un <a
+href="https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/";>instrumento
+de vigilancia</a>. Permite que miles de rastreadores invadan los ordenadores
+de los usuarios e informen de las páginas que visitan a empresas de
+publicidad y de datos, y en primer lugar a Google. Es más, si los usuarios
+tienen cuenta en Gmail, Chrome los conecta automáticamente a ella para
+mejorar la elaboración de su perfil. En Android, Chrome informa también a
+Google de su localización.</p>
+
+    <p>El mejor modo de evitar la vigilancia es cambiarse a <a
+href="/software/icecat/">IceCat</a>, una versión modificada de Firefox con
+algunos cambios para proteger la privacidad de los usuarios.</p>
+  </li>
+
   <li id="M201904130">
     <p>Google rastrea los movimientos de los teléfonos Android, y a veces <a
 
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html";>guarda
@@ -539,7 +554,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2019/04/19 15:59:32 $
+$Date: 2019/07/01 09:29:17 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/malware-mobiles.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.es.html,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- proprietary/malware-mobiles.es.html 12 Jun 2019 11:29:43 -0000      1.57
+++ proprietary/malware-mobiles.es.html 1 Jul 2019 09:29:17 -0000       1.58
@@ -725,14 +725,14 @@
 
   <li id="M201704260">
     <p>Faceapp parece ejercer una amplia vigilancia, a juzgar por <a
-href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/";>
-la magnitud del acceso que pide a los datos personales presentes en el
+href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/";>la
+magnitud del acceso que pide a los datos personales presentes en el
 dispositivo</a>.</p>
   </li>
 
   <li id="M201704190">
     <p>Los usuarios están llevando a Bose a los tribunales por <a
-href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/";>distribuir
+href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/";>distribuir
 una aplicación espía para sus auriculares</a>. Concretamente, la aplicación
 grabaría los nombres de los archivos de audio que se escuchan, asociándolos
 al número de serie individual de los auriculares.</p>
@@ -1140,7 +1140,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2019/06/12 11:29:43 $
+$Date: 2019/07/01 09:29:17 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-addictions.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-addictions.es.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary/proprietary-addictions.es.html  10 May 2019 10:59:38 -0000      
1.6
+++ proprietary/proprietary-addictions.es.html  1 Jul 2019 09:29:17 -0000       
1.7
@@ -99,6 +99,24 @@
 a &lt;<a href="mailto:address@hidden";>address@hidden</a>&gt;.</p>
   </li>
 
+  <li id="M209800000.1">
+    <p>Los desarrolladores de juegos gratuitos para móviles emplean <a
+href="/proprietary/proprietary-addictions.html#addictiveness">técnicas de
+manipulación conductual</a> para <a
+href="https://www.psychguides.com/interact/the-psychology-of-freemium/";>convertir
+sus productos en máquinas tragamonedas</a>. Esto se describe claramente en
+la infografía del artículo.</p>
+
+    <p>Las ganancias generadas por estos juegos están directamente 
relacionadas con
+el número de jugadores con una fuerte adicción (llamados «ballenas») y la
+cantidad de dinero que están dispuestos a gastar. Así los desarrolladores
+estudian minuciosamente el comportamiento de millones de usuarios a fin de
+incrementar la adictividad de sus juegos.</p>
+
+    <p>Desafortunadamente, el artículo utiliza el término 
<cite>«free»</cite> para
+significar «precio cero». Recomendamos en su lugar decir: «gratis».</p>
+  </li>
+
   <li id="M201902220">
     <p>Los servicios de juegos de apuestas en línea (y sus programas cliente 
no
 libres) están <a
@@ -226,7 +244,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2019/05/10 10:59:38 $
+$Date: 2019/07/01 09:29:17 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-back-doors.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.es.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary/proprietary-back-doors.es.html  12 Jun 2019 11:29:43 -0000      
1.8
+++ proprietary/proprietary-back-doors.es.html  1 Jul 2019 09:29:17 -0000       
1.9
@@ -98,7 +98,7 @@
 de forma remota algunos datos de los iPhone para cedérselos al Estado</a>.</p>
 
     <p>Esto puede haber mejorado con las <a
-href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html";>mejoras
+href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/";>mejoras
 de seguridad de iOS 8</a>, pero <a
 href="https://firstlook.org/theintercept/2014/09/22/apple-data/";>no tanto
 como Apple sostiene</a>.</p>
@@ -620,7 +620,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2019/06/12 11:29:43 $
+$Date: 2019/07/01 09:29:17 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.es.html,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -b -r1.58 -r1.59
--- proprietary/proprietary.es.html     12 Jun 2019 11:29:43 -0000      1.58
+++ proprietary/proprietary.es.html     1 Jul 2019 09:29:17 -0000       1.59
@@ -157,6 +157,39 @@
 <h3 id="latest">Añadidos recientes</h3>
 
 <ul class="blurbs">
+  <li id="M209800000">
+    <p>Los desarrolladores de juegos gratuitos para móviles emplean <a
+href="/proprietary/proprietary-addictions.html#addictiveness">técnicas de
+manipulación conductual</a> para <a
+href="https://www.psychguides.com/interact/the-psychology-of-freemium/";>convertir
+sus productos en máquinas tragamonedas</a>. Esto se describe claramente en
+la infografía del artículo.</p>
+
+    <p>Las ganancias generadas por estos juegos están directamente 
relacionadas con
+el número de jugadores con una fuerte adicción (llamados «ballenas») y la
+cantidad de dinero que están dispuestos a gastar. Así los desarrolladores
+estudian minuciosamente el comportamiento de millones de usuarios a fin de
+incrementar la adictividad de sus juegos.</p>
+
+    <p>Desafortunadamente, el artículo utiliza el término 
<cite>«free»</cite> para
+significar «precio cero». Recomendamos en su lugar decir: «gratis».</p>
+  </li>
+
+  <li id="M201906220">
+    <p>Google Chrome es un <a
+href="https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/";>instrumento
+de vigilancia</a>. Permite que miles de rastreadores invadan los ordenadores
+de los usuarios e informen de las páginas que visitan a empresas de
+publicidad y de datos, y en primer lugar a Google. Es más, si los usuarios
+tienen cuenta en Gmail, Chrome los conecta automáticamente a ella para
+mejorar la elaboración de su perfil. En Android, Chrome informa también a
+Google de su localización.</p>
+
+    <p>El mejor modo de evitar la vigilancia es cambiarse a <a
+href="/software/icecat/">IceCat</a>, una versión modificada de Firefox con
+algunos cambios para proteger la privacidad de los usuarios.</p>
+  </li>
+
   <li id="M201905280">
     <p>A pesar del supuesto compromiso de Apple con la privacidad, hay 
aplicaciones
 para el iPhone que contienen rastreadores que funcionan por la noche y <a
@@ -193,38 +226,6 @@
     <p>Además, espía a los usuarios, como cabe esperar de cualquier programa 
que no
 sea libre.</p>
   </li>
-
-  <li id="M201905061">
-    <p>Amazon Alexa recoge de los usuarios mucha más información de la 
necesaria
-para su correcto funcionamiento (hora, localización, grabaciones realizadas
-sin una orden explícita), y la envía a los servidores de Amazon, que la
-guardan indefinidamente. Aún más, Amazon la reenvía a otras compañías. De
-este modo, aun cuando los usuarios soliciten que se borren sus datos de los
-servidores de Amazon, <a
-href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php";>esos
-datos permanecerán en otros servidores</a>, quedando así al alcance de
-compañías publicitarias y agencias gubernamentales. En otras palabras,
-borrar la información recopilada no deshace el daño causado al 
recopilarla.</p>
-
-    <p>Los datos recopilados por dispositivos como el termostato Nest, el 
sistema
-de iluminación Philips Hue, el controlador para puertas de garaje
-Chamberlain MyQ y los altavoces Sonos se guardan también más tiempo del
-necesario en los servidores a los que tales dispositivos están
-conectados. Más aún, esos datos quedan a disposición de Alexa. En
-consecuencia, Amazon tiene una precisa imagen de la vida del usuario en su
-hogar, no solo en el presente, sino también en el pasado (y, quién sabe si
-también en el futuro).</p>
-  </li>
-
-  <li id="M201905150">
-    <p>Los usuarios atrapados en la prisión de un iMonstruo son <a
-href="https://boingboing.net/2019/05/15/brittle-security.html";>presa fácil
-para otros atacantes</a>, y la censura de aplicaciones impide a las
-compañías de seguridad descubrir cómo operan esos ataques.</p>
-
-    <p>La censura de aplicaciones de Apple es de por sí injusta, y sería 
también
-injustificable aun cuando no representara una amenaza a la seguridad.</p>
-  </li>
 </ul>
 
 
@@ -304,7 +305,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2019/06/12 11:29:43 $
+$Date: 2019/07/01 09:29:17 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.140
retrieving revision 1.141
diff -u -b -r1.140 -r1.141
--- proprietary/po/es.po        30 Jun 2019 08:29:21 -0000      1.140
+++ proprietary/po/es.po        1 Jul 2019 09:29:17 -0000       1.141
@@ -3608,6 +3608,11 @@
 "psychology-of-freemium/\"> turn their products into slot machines</a>. This "
 "is clearly described in an infographic."
 msgstr ""
+"Los desarrolladores de juegos gratuitos para móviles emplean <a href=\"/"
+"proprietary/proprietary-addictions.html#addictiveness\">técnicas de "
+"manipulación conductual</a> para <a href=\"https://www.psychguides.com/";
+"interact/the-psychology-of-freemium/\">convertir sus productos en máquinas "
+"tragamonedas</a>. Esto se describe claramente en la infografía del 
artículo."
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -3616,12 +3621,19 @@
 "money they are willing to spend. Thus developers carefully study the "
 "behavior of millions of users to increase the addictiveness of their games."
 msgstr ""
+"Las ganancias generadas por estos juegos están directamente relacionadas con 
"
+"el número de jugadores con una fuerte adicción (llamados «ballenas») y la 
"
+"cantidad de dinero que están dispuestos a gastar. Así los desarrolladores "
+"estudian minuciosamente el comportamiento de millones de usuarios a fin de "
+"incrementar la adictividad de sus juegos."
 
 #. type: Content of: <ul><li><p>
 msgid ""
 "Unfortunately, the article uses &ldquo;free&rdquo; to mean &ldquo;zero price."
 "&rdquo; We recommend saying &ldquo;gratis&rdquo; instead."
 msgstr ""
+"Desafortunadamente, el artículo utiliza el término <cite>«free»</cite> 
para "
+"significar «precio cero». Recomendamos en su lugar decir: «gratis»."
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -4417,6 +4429,14 @@
 "logs them in to the browser for more convenient profiling. On Android, "
 "Chrome also reports their location to Google."
 msgstr ""
+"Google Chrome es un <a href=\"https://www.mercurynews.com/2019/06/21/google-";
+"chrome-has-become-surveillance-software-its-time-to-switch/\">instrumento de "
+"vigilancia</a>. Permite que miles de rastreadores invadan los ordenadores de "
+"los usuarios e informen de las páginas que visitan a empresas de publicidad "
+"y de datos, y en primer lugar a Google. Es más, si los usuarios tienen "
+"cuenta en Gmail, Chrome los conecta automáticamente a ella para mejorar la "
+"elaboración de su perfil. En Android, Chrome informa también a Google de su 
"
+"localización."
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -4424,6 +4444,9 @@
 "icecat/\">IceCat</a>, a modified version of Firefox with several changes to "
 "protect users' privacy."
 msgstr ""
+"El mejor modo de evitar la vigilancia es cambiarse a <a href=\"/software/"
+"icecat/\">IceCat</a>, una versión modificada de Firefox con algunos cambios "
+"para proteger la privacidad de los usuarios."
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -7991,6 +8014,11 @@
 "interact/the-psychology-of-freemium/\"> turn their products into slot "
 "machines</a>. This is clearly described in an infographic."
 msgstr ""
+"Los desarrolladores de juegos gratuitos para móviles emplean <a href=\"/"
+"proprietary/proprietary-addictions.html#addictiveness\">técnicas de "
+"manipulación conductual</a> para <a href=\"https://www.psychguides.com/";
+"interact/the-psychology-of-freemium/\">convertir sus productos en máquinas "
+"tragamonedas</a>. Esto se describe claramente en la infografía del 
artículo."
 
 #. type: Content of: <ul><li><p>
 msgid ""

Index: proprietary/po/malware-apple.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.es-en.html,v
retrieving revision 1.66
retrieving revision 1.67
diff -u -b -r1.66 -r1.67
--- proprietary/po/malware-apple.es-en.html     12 Jun 2019 11:29:43 -0000      
1.66
+++ proprietary/po/malware-apple.es-en.html     1 Jul 2019 09:29:17 -0000       
1.67
@@ -648,7 +648,7 @@
     remotely extract some data from iPhones for the state</a>.</p>
 
     <p>This may have improved with <a
-    
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html";>
+    
href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/";>
     iOS 8 security improvements</a>; but <a
     href="https://firstlook.org/theintercept/2014/09/22/apple-data/";>
     not as much as Apple claims</a>.</p>
@@ -783,7 +783,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/06/12 11:29:43 $
+$Date: 2019/07/01 09:29:17 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-google.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.es-en.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/po/malware-google.es-en.html    19 Apr 2019 15:59:32 -0000      
1.4
+++ proprietary/po/malware-google.es-en.html    1 Jul 2019 09:29:17 -0000       
1.5
@@ -270,6 +270,21 @@
 <h3 id="surveillance">Google Surveillance</h3>
 
 <ul class="blurbs">
+  <li id="M201906220">
+    <p>Google Chrome is an <a
+    
href="https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/";>
+    instrument of surveillance</a>. It lets thousands of trackers invade
+    users' computers and report the sites they visit to advertising and
+    data companies, first of all to Google. Moreover, if users have a
+    Gmail account, Chrome automatically logs them in to the browser for
+    more convenient profiling. On Android, Chrome also reports their
+    location to Google.</p>
+
+    <p>The best way to escape surveillance is to switch to <a
+    href="/software/icecat/">IceCat</a>, a modified version of Firefox
+    with several changes to protect users' privacy.</p>
+  </li>
+
   <li id="M201904130">
     <p>Google tracks the movements of Android phones, and sometimes <a
     
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html";>
@@ -506,7 +521,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/04/19 15:59:32 $
+$Date: 2019/07/01 09:29:17 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-mobiles.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es-en.html,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- proprietary/po/malware-mobiles.es-en.html   12 Jun 2019 11:29:43 -0000      
1.54
+++ proprietary/po/malware-mobiles.es-en.html   1 Jul 2019 09:29:17 -0000       
1.55
@@ -689,13 +689,13 @@
 
   <li id="M201704260">
     <p>Faceapp appears to do lots of surveillance, judging by <a
-    
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/";>
+    
href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/";>
     how much access it demands to personal data in the device</a>.</p>
   </li>
 
   <li id="M201704190">
     <p>Users are suing Bose for <a
-    
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/";>
+    
href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/";>
     distributing a spyware app for its headphones</a>.  Specifically,
     the app would record the names of the audio files users listen to
     along with the headphone's unique serial number.</p>
@@ -1079,7 +1079,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/06/12 11:29:43 $
+$Date: 2019/07/01 09:29:17 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-addictions.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.es-en.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary/po/proprietary-addictions.es-en.html    10 May 2019 10:59:38 
-0000      1.5
+++ proprietary/po/proprietary-addictions.es-en.html    1 Jul 2019 09:29:18 
-0000       1.6
@@ -91,6 +91,24 @@
     href="mailto:address@hidden";>address@hidden</a>&gt;.</p>
   </li>
 
+  <li id="M209800000.1">
+    <p>The developers of gratis mobile games apply the <a
+    href="#addictiveness">techniques described above</a> to <a
+    href="https://www.psychguides.com/interact/the-psychology-of-freemium/";>
+    turn their products into slot machines</a>. This is clearly described
+    in an infographic.</p>
+
+    <p>The revenue generated by these games is directly related to the
+    number of strongly addicted gamers (called &ldquo;whales&rdquo;) and
+    to the amount of money they are willing to spend. Thus developers
+    carefully study the behavior of millions of users to increase the
+    addictiveness of their games.</p>
+
+    <p>Unfortunately, the article uses &ldquo;free&rdquo; to mean
+    &ldquo;zero price.&rdquo;  We recommend saying &ldquo;gratis&rdquo;
+    instead.</p>
+  </li>
+
   <li id="M201902220">
     <p>On-line gambling services (and their nonfree
     client programs) are <a
@@ -198,7 +216,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/05/10 10:59:38 $
+$Date: 2019/07/01 09:29:18 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-back-doors.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.es-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary/po/proprietary-back-doors.es-en.html    12 Jun 2019 11:29:43 
-0000      1.6
+++ proprietary/po/proprietary-back-doors.es-en.html    1 Jul 2019 09:29:18 
-0000       1.7
@@ -89,7 +89,7 @@
     remotely extract some data from iPhones for the state</a>.</p>
 
     <p>This may have improved with <a
-    
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html";>
+    
href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/";>
     iOS 8 security improvements</a>; but <a
     href="https://firstlook.org/theintercept/2014/09/22/apple-data/";>
     not as much as Apple claims</a>.</p>
@@ -595,7 +595,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/06/12 11:29:43 $
+$Date: 2019/07/01 09:29:18 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es-en.html,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- proprietary/po/proprietary.es-en.html       12 Jun 2019 11:29:43 -0000      
1.52
+++ proprietary/po/proprietary.es-en.html       1 Jul 2019 09:29:18 -0000       
1.53
@@ -147,6 +147,40 @@
 <h3 id="latest">Latest additions</h3>
 
 <ul class="blurbs">
+  <li id="M209800000">
+    <p>The developers of gratis mobile games apply <a
+    href="/proprietary/proprietary-addictions.html#addictiveness">
+    behavioral manipulation techniques</a> to <a
+    href="https://www.psychguides.com/interact/the-psychology-of-freemium/";>
+    turn their products into slot machines</a>. This is clearly described
+    in an infographic.</p>
+
+    <p>The revenue generated by these games is directly related to the
+    number of strongly addicted gamers (called &ldquo;whales&rdquo;) and
+    to the amount of money they are willing to spend. Thus developers
+    carefully study the behavior of millions of users to increase the
+    addictiveness of their games.</p>
+
+    <p>Unfortunately, the article uses &ldquo;free&rdquo; to mean
+    &ldquo;zero price.&rdquo;  We recommend saying &ldquo;gratis&rdquo;
+    instead.</p>
+  </li>
+
+  <li id="M201906220">
+    <p>Google Chrome is an <a
+    
href="https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/";>
+    instrument of surveillance</a>. It lets thousands of trackers invade
+    users' computers and report the sites they visit to advertising and
+    data companies, first of all to Google. Moreover, if users have a
+    Gmail account, Chrome automatically logs them in to the browser for
+    more convenient profiling. On Android, Chrome also reports their
+    location to Google.</p>
+
+    <p>The best way to escape surveillance is to switch to <a
+    href="/software/icecat/">IceCat</a>, a modified version of Firefox
+    with several changes to protect users' privacy.</p>
+  </li>
+
   <li id="M201905280">
     <p>In spite of Apple's supposed commitment to
     privacy, iPhone apps contain trackers that are busy at night <a
@@ -184,38 +218,6 @@
     <p>It snoops on users, too, as you must expect from nonfree
     programs.</p>
   </li>
-
-  <li id="M201905061">
-    <p>Amazon Alexa collects a lot more information from users
-    than is necessary for correct functioning (time, location,
-    recordings made without a legitimate prompt), and sends
-    it to Amazon's servers, which store it indefinitely. Even
-    worse, Amazon forwards it to third-party companies. Thus,
-    even if users request deletion of their data from Amazon's servers, <a
-    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php";>
-    the data remain on other servers</a>, where they can be accessed by
-    advertising companies and government agencies. In other words,
-    deleting the collected information doesn't cancel the wrong of
-    collecting it.</p>
-
-    <p>Data collected by devices such as the Nest thermostat, the Philips
-    Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
-    speakers are likewise stored longer than necessary on the servers
-    the devices are tethered to. Moreover, they are made available to
-    Alexa. As a result, Amazon has a very precise picture of users' life
-    at home, not only in the present, but in the past (and, who knows,
-    in the future too?)</p>
-  </li>
-
-  <li id="M201905150">
-    <p>Users caught in the jail of an iMonster are <a
-    href="https://boingboing.net/2019/05/15/brittle-security.html";> sitting
-    ducks for other attackers</a>, and the app censorship prevents security
-    companies from figuring out how those attacks work.</p>
-
-    <p>Apple's censorship of apps is fundamentally unjust, and would be
-    inexcusable even if it didn't lead to security threats as well.</p>
-  </li>
 </ul>
 
 
@@ -276,7 +278,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/06/12 11:29:43 $
+$Date: 2019/07/01 09:29:18 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]