www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-amazon.es.html malware-...


From: GNUN
Subject: www/proprietary malware-amazon.es.html malware-...
Date: Thu, 19 Sep 2019 05:29:38 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     19/09/19 05:29:38

Modified files:
        proprietary    : malware-amazon.es.html malware-google.es.html 
                         malware-microsoft.es.html 
                         malware-mobiles.es.html 
                         proprietary-insecurity.es.html 
                         proprietary-sabotage.es.html 
                         proprietary.es.html 
        proprietary/po : es.po malware-amazon.es-en.html 
                         malware-google.es-en.html 
                         malware-microsoft.es-en.html 
                         malware-mobiles.es-en.html 
                         proprietary-insecurity.es-en.html 
                         proprietary-sabotage.es-en.html 
                         proprietary.es-en.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-amazon.es.html?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-google.es.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.es.html?cvsroot=www&r1=1.72&r2=1.73
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.es.html?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.es.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.es.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.es.html?cvsroot=www&r1=1.74&r2=1.75
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.196&r2=1.197
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.es-en.html?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.es-en.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.es-en.html?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es-en.html?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.es-en.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.es-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es-en.html?cvsroot=www&r1=1.67&r2=1.68

Patches:
Index: malware-amazon.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-amazon.es.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- malware-amazon.es.html      15 Sep 2019 21:06:07 -0000      1.22
+++ malware-amazon.es.html      19 Sep 2019 09:29:37 -0000      1.23
@@ -212,10 +212,11 @@
 href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/";>también
 cualquier otro puede observar e incluso falsear vídeos</a>.</p>
 
-    <p>Es de suponer que la vulnerabilidad a terceros no es intencionada, e 
imagino
-que la Amazon lo solucionará. Pero no cuento con que Amazon cambie el diseño
-que <a href="/proprietary/proprietary-surveillance.html#M201901100">le
-permite observar</a>.</p>
+    <p>Es de suponer que la vulnerabilidad a terceros no es intencionada, y
+probablemente Amazon lo solucionará. Sin embargo, no contamos con que Amazon
+cambie el diseño que <a
+href="/proprietary/proprietary-surveillance.html#M201901100">le permite
+observar</a>.</p>
   </li>
 
   <li id="M201901100">
@@ -324,7 +325,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2019/09/15 21:06:07 $
+$Date: 2019/09/19 09:29:37 $
 
 <!-- timestamp end -->
 </p>

Index: malware-google.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-google.es.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- malware-google.es.html      15 Sep 2019 21:06:07 -0000      1.16
+++ malware-google.es.html      19 Sep 2019 09:29:37 -0000      1.17
@@ -446,8 +446,8 @@
 Wall Street Journal (en un artículo al que solo se puede acceder previo
 pago) informa que <a
 
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj";>
-el FBI puede activar de forma remota el GPS y el micrófono en teléfonos con
-Android y portátiles</a> (sospecho que quiere decir portátiles equipados con
+el FBI puede activar de forma remota el GPS y el micrófono en teléfonos y
+con Android y portátiles</a> (es de suponer que portátiles con
 Windows). Aquí hay <a href="http://cryptome.org/2013/08/fbi-hackers.htm";>más
 información</a>.</p>
   </li>
@@ -587,7 +587,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2019/09/15 21:06:07 $
+$Date: 2019/09/19 09:29:37 $
 
 <!-- timestamp end -->
 </p>

Index: malware-microsoft.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.es.html,v
retrieving revision 1.72
retrieving revision 1.73
diff -u -b -r1.72 -r1.73
--- malware-microsoft.es.html   15 Sep 2019 21:06:07 -0000      1.72
+++ malware-microsoft.es.html   19 Sep 2019 09:29:37 -0000      1.73
@@ -424,7 +424,7 @@
 
href="https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana";>trabajadores
 dedicados a escuchar las grabaciones</a>.</p>
 
-    <p>Desde el punto de vista moral no veo ninguna diferencia entre tener
+    <p>Desde el punto de vista moral no vemos ninguna diferencia entre tener
 trabajadores humanos a la escucha y tener sistemas de reconocimiento del
 habla.</p>
   </li>
@@ -712,7 +712,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2019/09/15 21:06:07 $
+$Date: 2019/09/19 09:29:37 $
 
 <!-- timestamp end -->
 </p>

Index: malware-mobiles.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.es.html,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- malware-mobiles.es.html     15 Sep 2019 21:06:07 -0000      1.64
+++ malware-mobiles.es.html     19 Sep 2019 09:29:37 -0000      1.65
@@ -425,6 +425,13 @@
 <h3 id="surveillance">Vigilancia</h3>
 
 <ul class="blurbs">
+  <li id="M201909090">
+    <p>Algunas aplicaciones privativas para controlar el ciclo menstrual, 
incluidas
+MIA Fem y Maya <a
+href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem";>envían
+a Facebook detalles íntimos de la vida de las usuarias</a>.</p>
+  </li>
+
   <li id="M201909060">
     <p>Mantener un registro de quienes se descargan un programa privativo es 
una
 forma de vigilancia. Existe un programa privativo para ajustar la mira de
@@ -598,9 +605,9 @@
 está siendo objeto de una demanda en la que se le exige que notifique a los
 usuarios qué va a hacer con los datos.</p>
 
-    <p>Pienso que esta demanda aborda un asunto colateral. Lo que la 
compañía haga
-con los datos es una cuestión secundaria. El principal daño aquí es que la
-compañía recoja esos datos.</p>
+    <p>Pensamos que esta demanda aborda un asunto colateral. Lo que la 
compañía
+haga con los datos es una cuestión secundaria. El principal daño aquí es que
+la compañía recoja esos datos.</p>
 
     <p><a
 
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps";>
@@ -646,8 +653,9 @@
     <p>Esto hace que los usuarios actúen como espías al servicio de la 
aplicación
 de las licencias.</p>
 
-    <p>Supongo que también implementa el DRM, que no hay manera de guardar una
-grabación, aunque no puedo estar seguro a partir de lo que dice el 
artículo.</p>
+    <p>Suponemos que también implementa el DRM, que no hay manera de guardar 
una
+grabación, aunque no podemos estar seguros a partir de lo que dice el
+artículo.</p>
 
     <p>Si aprende a dar menos importancia a los deportes, se beneficiará de 
muchas
 maneras. Esta es una más.</p>
@@ -1188,7 +1196,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2019/09/15 21:06:07 $
+$Date: 2019/09/19 09:29:37 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-insecurity.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.es.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary-insecurity.es.html      15 Sep 2019 21:06:07 -0000      1.6
+++ proprietary-insecurity.es.html      19 Sep 2019 09:29:37 -0000      1.7
@@ -129,10 +129,11 @@
 href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/";>cualquier
 otra persona también puede observar e incluso falsear vídeos</a>.</p>
 
-    <p>Es de suponer que la vulnerabilidad a terceros no es intencionada, e 
imagino
-que Amazon lo solucionará. Pero no cuento con que Amazon cambie el diseño
-que <a href="/proprietary/proprietary-surveillance.html#M201901100">le
-permite observar</a>.</p>
+    <p>Es de suponer que la vulnerabilidad a terceros no es intencionada, y
+probablemente Amazon lo solucionará. Sin embargo, no contamos con que Amazon
+cambie el diseño que <a
+href="/proprietary/proprietary-surveillance.html#M201901100">le permite
+observar</a>.</p>
   </li>
 
   <li id="M201809240">
@@ -524,8 +525,8 @@
 
     <p>Es de suponer que Chrysler y la NSA también pueden hacerlo.</p>
 
-    <p>Si se posee un automóvil que contiene un teléfono móvil, hay que
-desactivarlo.</p>
+    <p>Si posee un automóvil que contiene un teléfono móvil, desactivarlo 
sería una
+buena idea.</p>
   </li>
 
   <li id="M201506080">
@@ -758,7 +759,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2019/09/15 21:06:07 $
+$Date: 2019/09/19 09:29:37 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-sabotage.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-sabotage.es.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary-sabotage.es.html        16 Sep 2019 09:59:36 -0000      1.7
+++ proprietary-sabotage.es.html        19 Sep 2019 09:29:37 -0000      1.8
@@ -170,8 +170,8 @@
 las pulseras dejaron de funcionar para siempre</a>.</p>
 
     <p>El artículo hace hincapié en la perversa decisión de continuar 
vendiendo los
-dispositivos ya inutilizables. Pero creo que esto es algo secundario: hizo
-que las consecuencias nocivas alcanzaran a algunas personas más. Lo
+dispositivos ya inutilizables. Pero creemos que esto es algo secundario:
+hizo que las consecuencias nocivas alcanzaran a algunas personas más. Lo
 realmente grave fue diseñar los dispositivos de manera que tuvieran que
 depender de algún otro que no respeta la libertad de los usuarios.</p>
   </li>
@@ -659,7 +659,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2019/09/16 09:59:36 $
+$Date: 2019/09/19 09:29:37 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.es.html,v
retrieving revision 1.74
retrieving revision 1.75
diff -u -b -r1.74 -r1.75
--- proprietary.es.html 16 Sep 2019 09:59:36 -0000      1.74
+++ proprietary.es.html 19 Sep 2019 09:29:37 -0000      1.75
@@ -159,6 +159,13 @@
 <h3 id="latest">Añadidos recientes</h3>
 
 <ul class="blurbs">
+  <li id="M201909090">
+    <p>Algunas aplicaciones privativas para controlar el ciclo menstrual, 
incluidas
+MIA Fem y Maya <a
+href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem";>envían
+a Facebook detalles íntimos de la vida de las usuarias</a>.</p>
+  </li>
+
   <li id="M201909160">
     <p>Los usuarios de Tesla denuncian que Tesla <a
 
href="https://www.reuters.com/article/us-tesla-battery/tesla-owner-lawsuit-claims-software-update-fraudulently-cut-battery-capacity-idUSKCN1UY2TW";>ha
@@ -186,7 +193,7 @@
 
href="https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana";>trabajadores
 dedicados a escuchar las grabaciones</a>.</p>
 
-    <p>Desde el punto de vista moral no veo ninguna diferencia entre tener
+    <p>Desde el punto de vista moral no vemos ninguna diferencia entre tener
 trabajadores humanos a la escucha y tener sistemas de reconocimiento del
 habla.</p>
   </li>
@@ -202,19 +209,6 @@
     <p>Con un programa libre no existiría ninguna lista de los que se lo han
 descargado.</p>
   </li>
-
-  <li id="M201908310">
-    <p>Una serie de vulnerabilidades <a
-href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/";>halladas
-en iOS permitía a los atacantes acceder a información sensible, incluidos
-mensajes privados, contraseñas, fotos y contactos registrados en el
-iMonstruo del usuario</a>.</p>
-
-    <p>La profunda inseguridad de los iMonstruos es aún más relevante dado 
que el
-software privativo de Apple hace a los usuarios totalmente dependientes de
-esa compañía a cambio de una endeble seguridad. Esto significa también que
-los dispositivos no ofrecen ninguna seguridad frente a la propia Apple.</p>
-  </li>
 </ul>
 
 
@@ -293,7 +287,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2019/09/16 09:59:36 $
+$Date: 2019/09/19 09:29:37 $
 
 <!-- timestamp end -->
 </p>

Index: po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.196
retrieving revision 1.197
diff -u -b -r1.196 -r1.197
--- po/es.po    18 Sep 2019 16:01:41 -0000      1.196
+++ po/es.po    19 Sep 2019 09:29:37 -0000      1.197
@@ -7231,6 +7231,10 @@
 "\"https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-";
 "maya-mia-fem\"> send intimate details of users' lives to Facebook</a>."
 msgstr ""
+"Algunas aplicaciones privativas para controlar el ciclo menstrual, incluidas "
+"MIA Fem y Maya <a href=\"https://www.buzzfeednews.com/article/meghara/period-";
+"tracker-apps-facebook-maya-mia-fem\">envían a Facebook detalles íntimos de "
+"la vida de las usuarias</a>."
 
 #. type: Content of: <ul><li><p>
 msgid ""

Index: po/malware-amazon.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.es-en.html,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- po/malware-amazon.es-en.html        29 May 2019 09:29:32 -0000      1.20
+++ po/malware-amazon.es-en.html        19 Sep 2019 09:29:37 -0000      1.21
@@ -200,7 +200,7 @@
     anyone else can also watch, and fake videos too</a>.</p>
 
     <p>The third party vulnerability is presumably
-    unintentional and I suppose Amazon will fix it. I
+    unintentional and Amazon will probably fix it. However, we
     do not expect Amazon to change the design that <a
     href="/proprietary/proprietary-surveillance.html#M201901100">allows
     Amazon to watch</a>.</p>
@@ -293,7 +293,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/05/29 09:29:32 $
+$Date: 2019/09/19 09:29:37 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-google.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.es-en.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- po/malware-google.es-en.html        13 Sep 2019 15:29:50 -0000      1.13
+++ po/malware-google.es-en.html        19 Sep 2019 09:29:37 -0000      1.14
@@ -429,7 +429,7 @@
     Journal (in an article blocked from us by a paywall) reports that <a
     
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj";>
     the FBI can remotely activate the GPS and microphone in Android phones
-    and laptops</a>.  (I suspect this means Windows laptops.)  Here is <a
+    and laptops</a> (presumably Windows laptops).  Here is <a
     href="http://cryptome.org/2013/08/fbi-hackers.htm";>more info</a>.</p>
   </li>
 
@@ -549,7 +549,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/09/13 15:29:50 $
+$Date: 2019/09/19 09:29:37 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-microsoft.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.es-en.html,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- po/malware-microsoft.es-en.html     12 Sep 2019 11:03:21 -0000      1.67
+++ po/malware-microsoft.es-en.html     19 Sep 2019 09:29:37 -0000      1.68
@@ -413,7 +413,7 @@
     
href="https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana";>
     human workers listen to the recordings</a>.</p>
 
-    <p>Morally I see no difference between having human workers listen and
+    <p>Morally, we see no difference between having human workers listen and
     having speech-recognition systems listen.  Both intrude on privacy.</p>
   </li>
 
@@ -674,7 +674,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/09/12 11:03:21 $
+$Date: 2019/09/19 09:29:37 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-mobiles.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es-en.html,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- po/malware-mobiles.es-en.html       15 Sep 2019 17:58:30 -0000      1.60
+++ po/malware-mobiles.es-en.html       19 Sep 2019 09:29:37 -0000      1.61
@@ -405,6 +405,12 @@
 <h3 id="surveillance">Mobile Surveillance</h3>
 
 <ul class="blurbs">
+  <li id="M201909090">
+    <p>Some nonfree period-tracking apps including MIA Fem and Maya <a
+    
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem";>
+    send intimate details of users' lives to Facebook</a>.</p>
+  </li>
+
   <li id="M201909060">
     <p>Keeping track of who downloads a proprietary
     program is a form of surveillance.  There is a
@@ -569,7 +575,7 @@
     being sued, demanding that it notify the users of what it will do
     with the data.</p>
 
-    <p>I think that lawsuit is about a side issue. What the company does
+    <p>We think that lawsuit is about a side issue. What the company does
     with the data is a secondary issue. The principal wrong here is that
     the company gets that data at all.</p>
 
@@ -614,8 +620,8 @@
 
     <p>This makes them act as spies for licensing enforcement.</p>
 
-    <p>I expect it implements DRM, too&mdash;that there is no way to save
-    a recording. But I can't be sure from the article.</p>
+    <p>We expect it implements DRM, too&mdash;that there is no way to save
+    a recording. But we can't be sure from the article.</p>
 
     <p>If you learn to care much less about sports, you will benefit in
     many ways. This is one more.</p>
@@ -1125,7 +1131,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/09/15 17:58:30 $
+$Date: 2019/09/19 09:29:37 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-insecurity.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.es-en.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- po/proprietary-insecurity.es-en.html        13 Sep 2019 15:29:50 -0000      
1.5
+++ po/proprietary-insecurity.es-en.html        19 Sep 2019 09:29:37 -0000      
1.6
@@ -119,7 +119,7 @@
     anyone else can also watch, and fake videos too</a>.</p>
 
     <p>The third party vulnerability is presumably
-    unintentional and I suppose Amazon will fix it. I
+    unintentional and Amazon will probably fix it. However, we
     do not expect Amazon to change the design that <a
     href="/proprietary/proprietary-surveillance.html#M201901100">allows
     Amazon to watch</a>.</p>
@@ -499,10 +499,10 @@
     could track the car, start or stop the engine, and activate or
     deactivate the brakes, and more.</p>
 
-    <p>I expect that Chrysler and the NSA can do this too.</p>
+    <p>We expect that Chrysler and the NSA can do this too.</p>
 
-    <p>If I ever own a car, and it contains a portable phone, I will
-    deactivate that.</p>
+    <p>If you own a car that contains a phone modem, it would be a good
+    idea to deactivate this.</p>
   </li>
 
   <li id="M201506080">
@@ -714,7 +714,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/09/13 15:29:50 $
+$Date: 2019/09/19 09:29:37 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-sabotage.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.es-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- po/proprietary-sabotage.es-en.html  16 Sep 2019 09:59:37 -0000      1.6
+++ po/proprietary-sabotage.es-en.html  19 Sep 2019 09:29:37 -0000      1.7
@@ -155,7 +155,7 @@
     the existing trackers stopped working forever</a>.</p>
 
     <p>The article focuses on a further nasty fillip, that sales of the
-    broken devices continued. But I think that is a secondary issue;
+    broken devices continued. But we think that is a secondary issue;
     it made the nasty consequences extend to some additional people.
     The fundamental wrong was to design the devices to depend on something
     else that didn't respect users' freedom.</p>
@@ -624,7 +624,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/09/16 09:59:37 $
+$Date: 2019/09/19 09:29:37 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es-en.html,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- po/proprietary.es-en.html   16 Sep 2019 09:59:37 -0000      1.67
+++ po/proprietary.es-en.html   19 Sep 2019 09:29:37 -0000      1.68
@@ -149,6 +149,12 @@
 <h3 id="latest">Latest additions</h3>
 
 <ul class="blurbs">
+  <li id="M201909090">
+    <p>Some nonfree period-tracking apps including MIA Fem and Maya <a
+    
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem";>
+    send intimate details of users' lives to Facebook</a>.</p>
+  </li>
+
   <li id="M201909160">
     <p>Tesla users claim Tesla <a
     
href="https://www.reuters.com/article/us-tesla-battery/tesla-owner-lawsuit-claims-software-update-fraudulently-cut-battery-capacity-idUSKCN1UY2TW";>force-installed
@@ -176,7 +182,7 @@
     
href="https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana";>
     human workers listen to the recordings</a>.</p>
 
-    <p>Morally I see no difference between having human workers listen and
+    <p>Morally, we see no difference between having human workers listen and
     having speech-recognition systems listen.  Both intrude on privacy.</p>
   </li>
 
@@ -191,19 +197,6 @@
     <p>With a free program there would not be a list of who has installed
     it.</p>
   </li>
-
-  <li id="M201908310">
-    <p>A series of vulnerabilities <a
-    
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/";>found
-    in iOS allowed attackers to gain access to sensitive information
-    including private messages, passwords, photos and contacts stored on
-    the user's iMonster</a>.</p>
-
-    <p>The deep insecurity of iMonsters is even more pertinent given that
-    Apple's proprietary software makes users totally dependent on Apple
-    for even a modicum of security.  It also means that the devices do
-    not even try to offer security against Apple itself.</p>
-  </li>
 </ul>
 
 
@@ -264,7 +257,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/09/16 09:59:37 $
+$Date: 2019/09/19 09:29:37 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]