[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-amazon.es.html malware-...
From: |
GNUN |
Subject: |
www/proprietary malware-amazon.es.html malware-... |
Date: |
Thu, 19 Sep 2019 05:29:38 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/09/19 05:29:38
Modified files:
proprietary : malware-amazon.es.html malware-google.es.html
malware-microsoft.es.html
malware-mobiles.es.html
proprietary-insecurity.es.html
proprietary-sabotage.es.html
proprietary.es.html
proprietary/po : es.po malware-amazon.es-en.html
malware-google.es-en.html
malware-microsoft.es-en.html
malware-mobiles.es-en.html
proprietary-insecurity.es-en.html
proprietary-sabotage.es-en.html
proprietary.es-en.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-amazon.es.html?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-google.es.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.es.html?cvsroot=www&r1=1.72&r2=1.73
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.es.html?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.es.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.es.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.es.html?cvsroot=www&r1=1.74&r2=1.75
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.196&r2=1.197
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.es-en.html?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.es-en.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.es-en.html?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es-en.html?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.es-en.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.es-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es-en.html?cvsroot=www&r1=1.67&r2=1.68
Patches:
Index: malware-amazon.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-amazon.es.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- malware-amazon.es.html 15 Sep 2019 21:06:07 -0000 1.22
+++ malware-amazon.es.html 19 Sep 2019 09:29:37 -0000 1.23
@@ -212,10 +212,11 @@
href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">también
cualquier otro puede observar e incluso falsear vÃdeos</a>.</p>
- <p>Es de suponer que la vulnerabilidad a terceros no es intencionada, e
imagino
-que la Amazon lo solucionará. Pero no cuento con que Amazon cambie el diseño
-que <a href="/proprietary/proprietary-surveillance.html#M201901100">le
-permite observar</a>.</p>
+ <p>Es de suponer que la vulnerabilidad a terceros no es intencionada, y
+probablemente Amazon lo solucionará. Sin embargo, no contamos con que Amazon
+cambie el diseño que <a
+href="/proprietary/proprietary-surveillance.html#M201901100">le permite
+observar</a>.</p>
</li>
<li id="M201901100">
@@ -324,7 +325,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2019/09/15 21:06:07 $
+$Date: 2019/09/19 09:29:37 $
<!-- timestamp end -->
</p>
Index: malware-google.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-google.es.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- malware-google.es.html 15 Sep 2019 21:06:07 -0000 1.16
+++ malware-google.es.html 19 Sep 2019 09:29:37 -0000 1.17
@@ -446,8 +446,8 @@
Wall Street Journal (en un artÃculo al que solo se puede acceder previo
pago) informa que <a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
-el FBI puede activar de forma remota el GPS y el micrófono en teléfonos con
-Android y portátiles</a> (sospecho que quiere decir portátiles equipados con
+el FBI puede activar de forma remota el GPS y el micrófono en teléfonos y
+con Android y portátiles</a> (es de suponer que portátiles con
Windows). Aquà hay <a href="http://cryptome.org/2013/08/fbi-hackers.htm">más
información</a>.</p>
</li>
@@ -587,7 +587,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2019/09/15 21:06:07 $
+$Date: 2019/09/19 09:29:37 $
<!-- timestamp end -->
</p>
Index: malware-microsoft.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.es.html,v
retrieving revision 1.72
retrieving revision 1.73
diff -u -b -r1.72 -r1.73
--- malware-microsoft.es.html 15 Sep 2019 21:06:07 -0000 1.72
+++ malware-microsoft.es.html 19 Sep 2019 09:29:37 -0000 1.73
@@ -424,7 +424,7 @@
href="https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">trabajadores
dedicados a escuchar las grabaciones</a>.</p>
- <p>Desde el punto de vista moral no veo ninguna diferencia entre tener
+ <p>Desde el punto de vista moral no vemos ninguna diferencia entre tener
trabajadores humanos a la escucha y tener sistemas de reconocimiento del
habla.</p>
</li>
@@ -712,7 +712,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2019/09/15 21:06:07 $
+$Date: 2019/09/19 09:29:37 $
<!-- timestamp end -->
</p>
Index: malware-mobiles.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.es.html,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- malware-mobiles.es.html 15 Sep 2019 21:06:07 -0000 1.64
+++ malware-mobiles.es.html 19 Sep 2019 09:29:37 -0000 1.65
@@ -425,6 +425,13 @@
<h3 id="surveillance">Vigilancia</h3>
<ul class="blurbs">
+ <li id="M201909090">
+ <p>Algunas aplicaciones privativas para controlar el ciclo menstrual,
incluidas
+MIA Fem y Maya <a
+href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem">envÃan
+a Facebook detalles Ãntimos de la vida de las usuarias</a>.</p>
+ </li>
+
<li id="M201909060">
<p>Mantener un registro de quienes se descargan un programa privativo es
una
forma de vigilancia. Existe un programa privativo para ajustar la mira de
@@ -598,9 +605,9 @@
está siendo objeto de una demanda en la que se le exige que notifique a los
usuarios qué va a hacer con los datos.</p>
- <p>Pienso que esta demanda aborda un asunto colateral. Lo que la
compañÃa haga
-con los datos es una cuestión secundaria. El principal daño aquà es que la
-compañÃa recoja esos datos.</p>
+ <p>Pensamos que esta demanda aborda un asunto colateral. Lo que la
compañÃa
+haga con los datos es una cuestión secundaria. El principal daño aquà es que
+la compañÃa recoja esos datos.</p>
<p><a
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps">
@@ -646,8 +653,9 @@
<p>Esto hace que los usuarios actúen como espÃas al servicio de la
aplicación
de las licencias.</p>
- <p>Supongo que también implementa el DRM, que no hay manera de guardar una
-grabación, aunque no puedo estar seguro a partir de lo que dice el
artÃculo.</p>
+ <p>Suponemos que también implementa el DRM, que no hay manera de guardar
una
+grabación, aunque no podemos estar seguros a partir de lo que dice el
+artÃculo.</p>
<p>Si aprende a dar menos importancia a los deportes, se beneficiará de
muchas
maneras. Esta es una más.</p>
@@ -1188,7 +1196,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2019/09/15 21:06:07 $
+$Date: 2019/09/19 09:29:37 $
<!-- timestamp end -->
</p>
Index: proprietary-insecurity.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.es.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary-insecurity.es.html 15 Sep 2019 21:06:07 -0000 1.6
+++ proprietary-insecurity.es.html 19 Sep 2019 09:29:37 -0000 1.7
@@ -129,10 +129,11 @@
href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">cualquier
otra persona también puede observar e incluso falsear vÃdeos</a>.</p>
- <p>Es de suponer que la vulnerabilidad a terceros no es intencionada, e
imagino
-que Amazon lo solucionará. Pero no cuento con que Amazon cambie el diseño
-que <a href="/proprietary/proprietary-surveillance.html#M201901100">le
-permite observar</a>.</p>
+ <p>Es de suponer que la vulnerabilidad a terceros no es intencionada, y
+probablemente Amazon lo solucionará. Sin embargo, no contamos con que Amazon
+cambie el diseño que <a
+href="/proprietary/proprietary-surveillance.html#M201901100">le permite
+observar</a>.</p>
</li>
<li id="M201809240">
@@ -524,8 +525,8 @@
<p>Es de suponer que Chrysler y la NSA también pueden hacerlo.</p>
- <p>Si se posee un automóvil que contiene un teléfono móvil, hay que
-desactivarlo.</p>
+ <p>Si posee un automóvil que contiene un teléfono móvil, desactivarlo
serÃa una
+buena idea.</p>
</li>
<li id="M201506080">
@@ -758,7 +759,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2019/09/15 21:06:07 $
+$Date: 2019/09/19 09:29:37 $
<!-- timestamp end -->
</p>
Index: proprietary-sabotage.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-sabotage.es.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary-sabotage.es.html 16 Sep 2019 09:59:36 -0000 1.7
+++ proprietary-sabotage.es.html 19 Sep 2019 09:29:37 -0000 1.8
@@ -170,8 +170,8 @@
las pulseras dejaron de funcionar para siempre</a>.</p>
<p>El artÃculo hace hincapié en la perversa decisión de continuar
vendiendo los
-dispositivos ya inutilizables. Pero creo que esto es algo secundario: hizo
-que las consecuencias nocivas alcanzaran a algunas personas más. Lo
+dispositivos ya inutilizables. Pero creemos que esto es algo secundario:
+hizo que las consecuencias nocivas alcanzaran a algunas personas más. Lo
realmente grave fue diseñar los dispositivos de manera que tuvieran que
depender de algún otro que no respeta la libertad de los usuarios.</p>
</li>
@@ -659,7 +659,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2019/09/16 09:59:36 $
+$Date: 2019/09/19 09:29:37 $
<!-- timestamp end -->
</p>
Index: proprietary.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.es.html,v
retrieving revision 1.74
retrieving revision 1.75
diff -u -b -r1.74 -r1.75
--- proprietary.es.html 16 Sep 2019 09:59:36 -0000 1.74
+++ proprietary.es.html 19 Sep 2019 09:29:37 -0000 1.75
@@ -159,6 +159,13 @@
<h3 id="latest">Añadidos recientes</h3>
<ul class="blurbs">
+ <li id="M201909090">
+ <p>Algunas aplicaciones privativas para controlar el ciclo menstrual,
incluidas
+MIA Fem y Maya <a
+href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem">envÃan
+a Facebook detalles Ãntimos de la vida de las usuarias</a>.</p>
+ </li>
+
<li id="M201909160">
<p>Los usuarios de Tesla denuncian que Tesla <a
href="https://www.reuters.com/article/us-tesla-battery/tesla-owner-lawsuit-claims-software-update-fraudulently-cut-battery-capacity-idUSKCN1UY2TW">ha
@@ -186,7 +193,7 @@
href="https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">trabajadores
dedicados a escuchar las grabaciones</a>.</p>
- <p>Desde el punto de vista moral no veo ninguna diferencia entre tener
+ <p>Desde el punto de vista moral no vemos ninguna diferencia entre tener
trabajadores humanos a la escucha y tener sistemas de reconocimiento del
habla.</p>
</li>
@@ -202,19 +209,6 @@
<p>Con un programa libre no existirÃa ninguna lista de los que se lo han
descargado.</p>
</li>
-
- <li id="M201908310">
- <p>Una serie de vulnerabilidades <a
-href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/">halladas
-en iOS permitÃa a los atacantes acceder a información sensible, incluidos
-mensajes privados, contraseñas, fotos y contactos registrados en el
-iMonstruo del usuario</a>.</p>
-
- <p>La profunda inseguridad de los iMonstruos es aún más relevante dado
que el
-software privativo de Apple hace a los usuarios totalmente dependientes de
-esa compañÃa a cambio de una endeble seguridad. Esto significa también que
-los dispositivos no ofrecen ninguna seguridad frente a la propia Apple.</p>
- </li>
</ul>
@@ -293,7 +287,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2019/09/16 09:59:36 $
+$Date: 2019/09/19 09:29:37 $
<!-- timestamp end -->
</p>
Index: po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.196
retrieving revision 1.197
diff -u -b -r1.196 -r1.197
--- po/es.po 18 Sep 2019 16:01:41 -0000 1.196
+++ po/es.po 19 Sep 2019 09:29:37 -0000 1.197
@@ -7231,6 +7231,10 @@
"\"https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-"
"maya-mia-fem\"> send intimate details of users' lives to Facebook</a>."
msgstr ""
+"Algunas aplicaciones privativas para controlar el ciclo menstrual, incluidas "
+"MIA Fem y Maya <a href=\"https://www.buzzfeednews.com/article/meghara/period-"
+"tracker-apps-facebook-maya-mia-fem\">envÃan a Facebook detalles Ãntimos de "
+"la vida de las usuarias</a>."
#. type: Content of: <ul><li><p>
msgid ""
Index: po/malware-amazon.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.es-en.html,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- po/malware-amazon.es-en.html 29 May 2019 09:29:32 -0000 1.20
+++ po/malware-amazon.es-en.html 19 Sep 2019 09:29:37 -0000 1.21
@@ -200,7 +200,7 @@
anyone else can also watch, and fake videos too</a>.</p>
<p>The third party vulnerability is presumably
- unintentional and I suppose Amazon will fix it. I
+ unintentional and Amazon will probably fix it. However, we
do not expect Amazon to change the design that <a
href="/proprietary/proprietary-surveillance.html#M201901100">allows
Amazon to watch</a>.</p>
@@ -293,7 +293,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/05/29 09:29:32 $
+$Date: 2019/09/19 09:29:37 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-google.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.es-en.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- po/malware-google.es-en.html 13 Sep 2019 15:29:50 -0000 1.13
+++ po/malware-google.es-en.html 19 Sep 2019 09:29:37 -0000 1.14
@@ -429,7 +429,7 @@
Journal (in an article blocked from us by a paywall) reports that <a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
the FBI can remotely activate the GPS and microphone in Android phones
- and laptops</a>. (I suspect this means Windows laptops.) Here is <a
+ and laptops</a> (presumably Windows laptops). Here is <a
href="http://cryptome.org/2013/08/fbi-hackers.htm">more info</a>.</p>
</li>
@@ -549,7 +549,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/13 15:29:50 $
+$Date: 2019/09/19 09:29:37 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-microsoft.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.es-en.html,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- po/malware-microsoft.es-en.html 12 Sep 2019 11:03:21 -0000 1.67
+++ po/malware-microsoft.es-en.html 19 Sep 2019 09:29:37 -0000 1.68
@@ -413,7 +413,7 @@
href="https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
human workers listen to the recordings</a>.</p>
- <p>Morally I see no difference between having human workers listen and
+ <p>Morally, we see no difference between having human workers listen and
having speech-recognition systems listen. Both intrude on privacy.</p>
</li>
@@ -674,7 +674,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/12 11:03:21 $
+$Date: 2019/09/19 09:29:37 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-mobiles.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es-en.html,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- po/malware-mobiles.es-en.html 15 Sep 2019 17:58:30 -0000 1.60
+++ po/malware-mobiles.es-en.html 19 Sep 2019 09:29:37 -0000 1.61
@@ -405,6 +405,12 @@
<h3 id="surveillance">Mobile Surveillance</h3>
<ul class="blurbs">
+ <li id="M201909090">
+ <p>Some nonfree period-tracking apps including MIA Fem and Maya <a
+
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem">
+ send intimate details of users' lives to Facebook</a>.</p>
+ </li>
+
<li id="M201909060">
<p>Keeping track of who downloads a proprietary
program is a form of surveillance. There is a
@@ -569,7 +575,7 @@
being sued, demanding that it notify the users of what it will do
with the data.</p>
- <p>I think that lawsuit is about a side issue. What the company does
+ <p>We think that lawsuit is about a side issue. What the company does
with the data is a secondary issue. The principal wrong here is that
the company gets that data at all.</p>
@@ -614,8 +620,8 @@
<p>This makes them act as spies for licensing enforcement.</p>
- <p>I expect it implements DRM, too—that there is no way to save
- a recording. But I can't be sure from the article.</p>
+ <p>We expect it implements DRM, too—that there is no way to save
+ a recording. But we can't be sure from the article.</p>
<p>If you learn to care much less about sports, you will benefit in
many ways. This is one more.</p>
@@ -1125,7 +1131,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/15 17:58:30 $
+$Date: 2019/09/19 09:29:37 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-insecurity.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.es-en.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- po/proprietary-insecurity.es-en.html 13 Sep 2019 15:29:50 -0000
1.5
+++ po/proprietary-insecurity.es-en.html 19 Sep 2019 09:29:37 -0000
1.6
@@ -119,7 +119,7 @@
anyone else can also watch, and fake videos too</a>.</p>
<p>The third party vulnerability is presumably
- unintentional and I suppose Amazon will fix it. I
+ unintentional and Amazon will probably fix it. However, we
do not expect Amazon to change the design that <a
href="/proprietary/proprietary-surveillance.html#M201901100">allows
Amazon to watch</a>.</p>
@@ -499,10 +499,10 @@
could track the car, start or stop the engine, and activate or
deactivate the brakes, and more.</p>
- <p>I expect that Chrysler and the NSA can do this too.</p>
+ <p>We expect that Chrysler and the NSA can do this too.</p>
- <p>If I ever own a car, and it contains a portable phone, I will
- deactivate that.</p>
+ <p>If you own a car that contains a phone modem, it would be a good
+ idea to deactivate this.</p>
</li>
<li id="M201506080">
@@ -714,7 +714,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/13 15:29:50 $
+$Date: 2019/09/19 09:29:37 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-sabotage.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.es-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- po/proprietary-sabotage.es-en.html 16 Sep 2019 09:59:37 -0000 1.6
+++ po/proprietary-sabotage.es-en.html 19 Sep 2019 09:29:37 -0000 1.7
@@ -155,7 +155,7 @@
the existing trackers stopped working forever</a>.</p>
<p>The article focuses on a further nasty fillip, that sales of the
- broken devices continued. But I think that is a secondary issue;
+ broken devices continued. But we think that is a secondary issue;
it made the nasty consequences extend to some additional people.
The fundamental wrong was to design the devices to depend on something
else that didn't respect users' freedom.</p>
@@ -624,7 +624,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/16 09:59:37 $
+$Date: 2019/09/19 09:29:37 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es-en.html,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- po/proprietary.es-en.html 16 Sep 2019 09:59:37 -0000 1.67
+++ po/proprietary.es-en.html 19 Sep 2019 09:29:37 -0000 1.68
@@ -149,6 +149,12 @@
<h3 id="latest">Latest additions</h3>
<ul class="blurbs">
+ <li id="M201909090">
+ <p>Some nonfree period-tracking apps including MIA Fem and Maya <a
+
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem">
+ send intimate details of users' lives to Facebook</a>.</p>
+ </li>
+
<li id="M201909160">
<p>Tesla users claim Tesla <a
href="https://www.reuters.com/article/us-tesla-battery/tesla-owner-lawsuit-claims-software-update-fraudulently-cut-battery-capacity-idUSKCN1UY2TW">force-installed
@@ -176,7 +182,7 @@
href="https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
human workers listen to the recordings</a>.</p>
- <p>Morally I see no difference between having human workers listen and
+ <p>Morally, we see no difference between having human workers listen and
having speech-recognition systems listen. Both intrude on privacy.</p>
</li>
@@ -191,19 +197,6 @@
<p>With a free program there would not be a list of who has installed
it.</p>
</li>
-
- <li id="M201908310">
- <p>A series of vulnerabilities <a
-
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/">found
- in iOS allowed attackers to gain access to sensitive information
- including private messages, passwords, photos and contacts stored on
- the user's iMonster</a>.</p>
-
- <p>The deep insecurity of iMonsters is even more pertinent given that
- Apple's proprietary software makes users totally dependent on Apple
- for even a modicum of security. It also means that the devices do
- not even try to offer security against Apple itself.</p>
- </li>
</ul>
@@ -264,7 +257,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/16 09:59:37 $
+$Date: 2019/09/19 09:29:37 $
<!-- timestamp end -->
</p>
</div>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary malware-amazon.es.html malware-...,
GNUN <=