[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www proprietary/po/es.po proprietary/po/malware...
From: |
GNUN |
Subject: |
www proprietary/po/es.po proprietary/po/malware... |
Date: |
Tue, 24 Sep 2019 06:00:06 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/09/24 06:00:06
Modified files:
proprietary/po : es.po malware-adobe.translist
malware-appliances.translist
malware-cars.translist malware-games.translist
malware-webpages.translist
software : recent-releases-include.ru.html
software/po : recent-releases-include.ru.po
Added files:
proprietary : malware-adobe.es.html
malware-appliances.es.html malware-cars.es.html
malware-games.es.html malware-webpages.es.html
proprietary/po : malware-adobe.es-en.html
malware-appliances.es-en.html
malware-cars.es-en.html
malware-games.es-en.html
malware-webpages.es-en.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-adobe.es.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.es.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-cars.es.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-games.es.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-webpages.es.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.199&r2=1.200
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-adobe.translist?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.translist?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.translist?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.translist?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.translist?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-adobe.es-en.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.es-en.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.es-en.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.es-en.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.es-en.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/software/recent-releases-include.ru.html?cvsroot=www&r1=1.1806&r2=1.1807
http://web.cvs.savannah.gnu.org/viewcvs/www/software/po/recent-releases-include.ru.po?cvsroot=www&r1=1.2562&r2=1.2563
Patches:
Index: proprietary/po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.199
retrieving revision 1.200
diff -u -b -r1.199 -r1.200
--- proprietary/po/es.po 22 Sep 2019 19:28:12 -0000 1.199
+++ proprietary/po/es.po 24 Sep 2019 10:00:05 -0000 1.200
@@ -2106,6 +2106,8 @@
#. type: Content of: <div><p>
msgid "Some examples of malware in appliances are listed below."
msgstr ""
+"A continuación se presentan algunos ejemplos de <cite>malware</cite> en los "
+"aparatos."
#. type: Content of: <ul><li><p>
msgid ""
@@ -2438,12 +2440,18 @@
"theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-"
"service-update-change\"> Canary camera is an example</a>."
msgstr ""
+"Toda cámara de «seguridad doméstica» es un dispositivo de vigilancia si
su "
+"fabricante puede comunicarse con ella. <a href=\"https://www.theverge.com/"
+"circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-"
+"update-change\">La cámara Canary es un ejemplo</a>."
#. type: Content of: <ul><li><p>
msgid ""
"The article describes wrongdoing by the manufacturer, based on the fact that "
"the device is tethered to a server."
msgstr ""
+"Ese artÃculo describe iniquidades cometidas por el fabricante, basadas en el
"
+"hecho de que el dispositivo está subordinado al servidor."
#. type: Content of: <ul><li><p>
# | <a [-href=\"/proprietary/proprietary.html\">Other examples of-]
@@ -2465,6 +2473,8 @@
"But it also demonstrates that the device gives the company surveillance "
"capability."
msgstr ""
+"Pero también demuestra que el dispositivo otorga a la compañÃa la
capacidad "
+"de vigilar."
#. type: Content of: <ul><li><p>
msgid ""
@@ -2549,6 +2559,11 @@
"private-video-feeds-and-remote-controls/\">there is no way to delete these "
"accounts either</a>."
msgstr ""
+"Muchos modelos de cámaras conectadas a Internet son sumamente inseguras. "
+"Tienen cuentas de acceso con contraseñas codificadas de forma fija que no "
+"pueden cambiarse, y <a href=\"https://arstechnica.com/security/2017/06/"
+"internet-cameras-expose-private-video-feeds-and-remote-controls/\">tampoco "
+"hay forma de borrar esas cuentas</a>."
#. type: Content of: <ul><li><p>
msgid ""
@@ -3636,6 +3651,8 @@
#. type: Content of: <div><p>
msgid "Some examples of malware in cars are listed below."
msgstr ""
+"A continuación se presentan algunos ejemplos de <cite>malware</cite> en los "
+"automóviles."
#. type: Content of: <ul><li><p>
msgid ""
@@ -4111,6 +4128,8 @@
#. type: Content of: <div><p>
msgid "Some examples of malware in games are listed below."
msgstr ""
+"A continuación se presentan algunos ejemplos de <cite>malware</cite> en los "
+"juegos."
#. type: Content of: <ul><li><p>
msgid ""
@@ -8683,6 +8702,12 @@
"collect information that the user sends, via forms or otherwise, but here "
"we're not talking about that."
msgstr ""
+"En esta página se muestran ejemplos de sitios web que contienen programas "
+"JavaScript que espÃan a los usuarios o los engañan. Utilizan lo que
nosotros "
+"llamamos <a href=\"/philosophy/javascript-trap.html\">la trampa de "
+"JavaScript</a>. Por supuesto que muchos sitios recogen la información que "
+"los usuarios envÃan, por ejemplo, mediante formularios, pero aquà no "
+"hablamos de eso."
#. type: Content of: <ul><li><p>
msgid ""
Index: proprietary/po/malware-adobe.translist
===================================================================
RCS file: /web/www/www/proprietary/po/malware-adobe.translist,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary/po/malware-adobe.translist 11 Nov 2017 06:31:40 -0000
1.5
+++ proprietary/po/malware-adobe.translist 24 Sep 2019 10:00:05 -0000
1.6
@@ -4,6 +4,7 @@
<p>
<span dir="ltr" class="original"><a lang="en" hreflang="en"
href="/proprietary/malware-adobe.en.html">English</a> [en]</span>
<span dir="ltr"><a lang="de" hreflang="de"
href="/proprietary/malware-adobe.de.html">Deutsch</a> [de]</span>
+<span dir="ltr"><a lang="es" hreflang="es"
href="/proprietary/malware-adobe.es.html">español</a> [es]</span>
<span dir="ltr"><a lang="fr" hreflang="fr"
href="/proprietary/malware-adobe.fr.html">français</a> [fr]</span>
<span dir="ltr"><a lang="ja" hreflang="ja"
href="/proprietary/malware-adobe.ja.html">æ¥æ¬èª</a> [ja]</span>
<span dir="ltr"><a lang="ru" hreflang="ru"
href="/proprietary/malware-adobe.ru.html">ÑÑÑÑкий</a> [ru]</span>
@@ -12,6 +13,7 @@
<link rel="alternate" type="text/html" href="/proprietary/malware-adobe.html"
hreflang="x-default" />
<link rel="alternate" type="text/html" lang="en" hreflang="en"
href="/proprietary/malware-adobe.en.html" title="English" />
<link rel="alternate" type="text/html" lang="de" hreflang="de"
href="/proprietary/malware-adobe.de.html" title="Deutsch" />
+<link rel="alternate" type="text/html" lang="es" hreflang="es"
href="/proprietary/malware-adobe.es.html" title="español" />
<link rel="alternate" type="text/html" lang="fr" hreflang="fr"
href="/proprietary/malware-adobe.fr.html" title="français" />
<link rel="alternate" type="text/html" lang="ja" hreflang="ja"
href="/proprietary/malware-adobe.ja.html" title="æ¥æ¬èª" />
<link rel="alternate" type="text/html" lang="ru" hreflang="ru"
href="/proprietary/malware-adobe.ru.html" title="ÑÑÑÑкий" />
Index: proprietary/po/malware-appliances.translist
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.translist,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/po/malware-appliances.translist 28 Mar 2017 16:00:42 -0000
1.4
+++ proprietary/po/malware-appliances.translist 24 Sep 2019 10:00:05 -0000
1.5
@@ -4,6 +4,7 @@
<p>
<span dir="ltr" class="original"><a lang="en" hreflang="en"
href="/proprietary/malware-appliances.en.html">English</a> [en]</span>
<span dir="ltr"><a lang="de" hreflang="de"
href="/proprietary/malware-appliances.de.html">Deutsch</a> [de]</span>
+<span dir="ltr"><a lang="es" hreflang="es"
href="/proprietary/malware-appliances.es.html">español</a> [es]</span>
<span dir="ltr"><a lang="fr" hreflang="fr"
href="/proprietary/malware-appliances.fr.html">français</a> [fr]</span>
<span dir="ltr"><a lang="ru" hreflang="ru"
href="/proprietary/malware-appliances.ru.html">ÑÑÑÑкий</a> [ru]</span>
</p>
@@ -11,6 +12,7 @@
<link rel="alternate" type="text/html"
href="/proprietary/malware-appliances.html" hreflang="x-default" />
<link rel="alternate" type="text/html" lang="en" hreflang="en"
href="/proprietary/malware-appliances.en.html" title="English" />
<link rel="alternate" type="text/html" lang="de" hreflang="de"
href="/proprietary/malware-appliances.de.html" title="Deutsch" />
+<link rel="alternate" type="text/html" lang="es" hreflang="es"
href="/proprietary/malware-appliances.es.html" title="español" />
<link rel="alternate" type="text/html" lang="fr" hreflang="fr"
href="/proprietary/malware-appliances.fr.html" title="français" />
<link rel="alternate" type="text/html" lang="ru" hreflang="ru"
href="/proprietary/malware-appliances.ru.html" title="ÑÑÑÑкий" />
<!-- end translist file -->
Index: proprietary/po/malware-cars.translist
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.translist,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/po/malware-cars.translist 11 Nov 2017 06:31:40 -0000
1.4
+++ proprietary/po/malware-cars.translist 24 Sep 2019 10:00:05 -0000
1.5
@@ -4,6 +4,7 @@
<p>
<span dir="ltr" class="original"><a lang="en" hreflang="en"
href="/proprietary/malware-cars.en.html">English</a> [en]</span>
<span dir="ltr"><a lang="de" hreflang="de"
href="/proprietary/malware-cars.de.html">Deutsch</a> [de]</span>
+<span dir="ltr"><a lang="es" hreflang="es"
href="/proprietary/malware-cars.es.html">español</a> [es]</span>
<span dir="ltr"><a lang="fr" hreflang="fr"
href="/proprietary/malware-cars.fr.html">français</a> [fr]</span>
<span dir="ltr"><a lang="ru" hreflang="ru"
href="/proprietary/malware-cars.ru.html">ÑÑÑÑкий</a> [ru]</span>
</p>
@@ -11,6 +12,7 @@
<link rel="alternate" type="text/html" href="/proprietary/malware-cars.html"
hreflang="x-default" />
<link rel="alternate" type="text/html" lang="en" hreflang="en"
href="/proprietary/malware-cars.en.html" title="English" />
<link rel="alternate" type="text/html" lang="de" hreflang="de"
href="/proprietary/malware-cars.de.html" title="Deutsch" />
+<link rel="alternate" type="text/html" lang="es" hreflang="es"
href="/proprietary/malware-cars.es.html" title="español" />
<link rel="alternate" type="text/html" lang="fr" hreflang="fr"
href="/proprietary/malware-cars.fr.html" title="français" />
<link rel="alternate" type="text/html" lang="ru" hreflang="ru"
href="/proprietary/malware-cars.ru.html" title="ÑÑÑÑкий" />
<!-- end translist file -->
Index: proprietary/po/malware-games.translist
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.translist,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary/po/malware-games.translist 11 Nov 2017 06:31:40 -0000
1.5
+++ proprietary/po/malware-games.translist 24 Sep 2019 10:00:05 -0000
1.6
@@ -4,6 +4,7 @@
<p>
<span dir="ltr" class="original"><a lang="en" hreflang="en"
href="/proprietary/malware-games.en.html">English</a> [en]</span>
<span dir="ltr"><a lang="de" hreflang="de"
href="/proprietary/malware-games.de.html">Deutsch</a> [de]</span>
+<span dir="ltr"><a lang="es" hreflang="es"
href="/proprietary/malware-games.es.html">español</a> [es]</span>
<span dir="ltr"><a lang="fr" hreflang="fr"
href="/proprietary/malware-games.fr.html">français</a> [fr]</span>
<span dir="ltr"><a lang="ja" hreflang="ja"
href="/proprietary/malware-games.ja.html">æ¥æ¬èª</a> [ja]</span>
<span dir="ltr"><a lang="ru" hreflang="ru"
href="/proprietary/malware-games.ru.html">ÑÑÑÑкий</a> [ru]</span>
@@ -12,6 +13,7 @@
<link rel="alternate" type="text/html" href="/proprietary/malware-games.html"
hreflang="x-default" />
<link rel="alternate" type="text/html" lang="en" hreflang="en"
href="/proprietary/malware-games.en.html" title="English" />
<link rel="alternate" type="text/html" lang="de" hreflang="de"
href="/proprietary/malware-games.de.html" title="Deutsch" />
+<link rel="alternate" type="text/html" lang="es" hreflang="es"
href="/proprietary/malware-games.es.html" title="español" />
<link rel="alternate" type="text/html" lang="fr" hreflang="fr"
href="/proprietary/malware-games.fr.html" title="français" />
<link rel="alternate" type="text/html" lang="ja" hreflang="ja"
href="/proprietary/malware-games.ja.html" title="æ¥æ¬èª" />
<link rel="alternate" type="text/html" lang="ru" hreflang="ru"
href="/proprietary/malware-games.ru.html" title="ÑÑÑÑкий" />
Index: proprietary/po/malware-webpages.translist
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.translist,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/po/malware-webpages.translist 25 Oct 2017 12:59:04 -0000
1.4
+++ proprietary/po/malware-webpages.translist 24 Sep 2019 10:00:05 -0000
1.5
@@ -4,6 +4,7 @@
<p>
<span dir="ltr" class="original"><a lang="en" hreflang="en"
href="/proprietary/malware-webpages.en.html">English</a> [en]</span>
<span dir="ltr"><a lang="de" hreflang="de"
href="/proprietary/malware-webpages.de.html">Deutsch</a> [de]</span>
+<span dir="ltr"><a lang="es" hreflang="es"
href="/proprietary/malware-webpages.es.html">español</a> [es]</span>
<span dir="ltr"><a lang="fr" hreflang="fr"
href="/proprietary/malware-webpages.fr.html">français</a> [fr]</span>
<span dir="ltr"><a lang="ru" hreflang="ru"
href="/proprietary/malware-webpages.ru.html">ÑÑÑÑкий</a> [ru]</span>
</p>
@@ -11,6 +12,7 @@
<link rel="alternate" type="text/html"
href="/proprietary/malware-webpages.html" hreflang="x-default" />
<link rel="alternate" type="text/html" lang="en" hreflang="en"
href="/proprietary/malware-webpages.en.html" title="English" />
<link rel="alternate" type="text/html" lang="de" hreflang="de"
href="/proprietary/malware-webpages.de.html" title="Deutsch" />
+<link rel="alternate" type="text/html" lang="es" hreflang="es"
href="/proprietary/malware-webpages.es.html" title="español" />
<link rel="alternate" type="text/html" lang="fr" hreflang="fr"
href="/proprietary/malware-webpages.fr.html" title="français" />
<link rel="alternate" type="text/html" lang="ru" hreflang="ru"
href="/proprietary/malware-webpages.ru.html" title="ÑÑÑÑкий" />
<!-- end translist file -->
Index: software/recent-releases-include.ru.html
===================================================================
RCS file: /web/www/www/software/recent-releases-include.ru.html,v
retrieving revision 1.1806
retrieving revision 1.1807
diff -u -b -r1.1806 -r1.1807
--- software/recent-releases-include.ru.html 23 Sep 2019 21:29:08 -0000
1.1806
+++ software/recent-releases-include.ru.html 24 Sep 2019 10:00:05 -0000
1.1807
@@ -1,15 +1,15 @@
<!--#set var="LINK_CLOSE" value="</a>, <i>" -->
<ul>
-<li><strong>September 23, 2019</strong>
+<li><strong>23 ÑенÑÑбÑÑ 2019</strong>
<ul>
<li><!--#set var="LINK"
value='<a href="//lists.gnu.org/archive/html/info-gnu/2019-09/msg00007.html">'
-->
<!--#echo
encoding="none" var="LINK" -->
-Texinfo 6.7 released<!--#echo
+ÐÑпÑÑен Texinfo 6.7<!--#echo
encoding="none" var="LINK_CLOSE" -->
-Gavin Smith<!--#set
+Ðевин СмиÑ<!--#set
var="TIME" value="</i>, <tt>16:50</tt>" -->
<!--#echo encoding="none" var="TIME" -->
</li>
Index: software/po/recent-releases-include.ru.po
===================================================================
RCS file: /web/www/www/software/po/recent-releases-include.ru.po,v
retrieving revision 1.2562
retrieving revision 1.2563
diff -u -b -r1.2562 -r1.2563
--- software/po/recent-releases-include.ru.po 24 Sep 2019 09:54:36 -0000
1.2562
+++ software/po/recent-releases-include.ru.po 24 Sep 2019 10:00:06 -0000
1.2563
@@ -14,11 +14,8 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2019-09-23 21:26+0000\n"
#. type: Content of: <ul><li>
-# | <strong>September 2[-0-]{+3+}, 2019</strong>
-#| msgid "<strong>September 20, 2019</strong>"
msgid "<strong>September 23, 2019</strong>"
msgstr "<strong>23 ÑенÑÑбÑÑ 2019</strong>"
@@ -27,8 +24,6 @@
#. #echo
#. encoding="none" var="LINK"
#. type: Content of: <ul><li><ul><li>
-# | [-Gnuastro 0.10-]{+Texinfo 6.7+} released
-#| msgid "Gnuastro 0.10 released"
msgid "Texinfo 6.7 released"
msgstr "ÐÑпÑÑен Texinfo 6.7"
Index: proprietary/malware-adobe.es.html
===================================================================
RCS file: proprietary/malware-adobe.es.html
diff -N proprietary/malware-adobe.es.html
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ proprietary/malware-adobe.es.html 24 Sep 2019 10:00:05 -0000 1.1
@@ -0,0 +1,198 @@
+<!--#set var="ENGLISH_PAGE" value="/proprietary/malware-adobe.en.html" -->
+
+<!--#include virtual="/server/header.es.html" -->
+<!-- Parent-Version: 1.86 -->
+<!--
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ Please do not edit <ul class="blurbs">
+!
+ Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+ See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
+
+<!-- This file is automatically generated by GNUnited Nations! -->
+<title>El software de Adobe es malware - Proyecto GNU - Free Software
Foundation</title>
+
+<!--#include virtual="/proprietary/po/malware-adobe.translist" -->
+<!--#include virtual="/server/banner.es.html" -->
+<h2>El software de Adobe es <cite>malware</cite></h2>
+
+<p><a href="/proprietary/proprietary.html">Más ejemplos de
<cite>malware</cite>
+en el software privativo</a></p>
+
+<div class="comment">
+<p>
+<em><cite>Malware</cite></em> se refiere al software que está diseñado de
+tal forma que su funcionamiento maltrata o daña al usuario (no se tienen
+aquà en cuenta los errores involuntarios). En esta página se explica por qué
+el software de Adobe es <cite>malware</cite>.
+</p>
+
+<p>El <cite>malware</cite> y el software que no es libre son dos cosas
+diferentes. La diferencia entre el <a
+href="/philosophy/free-sw.html">software libre</a> y el software que no es
+libre reside en <a
+href="/philosophy/free-software-even-more-important.html"> si los usuarios
+controlan el programa o por el contrario el programa controla a los
+usuarios</a>. No es una cuestión directamente relacionada con lo que el
+programa <em>hace</em> cuando se ejecuta. De todas maneras, en la práctica,
+el software que no es libre a menudo es también <cite>malware</cite>. Esto
+se debe a que el desarrollador, sabiendo que a los usuarios se les ha negado
+la posibilidad de poner remedio a las funcionalidades maliciosas, se ve
+tentado a imponer algunas.
+</p>
+
+<div class="important">
+<p>Si conoce algún otro ejemplo que deberÃa mencionarse en esta página,
+escrÃbanos por favor a <a
+href="mailto:address@hidden"><address@hidden></a>. Incluya la
+URL de una o más referencias confiables que justifiquen su inclusión.</p>
+</div>
+</div>
+<div class="column-limit" id="malware-adobe"></div>
+
+<ul class="blurbs">
+ <li id="M201701110">
+ <p>Una actualización de Acrobat Reader <a
+href="https://www.bleepingcomputer.com/news/software/adobe-acrobat-reader-dc-update-installs-chrome-browser-extension/">modifica
+Chrome sigilosamente</a>.</p>
+ </li>
+
+ <li id="M201510220">
+ <p>El software privativo de Adobe puede detener todas las otras tareas y
+paralizar el ordenador <a
+href="http://shallowsky.com/blog/gimp/non-free-software-surprises.html">para
+realizar una verificación de la licencia</a> en un momento aleatorio cada 30
+dÃas.</p>
+ </li>
+
+ <li id="M201410080">
+ <p>Adobe hizo que su lector de libros electrónicos «<cite>Digital
+Editions</cite>», que se utiliza en la mayorÃa de las bibliotecas
+estadounidenses, <a
+href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">envÃe
+gran cantidad de datos a Adobe</a>. La «excusa» de Adobe: ¡Es necesario para
+controlar el DRM!</p>
+ </li>
+
+ <li id="M201402200">
+ <p><a
+href="https://www.scientificamerican.com/article/adobe-software-subscription-model-means-you-cant-own-your-software/">Las
+herramientas de Adobe requieren suscripción</a>. Adobe trató también de <a
+href="http://chocolateandvodka.com/2014/02/20/adobe-creative-cloud-subscription-warning/">estafar
+a la gente haciendo las suscripciones anuales</a>, pero esa es una cuestión
+secundaria si la comparamos con la injusticia básica de la bomba de
+relojerÃa. Cuando un programa es privativo, e incluso malicioso, no se deje
+distraer por una cuestión secundaria como el precio.</p>
+
+ <p>No repita el término publicitario «Nube creativa» (<cite>Creative
+Cloud</cite>), a menos que sea para expresar su rechazo. El <a
+href="/philosophy/words-to-avoid.es.html#CloudComputing">término «nube»
está
+pensado para nublar el entendimiento de los usuarios</a>.</p>
+ </li>
+
+ <li id="M201305100">
+ <p>Las aplicaciones de Adobe <a
+href="https://www.wired.com/2013/05/adobe-creative-cloud-petition/">requieren
+conexiones periódicas a un servidor</a>.</p>
+ </li>
+
+ <li id="M201305060">
+ <p>Hay aplicaciones de Adobe que contienen bombas de relojerÃa: <a
+href="http://techcrunch.com/2013/05/06/adobe-goes-all-in-with-subscription-based-creative-cloud-will-stop-selling-regular-cs-licenses-shrink-wrapped-boxes/">pasado
+cierto tiempo dejan de funcionar</a>, y el usuario debe pagar para ampliar
+el tiempo de uso.</p>
+
+ <p>Una vez hubo un problema con los servidores que estos programas
utilizan a
+fin de verificar quién ha pagado, y <a
+href="http://www.macuser.co.uk/9015-adobe-creative-cloud-outage-leaves-adobe-users-locked-out">las
+aplicaciones dejaron de funcionar para todos</a>.</p>
+ </li>
+</ul>
+
+
+<div class="translators-notes">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
+ </div>
+</div>
+
+<!-- for id="content", starts in the include above -->
+<!--#include virtual="/server/footer.es.html" -->
+<div id="footer">
+<div class="unprintable">
+
+<p>EnvÃe sus consultas acerca de la FSF y GNU a <a
+href="mailto:address@hidden"><address@hidden></a>. Existen también <a
+href="/contact/">otros medios para contactar</a> con la FSF. <br /> Para
+avisar de enlaces rotos y proponer otras correcciones o sugerencias,
+dirÃjase a <a
+href="mailto:address@hidden"><address@hidden></a>.</p>
+
+<p>
+<!-- TRANSLATORS: Ignore the original text in this paragraph,
+ replace it with the translation of these two:
+
+ We work hard and do our best to provide accurate, good quality
+ translations. However, we are not exempt from imperfection.
+ Please send your comments and general suggestions in this regard
+ to <a href="mailto:address@hidden">
+
+ <address@hidden></a>.</p>
+
+ <p>For information on coordinating and submitting translations of
+ our web pages, see <a
+ href="/server/standards/README.translations.html">Translations
+ README</a>. -->
+El equipo de traductores al español se esfuerza por ofrecer traducciones
+fieles al original y de buena calidad, pero no estamos libres de cometer
+errores.<br /> EnvÃe sus comentarios y sugerencias sobre las traducciones a
+<a
+href="mailto:address@hidden"><address@hidden></a>.
+</p><p>Consulte la <a href="/server/standards/README.translations.html">GuÃa
+para las traducciones</a> para obtener información sobre la coordinación y
+el envÃo de traducciones de las páginas de este sitio web.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+ files generated as part of manuals) on the GNU web server should
+ be under CC BY-ND 4.0. Please do NOT change or remove this
+ without talking with the webmasters or licensing team first.
+ Please make sure the copyright date is consistent with the
+ document. For web pages, it is ok to list just the latest year the
+ document was modified, or published.
+
+ If you wish to list earlier years, that is ok too.
+ Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+ years, as long as each year in the range is in fact a copyrightable
+ year, i.e., a year in which the document was published (including
+ being publicly visible on the web or in a revision control system).
+
+ There is more detail about copyright years in the GNU Maintainers
+ Information document, www.gnu.org/prep/maintain. -->
+<p>Copyright © 2016, 2018, 2019 Free Software Foundation, Inc.</p>
+
+<p>Esta página está bajo licencia <a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/deed.es_ES">Creative
+Commons Reconocimiento 4.0 Internacional</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.es.html" -->
+<div class="translators-credits">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.-->
+<strong>Traducción y revisión: Equipo de traductores al español de GNU,
+2019.</strong></div>
+
+<p class="unprintable"><!-- timestamp start -->
+Ãltima actualización:
+
+$Date: 2019/09/24 10:00:05 $
+
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+<!-- for class="inner", starts in the banner include -->
+</body>
+</html>
Index: proprietary/malware-appliances.es.html
===================================================================
RCS file: proprietary/malware-appliances.es.html
diff -N proprietary/malware-appliances.es.html
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ proprietary/malware-appliances.es.html 24 Sep 2019 10:00:05 -0000
1.1
@@ -0,0 +1,966 @@
+<!--#set var="ENGLISH_PAGE" value="/proprietary/malware-appliances.en.html" -->
+
+<!--#include virtual="/server/header.es.html" -->
+<!-- Parent-Version: 1.86 -->
+<!--
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ Please do not edit <ul class="blurbs">
+!
+ Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+ See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
+
+<!-- This file is automatically generated by GNUnited Nations! -->
+<title>Malware en los aparatos - Proyecto GNU - Free Software
Foundation</title>
+
+<!--#include virtual="/proprietary/po/malware-appliances.translist" -->
+<!--#include virtual="/server/banner.es.html" -->
+<h2><cite>Malware</cite> en los aparatos</h2>
+
+<p><a href="/proprietary/proprietary.html">Más ejemplos de
<cite>malware</cite>
+en el software privativo</a></p>
+
+<div class="comment">
+<p>
+<cite>Malware</cite> se refiere al software que está diseñado de tal forma
+que su funcionamiento maltrata o daña al usuario (no se tienen aquàen
+cuenta los errores involuntarios).
+</p>
+
+<p>
+El <cite>malware</cite> y el software que no es libre son dos cosas
+diferentes. La diferencia entre el <a
+href="/philosophy/free-sw.html">software libre</a> y el software que no es
+libre reside en <a
+href="/philosophy/free-software-even-more-important.html"> si los usuarios
+controlan el programa o por el contrario el programa controla a los
+usuarios</a>. No es una cuestión directamente relacionada con lo que el
+programa <em>hace</em> cuando se ejecuta. De todas maneras, en la práctica,
+el software que no es libre a menudo es también <cite>malware</cite>. Esto
+se debe a que el desarrollador, sabiendo que a los usuarios se les ha negado
+la posibilidad de poner remedio a las funcionalidades maliciosas, se ve
+tentado a imponer algunas.
+</p>
+
+<p>A continuación se presentan algunos ejemplos de <cite>malware</cite> en los
+aparatos.</p>
+
+<div class="important">
+<p>Si conoce algún otro ejemplo que deberÃa mencionarse en esta página,
+escrÃbanos por favor a <a
+href="mailto:address@hidden"><address@hidden></a>. Incluya la
+URL de una o más referencias confiables que justifiquen su inclusión.</p>
+</div>
+</div>
+<div class="column-limit" id="malware-appliances"></div>
+
+<ul class="blurbs">
+ <li id="M201904260">
+ <p>Los robots de juguete Jibo estaban conectados al servidor del
fabricante. La
+empresa cerró el servidor e <a
+href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648">hizo que
+todos dejaran de funcionar</a>.</p>
+
+ <p>Irónicamente, el cierre del servidor pudo ser beneficioso para los
usuarios,
+ya que el producto estaba diseñado para manipular a la gente simulando
+emociones, y casi con toda seguridad los estaba espiando.</p>
+ </li>
+
+ <li id="M201903210">
+ <p>El protocolo de telemetrÃa Conexus, de Medtronics, tiene <a
+href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/">dos
+vulnerabilidades que afectan a varios modelos de desfibriladores
+implantables</a> y a los dispositivos a los que se conectan.</p>
+
+ <p>Este protocolo se ha estado utilizando aproximadamente desde 2006, y en
2008
+se descubrieron vulnerabilidades similares en un protocolo de comunicaciones
+anterior de Medtronics. Es obvio que la compañÃa no hizo nada por
+solucionarlo. Esto significa que no se puede confiar en que los
+desarrolladores de software privativo arreglen los fallos de sus productos.</p>
+ </li>
+
+ <li id="M201902270">
+ <p>El videotimbre Ring (ahora Amazon) está diseñado de tal modo que el
+fabricante (ahora Amazon) puede estar observando todo el tiempo. Ahora
+resulta que <a
+href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">también
+cualquier otro puede observar e incluso falsear vÃdeos</a>.</p>
+
+ <p>Es de suponer que la vulnerabilidad a terceros no es intencionada, e que
+Amazon lo solucionará. Pero contamos con que Amazon cambie el diseño que <a
+href="/proprietary/proprietary-surveillance.html#M201901100">le permite
+observar</a>.</p>
+ </li>
+
+ <li id="M201902080">
+ <p>Los <a
+href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">cartuchos de
+HP por suscripción tienen un DRM que se comunica constantemente con los
+servidores de HP</a> para asegurarse de que el usuario esté al dÃa en el
+pago de la suscripción y no haya imprimido más páginas de aquellas por las
+que ha pagado.</p>
+
+ <p>Aun cuando con el programa de suscripción la tinta puede resultar más
barata
+en algunos casos, se espÃa a los usuarios, y conlleva restricciones
+totalmente inaceptables con respecto al uso de cartuchos de tinta que de
+otro modo podrÃan seguir utilizándose.</p>
+ </li>
+
+ <li id="M201901100">
+ <p>Los dispositivos de «seguridad» Ring, de Amazon, <a
+href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">envÃan
+la señal de vÃdeo que capturan a los servidores de Amazon</a>, que la
+guardan por mucho tiempo.</p>
+
+ <p>En muchos casos el vÃdeo muestra a cualquiera que se acerque o
simplemente
+pase al lado de la puerta de entrada del usuario.</p>
+
+ <p>El artÃculo hace hincapié en que Ring permitÃa a sus empleados ver
+libremente los vÃdeos. Al parecer Amazon ha tratado de evitar ese abuso
+adicional, pero espera que la sociedad se someta al abuso primordial (el
+hecho de que Amazon se hace con el vÃdeo).</p>
+ </li>
+
+ <li id="M201901070">
+ <p>Los televisores Vizio <a
+href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">registran
+«todo lo que el televisor ve»</a>, palabras textuales del director técnico
+de la compañÃa, y estos datos se venden a terceros. Esto se hace a cambio de
+un «mejor servicio» (¿más anuncios intrusivos, quizás?) y ligeras rebajas
de
+precios.</p>
+
+ <p>Lo que se supone que hace que este espionaje sea aceptable, según
ellos, es
+que es una opción en los nuevos modelos. Pero dado que el software de Vizio
+no es libre, no sabemos qué sucede exactamente por detrás, y no hay garantÃa
+de que en las actualizaciones futuras no modifiquen la configuración del
+usuario.</p>
+
+ <p>Si ya posee un televisor Vizio «inteligente» (o cualquier televisor
+«inteligente», por cierto), la manera más sencilla de asegurarse de que no
+lo están espiando consiste en desconectarlo de Internet y utilizar una
+antena terrestre en su lugar. Otra opción, si tiene algunos conocimientos
+técnicos, es utilizar un enrutador propio (que podrÃa ser un viejo ordenador
+que utilice únicamente software libre) y activar un cortafuegos que bloquee
+las conexiones a los servidores de Vizio. O, como último recurso, sustituir
+su televisor por otro modelo.</p>
+ </li>
+
+ <li id="M201810300">
+ <p>Casi todas las «cámaras de seguridad domésticas» <a
+href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">proporcionan
+al fabricante una copia no encriptada de todo lo que ven</a>. ¡DeberÃan
+llamarse «cámaras de inseguridad doméstica»!</p>
+
+ <p>Cuando <cite>Consumer Reports</cite> las sometió a examen, sugirió
que los
+fabricantes prometieran no mirar el contenido de los vÃdeos. Eso no es
+seguridad para su hogar. Seguridad significa asegurarse de que no tienen
+acceso a lo que ve su cámara.</p>
+ </li>
+
+ <li id="M201810150">
+ <p>Los fabricantes de impresoras son muy innovadores a la hora de bloquear
el
+uso de cartuchos de tinta no oficiales. Sus «actualizaciones de seguridad»
+imponen de vez en cuando nuevas formas de DRM. <a
+href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates">HP
+y Epson lo han hecho</a>.</p>
+ </li>
+
+ <li id="M201809260">
+ <p>Los termostatos «inteligentes» Honeywell funcionan únicamente a
través del
+servidor de la compañÃa. Poseen todas las caracterÃsticas nocivas de ese
+tipo de dispositivos: <a
+href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9">vigilancia,
+y el peligro de sabotaje</a> (contra un usuario en particular o contra todos
+los usuarios a la vez), como asà también el riesgo de mal funcionamiento del
+servidor (que es lo que sucedió).</p>
+
+ <p>Además, para regular la temperatura deseada es necesario ejecutar
software
+que no es libre. Con los termostatos tradicionales eso se puede hacer
+mediante teclas de control posicionadas en el termostato mismo.</p>
+ </li>
+
+ <li id="M201809240">
+ <p>Algunos investigadores han descubierto cómo <a
+href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">ocultar
+las órdenes vocales en otras transmisiones de audio</a>, de modo que
+resultan inaudibles para los seres humanos pero no para Alexa y Siri.</p>
+ </li>
+
+ <li id="M201807050">
+ <p>La pulsera de actividad Jawbone estaba vinculada a una aplicación
telefónica
+privativa. En 2017 la compañÃa desapareció, haciendo que la aplicación
+dejara de funcionar. <a
+href="https://www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-kept-selling-after-app-closure-says-which">Todas
+las pulseras dejaron de funcionar para siempre</a>.</p>
+
+ <p>El artÃculo hace hincapié en la perversa decisión de continuar
vendiendo los
+dispositivos ya inutilizables. Pero creemos que esto es algo secundario:
+hizo que las consecuencias nocivas alcanzaran a algunas personas más. Lo
+realmente grave fue diseñar los dispositivos de manera que tuvieran que
+depender de algún otro que no respeta la libertad de los usuarios.</p>
+ </li>
+
+ <li id="M201804140">
+ <p>Una empresa de seguros médicos <a
+href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">ofrece
+gratuitamente cepillos de dientes electrónicos que espÃan a los usuarios
+enviando datos de uso por Internet</a>.</p>
+ </li>
+
+ <li id="M201804010">
+ <p>Algunos televisores «inteligentes» <a
+href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">cargan
+actualizaciones regresivas que instalan una aplicación de vigilancia</a>.</p>
+
+ <p>Enlazamos el artÃculo por los hechos que presenta. Es una pena que al
final
+el artÃculo aconseje rendirse a Netflix. La aplicación de Netflix <a
+href="/proprietary/malware-google.html#netflix-app-geolocation-drm">es
+también software malicioso</a>.</p>
+ </li>
+
+ <li id="M201802120">
+ <p>Los dispositivos de Apple atan a los usuarios a <a
+href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347">los
+servicios de Apple en exclusiva</a>, al estar diseñados para ser
+incompatibles con cualquier otra opción, sea ética o no.</p>
+ </li>
+
+ <li id="M201712240">
+ <p>Uno de los peligros del «Internet de las Trucosas» es que si se
pierde la
+conexión a Internet, también <a
+href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/">se
+pierde el control de la casa y aparatos domésticos</a>.</p>
+
+ <p>Por el bien de su seguridad, no utilice aparatos conectados a
Internet.</p>
+ </li>
+
+ <li id="M201711200">
+ <p>Recientemente Amazon embaucó a los consumidores para que <a
+href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">permitieran
+a su personal que abriera la puerta de entrada al sistema</a>. Por si no lo
+sabÃa, el sistema tiene un grave fallo de seguridad.</p>
+ </li>
+
+ <li id="M201711100">
+ <p>Se descubrió que un juguete erótico de control remoto <a
+href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">registraba
+la conversación entre los dos usuarios</a>.</p>
+ </li>
+
+ <li id="M201711080">
+ <p>Logitech saboteará todos los dispositivos de control doméstico
Harmony Link
+<a
+href="https://arstechnica.com/gadgets/2017/11/logitech-to-shut-down-service-and-support-for-harmony-link-devices-in-2018/">cerrando
+el servidor mediante el cual los supuestos propietarios se comunican con sus
+productos</a>.</p>
+
+ <p>Los propietarios sospechan que es una forma de presionarlos para que
compren
+un modelo más reciente. Si son sensatos aprenderán más bien a desconfiar de
+cualquier producto que requiera que los usuarios se comuniquen con él a
+través de algún servicio especializado.</p>
+ </li>
+
+ <li id="M201710040">
+ <p>Toda cámara de «seguridad doméstica» es un dispositivo de
vigilancia si su
+fabricante puede comunicarse con ella. <a
+href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">La
+cámara Canary es un ejemplo</a>.</p>
+
+ <p>Ese artÃculo describe iniquidades cometidas por el fabricante, basadas
en el
+hecho de que el dispositivo está subordinado al servidor.</p>
+
+ <p>Más ejemplos de <a
+href="/proprietary/proprietary-tethers.html">subordinación a un servidor en
+el software privativo</a>.</p>
+
+ <p>Pero también demuestra que el dispositivo otorga a la compañÃa la
capacidad
+de vigilar.</p>
+ </li>
+
+ <li id="M201709200">
+ <p>Una bomba intravenosa «inteligente» para hospitales está conectada a
+Internet. Naturalmente, <a
+href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml">su
+seguridad ya ha sido burlada</a>.</p>
+
+ <p>En ese artÃculo se utiliza erróneamente el término <a
+href="/philosophy/words-to-avoid.es.html#Hacker">«<cite>hackers</cite>»</a>
+para referirse a los «<cite>crackers</cite>».</p>
+ </li>
+
+ <li id="M201708280">
+ <p>El sistema de seguridad deficiente de muchos de los aparatos que
funcionan
+en el Internet de las Trucosas permite que <a
+href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">los
+proveedores de los servicios de Internet espÃen a quienes los usan</a>.</p>
+
+ <p>No sea ingenuo, rechace todas las trucosas.</p>
+
+ <p>Lamentablemente, en al artÃculo se utiliza el término <a
+href="/philosophy/words-to-avoid.es.html#Monetize">«monetizar»</a>.</p>
+ </li>
+
+ <li id="M201708230">
+ <p>Sonos <a
+href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/">dijo
+a sus clientes que dieran su consentimiento para ser espiados o el producto
+dejarÃa de funcionar</a>. <a
+href="https://www.consumerreports.org/consumerist/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/">Otro
+artÃculo</a> señala que no cambiarán el software de manera forzosa, pero que
+asà los clientes no podrán obtener ninguna actualización y al final el
+aparato dejará de funcionar.</p>
+ </li>
+
+ <li id="M201708040">
+ <p>Cuando usted usa un drone DJI para espiar a la gente, en muchos casos
el DJI
+<a
+href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">lo
+espÃa a usted</a>.</p>
+ </li>
+
+ <li id="M201706200">
+ <p>Muchos modelos de cámaras conectadas a Internet son sumamente
+inseguras. Tienen cuentas de acceso con contraseñas codificadas de forma
+fija que no pueden cambiarse, y <a
+href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">tampoco
+hay forma de borrar esas cuentas</a>.</p>
+ </li>
+
+ <li id="M201705250">
+ <p>El código privativo que hace funcionar a los marcapasos, bombas de
insulina
+y otros dispositivos médicos <a
+href="http://www.bbc.co.uk/news/technology-40042584">está repleto de graves
+fallos de seguridad</a>.</p>
+ </li>
+
+ <li id="M201705180">
+ <p>Una empresa creó pájaros y conejos de compañÃa para Second Life e
hizo que
+su alimento dependiera de un servidor. <a
+href="https://www.rockpapershotgun.com/2017/05/19/second-life-ozimals-pet-rabbits-dying">Cerraron
+el servidor y los animales murieron, o algo parecido</a>.</p>
+ </li>
+
+ <li id="M201704190">
+ <p>Los usuarios están llevando a Bose a los tribunales por <a
+href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">distribuir
+una aplicación espÃa para sus auriculares</a>. Concretamente, la aplicación
+grabarÃa los nombres de los archivos de audio que se escuchan, asociándolos
+al número de serie individual de los auriculares.</p>
+
+ <p>Se acusa a Bose de haberlo hecho sin el consentimiento de los usuarios.
Si
+la letra pequeña de la aplicación dijera que los usuarios dan su
+consentimiento, ¿serÃa aceptable? ¡De ninguna manera! Debe ser completamente
+<a href="/philosophy/surveillance-vs-democracy.html">ilegal diseñar la
+aplicación para cualquier forma de espionaje</a>.</p>
+ </li>
+
+ <li id="M201704120">
+ <p>Anova saboteó los robots de cocina de los usuarios con una
actualización
+regresiva que los vinculaba a un servidor. <a
+href="https://web.archive.org/web/20170415145520/https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/">A
+menos que los usuarios crearan una cuenta en los servidores de Anova, los
+aparatos dejarÃan de funcionar</a>.</p>
+ </li>
+
+ <li id="M201703270">
+ <p>Cuando el lavavajillas desinfectante Miele que se usa en los hospitales
<a
+href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">se
+conecta al Internet de las Trucosas, su seguridad es pura basura</a>.</p>
+
+ <p>Por ejemplo, un delincuente informático puede acceder al sistema de
archivos
+del lavavajillas, infectarlo con <cite>malware</cite>, y hacer que la
+máquina lance un ataque a los otros dispositivos conectados a la red. Dado
+que estos lavavajillas se usan en los hospitales, tales ataques podrÃan
+poner en riesgo las vidas de cientos de personas.</p>
+ </li>
+
+ <li id="M201703140">
+ <p>Un vibrador computarizado <a
+href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">espiaba
+a los usuarios a través de la aplicación privativa de control</a>.</p>
+
+ <p>La aplicación informaba de la temperatura del vibrador minuto a minuto
(por
+lo tanto, si se encontraba o no cerca de un cuerpo humano), como as'i
+también la frecuencia de vibración.</p>
+
+ <p>La solución que se propone es totalmente inadecuada. Se propone una
norma de
+etiquetado que obligarÃa a los fabricantes a hacer declaraciones sobre sus
+productos, en lugar de software libre que los usuarios podrÃan verificar y
+cambiar.</p>
+
+ <p>La empresa que fabricó el vibrador <a
+href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">fue
+demandada por recoger gran cantidad de información personal de la gente que
+lo usaba</a>.</p>
+
+ <p>La compañÃa declaró que anonimizaba los datos, y puede que sea
cierto, pero
+eso no es lo realmente importante. Si los hubiese vendido a una empresa de
+datos, esa empresa podrÃa haber descubierto la identidad del usuario.</p>
+
+ <p>Como resultado del juicio, <a
+href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">se
+dispuso que la compañÃa pagara un total de 4 millones de dólares
+canadienses</a> a sus clientes.</p>
+ </li>
+
+ <li id="M201702280">
+ <p>Los juguetes «CloudPets» con micrófono <a
+href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">revelan
+al fabricante las conversaciones de los niños</a>. Y adivine qué... <a
+href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">delincuentes
+informáticos encontraron la manera de acceder a los datos</a> recogidos por
+el fabricante espÃa.</p>
+
+ <p>El hecho de que el fabricante y el FBI pudieran acceder a esas
+conversaciones fue de por sà inaceptable.</p>
+ </li>
+
+ <li id="M201702200">
+ <p>Si usted compra algo que supuestamente es «inteligente», como por
ejemplo un
+automóvil, una casa, un televisor, un refrigerador, etc., por lo general <a
+href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html">los
+anteriores dueños siguen teniendo el control de manera remota</a>.</p>
+ </li>
+
+ <li id="M201702060">
+ <p>Los <a
+href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">televisores
+«inteligentes» Vizio informan de todo lo que se ve en ellos, no solo los
+programas de televisión general y de pago</a>. Incluso si la imagen proviene
+del ordenador personal del usuario, el televisor informa sobre ella. El
+hecho de que exista una manera de desactivar la vigilancia, aun si esta
+opción no estuviera escondida como lo estaba en estos televisores, no
+legitima la vigilancia.</p>
+ </li>
+
+ <li id="M201701271">
+ <p>Un atacante podrÃa <a
+href="https://uploadvr.com/hackable-webcam-oculus-sensor-be-aware/">convertir
+los sensores del Oculus Rift en cámaras de vigilancia</a>, tras haber
+penetrado en el ordenador al que están conectadas.</p>
+
+ <p>Desafortunadamente, el artÃculo <a
+href="/philosophy/words-to-avoid.es.html#Hacker">emplea de forma impropia la
+palabra «<cite>hackers</cite>» para referirse a los
+<cite>crackers</cite></a>.</p>
+ </li>
+
+ <li id="M201612230">
+ <p>Los equipos de realidad virtual, que registran cada mÃnimo movimiento,
crean
+el potencial para una vigilancia lo más Ãntima posible. Todo lo que se
+necesita para hacer realidad ese potencial es <a
+href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/">software
+tan malicioso como muchos de los otros programas que se mencionan en esta
+página</a>.</p>
+
+ <p>Podemos apostar que Facebook implementará la máxima vigilancia
posible en
+los dispositivos Oculus Rift. La moraleja es: no confÃe nunca en un sistema
+de realidad virtual que contenga software que no es libre.</p>
+ </li>
+
+ <li id="M201612200">
+ <p>El desarrollador de Ham Radio Deluxe <a
+href="https://www.techdirt.com/articles/20161220/12411836320/company-bricks-users-software-after-he-posts-negative-review.shtml">saboteó
+la instalación de un cliente para castigarlo por publicar una reseña
+negativa</a>.</p>
+
+ <p>La mayorÃa de las compañÃas de software privativo no utilizan su
poder de
+manera tan hostil, pero es una injusticia que todas ellas <em>tengan</em>
+ese poder.</p>
+ </li>
+
+ <li id="M201612060.1">
+ <p>Los juguetes «inteligentes» <cite>My Friend Cayla</cite> y
+<cite>i-Que</cite> <a
+href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">se
+pueden controlar a distancia con un teléfono móvil</a>, no es necesario
+acceder fÃsicamente. Esto permitirÃa a los delincuentes informáticos
+escuchar las conversaciones de los niños e incluso hablarles a través de los
+juguetes.</p>
+
+ <p>Esto significa que un ladrón podrÃa, a través de los juguetes,
pedirle al
+niño que abra la puerta de la casa mientras su mamá está distraÃda.</p>
+ </li>
+
+ <li id="M201609200">
+ <p>Una actualización regresiva del <cite>firmware</cite> de HP <a
+href="https://www.theguardian.com/technology/2016/sep/20/hp-inkjet-printers-unofficial-cartridges-software-update">impuso
+el DRM en algunas impresoras, de modo que ahora dejan de funcionar con
+cartuchos de tinta de terceros</a>.</p>
+ </li>
+
+ <li id="M201608080">
+ <p>Se ha desarrollado software para el secuestro de datos <a
+href="https://www.pentestpartners.com/security-blog/thermostat-ransomware-a-lesson-in-iot-security/">para
+un termostato que funciona con software privativo</a>.</p>
+ </li>
+
+ <li id="M201605020">
+ <p>El sistema «<cite>Smart Home</cite>» de Samsung tiene un gran agujero
de
+seguridad: <a
+href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/">puede
+ser controlado a distancia por personas sin autorización</a>.</p>
+
+ <p>Samsung dice que se trata de una plataforma «abierta», por lo que los
+desarrolladores de aplicaciones son en parte los responsables del
+problema. Esto es claramente cierto en el caso de aplicaciones privativas.</p>
+
+ <p>Todo lo que incluye la palabra «inteligente» (<cite>smart</cite>) en
el
+nombre con toda probabilidad está diseñado para engañar.</p>
+ </li>
+
+ <li id="M201604110">
+ <p>Se ha encontrado <cite>malware</cite> en las <a
+href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html">cámaras
+de seguridad que se venden en Amazon</a>.</p>
+
+ <p>Si una cámara registra localmente en un soporte fÃsico y no está
conectada a
+una red, ésta no constituye peligro de vigilancia, ni por el hecho de que
+observa a las personas ni por la presencia de <cite>malware</cite> en la
+misma.</p>
+ </li>
+
+ <li id="M201604050">
+ <p>Revolv es un dispositivo que controlaba las operaciones de una «casa
+inteligente»: encender las luces, poner en funcionamiento los sensores de
+movimiento, regular la temperatura, etc. Su software privativo depende de un
+servidor remoto para llevar a cabo esas tareas. El 15 de mayo de 2016,
+Google/Alphabet <a
+href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be">lo
+dejó intencionadamente fuera de uso al cerrar el servidor</a>.</p>
+
+ <p>Si fuera software libre, los usuarios tendrÃan la posibilidad de
ponerlo de
+nuevo en funcionamiento, de manera diferente, y entonces tendrÃan una casa
+que respeta la libertad en lugar de una casa «inteligente». No permita que
+el software privativo controle sus dispositivos y los convierta en ladrillos
+de 300 dólares sin garantÃa. ¡Exija ordenadores autónomos que utilicen
+software libre!</p>
+ </li>
+
+ <li id="M201603220">
+ <p>Más de setenta cámaras de vigilancia conectadas a la red tienen <a
+href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">fallos
+de seguridad que permiten que cualquiera pueda mirar a través de
ellas</a>.</p>
+ </li>
+
+ <li id="M201601100">
+ <p>La <a
+href="http://michaelweinberg.org/post/137045828005/free-the-cube">impresora
+3D «Cube» fue diseñada con gestión digital de restricciones (<abbr
+title="Digital Restrictions Management">DRM</abbr>)</a>: no acepta
+consumibles de terceras partes. Es la Keurig de las impresoras. Esta
+impresora ha dejado de fabricarse, lo que significa que a la larga los
+consumibles autorizados no estarán disponibles, por lo que puede volverse
+inutilizable.</p>
+
+ <p>Con una impresora etiquetada como «Respeta Tu Libertad» (<abbr
+title="Respects Your Freedom">RYF</abbr>), no existe la menor posibilidad de
+que esto suceda.</p>
+
+ <p>Es lamentable que el autor de ese artÃculo diga que no habÃa «nada
de malo»
+en diseñar el dispositivo con restricciones de uso. Es como ponerse en el
+pecho un cartel que diga «engáñame y maltrátame». Ya deberÃamos saber
que es
+necesario repudiar a todas las empresas que se aprovechan de las personas
+como él. De hecho, es esa aceptación de la injusticia lo que lleva a las
+personas a dejarse pisotear.</p>
+ </li>
+
+ <li id="M201512140">
+ <p>Las bombillas «inteligentes» de Philips fueron diseñadas al
principio para
+interactuar con las bombillas inteligentes de otras compañÃas, pero <a
+href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml">posteriormente
+la compañÃa actualizó el <cite>firmware</cite> para anular la
+interoperabilidad</a>.</p>
+
+ <p>Si un producto es «inteligente» y no lo ha hecho usted mismo, estará
+astutamente al servicio de su fabricante <em>contra usted</em>.</p>
+ </li>
+
+ <li id="M201512074">
+ <p><a
+href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html">Algunos
+enrutadores D-Link</a>tienen una puerta trasera que les permite cambiar las
+Preferencias.</p>
+
+ <p><a href="http://sekurak.pl/tp-link-httptftp-backdoor/">El enrutador
TP-Link
+tiene una puerta trasera</a>.</p>
+
+ <p><a href="https://github.com/elvanderb/TCP-32764">Muchos modelos de
+enrutadores tienen puertas traseras</a>.</p>
+ </li>
+
+ <li id="M201511250">
+ <p>La cámara «inteligente» Nest Cam <a
+href="http://www.bbc.com/news/technology-34922712">observa siempre</a>,
+incluso cuando el «propietario» la apaga.</p>
+
+ <p>Dispositivo «inteligente» significa que el fabricante lo utiliza para
ser
+más astuto que usted.</p>
+ </li>
+
+ <li id="M201511198">
+ <p>El módem de cable ARRIS tiene una <a
+href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">puerta
+trasera en la puerta trasera</a>.</p>
+ </li>
+
+ <li id="M201511130">
+ <p>Algunos avisos publicitarios de la televisión y la web reproducen
sonidos
+inaudibles que son capturados por el <cite>malware</cite> instalado en otros
+dispositivos que se encuentran en las mediaciones. Una vez que vuestros
+dispositivos conectados a Internet estén emparejados con vuestros
+televisores, los anunciantes pueden correlacionar los avisos con la
+actividad en la web, y también hacer el <a
+href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">rastreo
+cruzado en diversos dispositivos</a>.</p>
+ </li>
+
+ <li id="M201511060">
+ <p>Vizio va más allá que otros fabricantes de televisores en el
espionaje de
+los usuarios. Sus <a
+href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">televisores
+«inteligentes» analizan en detalle lo que usted tiene por costumbre mirar y
+lo vincula a su dirección IP</a>, de modo que los anunciantes puedan
+rastrearlo en todos los dispositivos que usted usa.</p>
+
+ <p>Es posible desactivar esa función, pero el hecho de que esté
habilitada en
+la configuración original es de por sà una injusticia.</p>
+ </li>
+
+ <li id="M201511020">
+ <p>La unión de Tivo con Viacom añade 2.3 millones de hogares a los 600
millones
+de perfiles de los medios sociales que la compañÃa ya monitoriza. Los
+clientes de Tivo no saben que los anunciantes los están
+vigilando. Combinando la información de lo que se mira en la televisión con
+la participación en los medios sociales, Tivo ahora puede <a
+href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">relacionar
+los avisos televisivos con las compras en Internet</a>, exponiendo asà a
+todos los usuarios a una nueva vigilancia combinada de manera predefinida.</p>
+ </li>
+
+ <li id="M201510210">
+ <p>Los medidores de actividad fÃsica FitBit tienen una <a
+href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/">vulnerabilidad
+de Bluetooth</a> que permite a un atacante enviar a un dispositivo
+<cite>malware</cite> que sucesivamente se puede propagar a otros medidores
+FitBit con los que interactúa.</p>
+ </li>
+
+ <li id="M201510200">
+ <p>Los discos duros «autoencriptables» encriptan los datos con firmware
+privativo, de modo que no se puede confiar. Los discos «My Passport" de
+Western Digital' <a
+href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">tienen
+una puerta trasera</a>.</p>
+ </li>
+
+ <li id="M201507240">
+ <p>Los televisores «inteligentes» de Vizio reconocen y <a
+href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">rastrean lo
+que la gente mira</a>, incluso cuando no se trata de un canal televisivo.</p>
+ </li>
+
+ <li id="M201506080">
+ <p>Debido a fallos de seguridad en una bomba de infusión en los
hospitales, los
+delincuentes informáticos podrÃan utilizarla para <a
+href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/">matar
+a los pacientes</a>.</p>
+ </li>
+
+ <li id="M201505290">
+ <p>La televisión por cable de Verizon <a
+href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">husmea
+los programas que la gente mira, e incluso lo que quisieron grabar</a>.</p>
+ </li>
+
+ <li id="M201505050">
+ <p>Un investigador de seguridad calificó a las bombas de infusión
Hospira, que
+se usan para suministrar medicamentos a los pacientes, como <a
+href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/">los
+dispositivos IP menos seguros que jamás haya visto</a>.</p>
+
+ <p>Dependiendo del tipo de medicamento que se administra, esta inseguridad
+podrÃa permitir la perpetración de asesinatos.</p>
+ </li>
+
+ <li id="M201504300">
+ <p>Vizio <a
+href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">utilizó
+una «actualización» de <cite>firmware</cite> para hacer que sus televisores
+espiaran lo que los usuarios veÃan</a>. Los televisores no lo hacÃan cuando
+se vendieron.</p>
+ </li>
+
+ <li id="M201502180">
+ <p>Barbie <a
+href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">espiará
+a adultos y niños</a>.</p>
+ </li>
+
+ <li id="M201502090">
+ <p>El televisor «inteligente» Samsung <a
+href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmite
+la voz de los usuarios en Internet a la compañÃa Nuance</a>. Nuance la puede
+guardar, y luego tendrÃa que entregarla a los Estados Unidos o algún otro
+Gobierno.</p>
+
+ <p>No se debe confiar en el reconocimiento vocal a menos que se haga con
+software libre en el propio ordenador del usuario.</p>
+
+ <p>En su declaración de privacidad, Samsung confirma explÃcitamente que
<a
+href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">los
+datos vocales que contienen información sensible serán transmitidos a
+terceros</a>.</p>
+ </li>
+
+ <li id="M201411090">
+ <p>El televisor «inteligente» de Amazon <a
+href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">espÃa
+todo el tiempo</a>.</p>
+ </li>
+
+ <li id="M201409290">
+ <p>Casi todos los televisores «inteligentes» <a
+href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">espÃan
+a los usuarios</a>.</p>
+
+ <p>El informe es de 2014, pero nada nos hace suponer que esto haya
mejorado.</p>
+
+ <p>Esto muestra que las leyes que requieren que los productos soliciten el
+consentimiento formal antes de recoger los datos personales son totalmente
+inadecuadas. ¿Y qué pasa si un usuario se niega a dar el consentimiento?
+Probablemente el televisor dirá: «Sin tu consentimiento para el rastreo, el
+televisor no funcionará».</p>
+
+ <p>Leyes adecuadas serÃan aquellas que impusieran que los televisores no
puedan
+informar de lo que el usuario mira, ¡sin excepción!</p>
+ </li>
+
+ <li id="M201407170">
+ <p id="nest-thermometers">Los termómetros Nest envÃan <a
+href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">multitud de
+datos sobre el usuario</a>.</p>
+ </li>
+
+ <li id="M201405200.1">
+ <p>LG <a
+href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">deshabilitó
+funciones de red</a> en televisores «inteligentes» <em>adquiridos
+previamente</em>, a menos que los compradores aceptaran que LG empezara a
+espiarlos y distribuir sus datos personales.</p>
+ </li>
+
+ <li id="M201404250">
+ <p>Muchos de los <a
+href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">equipos
+en los hospitales tienen una seguridad deficiente</a> que puede llevar a la
+muerte.</p>
+ </li>
+
+ <li id="M201312290">
+ <p><a href="http://www.bunniestudios.com/blog/?p=3554">Algunas memorias
flash
+contienen software modificable</a>, lo que las hace vulnerables a los
virus.</p>
+
+ <p>No consideramos esto como una «puerta trasera» porque es normal que
se pueda
+instalar un nuevo sistema en un ordenador cuando se tiene acceso fÃsico a
+él. Sin embargo, las tarjetas de memoria y los USB no deben admitir este
+tipo de modificación.</p>
+ </li>
+
+ <li id="M201312040">
+ <p><a
+href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/">Terminales
+de puntos de venta que funcionan con Windows han sido atacados</a> y
+convertidos en una <cite>botnet </cite> con el propósito de obtener los
+números de las tarjetas de crédito de los clientes.</p>
+ </li>
+
+ <li id="M201311210">
+ <p>Código espÃa en los televisores «inteligentes» LG <a
+href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">informa
+de lo que el usuario mira, y no se puede desactivar</a>. (El hecho de que la
+transmisión devuelva un error 404 en realidad no significa nada, porque el
+servidor podrÃa guardar los datos de todos modos).</p>
+
+ <p>Peor aún, <a
+href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">husmea
+en los otros dispositivos de la red del usuario</a>.</p>
+
+ <p>Luego LG declaró que habÃa instalado un parche para solucionarlo, pero
+cualquier producto podrÃa espiar de esa misma manera.</p>
+ </li>
+
+ <li id="M201310070">
+ <p id="bluray"><a
+href="http://web.archive.org/web/20131007102857/http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up">
+Los DVD y los discos Bluray tienen DRM</a>.</p>
+
+ <p>En esa página usan la misma cantinela de siempre a favor del DRM, como
<a
+href="/philosophy/words-to-avoid.es.html#DigitalRightsManagement">gestión
+digital de los «derechos»</a> y <a
+href="/philosophy/words-to-avoid.es.html#Protection">«proteger»</a>, y
+afirman que los «artistas» (no las empresas) son los principales
+responsables de la inclusión del DRM en estos discos. No obstante, sirve de
+referencia a los hechos.</p>
+
+ <p>Todos los discos Bluray (con muy pocas, raras excepciones) tienen DRM;
¡no
+use los discos Bluray!</p>
+ </li>
+
+ <li id="M201309050">
+ <p>La FTC (Comisión Federal de Comercio, para la tutela del consumador) ha
+sancionado a una empresa por haber construido cámaras web con <a
+href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html">seguridad
+deficiente que permiten a cualquiera mirar a través de ellas</a>.</p>
+ </li>
+
+ <li id="M201308060">
+ <p><a href="http://spritesmods.com/?art=hddhack&page=6">Un programa
+privativo permite reescribir el software privativo reemplazable de algunos
+discos duros</a>. Esto hace que cualquier sistema sea vulnerable a ataques
+persistentes que las herramientas de escaneo normales no detectarán.</p>
+ </li>
+
+ <li id="M201307270">
+ <p> Es posible <a
+href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/">matar
+a personas tomando el control de los implantes médicos por radio</a>. Para
+más información, véase <a
+href="http://www.bbc.co.uk/news/technology-17631838">BBC News</a> y el blog
+de <a
+href="https://ioactive.com/broken-hearts-how-plausible-was-the-homeland-pacemaker-hack/">IOActive
+Labs Research</a>.</p>
+ </li>
+
+ <li id="M201307260">
+ <p><a
+href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/">Las
+«casas inteligentes»</a> resultan ser estúpidamente vulnerables a la
+intrusión.</p>
+ </li>
+
+ <li id="M201307114">
+ <p>Los «dispositivos de almacenamiento» de HP que utilizan el sistema
operativo
+privativo «Left Hand» tienen puertas traseras que permiten a HP <a
+href="https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/">iniciar
+sesión de forma remota</a> y acceder a ellos. HP sostiene que eso no le da
+acceso a los datos del cliente, pero si la puerta trasera permite la
+instalación de cambios en el software, podrÃa instalar un cambio que diera
+acceso a los datos del cliente.</p>
+ </li>
+
+ <li id="M201212290">
+ <p>Los teléfonos VoIP TNP de Cisco son <a
+href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">dispositivos
+para espiar</a>.</p>
+ </li>
+
+ <li id="M201212180">
+ <p>Los televisores «inteligentes» de Samsung han <a
+href="https://wiki.samygo.tv/index.php?title=SamyGO_for_DUMMIES#What_are_Restricted_Firmwares.3F">convertido
+Linux en la base para un sistema tirano</a> a fin de imponer el DRM. Lo que
+permite a Samsung hacer esto es que Linux está publicado bajo la versión 2
+de la GPL de GNU, <a href="/licenses/rms-why-gplv3.html">no la versión
+3</a>, interpretando además de manera laxa la versión 2 de la GPL.</p>
+ </li>
+
+ <li id="M201212170">
+ <p id="break-security-smarttv"><a
+href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">Algunos
+delincuentes informáticos encontraron la manera de quebrar la seguridad de
+un televisor «inteligente»</a> y, a través de la cámara, observar a la
+personas que miran la televisión.</p>
+ </li>
+
+ <li id="M201210020">
+ <p>Algunos televisores LG <a
+href="http://openlgtv.org.ru/wiki/index.php/Achievements">son tiranos</a>.</p>
+ </li>
+</ul>
+
+
+<div class="translators-notes">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
+ </div>
+</div>
+
+<!-- for id="content", starts in the include above -->
+<!--#include virtual="/server/footer.es.html" -->
+<div id="footer">
+<div class="unprintable">
+
+<p>EnvÃe sus consultas acerca de la FSF y GNU a <a
+href="mailto:address@hidden"><address@hidden></a>. Existen también <a
+href="/contact/">otros medios para contactar</a> con la FSF. <br /> Para
+avisar de enlaces rotos y proponer otras correcciones o sugerencias,
+dirÃjase a <a
+href="mailto:address@hidden"><address@hidden></a>.</p>
+
+<p>
+<!-- TRANSLATORS: Ignore the original text in this paragraph,
+ replace it with the translation of these two:
+
+ We work hard and do our best to provide accurate, good quality
+ translations. However, we are not exempt from imperfection.
+ Please send your comments and general suggestions in this regard
+ to <a href="mailto:address@hidden">
+
+ <address@hidden></a>.</p>
+
+ <p>For information on coordinating and submitting translations of
+ our web pages, see <a
+ href="/server/standards/README.translations.html">Translations
+ README</a>. -->
+El equipo de traductores al español se esfuerza por ofrecer traducciones
+fieles al original y de buena calidad, pero no estamos libres de cometer
+errores.<br /> EnvÃe sus comentarios y sugerencias sobre las traducciones a
+<a
+href="mailto:address@hidden"><address@hidden></a>.
+</p><p>Consulte la <a href="/server/standards/README.translations.html">GuÃa
+para las traducciones</a> para obtener información sobre la coordinación y
+el envÃo de traducciones de las páginas de este sitio web.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+ files generated as part of manuals) on the GNU web server should
+ be under CC BY-ND 4.0. Please do NOT change or remove this
+ without talking with the webmasters or licensing team first.
+ Please make sure the copyright date is consistent with the
+ document. For web pages, it is ok to list just the latest year the
+ document was modified, or published.
+
+ If you wish to list earlier years, that is ok too.
+ Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+ years, as long as each year in the range is in fact a copyrightable
+ year, i.e., a year in which the document was published (including
+ being publicly visible on the web or in a revision control system).
+
+ There is more detail about copyright years in the GNU Maintainers
+ Information document, www.gnu.org/prep/maintain. -->
+<p>Copyright © 2016, 2017, 2018, 2019 Free Software Foundation, Inc.</p>
+
+<p>Esta página está bajo licencia <a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/deed.es_ES">Creative
+Commons Reconocimiento 4.0 Internacional</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.es.html" -->
+<div class="translators-credits">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.-->
+<strong>Traducción y revisión: Equipo de traductores al español de GNU,
+2019.</strong></div>
+
+<p class="unprintable"><!-- timestamp start -->
+Ãltima actualización:
+
+$Date: 2019/09/24 10:00:05 $
+
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+<!-- for class="inner", starts in the banner include -->
+</body>
+</html>
Index: proprietary/malware-cars.es.html
===================================================================
RCS file: proprietary/malware-cars.es.html
diff -N proprietary/malware-cars.es.html
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ proprietary/malware-cars.es.html 24 Sep 2019 10:00:05 -0000 1.1
@@ -0,0 +1,381 @@
+<!--#set var="ENGLISH_PAGE" value="/proprietary/malware-cars.en.html" -->
+
+<!--#include virtual="/server/header.es.html" -->
+<!-- Parent-Version: 1.86 -->
+<!--
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ Please do not edit <ul class="blurbs">
+!
+ Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+ See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
+
+<!-- This file is automatically generated by GNUnited Nations! -->
+<title>Malware en los automóviles - Proyecto GNU - Free Software
Foundation</title>
+
+<!--#include virtual="/proprietary/po/malware-cars.translist" -->
+<!--#include virtual="/server/banner.es.html" -->
+<h2><cite>Malware</cite> en los automóviles</h2>
+
+<p><a href="/proprietary/proprietary.html">Más ejemplos de
<cite>malware</cite>
+en el software privativo</a></p>
+
+<div class="comment">
+<p>
+<cite>Malware</cite> se refiere al software que está diseñado de tal forma
+que su funcionamiento maltrata o daña al usuario (no se tienen aquà en
+cuenta los errores involuntarios).
+</p>
+
+<p>
+El <cite>malware</cite> y el software que no es libre son dos cosas
+diferentes. La diferencia entre el <a
+href="/philosophy/free-sw.html">software libre</a> y el software que no es
+libre reside en <a
+href="/philosophy/free-software-even-more-important.html"> si los usuarios
+controlan el programa o por el contrario el programa controla a los
+usuarios</a>. No es una cuestión directamente relacionada con lo que el
+programa <em>hace</em> cuando se ejecuta. De todas maneras, en la práctica,
+el software que no es libre a menudo es también <cite>malware</cite>. Esto
+se debe a que el desarrollador, sabiendo que a los usuarios se les ha negado
+la posibilidad de poner remedio a las funcionalidades maliciosas, se ve
+tentado a imponer algunas.
+</p>
+
+<p>A continuación se presentan algunos ejemplos de <cite>malware</cite> en los
+automóviles.</p>
+
+<div class="important">
+<p>Si conoce algún otro ejemplo que deberÃa mencionarse en esta página,
+escrÃbanos por favor a <a
+href="mailto:address@hidden"><address@hidden></a>. Incluya la
+URL de una o más referencias confiables que justifiquen su inclusión.</p>
+</div>
+</div>
+<div class="column-limit" id="malware-cars"></div>
+
+<ul class="blurbs">
+ <li id="M201909160">
+ <p>Los usuarios de Tesla denuncian que Tesla <a
+href="https://www.reuters.com/article/us-tesla-battery/tesla-owner-lawsuit-claims-software-update-fraudulently-cut-battery-capacity-idUSKCN1UY2TW">ha
+instalado software de manera forzosa a fin de recortar la autonomÃa de las
+baterÃas</a>, en lugar de sustituir las baterÃas defectuosas. Tesla ha hecho
+esto para evitar la ejecución de la garantÃa.</p>
+
+ <p>Esto significa que el software privativo puede llegar a ser un
instrumento
+para cometer perjurio impunemente.</p>
+ </li>
+
+ <li id="M201904150">
+ <p id="M201509210">Volkswagen programó los ordenadores que controlan el
motor de sus coches
+para que <a
+href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions">detectaran
+las pruebas de emisiones de la Agencia de Protección Medioambiental</a>, y
+seguir contaminando el resto del tiempo. En situaciones reales, los coches
+producÃan emisiones que llegaban a multiplicar por 35 los estándares
+permitidos.</p>
+
+ <p>El uso de software libre no habrÃa impedido que Volkswagen lo
programara de
+esa manera, pero lo habrÃa hecho más difÃcil de ocultar, y habrÃa dado a
los
+usuarios la posibilidad de corregir el engaño.</p>
+
+ <p>Antiguos ejecutivos de Volkswagen están siendo <a
+href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison">encausados
+por este fraude</a>.</p>
+ </li>
+
+ <li id="M201903290">
+ <p>Los vehÃculos Tesla recopilan multitud de datos personales, y <a
+href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">cuando
+van al desguace, los datos personales del conductor van con ellos</a>.</p>
+ </li>
+
+ <li id="M201902011">
+ <p>El sistema FordPass Connect de algunos vehÃculos Ford tiene <a
+href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">acceso
+casi total a la red interna del vehÃculo</a>. Está conectado permanentemente
+a la red del teléfono celular y envÃa multitud de datos a Ford, incluida la
+localización del vehÃculo. Funciona incluso cuando se ha retirado la llave
+de contacto, y los usuarios señalan que no lo pueden inhabilitar.</p>
+
+ <p>Si posee un vehÃculo de este tipo, ¿ha conseguido interrumpir la
conexión
+desconectando el módem del celular o envolviendo la antena con papel de
+aluminio?</p>
+ </li>
+
+ <li id="M201812300">
+ <p>Los nuevos modelos de vehÃculos de GM <a
+href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html">están
+dotados de una puerta trasera universal</a>.</p>
+
+ <p>Todo programa que no es libre ofrece seguridad nula frente a su
+desarrollador, pero de este modo GM ha agravado aún más esa situación.</p>
+ </li>
+
+ <li id="M201811300">
+ <p>En China, es obligatorio que los coches eléctricos estén equipados
con un
+terminal que <a
+href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">transfiere
+datos técnicos, incluida la localización del vehÃculo, a una plataforma
+gestionada por el Gobierno</a>. En la práctica, <a
+href="/proprietary/proprietary-surveillance.html#car-spying">los fabricantes
+recopilan estos datos</a> para su propio espionaje, y luego los remiten a la
+plataforma gubernamental.</p>
+ </li>
+
+ <li id="M201810230">
+ <p>GM <a
+href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">rastreaba
+los programas de radio sintonizados</a> en los vehÃculos «conectados»,
+minuto a minuto.</p>
+
+ <p>GM no pidió consentimiento a los usuarios, pero podrÃa haberlo
obtenido
+fácilmente introduciéndolo furtivamente en el contrato que firman los
+usuarios para suscribirse a un servicio digital u otro. El requisito de
+consentimiento no constituye una protección efectiva.</p>
+
+ <p>Los coches pueden recopilar multitud de datos diferentes: pueden
escuchar,
+observar, seguir los movimientos o rastrear los móviles de los
+pasajeros. <em>Toda</em> recopilación de tales datos debe prohibirse.</p>
+
+ <p>Pero si queremos estar verdaderamente a salvo, debemos asegurarnos de
que el
+equipo del vehÃculo no pueda recopilar ninguno de esos datos, o de que el
+software sea libre, de modo que sepamos que no recopila esos datos.</p>
+ </li>
+
+ <li id="M201711230">
+ <p>Las aplicaciones de asistencia a la conducción de vehÃculos mediante
+inteligencia artificial <a
+href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">rastrean
+todos sus movimientos</a>.</p>
+ </li>
+
+ <li id="M201709290">
+ <p>El sistema de seguridad deficiente de algunos coches hace que sea
posible <a
+href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937">
+activar las bolsas de aire de forma remota</a>.</p>
+ </li>
+
+ <li id="M201709090.1">
+ <p>En algunos coches, Tesla utilizó software para limitar la parte de la
+baterÃa disponible para los usuarios, y puso <a
+href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/">una
+puerta trasera universal en el software</a> para incrementar temporalmente
+ese lÃmite.</p>
+
+ <p>Si bien dejar que los «propietarios» de los vehÃculos utilizaran
toda la
+capacidad de la baterÃa no les hacÃa ningún daño, esa misma puerta trasera
+permitirÃa a Tesla (quizá obedeciendo las órdenes de algún Gobierno)
ordenar
+al coche que dejara de usar la baterÃa. O que llevara a los pasajeros a una
+sala de tortura.</p>
+ </li>
+
+ <li id="M201702170">
+ <p>Las aplicaciones de los móviles para comunicarse <a
+href="https://www.bleepingcomputer.com/news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/">con
+un automóvil supuestamente «inteligente» ofrecen poca seguridad</a>.</p>
+
+ <p>A esto se añade el hecho de que el vehÃculo lleva un módem de
+radiocomunicación que informa permanentemente al Gran Hermano de su
+localización. Si posee un automóvil de este tipo, serÃa razonable
+desconectar el módem a fin de evitar el rastreo.</p>
+ </li>
+
+ <li id="M201611060">
+ <p><a
+href="http://jalopnik.com/america-figured-out-a-new-way-audi-cheated-on-emissions-1788630969">El
+software privativo de Audi utilizó un método sencillo para hacer trampa en
+las pruebas de emisiones</a>, que consistÃa en activar un modo especial de
+cambio de marchas con bajas emisiones, hasta que el coche diese un giro.</p>
+ </li>
+
+ <li id="M201608110">
+ <p>Debido a una seguridad deficiente, <a
+href="http://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844">es
+fácil abrir las puertas de cien millones de automóviles construidos por
+Volkswagen</a>.</p>
+ </li>
+
+ <li id="M201607160">
+ <p id="car-spying">Los automóviles computarizados con software privativo
son <a
+href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">dispositivos
+espÃas</a>.</p>
+ </li>
+
+ <li id="M201602240">
+ <p id="nissan-modem">El Nissan Leaf contiene un módem integrado de
teléfono móvil que permite a
+cualquiera <a
+href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">acceder
+a distancia al ordenador del coche y hacer modificaciones en la
+configuración</a>.</p>
+
+ <p>Es fácil hacerlo porque el sistema no requiere autenticación cuando se
+accede a través del módem. Pero aunque fuese necesaria la autenticación, no
+se puede confiar en que Nissan no tenga acceso. El software del coche es
+privativo, <a href="/philosophy/free-software-even-more-important.html">lo
+que significa que a los usuarios se les pide que confÃen ciegamente en
+él</a>.</p>
+
+ <p>Aun en el caso de que nadie se conecte al coche de forma remota, el
módem
+del móvil hace que la compañÃa telefónica pueda rastrear los movimientos
del
+coche en todo momento; no obstante, es posible quitar fÃsicamente el módem
+del móvil.</p>
+ </li>
+
+ <li id="M201511194">
+ <p>Los vehÃculos Caterpillar tienen <a
+href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">una
+puerta trasera para apagar el motor</a> de forma remota.</p>
+ </li>
+
+ <li id="M201508120">
+ <p>Algunos investigadores en materia de seguridad han descubierto <a
+href="http://www.theguardian.com/technology/2015/aug/12/hack-car-brakes-sms-text">una
+vulnerabilidad en los dispositivos de diagnóstico que se usan para el
+rastreo y el seguro de vehÃculos</a>; la vulnerabilidad consiste en que se
+puede tomar el control a distancia del automóvil o camión a través de un
+mensaje de texto (SMS).</p>
+ </li>
+
+ <li id="M201507214">
+ <p>Algunos delincuentes informáticos lograron <a
+href="http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/">tomar
+el control remoto del «automóvil conectado» Jeep</a>, lo que les permitió
+rastrear el vehÃculo, encender o apagar el motor y activar o desactivar los
+frenos, entre otras cosas.</p>
+
+ <p>Es de suponer que Chrysler y la NSA también pueden hacerlo.</p>
+
+ <p>Si se posee un automóvil que contiene el módem de un teléfono, hay
que
+desactivarlo.</p>
+ </li>
+
+ <li id="M201311130">
+ <p><a
+href="https://www.eff.org/deeplinks/2013/11/drm-cars-will-drive-consumers-crazy">El
+DRM en los automóviles conducirá a los consumidores a la locura</a>.</p>
+ </li>
+
+ <li id="M201306140">
+ <p>Los automóviles Tesla permiten que la compañÃa extraiga datos de
manera
+remota para determinar la ubicación del vehÃculo en cualquier momento (véase
+la Sección 2, párrafos b y c de la <a
+href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">declaración
+de privacidad</a>). La compañÃa afirma que no guarda esa información, pero
+si el Estado le ordena obtener los datos y entregarlos, el Estado los puede
+guardar.</p>
+ </li>
+
+ <li id="M201303250">
+ <p id="records-drivers">El software privativo de los automóviles <a
+href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">recoge
+información sobre los movimientos del usuario</a>, información que está
+disponible para los fabricantes y las compañÃas de seguros, entre otros.</p>
+
+ <p>El caso de los sistemas para el cobro del peaje que se menciona en ese
+artÃculo en realidad no es una cuestión de vigilancia en el software
+privativo. Esos sistemas constituyen una intolerable invasión de la
+privacidad y deben ser reemplazados por sistemas de pago anónimo, pero la
+invasión no se hace mediante <cite>malware</cite>. En los otros casos que
+allà se mencionan sà se hace mediante <cite>malware</cite> presente en el
+automóvil.</p>
+ </li>
+
+ <li id="M201103110">
+ <p>Es posible <a
+href="http://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/">tomar
+el control de ciertos ordenadores en los automóviles a través de
+<cite>malware</cite> en los archivos de música</a>. También <a
+href="http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0">por
+radio</a>. Para más información, véase <a
+href="http://www.autosec.org/faq.html"> Automotive Security And Privacy
+Center</a>.</p>
+ </li>
+</ul>
+
+
+<div class="translators-notes">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
+ </div>
+</div>
+
+<!-- for id="content", starts in the include above -->
+<!--#include virtual="/server/footer.es.html" -->
+<div id="footer">
+<div class="unprintable">
+
+<p>EnvÃe sus consultas acerca de la FSF y GNU a <a
+href="mailto:address@hidden"><address@hidden></a>. Existen también <a
+href="/contact/">otros medios para contactar</a> con la FSF. <br /> Para
+avisar de enlaces rotos y proponer otras correcciones o sugerencias,
+dirÃjase a <a
+href="mailto:address@hidden"><address@hidden></a>.</p>
+
+<p>
+<!-- TRANSLATORS: Ignore the original text in this paragraph,
+ replace it with the translation of these two:
+
+ We work hard and do our best to provide accurate, good quality
+ translations. However, we are not exempt from imperfection.
+ Please send your comments and general suggestions in this regard
+ to <a href="mailto:address@hidden">
+
+ <address@hidden></a>.</p>
+
+ <p>For information on coordinating and submitting translations of
+ our web pages, see <a
+ href="/server/standards/README.translations.html">Translations
+ README</a>. -->
+El equipo de traductores al español se esfuerza por ofrecer traducciones
+fieles al original y de buena calidad, pero no estamos libres de cometer
+errores.<br /> EnvÃe sus comentarios y sugerencias sobre las traducciones a
+<a
+href="mailto:address@hidden"><address@hidden></a>.
+</p><p>Consulte la <a href="/server/standards/README.translations.html">GuÃa
+para las traducciones</a> para obtener información sobre la coordinación y
+el envÃo de traducciones de las páginas de este sitio web.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+ files generated as part of manuals) on the GNU web server should
+ be under CC BY-ND 4.0. Please do NOT change or remove this
+ without talking with the webmasters or licensing team first.
+ Please make sure the copyright date is consistent with the
+ document. For web pages, it is ok to list just the latest year the
+ document was modified, or published.
+
+ If you wish to list earlier years, that is ok too.
+ Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+ years, as long as each year in the range is in fact a copyrightable
+ year, i.e., a year in which the document was published (including
+ being publicly visible on the web or in a revision control system).
+
+ There is more detail about copyright years in the GNU Maintainers
+ Information document, www.gnu.org/prep/maintain. -->
+<p>Copyright © 2017, 2018, 2019 Free Software Foundation, Inc.</p>
+
+<p>Esta página está bajo licencia <a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/deed.es_ES">Creative
+Commons Reconocimiento 4.0 Internacional</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.es.html" -->
+<div class="translators-credits">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.-->
+<strong>Traducción y revisión: Equipo de traductores al español de GNU,
+2019.</strong></div>
+
+<p class="unprintable"><!-- timestamp start -->
+Ãltima actualización:
+
+$Date: 2019/09/24 10:00:05 $
+
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+<!-- for class="inner", starts in the banner include -->
+</body>
+</html>
Index: proprietary/malware-games.es.html
===================================================================
RCS file: proprietary/malware-games.es.html
diff -N proprietary/malware-games.es.html
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ proprietary/malware-games.es.html 24 Sep 2019 10:00:05 -0000 1.1
@@ -0,0 +1,442 @@
+<!--#set var="ENGLISH_PAGE" value="/proprietary/malware-games.en.html" -->
+
+<!--#include virtual="/server/header.es.html" -->
+<!-- Parent-Version: 1.86 -->
+<!--
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ Please do not edit <ul class="blurbs">
+!
+ Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+ See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
+
+<!-- This file is automatically generated by GNUnited Nations! -->
+<title>Malware en los juegos - Proyecto GNU - Free Software Foundation</title>
+
+<!--#include virtual="/proprietary/po/malware-games.translist" -->
+<!--#include virtual="/server/banner.es.html" -->
+<h2><cite>Malware</cite> en los juegos</h2>
+
+<p><a href="/proprietary/proprietary.html">Más ejemplos de
<cite>malware</cite>
+en el software privativo</a></p>
+
+<div class="comment">
+<p>
+<em><cite>Malware</cite></em> se refiere al software que está diseñado de
+tal forma que su funcionamiento maltrata o daña al usuario (no se tienen
+aquÃÂ en cuenta los errores involuntarios).
+</p>
+
+<p>
+El <cite>malware</cite> y el software que no es libre son dos cosas
+diferentes. La diferencia entre el <a
+href="/philosophy/free-sw.html">software libre</a> y el software que no es
+libre reside en <a
+href="/philosophy/free-software-even-more-important.html"> si los usuarios
+controlan el programa o por el contrario el programa controla a los
+usuarios</a>. No es una cuestión directamente relacionada con lo que el
+programa <em>hace</em> cuando se ejecuta. De todas maneras, en la práctica,
+el software que no es libre a menudo es también <cite>malware</cite>. Esto
+se debe a que el desarrollador, sabiendo que a los usuarios se les ha negado
+la posibilidad de poner remedio a las funcionalidades maliciosas, se ve
+tentado a imponer algunas.
+</p>
+
+<p>A continuación se presentan algunos ejemplos de <cite>malware</cite> en los
+juegos.</p>
+
+<div class="important">
+<p>Si conoce algún otro ejemplo que deberÃa mencionarse en esta página,
+escrÃbanos por favor a <a
+href="mailto:address@hidden"><address@hidden></a>. Incluya la
+URL de una o más referencias confiables que justifiquen su inclusión.</p>
+</div>
+</div>
+<div class="column-limit" id="malware-games"></div>
+
+<ul class="blurbs">
+ <li id="M209900000">
+ <p id="addictiveness">Muchos juegos están diseñados para que los
jugadores continúen jugando
+compulsivamente y renueven su suscripción. Para conseguirlo, los
+desarrolladores emplean <a
+href="http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html">técnicas
+derivadas de la investigación del cerebro y de la conducta</a>:</p>
+
+ <dl class="compact"><dt>La caja de Skinner</dt>
+ <dd>Un entorno en el cual se entrena al usuario para que «accione la
palanca»,
+esto es, para que realice una acción determinada una y otra vez a fin de
+obtener una recompensa.</dd>
+
+ <dt>Bocados de comida virtual</dt>
+ <dd>ArtÃculos que no tienen nada que ver con el juego propiamente
dicho, pero
+que son valiosos para los jugadores por el trabajo exigido para obtenerlos
+(por ejemplo, EverQuest); algunos acaban recolectándolos simplemente por
+recolectarlos.</dd>
+
+ <dt>Recompensas aleatorias</dt>
+ <dd>Convierten el juego en el equivalente a una máquina tragamonedas
(por
+ejemplo, World of Warcraft, ZT Online).</dd>
+
+ <dt>Ciclos elaborados</dt>
+ <dd>El comportamiento de los jugadores puede ser «modelado» haciendo
que los
+ciclos (el paso de un nivel al siguiente) sean cada vez más lentos,
+diseñando tareas complejas difÃciles de llevar a cabo (por ejemplo, World of
+Warcraft), o, por el contrario, dividiéndolos en partes más pequeñas para
+evitar la frustración (por ejemplo, Nuevo Super Mario Bros.Wii).</dd>
+
+ <dt>Devaluación de los activos del juego</dt>
+ <dd>Esto hace que el jugador tenga que continuar jugando, sin tomarse
descansos,
+simplemente para evitar perder lo que ha ganado hasta entonces (por ejemplo,
+Farmville, Ultima Online, Animal Crossing).</dd>
+ </dl>
+
+ <p>Juegos como World of Warcraft, que se consideran muy adictivos, emplean
+varias de estas técnicas.</p>
+
+ <p>No obstante, la adictividad de un juego es solo uno de los factores
+determinantes de la adicción. Igualmente importantes son el perfil
+psicológico y las circunstancias vitales del jugador. La adicción a los
+juegos, como cualquier otra adicción, es una vÃa de escape de una vida poco
+gratificante. La triste realidad es que, a la larga, lleva a una vida aún
+peor.</p>
+
+ <p><em>Nota:</em>: No somos jugadores. Si cree que hemos malinterpretado
algo,
+o tiene sugerencias para que el texto sea más claro o más correcto, envÃelas
+a <<a href="mailto:address@hidden">address@hidden</a>>.</p>
+ </li>
+
+ <li id="M209800000">
+ <p>Los desarrolladores de juegos gratuitos para móviles emplean <a
+href="/proprietary/proprietary-addictions.html#addictiveness">técnicas de
+manipulación conductual</a> para <a
+href="https://www.psychguides.com/interact/the-psychology-of-freemium/">convertir
+sus productos en máquinas tragamonedas</a>. Esto se describe claramente en
+la infografÃa del artÃculo.</p>
+
+ <p>Las ganancias generadas por estos juegos están directamente
relacionadas con
+el número de jugadores con una fuerte adicción (llamados «ballenas») y la
+cantidad de dinero que están dispuestos a gastar. Asà los desarrolladores
+estudian minuciosamente el comportamiento de millones de usuarios a fin de
+incrementar la adictividad de sus juegos.</p>
+
+ <p>Desafortunadamente, el artÃculo utiliza el término
«<cite>free</cite>» para
+significar «precio cero». Recomendamos en su lugar decir «gratis».</p>
+ </li>
+
+ <li id="M201908210">
+ <p>Microsoft ha grabado a los usuarios de la Xbox y tenÃa <a
+href="https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">empleados
+dedicados a escuchar las grabaciones</a>.</p>
+
+ <p>Desde el punto de vista moral, no veo ninguna diferencia entre tener
+empleados humanos a la escucha y tener sistemas de reconocimiento del
habla.</p>
+ </li>
+
+ <li id="M201907090">
+ <p>Niños hábiles descubrieron cómo <a
+href="https://www.bbc.co.uk/news/technology-48908766">vaciar la cuenta
+bancaria de sus padres</a>comprando paquetes de jugadores especiales para un
+juego de fútbol de Electronic Arts.</p>
+
+ <p>El carácter aleatorio de estos paquetes (también llamados «cajas de
botÃn»)
+hace que el juego sea <a
+href="/proprietary/proprietary-addictions#addictiveness">muy adictivo</a>,
+pero el hecho de que se presione a los jugadores para que gasten más dinero
+a fin de superar a sus competidores lo convierte ya en «predatorio». Bélgica
+<a
+href="https://www.rockpapershotgun.com/2019/01/29/fifa-ultimate-team-packs-blocked-in-belgium/">ilegalizó
+estas cajas de botÃn</a> en 2018.</p>
+
+ <p>La única buena razón para tener copia de un juego privativo como este
es la
+de estudiarlo para desarrollar una versión libre.</p>
+ </li>
+
+ <li id="M201809210">
+ <p>Clash of Clans es un buen ejemplo de juego gratuito para móviles que
sus
+desarrolladores <a
+href="https://gamerant.com/clash-of-clans-addiction/">hicieron muy
+adictivo</a> para un gran número de usuarios (convirtiéndolo en una caja
+registradora para ellos), empleando <a
+href="/proprietary/proprietary-addictions.html#addictiveness">técnicas de
+manipulación psicológica</a>.</p>
+
+ <p>El artÃculo utiliza el término «<cite>free</cite>» para significar
«precio
+cero», uso que debemos evitar. Recomendamos en su lugar decir «gratis».</p>
+ </li>
+
+ <li id="M201807310">
+ <p>Un videojuego que no es libre, disponible a través del programa cliente
+Steam, que tampoco es libre, <a
+href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-">incluÃa
+un «minero»</a>, esto es, un ejecutable que secuestra la CPU del ordenador
+del usuario para minar alguna criptomoneda.</p>
+ </li>
+
+ <li id="M201806250">
+ <p>El juego Metal Gear Rising para MacOS estaba vinculado a un servidor. La
+compañÃa <a
+href="http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm">
+clausuró el servidor y todas las copias del juego dejaron de
funcionar</a>.</p>
+ </li>
+
+ <li id="M201806240">
+ <p>Red Shell es un código espÃa que se encuentra en muchos juegos
+privativos. <a
+href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">Rastrea
+datos en los ordenadores de los usuarios y los envÃa a terceros</a>.</p>
+ </li>
+
+ <li id="M201804144">
+ <p>Junto con una actualización del masivo juego de multijugadores Guild
Wars 2,
+ArenaNet instaló subrepticiamente un programa espÃa. El programa hacÃa que
+ArenaNet pudiera <a
+href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave">espiar
+todos los procesos abiertos en el ordenador del usuario</a>.</p>
+ </li>
+
+ <li id="M201712060">
+ <p>Vea cómo <a
+href="https://web.archive.org/web/20170319013045/https://www.huffingtonpost.com/joseph-farrell/the-fascinating-psycholog_b_6076502.html">los
+juegos gratuitos en los que se gana poco manipulan psicológicamente a los
+«usados»</a>.</p>
+
+ <p>Estas conductas manipuladoras son funcionalidades maliciosas, y son
posibles
+debido a que el juego es privativo. Si fuera libre, se podrÃan publicar
+versiones no manipuladoras y jugar con estas en su lugar.</p>
+ </li>
+
+ <li id="M201711070">
+ <p>El controlador de un cierto teclado para juegos <a
+href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">envÃa
+información a China</a>.</p>
+ </li>
+
+ <li id="M201612290">
+ <p>En el juego Fruit Pop, el jugador compra poderes con monedas para
obtener
+una puntuación más alta. El jugador consigue monedas al final de cada juego,
+y puede comprar más monedas con dinero real.</p>
+
+ <p>La obtención en una ocasión de una puntuación más alta lleva al
jugador a
+desear luego una puntuación más alta aún. Pero la puntuación mayor
+resultante de los poderes adquiridos <a
+href="https://qz.com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-warping-kids-understanding-of-basic-economic-ideas/">no
+le proporciona al jugador más monedas, y no le ayuda a obtener puntuaciones
+más altas en las siguientes jugadas</a>. Para lograrlo necesitará poderes
+con frecuencia, y habitualmente tiene que pagar para ello dinero real. Como
+los poderes son excitantes y divertidos, el jugador se ve sutilmente
+incitado a comprar más monedas con dinero real para asà obtener poderes, con
+lo cual esto puede convertirse en costoso hábito.</p>
+ </li>
+
+ <li id="M201611070">
+ <p>La tarjeta gráfica privativa GeForce Experience de nVidia <a
+href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">obliga
+a los usuarios a identificarse ,y luego envÃa sus datos personales a los
+servidores de nVidia</a>.</p>
+ </li>
+
+ <li id="M201609240">
+ <p>Una actualización del Street Fighter V de Capcom <a
+href="https://www.theregister.co.uk/2016/09/23/capcom_street_fighter_v/">instalaba
+un controlador que cualquier aplicación instalada en un ordenador con
+Windows podÃa utilizar como puerta trasera</a>, pero fue <a
+href="https://www.rockpapershotgun.com/2016/09/24/street-fighter-v-removes-new-anti-crack">retirada
+inmediatamente</a> debido a la indignación del público.</p>
+ </li>
+
+ <li id="M201605200">
+ <p>Los juegos Oculus Rift ahora tienen <a
+href="https://motherboard.vice.com/en_us/article/vv77ea/new-oculus-drm-cross-platform">
+DRM para impedir que puedan ejecutarse en otros sistemas</a>.</p>
+ </li>
+
+ <li id="M201512290">
+ <p>Muchas <a
+href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">consolas
+para videojuegos espÃan a los usuarios y transmiten la información al
+Internet</a>, incluso el peso fÃsico del usuario.</p>
+
+ <p>Una consola para juegos es un ordenador, y no se puede confiar en un
+ordenador que funciona con un sistema operativo que no es libre.</p>
+ </li>
+
+ <li id="M201509160">
+ <p>Muchas aplicaciones de juegos gratuitas modernas <a
+href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">recogen
+una amplia serie de datos de los usuarios y de los amigos y personas con las
+que estos se relacionan</a>.</p>
+
+ <p>Y lo que es aún peor, lo hacen mediante redes de anuncios que combinan
los
+datos recogidos por diversas aplicaciones y sitios web de distintas
+compañÃas.</p>
+
+ <p>Utilizan estos datos para manipular a la gente e incitar a comprar
cosas, y
+van a la caza de aquellos usuarios a los que pueden hacer gastar mucho
+dinero. Utilizan también una puerta trasera para manipular el desarrollo del
+juego en determinados jugadores.</p>
+
+ <p>Si bien el artÃculo se refiere a los juegos gratuitos, los juegos que
+cuestan dinero pueden utilizar las mismas tácticas.</p>
+ </li>
+
+ <li id="M201507290">
+ <p>Game Of War: Fire Age es un juego para el iPhone con <a
+href="http://www.cracked.com/personal-experiences-1762-5-reasons-i-lost-249000-iphone-game.html">elementos
+adictivos</a> que están basados en varias de las <a
+href="/proprietary/proprietary-addictions.html#addictiveness">técnicas
+descritas arriba</a>, todo ello agravado con la emulación de grupo. Tras un
+comienzo bastante sencillo, el juego se ralentiza y se vuelve más difÃcil,
+de modo que se induce a los jugadores a gastar más y más dinero para
+mantenerse en el grupo. Y se dejan de jugar por algún tiempo, el equipo en
+el que invirtieron es destruido por el «enemigo», a menos que adquieran un
+costoso «escudo» para protegerlo. El juego es además engañoso, ya que
+utiliza menús confusos y estadÃsticas complejas para difuminar el verdadero
+coste monetario.</p>
+ </li>
+
+ <li id="M201410130">
+ <p><a
+href="https://www.eff.org/deeplinks/2014/10/nintendo-updates-take-wii-u-hostage-until-you-agree-new-legal-terms">Nintendo
+saboteó de forma remota todas las Wiis, haciendo que dejaran de funcionar a
+menos que el usuario aceptara un nuevo EULA</a>.</p>
+
+ <p>Podemos estar seguros de que este EULA es injusto, pues la injusticia
es el
+único motivo para imponer un EULA.</p>
+ </li>
+
+ <li id="M201401280">
+ <p>Angry Birds <a
+href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+espÃa por cuenta de las empresas, y la NSA aprovecha para espiar
+también</a>. He aquà más información sobre <a
+href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">otras
+aplicaciones espÃa</a>.</p>
+
+ <p><a
+href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
+Más información sobre las aplicaciones espÃa de la NSA</a>.</p>
+ </li>
+
+ <li id="M201401190">
+ <p>Algunos juegos privativos <a
+href="http://www.theguardian.com/technology/2014/jan/19/apple-talking-cats-in-app-purchases">inducen
+a los niños a gastar el dinero de sus padres</a>.</p>
+ </li>
+
+ <li id="M201105070">
+ <p><a href="https://www.defectivebydesign.org/sony">La Playstation 3 es
+tirana</a>.</p>
+ </li>
+
+ <li id="M201003300">
+ <p>Sony <a
+href="https://www.eff.org/deeplinks/2010/03/sony-steals-feature-from-your-playstation-3">saboteó
+la Playstation 3</a>con una actualización regresiva del
+<cite>firmware</cite> que eliminaba la funcionalidad que permitÃa a los
+usuarios ejecutar GNU/Linux en ella.</p>
+
+ <p>A continuación, Sony mandó a la policÃa tras Geohot, después de que
este
+rompiera el código que impedÃa a los usuarios cambiar el
+<cite>firmware</cite>, a lo cual respondimos con un llamamiento para <a
+href="http://boycottsony.org">boicotear a Sony</a>.</p>
+
+ <p>Tras un acuerdo judicial, Sony está ahora <a
+href="http://arstechnica.com/tech-policy/2016/06/if-you-used-to-run-linux-on-your-ps3-you-could-get-55-from-sony/">pagando
+por el sabotaje</a>.</p>
+ </li>
+
+ <li id="M200510200">
+ <p>Blizzard Warden es un programa para «prevenir las trampas» que <a
+href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">espÃa
+todos los procesos que se ejecutan en el ordenador del jugador y husmea
+buena parte de los datos personales</a>, incluso muchas actividades que no
+tienen nada que ver con las trampas.</p>
+ </li>
+</ul>
+
+
+<div class="translators-notes">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
+ </div>
+</div>
+
+<!-- for id="content", starts in the include above -->
+<!--#include virtual="/server/footer.es.html" -->
+<div id="footer">
+<div class="unprintable">
+
+<p>EnvÃe sus consultas acerca de la FSF y GNU a <a
+href="mailto:address@hidden"><address@hidden></a>. Existen también <a
+href="/contact/">otros medios para contactar</a> con la FSF. <br /> Para
+avisar de enlaces rotos y proponer otras correcciones o sugerencias,
+dirÃjase a <a
+href="mailto:address@hidden"><address@hidden></a>.</p>
+
+<p>
+<!-- TRANSLATORS: Ignore the original text in this paragraph,
+ replace it with the translation of these two:
+
+ We work hard and do our best to provide accurate, good quality
+ translations. However, we are not exempt from imperfection.
+ Please send your comments and general suggestions in this regard
+ to <a href="mailto:address@hidden">
+
+ <address@hidden></a>.</p>
+
+ <p>For information on coordinating and submitting translations of
+ our web pages, see <a
+ href="/server/standards/README.translations.html">Translations
+ README</a>. -->
+El equipo de traductores al español se esfuerza por ofrecer traducciones
+fieles al original y de buena calidad, pero no estamos libres de cometer
+errores.<br /> EnvÃe sus comentarios y sugerencias sobre las traducciones a
+<a
+href="mailto:address@hidden"><address@hidden></a>.
+</p><p>Consulte la <a href="/server/standards/README.translations.html">GuÃa
+para las traducciones</a> para obtener información sobre la coordinación y
+el envÃo de traducciones de las páginas de este sitio web.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+ files generated as part of manuals) on the GNU web server should
+ be under CC BY-ND 4.0. Please do NOT change or remove this
+ without talking with the webmasters or licensing team first.
+ Please make sure the copyright date is consistent with the
+ document. For web pages, it is ok to list just the latest year the
+ document was modified, or published.
+
+ If you wish to list earlier years, that is ok too.
+ Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+ years, as long as each year in the range is in fact a copyrightable
+ year, i.e., a year in which the document was published (including
+ being publicly visible on the web or in a revision control system).
+
+ There is more detail about copyright years in the GNU Maintainers
+ Information document, www.gnu.org/prep/maintain. -->
+<p>Copyright © 2016, 2017, 2018, 2019 Free Software Foundation, Inc.</p>
+
+<p>Esta página está bajo licencia <a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/deed.es_ES">Creative
+Commons Reconocimiento 4.0 Internacional</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.es.html" -->
+<div class="translators-credits">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.-->
+<strong>Traducción y revisión: Equipo de traductores al español de GNU,
+2019.</strong></div>
+
+<p class="unprintable"><!-- timestamp start -->
+Ãltima actualización:
+
+$Date: 2019/09/24 10:00:05 $
+
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+<!-- for class="inner", starts in the banner include -->
+</body>
+</html>
Index: proprietary/malware-webpages.es.html
===================================================================
RCS file: proprietary/malware-webpages.es.html
diff -N proprietary/malware-webpages.es.html
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ proprietary/malware-webpages.es.html 24 Sep 2019 10:00:05 -0000
1.1
@@ -0,0 +1,310 @@
+<!--#set var="ENGLISH_PAGE" value="/proprietary/malware-webpages.en.html" -->
+
+<!--#include virtual="/server/header.es.html" -->
+<!-- Parent-Version: 1.86 -->
+<!--
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ Please do not edit <ul class="blurbs">
+!
+ Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+ See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
+
+<!-- This file is automatically generated by GNUnited Nations! -->
+<title>Malware en las páginas web - Proyecto GNU - Free Software
Foundation</title>
+
+<!--#include virtual="/proprietary/po/malware-webpages.translist" -->
+<!--#include virtual="/server/banner.es.html" -->
+<h2><cite>Malware</cite> en las páginas web</h2>
+
+<p><a href="/proprietary/proprietary.html">Más ejemplos de
<cite>malware</cite>
+en el software privativo</a></p>
+
+<div class="comment">
+ <p>
+ <em><cite>Malware</cite></em> se refiere al software que está diseñado de
+tal forma que su funcionamiento maltrata o daña al usuario (no se tienen
+aquÃÂ en cuenta los errores involuntarios).
+ </p>
+
+ <p>
+ El <cite>malware</cite> y el software que no es libre son dos cosas
+diferentes. La diferencia entre el <a
+href="/philosophy/free-sw.html">software libre</a> y el software que no es
+libre reside en <a
+href="/philosophy/free-software-even-more-important.html"> si los usuarios
+controlan el programa o por el contrario el programa controla a los
+usuarios</a>. No es una cuestión directamente relacionada con lo que el
+programa <em>hace</em> cuando se ejecuta. De todas maneras, en la práctica,
+el software que no es libre a menudo es también <cite>malware</cite>. Esto
+se debe a que el desarrollador, sabiendo que a los usuarios se les ha negado
+la posibilidad de poner remedio a las funcionalidades maliciosas, se ve
+tentado a imponer algunas.
+ </p>
+
+<p>En esta página se muestran ejemplos de sitios web que contienen programas
+JavaScript que espÃan a los usuarios o los engañan. Utilizan lo que nosotros
+llamamos <a href="/philosophy/javascript-trap.html">la trampa de
+JavaScript</a>. Por supuesto que muchos sitios recogen la información que
+los usuarios envÃan, por ejemplo, mediante formularios, pero aquà no
+hablamos de eso.</p>
+
+<div class="important">
+<p>Si conoce algún otro ejemplo que deberÃa mencionarse en esta página,
+escrÃbanos por favor a <a
+href="mailto:address@hidden"><address@hidden></a>. Incluya la
+URL de una o más referencias confiables que justifiquen su inclusión.</p>
+</div>
+</div>
+<div class="column-limit" id="malware-webpages"></div>
+
+<ul class="blurbs">
+ <li id="M201811270">
+ <p>Muchos sitios web utilizan código JavaScript <a
+href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">para
+obtener la información que los usuarios han introducido en un formulario
+pero que no han enviado</a>, a fin de conocer su identidad. Algunos han sido
+<a
+href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">demandados</a>
+por ello.</p>
+
+ <p>La mensajerÃa instantánea de algunos servicios de atención al cliente
+utilizan el mismo tipo de <cite>malware</cite> para <a
+href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119">leer
+lo que los usuarios están tecleando antes de que lo envÃen</a>.</p>
+ </li>
+
+ <li id="M201807190">
+ <p>British Airways utilizó <a
+href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security">código
+JavaScript privativo en su sitio web para entregar los datos personales de
+sus clientes a otras compañÃas</a>.</p>
+ </li>
+
+ <li id="M201805170">
+ <p>El programa Storyful <a
+href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch">espÃa
+a los periodistas que lo usan</a>.</p>
+ </li>
+
+ <li id="M201805080">
+ <p>Un delincuente informático aprovechó un agujero en un software sin
+actualizar para <a
+href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito">introducir
+un «minero» en las páginas web</a> servidas a los visitantes. Este tipo de
+software malicioso secuestra el procesador de la computadora para minar
+alguna criptomoneda. (Advierta que el artÃculo se refiere al software
+infectado como «sistema de gestión de contenidos». Una forma más apropiada
+de denominarlo serÃa «<a
+href="/philosophy/words-to-avoid.es.html#Content">sistema de revisión de
+sitios web</a>»).</p>
+
+ <p>Puesto que el minero era un programa de JavaScript privativo, los
visitantes
+no se habrÃan visto afectados si hubieran utilizado <a
+href="/software/librejs/index.html">LibreJS</a>. También existen algunas
+extensiones para navegadores que <a
+href="https://www.cnet.com/how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/">bloquean
+especÃficamente los mineros JavaScript</a>.</p>
+ </li>
+
+ <li id="M201712300">
+ <p>Algunos programas JavaScript maliciosos <a
+href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research">extraen
+los nombres de usuario contenidos en el gestor de contraseñas del
+navegador</a>.</p>
+ </li>
+
+ <li id="M201711150">
+ <p>Algunos sitios web envÃan código JavaScript para recoger todo lo que
el
+usuario ingresa, <a
+href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/">que
+después se puede utilizar para reproducir la sesión completa</a>.</p>
+
+ <p>Para bloquear ese código JavaScript malicioso, utilice LibreJS.</p>
+ </li>
+
+ <li id="M201701060">
+ <p>Cuando una página usa Disqus para los comentarios, el software
privativo
+Disqus <a
+href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook">carga
+un paquete de software de Facebook en el navegador de todos los que visitan
+la página anónimamente, y pone a disposición de Facebook la URL de la
+página</a>.</p>
+ </li>
+
+ <li id="M201612064">
+ <p>Las ventas por Internet, mediante el rastreo y la vigilancia de los
+clientes, <a
+href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices">hacen
+que las tiendas puedan mostrar precios diferentes a diferentes
+personas</a>. La mayor parte del rastreo se hace registrando la interacción
+con los servidores, pero el software privativo también contribuye.</p>
+ </li>
+
+ <li id="M201611160.1">
+ <p>Un <a
+href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">trabajo
+de investigación</a> que estudió la privacidad y seguridad de 283
+aplicaciones de VPN para Android concluyó que «a pesar de las promesas de
+privacidad, seguridad y anonimato expresadas por la mayorÃa de las
+aplicaciones de VPN, millones de usuarios podrÃan, sin saberlo, estar
+depositando su confianza en falsas garantÃas de seguridad y siendo objeto de
+prácticas abusivas por parte de estas aplicaciones».</p>
+
+ <p>A continuación presentamos dos ejemplos, mencionados en ese trabajo de
+investigación, de aplicaciones de VPN privativas que rastrean a los usuarios
+y violan su privacidad:</p>
+
+ <dl class="compact">
+ <dt>VPN Services HotspotShield</dt>
+ <dd>Inserta código JavaScript en las páginas HTML reenviadas a los
usuarios. El
+propósito declarado de la inserción de JS es mostrar anuncios. Utiliza unas
+cinco bibliotecas de rastreo. Además, redirige el tráfico de los usuarios a
+través de valueclick.com (una página de publicidad personalizada).</dd>
+
+ <dt>WiFi Protector VPN</dt>
+ <dd>Inserta código JavaScript en las páginas HTML y utiliza también
alrededor de
+cinco bibliotecas de rastreo. Los desarrolladores de esta aplicación han
+confirmado que la versión non-premium de la aplicación inserta código
+JavaScript para rastrear a los usuarios y mostrarles anuncios.</dd>
+ </dl>
+ </li>
+
+ <li id="M201603080">
+ <p>Los dispositivos para la lectura de libros electrónicos pueden contener
+código JavaScript, y <a
+href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">a
+veces ese código espÃa a los lectores</a>.</p>
+ </li>
+
+ <li id="M201310110">
+ <p>Flash y JavaScript se usan para <a
+href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">tomar
+la «huella digital» de los dispositivos</a> con el propósito de identificar
+a los usuarios.</p>
+ </li>
+
+ <li id="M201210240">
+ <p>Muchos sitios web traicionan a sus visitantes exponiéndolos a redes
+publicitarias que rastrean a los usuarios. De los 1.000 sitios web más
+visitados, <a
+href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/">el
+84% (al 17/5/2012) instaló <cite>cookies</cite> de terceros en los
+ordenadores de los visitantes, posibilitando asà que otros sitios pudieran
+rastrearlos</a>.</p>
+ </li>
+
+ <li id="M201208210">
+ <p>Muchas páginas web informan a Google sobre sus visitantes mediante el
+servicio Google Analytics, que <a
+href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
+indica a Google la dirección IP y la página visitada</a>.</p>
+ </li>
+
+ <li id="M201200000">
+ <p>Muchos sitios web tratan de apoderarse de las libretas de direcciones
de los
+usuarios (la lista del usuario que contiene los números de teléfono y
+direcciones de correo de otras personas). Esto viola la privacidad de esas
+otras personas.</p>
+ </li>
+
+ <li id="M201110040">
+ <p>Las páginas que contienen los botones «<cite>Like</cite>» <a
+href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html">hacen
+que Facebook rastree a los visitantes de esas páginas</a>, incluso a quienes
+no tienen una cuenta en Facebook.</p>
+ </li>
+
+ <li id="M201003010">
+ <p>Las <a
+href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/"><cite>cookies</cite>
+de Flash Player ayudan a los sitios web a rastrear a los visitantes</a>.</p>
+ </li>
+</ul>
+
+
+<div class="translators-notes">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
+ </div>
+</div>
+
+<!-- for id="content", starts in the include above -->
+<!--#include virtual="/server/footer.es.html" -->
+<div id="footer">
+<div class="unprintable">
+
+<p>EnvÃe sus consultas acerca de la FSF y GNU a <a
+href="mailto:address@hidden"><address@hidden></a>. Existen también <a
+href="/contact/">otros medios para contactar</a> con la FSF. <br /> Para
+avisar de enlaces rotos y proponer otras correcciones o sugerencias,
+dirÃjase a <a
+href="mailto:address@hidden"><address@hidden></a>.</p>
+
+<p>
+<!-- TRANSLATORS: Ignore the original text in this paragraph,
+ replace it with the translation of these two:
+
+ We work hard and do our best to provide accurate, good quality
+ translations. However, we are not exempt from imperfection.
+ Please send your comments and general suggestions in this regard
+ to <a href="mailto:address@hidden">
+
+ <address@hidden></a>.</p>
+
+ <p>For information on coordinating and submitting translations of
+ our web pages, see <a
+ href="/server/standards/README.translations.html">Translations
+ README</a>. -->
+El equipo de traductores al español se esfuerza por ofrecer traducciones
+fieles al original y de buena calidad, pero no estamos libres de cometer
+errores.<br /> EnvÃe sus comentarios y sugerencias sobre las traducciones a
+<a
+href="mailto:address@hidden"><address@hidden></a>.
+</p><p>Consulte la <a href="/server/standards/README.translations.html">GuÃa
+para las traducciones</a> para obtener información sobre la coordinación y
+el envÃo de traducciones de las páginas de este sitio web.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+ files generated as part of manuals) on the GNU web server should
+ be under CC BY-ND 4.0. Please do NOT change or remove this
+ without talking with the webmasters or licensing team first.
+ Please make sure the copyright date is consistent with the
+ document. For web pages, it is ok to list just the latest year the
+ document was modified, or published.
+
+ If you wish to list earlier years, that is ok too.
+ Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+ years, as long as each year in the range is in fact a copyrightable
+ year, i.e., a year in which the document was published (including
+ being publicly visible on the web or in a revision control system).
+
+ There is more detail about copyright years in the GNU Maintainers
+ Information document, www.gnu.org/prep/maintain. -->
+<p>Copyright © 2017, 2018, 2019 Free Software Foundation, Inc.</p>
+
+<p>Esta página está bajo licencia <a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/deed.es_ES">Creative
+Commons Reconocimiento 4.0 Internacional</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.es.html" -->
+<div class="translators-credits">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.-->
+<strong>Traducción y revisión: Equipo de traductores al español de GNU,
+2019.</strong></div>
+
+<p class="unprintable"><!-- timestamp start -->
+Ãltima actualización:
+
+$Date: 2019/09/24 10:00:05 $
+
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+<!-- for class="inner", starts in the banner include -->
+</body>
+</html>
Index: proprietary/po/malware-adobe.es-en.html
===================================================================
RCS file: proprietary/po/malware-adobe.es-en.html
diff -N proprietary/po/malware-adobe.es-en.html
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ proprietary/po/malware-adobe.es-en.html 24 Sep 2019 10:00:05 -0000
1.1
@@ -0,0 +1,168 @@
+<!--#include virtual="/server/header.html" -->
+<!-- Parent-Version: 1.86 -->
+<!--
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ Please do not edit <ul class="blurbs">!
+ Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+ See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
+<title>Adobe's Software Is Malware
+- GNU Project - Free Software Foundation</title>
+ <!--#include virtual="/proprietary/po/malware-adobe.translist" -->
+<!--#include virtual="/server/banner.html" -->
+<h2>Adobe's Software is Malware</h2>
+
+<p><a href="/proprietary/proprietary.html">Other examples of proprietary
+malware</a></p>
+
+<div class="comment">
+<p>
+<em>Malware</em> means software designed to function in ways that
+mistreat or harm the user. (This does not include accidental errors.)
+This page explains how Adobe software is malware.
+</p>
+
+<p>Malware and nonfree software are two different issues. The
+difference between <a href="/philosophy/free-sw.html">free
+software</a> and nonfree software is in
+<a href="/philosophy/free-software-even-more-important.html">
+whether the users have control of the program or vice versa</a>. It's
+not directly a question of what the program <em>does</em> when it
+runs. However, in practice nonfree software is often malware,
+because the developer's awareness that the users would be powerless to fix
+any malicious functionalities tempts the developer to impose some.
+</p>
+
+<div class="important">
+<p>If you know of an example that ought to be in this page but isn't
+here, please write
+to <a href="mailto:address@hidden"><address@hidden></a>
+to inform us. Please include the URL of a trustworthy reference or two
+to serve as specific substantiation.</p>
+</div>
+</div>
+<div class="column-limit" id="malware-adobe"></div>
+
+<ul class="blurbs">
+ <li id="M201701110">
+ <p>An upgrade package for Acrobat Reader <a
+
href="https://www.bleepingcomputer.com/news/software/adobe-acrobat-reader-dc-update-installs-chrome-browser-extension/">silently
+ alters Chrome</a>.</p>
+ </li>
+
+ <li id="M201510220">
+ <p>Adobe nonfree software may halt
+ all other work and freeze a computer <a
+ href="http://shallowsky.com/blog/gimp/non-free-software-surprises.html">
+ to perform a license check</a>, at a random time every 30 days.</p>
+ </li>
+
+ <li id="M201410080">
+ <p>Adobe made “Digital Editions,”
+ the e-reader used by most US libraries, <a
+
href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data to Adobe</a>. Adobe's “excuse”: it's
+ needed to check DRM!</p>
+ </li>
+
+ <li id="M201402200">
+ <p><a
+
href="https://www.scientificamerican.com/article/adobe-software-subscription-model-means-you-cant-own-your-software/">
+ Adobe tools require a subscription</a>. Adobe also tried to <a
+
href="http://chocolateandvodka.com/2014/02/20/adobe-creative-cloud-subscription-warning/">
+ rip people off by making the subscriptions annual</a>, but that is
+ a secondary issue compared with the basic wrong of the time bomb.
+ When a program proprietary, and even malware, don't get distracted
+ by the secondary issues like price.</p>
+
+ <p>Please don't repeat the marketing term “Creative
+ Cloud” except to express revulsion for it. The <a
+ href="/philosophy/words-to-avoid.html#CloudComputing"> term
+ “cloud” is designed to cloud users' minds</a>.</p>
+ </li>
+
+ <li id="M201305100">
+ <p>Adobe applications <a
+ href="https://www.wired.com/2013/05/adobe-creative-cloud-petition/">
+ require periodic connection to a server</a>.</p>
+ </li>
+
+ <li id="M201305060">
+ <p>Adobe applications have time bombs: they <a
+
href="http://techcrunch.com/2013/05/06/adobe-goes-all-in-with-subscription-based-creative-cloud-will-stop-selling-regular-cs-licenses-shrink-wrapped-boxes/">
+ stop working after a certain time</a>, after which the user
+ must pay to extend the time.</p>
+
+ <p>Once there was a problem with the servers
+ that these programs use to check who has paid, and <a
+
href="http://www.macuser.co.uk/9015-adobe-creative-cloud-outage-leaves-adobe-users-locked-out">
+ the applications refused to work for anyone</a>.</p>
+ </li>
+</ul>
+
+
+</div><!-- for id="content", starts in the include above -->
+<!--#include virtual="/server/footer.html" -->
+<div id="footer">
+<div class="unprintable">
+
+<p>Please send general FSF & GNU inquiries to
+<a href="mailto:address@hidden"><address@hidden></a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF. Broken links and other corrections or suggestions can be sent
+to <a href="mailto:address@hidden"><address@hidden></a>.</p>
+
+<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
+ replace it with the translation of these two:
+
+ We work hard and do our best to provide accurate, good quality
+ translations. However, we are not exempt from imperfection.
+ Please send your comments and general suggestions in this regard
+ to <a href="mailto:address@hidden">
+ <address@hidden></a>.</p>
+
+ <p>For information on coordinating and submitting translations of
+ our web pages, see <a
+ href="/server/standards/README.translations.html">Translations
+ README</a>. -->
+Please see the <a
+href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and submitting translations
+of this article.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+ files generated as part of manuals) on the GNU web server should
+ be under CC BY-ND 4.0. Please do NOT change or remove this
+ without talking with the webmasters or licensing team first.
+ Please make sure the copyright date is consistent with the
+ document. For web pages, it is ok to list just the latest year the
+ document was modified, or published.
+
+ If you wish to list earlier years, that is ok too.
+ Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+ years, as long as each year in the range is in fact a copyrightable
+ year, i.e., a year in which the document was published (including
+ being publicly visible on the web or in a revision control system).
+
+ There is more detail about copyright years in the GNU Maintainers
+ Information document, www.gnu.org/prep/maintain. -->
+
+<p>Copyright © 2016, 2018, 2019 Free Software Foundation, Inc.</p>
+
+<p>This page is licensed under a <a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/">Creative
+Commons Attribution 4.0 International License</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.html" -->
+
+<p class="unprintable">Updated:
+<!-- timestamp start -->
+$Date: 2019/09/24 10:00:05 $
+<!-- timestamp end -->
+</p>
+</div>
+</div><!-- for class="inner", starts in the banner include -->
+</body>
+</html>
Index: proprietary/po/malware-appliances.es-en.html
===================================================================
RCS file: proprietary/po/malware-appliances.es-en.html
diff -N proprietary/po/malware-appliances.es-en.html
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ proprietary/po/malware-appliances.es-en.html 24 Sep 2019 10:00:05
-0000 1.1
@@ -0,0 +1,935 @@
+<!--#include virtual="/server/header.html" -->
+<!-- Parent-Version: 1.86 -->
+<!--
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ Please do not edit <ul class="blurbs">!
+ Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+ See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
+<title>Malware in Appliances
+- GNU Project - Free Software Foundation</title>
+ <!--#include virtual="/proprietary/po/malware-appliances.translist" -->
+<!--#include virtual="/server/banner.html" -->
+<h2>Malware in Appliances</h2>
+
+<p><a href="/proprietary/proprietary.html">Other examples of proprietary
+malware</a></p>
+
+<div class="comment">
+<p>
+<em>Malware</em> means software designed to function in ways that
+mistreat or harm the user. (This does not include accidental errors.)
+</p>
+
+<p>
+Malware and nonfree software are two different issues. The difference
+between <a href="/philosophy/free-sw.html">free software</a> and
+nonfree software is in <a
+href="/philosophy/free-software-even-more-important.html">
+whether the users have control of the program or vice versa</a>. It's
+not directly a question of what the program <em>does</em> when it
+runs. However, in practice nonfree software is often malware, because
+the developer's awareness that the users would be powerless to fix any
+malicious functionalities tempts the developer to impose some.
+</p>
+
+<p>Some examples of malware in appliances are listed below.</p>
+
+<div class="important">
+<p>If you know of an example that ought to be in this page but isn't
+here, please write
+to <a href="mailto:address@hidden"><address@hidden></a>
+to inform us. Please include the URL of a trustworthy reference or two
+to serve as specific substantiation.</p>
+</div>
+</div>
+<div class="column-limit" id="malware-appliances"></div>
+
+<ul class="blurbs">
+ <li id="M201904260">
+ <p>The Jibo robot toys were tethered to the manufacturer's server,
+ and <a href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648">
+ the company made them all cease to work</a> by shutting down that
+ server.</p>
+
+ <p>The shutdown might ironically be good for their users, since the
+ product was designed to manipulate people by presenting a phony
+ semblance of emotions, and was most certainly spying on them.</p>
+ </li>
+
+ <li id="M201903210">
+ <p>The Medtronics Conexus Telemetry Protocol has <a
+
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/">
+ two vulnerabilities that affect several models of implantable
+ defibrillators</a> and the devices they connect to.</p>
+
+ <p>This protocol has been around since 2006, and similar
+ vulnerabilities were discovered in an earlier Medtronics communication
+ protocol in 2008. Apparently, nothing was done by the company to
+ correct them. This means you can't rely on proprietary software
+ developers to fix bugs in their products.</p>
+ </li>
+
+ <li id="M201902270">
+ <p>The Ring (now Amazon) doorbell camera is designed so that the
+ manufacturer (now Amazon) can watch all the time. Now it turns out
+ that <a href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
+ anyone else can also watch, and fake videos too</a>.</p>
+
+ <p>The third party vulnerability is presumably
+ unintentional and Amazon will probably fix it. However, we
+ do not expect Amazon to change the design that <a
+ href="/proprietary/proprietary-surveillance.html#M201901100">allows
+ Amazon to watch</a>.</p>
+ </li>
+
+ <li id="M201902080">
+ <p>The HP <a
+ href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
+ “ink subscription” cartridges have DRM that constantly
+ communicates with HP servers</a> to make sure the user is still
+ paying for the subscription, and hasn't printed more pages than were
+ paid for.</p>
+
+ <p>Even though the ink subscription program may be cheaper in some
+ specific cases, it spies on users, and involves totally unacceptable
+ restrictions in the use of ink cartridges that would otherwise be in
+ working order.</p>
+ </li>
+
+ <li id="M201901100">
+ <p>Amazon Ring “security” devices <a
+
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
+ send the video they capture to Amazon servers</a>, which save it
+ long-term.</p>
+
+ <p>In many cases, the video shows everyone that comes near, or merely
+ passes by, the user's front door.</p>
+
+ <p>The article focuses on how Ring used to let individual employees look
+ at the videos freely. It appears Amazon has tried to prevent that
+ secondary abuse, but the primary abuse—that Amazon gets the
+ video—Amazon expects society to surrender to.</p>
+ </li>
+
+ <li id="M201901070">
+ <p>Vizio TVs <a
+
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
+ collect “whatever the TV sees,”</a> in the own words of the
company's
+ CTO, and this data is sold to third parties. This is in return for
+ “better service” (meaning more intrusive ads?) and slightly
+ lower retail prices.</p>
+
+ <p>What is supposed to make this spying acceptable, according to him,
+ is that it is opt-in in newer models. But since the Vizio software is
+ nonfree, we don't know what is actually happening behind the scenes,
+ and there is no guarantee that all future updates will leave the
+ settings unchanged.</p>
+
+ <p>If you already own a Vizio smart TV (or any smart TV, for that
+ matter), the easiest way to make sure it isn't spying on you is
+ to disconnect it from the Internet, and use a terrestrial antenna
+ instead. Unfortunately, this is not always possible. Another option,
+ if you are technically oriented, is to get your own router (which can
+ be an old computer running completely free software), and set up a
+ firewall to block connections to Vizio's servers. Or, as a last resort,
+ you can replace your TV with another model.</p>
+ </li>
+
+ <li id="M201810300">
+ <p>Nearly all “home security cameras” <a
+
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
+ give the manufacturer an unencrypted copy of everything they
+ see</a>. “Home insecurity camera” would be a better
+ name!</p>
+
+ <p>When Consumer Reports tested them, it suggested that these
+ manufacturers promise not to look at what's in the videos. That's not
+ security for your home. Security means making sure they don't get to
+ see through your camera.</p>
+ </li>
+
+ <li id="M201810150">
+ <p>Printer manufacturers are very innovative—at blocking the
+ use of independent replacement ink cartridges. Their “security
+ upgrades” occasionally impose new forms of cartridge DRM. <a
+
href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates">
+ HP and Epson have done this</a>.</p>
+ </li>
+
+ <li id="M201809260">
+ <p>Honeywell's “smart” thermostats communicate
+ only through the company's server. They have
+ all the nasty characteristics of such devices: <a
+
href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9">
+ surveillance, and danger of sabotage</a> (of a specific user, or of
+ all users at once), as well as the risk of an outage (which is what
+ just happened).</p>
+
+ <p>In addition, setting the desired temperature requires running
+ nonfree software. With an old-fashioned thermostat, you can do it
+ using controls right on the thermostat.</p>
+ </li>
+
+ <li id="M201809240">
+ <p>Researchers have discovered how to <a
+
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
+ hide voice commands in other audio</a>, so that people cannot hear
+ them, but Alexa and Siri can.</p>
+ </li>
+
+ <li id="M201807050">
+ <p>The Jawbone fitness tracker was tethered to a proprietary phone
+ app. In 2017, the company shut down and made the app stop working. <a
+
href="https://www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-kept-selling-after-app-closure-says-which">All
+ the existing trackers stopped working forever</a>.</p>
+
+ <p>The article focuses on a further nasty fillip, that sales of the
+ broken devices continued. But we think that is a secondary issue;
+ it made the nasty consequences extend to some additional people.
+ The fundamental wrong was to design the devices to depend on something
+ else that didn't respect users' freedom.</p>
+ </li>
+
+ <li id="M201804140">
+ <p>A medical insurance company <a
+
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
+ offers a gratis electronic toothbrush that snoops on its user by
+ sending usage data back over the Internet</a>.</p>
+ </li>
+
+ <li id="M201804010">
+ <p>Some “Smart” TVs automatically <a
+
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
+ load downgrades that install a surveillance app</a>.</p>
+
+ <p>We link to the article for the facts it presents. It
+ is too bad that the article finishes by advocating the
+ moral weakness of surrendering to Netflix. The Netflix app <a
+ href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
+ malware too</a>.</p>
+ </li>
+
+ <li id="M201802120">
+ <p>Apple devices lock users in <a
+
href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347">
+ solely to Apple services</a> by being designed to be incompatible
+ with all other options, ethical or unethical.</p>
+ </li>
+
+ <li id="M201712240">
+ <p>One of the dangers of the “internet of stings”
+ is that, if you lose your internet service, you also <a
+
href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/">
+ lose control of your house and appliances</a>.</p>
+
+ <p>For your safety, don't use any appliance with a connection to the
+ real internet.</p>
+ </li>
+
+ <li id="M201711200">
+ <p>Amazon recently invited consumers to be suckers and <a
+
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
+ allow delivery staff to open their front doors</a>. Wouldn't you know
+ it, the system has a grave security flaw.</p>
+ </li>
+
+ <li id="M201711100">
+ <p>A remote-control sex toy was found to make <a
+
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
+ recordings of the conversation between two users</a>.</p>
+ </li>
+
+ <li id="M201711080">
+ <p>Logitech will sabotage
+ all Harmony Link household control devices by <a
+
href="https://arstechnica.com/gadgets/2017/11/logitech-to-shut-down-service-and-support-for-harmony-link-devices-in-2018/">
+ turning off the server through which the products' supposed owners
+ communicate with them</a>.</p>
+
+ <p>The owners suspect this is to pressure them to buy a newer model. If
+ they are wise, they will learn, rather, to distrust any product that
+ requires users to talk with them through some specialized service.</p>
+ </li>
+
+ <li id="M201710040">
+ <p>Every “home security” camera, if its
+ manufacturer can communicate with it, is a surveillance device. <a
+
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
+ Canary camera is an example</a>.</p>
+
+ <p>The article describes wrongdoing by the manufacturer, based on
+ the fact that the device is tethered to a server.</p>
+
+ <p><a href="/proprietary/proprietary-tethers.html">More about
+ proprietary tethering</a>.</p>
+
+ <p>But it also demonstrates that the device gives the company
+ surveillance capability.</p>
+ </li>
+
+ <li id="M201709200">
+ <p>A “smart” intravenous pump
+ designed for hospitals is connected to the internet. Naturally <a
+
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml">
+ its security has been cracked</a>.</p>
+
+ <p>Note that this article misuses the term <a
+ href="/philosophy/words-to-avoid.html#Hacker">“hackers”</a>
+ referring to crackers.</p>
+ </li>
+
+ <li id="M201708280">
+ <p>The bad security in many Internet of Stings devices allows <a
+
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
+ to snoop on the people that use them</a>.</p>
+
+ <p>Don't be a sucker—reject all the stings.</p>
+
+ <p>It is unfortunate that the article uses the term <a
+
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
+ </li>
+
+ <li id="M201708230">
+ <p>Sonos <a
+
href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/">
+ told all its customers, “Agree”
+ to snooping or the product will stop working</a>. <a
+
href="https://www.consumerreports.org/consumerist/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/">
+ Another article</a> says they won't forcibly change the software, but
+ people won't be able to get any upgrades and eventually it will
+ stop working.</p>
+ </li>
+
+ <li id="M201708040">
+ <p>While you're using a DJI drone
+ to snoop on other people, DJI is in many cases <a
+
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
+ on you</a>.</p>
+ </li>
+
+ <li id="M201706200">
+ <p>Many models of Internet-connected cameras
+ are tremendously insecure. They have login
+ accounts with hard-coded passwords, which can't be changed, and <a
+
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">there
+ is no way to delete these accounts either</a>.</p>
+ </li>
+
+ <li id="M201705250">
+ <p>The proprietary code that runs pacemakers,
+ insulin pumps, and other medical devices is <a
+ href="http://www.bbc.co.uk/news/technology-40042584"> full of gross
+ security faults</a>.</p>
+ </li>
+
+ <li id="M201705180">
+ <p>Bird and rabbit pets were implemented for Second
+ Life by a company that tethered their food to a server. <a
+
href="https://www.rockpapershotgun.com/2017/05/19/second-life-ozimals-pet-rabbits-dying">
+ It shut down the server and the pets more or less died</a>.</p>
+ </li>
+
+ <li id="M201704190">
+ <p>Users are suing Bose for <a
+
href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
+ distributing a spyware app for its headphones</a>. Specifically,
+ the app would record the names of the audio files users listen to
+ along with the headphone's unique serial number.</p>
+
+ <p>The suit accuses that this was done without the users' consent.
+ If the fine print of the app said that users gave consent for this,
+ would that make it acceptable? No way! It should be flat out <a
+ href="/philosophy/surveillance-vs-democracy.html"> illegal to design
+ the app to snoop at all</a>.</p>
+ </li>
+
+ <li id="M201704120">
+ <p>Anova sabotaged users' cooking devices
+ with a downgrade that tethered them to a remote server. <a
+
href="https://web.archive.org/web/20170415145520/https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/">Unless
+ users create an account on Anova's servers, their cookers won't
+ function</a>.</p>
+ </li>
+
+ <li id="M201703270">
+ <p>When Miele's Internet of
+ Stings hospital disinfectant dishwasher is <a
+
href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">
+ connected to the Internet, its security is crap</a>.</p>
+
+ <p>For example, a cracker can gain access to the dishwasher's
+ filesystem, infect it with malware, and force the dishwasher to launch
+ attacks on other devices in the network. Since these dishwashers are
+ used in hospitals, such attacks could potentially put hundreds of
+ lives at risk.</p>
+ </li>
+
+ <li id="M201703140">
+ <p>A computerized vibrator <a
+
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping on its users through the proprietary control app</a>.</p>
+
+ <p>The app was reporting the temperature of the vibrator minute by
+ minute (thus, indirectly, whether it was surrounded by a person's
+ body), as well as the vibration frequency.</p>
+
+ <p>Note the totally inadequate proposed response: a labeling
+ standard with which manufacturers would make statements about their
+ products, rather than free software which users could have checked
+ and changed.</p>
+
+ <p>The company that made the vibrator <a
+
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued for collecting lots of personal information about how people
+ used it</a>.</p>
+
+ <p>The company's statement that it was anonymizing the data may be
+ true, but it doesn't really matter. If it had sold the data to a data
+ broker, the data broker would have been able to figure out who the
+ user was.</p>
+
+ <p>Following this lawsuit, <a
+
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company has been ordered to pay a total of C$4m</a> to its
+ customers.</p>
+ </li>
+
+ <li id="M201702280">
+ <p>“CloudPets” toys with microphones <a
+
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
+ leak childrens' conversations to the manufacturer</a>. Guess what? <a
+
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
+ Crackers found a way to access the data</a> collected by the
+ manufacturer's snooping.</p>
+
+ <p>That the manufacturer and the FBI could listen to these
+ conversations was unacceptable by itself.</p>
+ </li>
+
+ <li id="M201702200">
+ <p>If you buy a used “smart”
+ car, house, TV, refrigerator, etc., usually <a
+
href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html">the
+ previous owners can still remotely control it</a>.</p>
+ </li>
+
+ <li id="M201702060">
+ <p>Vizio “smart” <a
+
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything that is viewed on them, and not just broadcasts and
+ cable</a>. Even if the image is coming from the user's own computer,
+ the TV reports what it is. The existence of a way to disable the
+ surveillance, even if it were not hidden as it was in these TVs,
+ does not legitimize the surveillance.</p>
+ </li>
+
+ <li id="M201701271">
+ <p>A cracker would be able to <a
+ href="https://uploadvr.com/hackable-webcam-oculus-sensor-be-aware/">
+ turn the Oculus Rift sensors into spy cameras</a> after breaking into
+ the computer they are connected to.</p>
+
+ <p>Unfortunately, the article <a
+ href="/philosophy/words-to-avoid.html#Hacker">improperly refers to crackers
+ as “hackers”</a>.</p>
+ </li>
+
+ <li id="M201612230">
+ <p>VR equipment, measuring every slight motion,
+ creates the potential for the most intimate
+ surveillance ever. All it takes to make this potential real <a
+
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/">is
+ software as malicious as many other programs listed in this
+ page</a>.</p>
+
+ <p>You can bet Facebook will implement the maximum possible
+ surveillance on Oculus Rift devices. The moral is, never trust a VR
+ system with nonfree software in it.</p>
+ </li>
+
+ <li id="M201612200">
+ <p>The developer of Ham Radio Deluxe <a
+
href="https://www.techdirt.com/articles/20161220/12411836320/company-bricks-users-software-after-he-posts-negative-review.shtml">sabotaged
+ a customer's installation as punishment for posting a negative
+ review</a>.</p>
+
+ <p>Most proprietary software companies don't use their power so
+ harshly, but it is an injustice that they all <em>have</em> such
+ power.</p>
+ </li>
+
+ <li id="M201612060.1">
+ <p>The “smart” toys My Friend Cayla and i-Que can be <a
+
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">remotely
+ controlled with a mobile phone</a>; physical access is not
+ necessary. This would enable crackers to listen in on a child's
+ conversations, and even speak into the toys themselves.</p>
+
+ <p>This means a burglar could speak into the toys and ask the child
+ to unlock the front door while Mommy's not looking.</p>
+ </li>
+
+ <li id="M201609200">
+ <p>HP's firmware downgrade <a
+
href="https://www.theguardian.com/technology/2016/sep/20/hp-inkjet-printers-unofficial-cartridges-software-update">imposed
+ DRM on some printers, which now refuse to function with third-party
+ ink cartridges</a>.</p>
+ </li>
+
+ <li id="M201608080">
+ <p>Ransomware <a
+
href="https://www.pentestpartners.com/security-blog/thermostat-ransomware-a-lesson-in-iot-security/">
+ has been developed for a thermostat that uses proprietary
+ software</a>.</p>
+ </li>
+
+ <li id="M201605020">
+ <p>Samsung's “Smart Home” has a big security hole; <a
+
href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/">
+ unauthorized people can remotely control it</a>.</p>
+
+ <p>Samsung claims that this is an “open” platform so the
+ problem is partly the fault of app developers. That is clearly true
+ if the apps are proprietary software.</p>
+
+ <p>Anything whose name is “Smart” is most likely going
+ to screw you.</p>
+ </li>
+
+ <li id="M201604110">
+ <p>Malware was found on <a
+
href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html">
+ security cameras available through Amazon</a>.</p>
+
+ <p>A camera that records locally on physical media, and has no network
+ connection, does not threaten people with surveillance—neither
+ by watching people through the camera, nor through malware in the
+ camera.</p>
+ </li>
+
+ <li id="M201604050">
+ <p>Revolv is a device that managed “smart home”
+ operations: switching lights, operate motion sensors, regulating
+ temperature, etc. Its proprietary software depends on a remote server
+ to do these tasks. On May 15th, 2016, Google/Alphabet <a
+
href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be">intentionally
+ broke it by shutting down the server</a>.</p>
+
+ <p>If it were free software, users would have the ability to make it
+ work again, differently, and then have a freedom-respecting home
+ instead of a “smart” home. Don't let proprietary software
+ control your devices and turn them into $300 out-of-warranty
+ bricks. Insist on self-contained computers that run free software!</p>
+ </li>
+
+ <li id="M201603220">
+ <p>Over 70 brands of network-connected surveillance cameras have <a
+
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
+ security bugs that allow anyone to watch through them</a>.</p>
+ </li>
+
+ <li id="M201601100">
+ <p>The <a
+ href="http://michaelweinberg.org/post/137045828005/free-the-cube">
+ “Cube” 3D printer was designed with DRM</a>: it
+ won't accept third-party printing materials. It is the Keurig of
+ printers. Now it is being discontinued, which means that eventually
+ authorized materials won't be available and the printers may become
+ unusable.</p>
+
+ <p>With a <a
+ href="http://www.fsf.org/resources/hw/endorsement/aleph-objects">
+ printer that gets the Respects Your Freedom</a>, this problem would
+ not even be a remote possibility.</p>
+
+ <p>How pitiful that the author of that article says that there was
+ “nothing wrong” with designing the device to restrict
+ users in the first place. This is like putting a “cheat me and
+ mistreat me” sign on your chest. We should know better: we
+ should condemn all companies that take advantage of people like him.
+ Indeed, it is the acceptance of their unjust practice that teaches
+ people to be doormats.</p>
+ </li>
+
+ <li id="M201512140">
+ <p>Philips “smart” lightbulbs had initially been
+ designed to interact with other companies' smart light bulbs, but <a
+
href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml">
+ later the company updated the firmware to disallow
+ interoperability</a>.</p>
+
+ <p>If a product is “smart”, and you didn't build it,
+ it is cleverly serving its manufacturer <em>against you</em>.</p>
+ </li>
+
+ <li id="M201512074">
+ <p><a
+
href="http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html">
+ Some D-Link routers</a> have a back door for changing settings in a
+ dlink of an eye.</p>
+
+ <p><a href="http://sekurak.pl/tp-link-httptftp-backdoor/"> The TP-Link
+ router has a back door</a>.</p>
+
+ <p><a href="https://github.com/elvanderb/TCP-32764">Many models of
+ routers have back doors</a>.</p>
+ </li>
+
+ <li id="M201511250">
+ <p>The Nest Cam “smart” camera is <a
+ href="http://www.bbc.com/news/technology-34922712">always watching</a>,
+ even when the “owner” switches it “off.”</p>
+
+ <p>A “smart” device means the manufacturer is using it
+ to outsmart you.</p>
+ </li>
+
+ <li id="M201511198">
+ <p>ARRIS cable modem has a <a
+
href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
+ back door in the back door</a>.</p>
+ </li>
+
+ <li id="M201511130">
+ <p>Some web and TV advertisements play inaudible
+ sounds to be picked up by proprietary malware running
+ on other devices in range so as to determine that they
+ are nearby. Once your Internet devices are paired with
+ your TV, advertisers can correlate ads with Web activity, and other <a
+
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
+ cross-device tracking</a>.</p>
+ </li>
+
+ <li id="M201511060">
+ <p>Vizio goes a step further than other TV
+ manufacturers in spying on their users: their <a
+
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits in detail and
+ link them your IP address</a> so that advertisers can track you
+ across devices.</p>
+
+ <p>It is possible to turn this off, but having it enabled by default
+ is an injustice already.</p>
+ </li>
+
+ <li id="M201511020">
+ <p>Tivo's alliance with Viacom adds 2.3 million households
+ to the 600 millions social media profiles the company
+ already monitors. Tivo customers are unaware they're
+ being watched by advertisers. By combining TV viewing
+ information with online social media participation, Tivo can now <a
+ href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
+ correlate TV advertisement with online purchases</a>, exposing all
+ users to new combined surveillance by default.</p>
+ </li>
+
+ <li id="M201510210">
+ <p>FitBit fitness trackers have a <a
+
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/">
+ Bluetooth vulnerability</a> that allows attackers to send malware
+ to the devices, which can subsequently spread to computers and other
+ FitBit trackers that interact with them.</p>
+ </li>
+
+ <li id="M201510200">
+ <p>“Self-encrypting” disk drives
+ do the encryption with proprietary firmware so you
+ can't trust it. Western Digital's “My Passport” drives <a
+
href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">
+ have a back door</a>.</p>
+ </li>
+
+ <li id="M201507240">
+ <p>Vizio “smart” TVs recognize and <a
+ href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
+ what people are watching</a>, even if it isn't a TV channel.</p>
+ </li>
+
+ <li id="M201506080">
+ <p>Due to bad security in a drug pump, crackers could use it to <a
+
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/">
+ kill patients</a>.</p>
+ </li>
+
+ <li id="M201505290">
+ <p>Verizon cable TV <a
+
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
+ snoops on what programs people watch, and even what they wanted to
+ record</a>.</p>
+ </li>
+
+ <li id="M201505050">
+ <p>Hospira infusion pumps, which are used
+ to administer drugs to a patient, were rated “<a
+
href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/">least
+ secure IP device I've ever seen</a>” by a security
+ researcher.</p>
+
+ <p>Depending on what drug is being infused, the insecurity could open
+ the door to murder.</p>
+ </li>
+
+ <li id="M201504300">
+ <p>Vizio <a
+ href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
+ used a firmware “upgrade” to make its TVs snoop on what
+ users watch</a>. The TVs did not do that when first sold.</p>
+ </li>
+
+ <li id="M201502180">
+ <p>Barbie <a
+
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
+ going to spy on children and adults</a>.</p>
+ </li>
+
+ <li id="M201502090">
+ <p>The Samsung “Smart” TV <a
+
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
+ transmits users' voice on the internet to another company, Nuance</a>.
+ Nuance can save it and would then have to give it to the US or some
+ other government.</p>
+
+ <p>Speech recognition is not to be trusted unless it is done by free
+ software in your own computer.</p>
+
+ <p>In its privacy policy, Samsung explicitly confirms that <a
+
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
+ data containing sensitive information will be transmitted to third
+ parties</a>.</p>
+ </li>
+
+ <li id="M201411090">
+ <p>The Amazon “Smart” TV is <a
+
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
+ snooping all the time</a>.</p>
+ </li>
+
+ <li id="M201409290">
+ <p>More or less all “smart” TVs <a
+
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on their users</a>.</p>
+
+ <p>The report was as of 2014, but we don't expect this has got
+ better.</p>
+
+ <p>This shows that laws requiring products to get users' formal
+ consent before collecting personal data are totally inadequate.
+ And what happens if a user declines consent? Probably the TV will
+ say, “Without your consent to tracking, the TV will not
+ work.”</p>
+
+ <p>Proper laws would say that TVs are not allowed to report what the
+ user watches—no exceptions!</p>
+ </li>
+
+ <li id="M201407170">
+ <p id="nest-thermometers">Nest thermometers send <a
+ href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a lot of
+ data about the user</a>.</p>
+ </li>
+
+ <li id="M201405200.1">
+ <p>LG <a
+
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
+ disabled network features</a> on <em>previously purchased</em>
+ “smart” TVs, unless the purchasers agreed to let LG begin
+ to snoop on them and distribute their personal data.</p>
+ </li>
+
+ <li id="M201404250">
+ <p>Lots of <a
+ href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">
+ hospital equipment has lousy security</a>, and it can be fatal.</p>
+ </li>
+
+ <li id="M201312290">
+ <p><a href="http://www.bunniestudios.com/blog/?p=3554"> Some flash
+ memories have modifiable software</a>, which makes them vulnerable
+ to viruses.</p>
+
+ <p>We don't call this a “back door” because it is normal
+ that you can install a new system in a computer, given physical access
+ to it. However, memory sticks and cards should not be modifiable in
+ this way.</p>
+ </li>
+
+ <li id="M201312040">
+ <p><a
+
href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/">
+ Point-of-sale terminals running Windows were taken over</a> and
+ turned into a botnet for the purpose of collecting customers' credit
+ card numbers.</p>
+ </li>
+
+ <li id="M201311210">
+ <p>Spyware in LG “smart” TVs <a
+
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ reports what the user watches, and the switch to turn this off has
+ no effect</a>. (The fact that the transmission reports a 404 error
+ really means nothing; the server could save that data anyway.)</p>
+
+ <p>Even worse, it <a
+
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ snoops on other devices on the user's local network</a>.</p>
+
+ <p>LG later said it had installed a patch to stop this, but any
+ product could spy this way.</p>
+ </li>
+
+ <li id="M201310070">
+ <p id="bluray"><a
+
href="http://web.archive.org/web/20131007102857/http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up">
+ DVDs and Bluray disks have DRM</a>.</p>
+
+ <p>That page uses spin terms that favor DRM, including <a
+ href="/philosophy/words-to-avoid.html#DigitalRightsManagement">
+ digital “rights” management</a> and <a
+
href="/philosophy/words-to-avoid.html#Protection">“protect”</a>,
+ and it claims that “artists” (rather than companies)
+ are primarily responsible for putting digital restrictions management
+ into these disks. Nonetheless, it is a reference for the facts.</p>
+
+ <p>Every Bluray disk (with few, rare exceptions) has DRM—so
+ don't use Bluray disks!</p>
+ </li>
+
+ <li id="M201309050">
+ <p>The FTC punished a company for making webcams with <a
+
href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html">
+ bad security so that it was easy for anyone to watch through
+ them</a>.</p>
+ </li>
+
+ <li id="M201308060">
+ <p><a href="http://spritesmods.com/?art=hddhack&page=6">
+ Replaceable nonfree software in disk drives can be written by a
+ nonfree program</a>. This makes any system vulnerable to persistent
+ attacks that normal forensics won't detect.</p>
+ </li>
+
+ <li id="M201307270">
+ <p> It is possible to <a
+
href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/">
+ kill people by taking control of medical
+ implants by radio</a>. More information in <a
+ href="http://www.bbc.co.uk/news/technology-17631838">BBC
+ News</a> and <a
+
href="https://ioactive.com/broken-hearts-how-plausible-was-the-homeland-pacemaker-hack/">
+ IOActive Labs Research blog</a>.</p>
+ </li>
+
+ <li id="M201307260">
+ <p><a
+
href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/">
+ “Smart homes”</a> turn out to be stupidly vulnerable to
+ intrusion.</p>
+ </li>
+
+ <li id="M201307114">
+ <p>HP “storage appliances” that
+ use the proprietary “Left Hand”
+ operating system have back doors that give HP <a
+
href="https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/">
+ remote login access</a> to them. HP claims that this does not
+ give HP access to the customer's data, but if the back door allows
+ installation of software changes, a change could be installed that
+ would give access to the customer's data.</p>
+ </li>
+
+ <li id="M201212290">
+ <p>The Cisco TNP IP phones are <a
+ href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+ spying devices</a>.</p>
+ </li>
+
+ <li id="M201212180">
+ <p>Samsung “Smart” TVs have <a
+
href="https://wiki.samygo.tv/index.php?title=SamyGO_for_DUMMIES#What_are_Restricted_Firmwares.3F">
+ turned Linux into the base for a tyrant system</a> so as to impose
+ DRM. What enables Samsung to do this is that Linux is released
+ under GNU GPL version 2, <a
+ href="/licenses/rms-why-gplv3.html">not version 3</a>, together with
+ a weak interpretation of GPL version 2.</p>
+ </li>
+
+ <li id="M201212170">
+ <p id="break-security-smarttv"><a
+
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
+ Crackers found a way to break security on a “smart” TV</a>
+ and use its camera to watch the people who are watching TV.</p>
+ </li>
+
+ <li id="M201210020">
+ <p>Some LG TVs <a
+ href="http://openlgtv.org.ru/wiki/index.php/Achievements">are
+ tyrants</a>.</p>
+ </li>
+</ul>
+
+
+</div><!-- for id="content", starts in the include above -->
+<!--#include virtual="/server/footer.html" -->
+<div id="footer">
+<div class="unprintable">
+
+<p>Please send general FSF & GNU inquiries to
+<a href="mailto:address@hidden"><address@hidden></a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF. Broken links and other corrections or suggestions can be sent
+to <a href="mailto:address@hidden"><address@hidden></a>.</p>
+
+<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
+ replace it with the translation of these two:
+
+ We work hard and do our best to provide accurate, good quality
+ translations. However, we are not exempt from imperfection.
+ Please send your comments and general suggestions in this regard
+ to <a href="mailto:address@hidden">
+ <address@hidden></a>.</p>
+
+ <p>For information on coordinating and submitting translations of
+ our web pages, see <a
+ href="/server/standards/README.translations.html">Translations
+ README</a>. -->
+Please see the <a
+href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and submitting translations
+of this article.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+ files generated as part of manuals) on the GNU web server should
+ be under CC BY-ND 4.0. Please do NOT change or remove this
+ without talking with the webmasters or licensing team first.
+ Please make sure the copyright date is consistent with the
+ document. For web pages, it is ok to list just the latest year the
+ document was modified, or published.
+
+ If you wish to list earlier years, that is ok too.
+ Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+ years, as long as each year in the range is in fact a copyrightable
+ year, i.e., a year in which the document was published (including
+ being publicly visible on the web or in a revision control system).
+
+ There is more detail about copyright years in the GNU Maintainers
+ Information document, www.gnu.org/prep/maintain. -->
+
+<p>Copyright © 2016, 2017, 2018, 2019 Free Software Foundation, Inc.</p>
+
+<p>This page is licensed under a <a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/">Creative
+Commons Attribution 4.0 International License</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.html" -->
+
+<p class="unprintable">Updated:
+<!-- timestamp start -->
+$Date: 2019/09/24 10:00:05 $
+<!-- timestamp end -->
+</p>
+</div>
+</div><!-- for class="inner", starts in the banner include -->
+</body>
+</html>
Index: proprietary/po/malware-cars.es-en.html
===================================================================
RCS file: proprietary/po/malware-cars.es-en.html
diff -N proprietary/po/malware-cars.es-en.html
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ proprietary/po/malware-cars.es-en.html 24 Sep 2019 10:00:05 -0000
1.1
@@ -0,0 +1,346 @@
+<!--#include virtual="/server/header.html" -->
+<!-- Parent-Version: 1.86 -->
+<!--
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ Please do not edit <ul class="blurbs">!
+ Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+ See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
+<title>Malware In Cars
+- GNU Project - Free Software Foundation</title>
+ <!--#include virtual="/proprietary/po/malware-cars.translist" -->
+<!--#include virtual="/server/banner.html" -->
+<h2>Malware In Cars</h2>
+
+<p><a href="/proprietary/proprietary.html">Other examples of proprietary
+malware</a></p>
+
+<div class="comment">
+<p>
+<em>Malware</em> means software designed to function in ways that
+mistreat or harm the user. (This does not include accidental errors.)
+</p>
+
+<p>
+Malware and nonfree software are two different issues. The difference
+between <a href="/philosophy/free-sw.html">free software</a> and
+nonfree software is in <a
+href="/philosophy/free-software-even-more-important.html">
+whether the users have control of the program or vice versa</a>. It's
+not directly a question of what the program <em>does</em> when it
+runs. However, in practice nonfree software is often malware, because
+the developer's awareness that the users would be powerless to fix any
+malicious functionalities tempts the developer to impose some.
+</p>
+
+<p>Some examples of malware in cars are listed below.</p>
+
+<div class="important">
+<p>If you know of an example that ought to be in this page but isn't
+here, please write
+to <a href="mailto:address@hidden"><address@hidden></a>
+to inform us. Please include the URL of a trustworthy reference or two
+to serve as specific substantiation.</p>
+</div>
+</div>
+<div class="column-limit" id="malware-cars"></div>
+
+<ul class="blurbs">
+ <li id="M201909160">
+ <p>Tesla users claim Tesla <a
+
href="https://www.reuters.com/article/us-tesla-battery/tesla-owner-lawsuit-claims-software-update-fraudulently-cut-battery-capacity-idUSKCN1UY2TW">force-installed
+ software to cut down on battery range</a>, rather than replace the
+ defective batteries. Tesla did this to avoid having to run their
+ warranty.</p>
+
+ <p>This means that proprietary software can potentially be a way to
+ commit perjury with impunity.</p>
+ </li>
+
+ <li id="M201904150">
+ <p id="M201509210">Volkswagen programmed its car engine computers to <a
+
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions">
+ detect the Environmental Protection Agency's emission tests</a>, and
+ run dirty the rest of the time. In real driving, the cars exceeded
+ emissions standards by a factor of up to 35.</p>
+
+ <p>Using free software would not have stopped Volkswagen from
+ programming it this way, but would have made it harder to conceal,
+ and given the users the possibility of correcting the deception.</p>
+
+ <p>Former executives of Volkswagen are being <a
+
href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison">
+ sued over this fraud</a>.</p>
+ </li>
+
+ <li id="M201903290">
+ <p>Tesla cars collect lots of personal data, and <a
+
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">
+ when they go to a junkyard the driver's personal data goes with
+ them</a>.</p>
+ </li>
+
+ <li id="M201902011">
+ <p>The FordPass Connect feature of some Ford vehicles has <a
+
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
+ near-complete access to the internal car network</a>. It is constantly
+ connected to the cellular phone network and sends Ford a lot of data,
+ including car location. This feature operates even when the ignition
+ key is removed, and users report that they can't disable it.</p>
+
+ <p>If you own one of these cars, have you succeeded in breaking the
+ connectivity by disconnecting the cellular modem, or wrapping the
+ antenna in aluminum foil?</p>
+ </li>
+
+ <li id="M201812300">
+ <p>New GM cars <a
+ href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html">
+ offer the feature of a universal back door</a>.</p>
+
+ <p>Every nonfree program offers the user zero security against its
+ developer. With this malfeature, GM has explicitly made things even
+ worse.</p>
+ </li>
+
+ <li id="M201811300">
+ <p>In China, it is mandatory for electric
+ cars to be equipped with a terminal that <a
+ href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
+ transfers technical data, including car location,
+ to a government-run platform</a>. In practice, <a
+ href="/proprietary/proprietary-surveillance.html#car-spying">
+ manufacturers collect this data</a> as part of their own spying, then
+ forward it to the government-run platform.</p>
+ </li>
+
+ <li id="M201810230">
+ <p>GM <a
+ href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
+ tracked the choices of radio programs</a> in its
+ “connected” cars, minute by minute.</p>
+
+ <p>GM did not get users' consent, but it could have got that easily by
+ sneaking it into the contract that users sign for some digital service
+ or other. A requirement for consent is effectively no protection.</p>
+
+ <p>The cars can also collect lots of other data: listening to you,
+ watching you, following your movements, tracking passengers' cell
+ phones. <em>All</em> such data collection should be forbidden.</p>
+
+ <p>But if you really want to be safe, we must make sure the car's
+ hardware cannot collect any of that data, or that the software
+ is free so we know it won't collect any of that data.</p>
+ </li>
+
+ <li id="M201711230">
+ <p>AI-powered driving apps can <a
+
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
+ track your every move</a>.</p>
+ </li>
+
+ <li id="M201709290">
+ <p>Bad security in some cars makes it possible to <a
+ href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937">
+ remotely activate the airbags</a>.</p>
+ </li>
+
+ <li id="M201709090.1">
+ <p>Tesla used software to limit the part of the battery
+ that was available to customers in some cars, and <a
+
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/">
+ a universal back door in the software</a> to temporarily increase
+ this limit.</p>
+
+ <p>While remotely allowing car “owners” to use the
+ whole battery capacity did not do them any harm, the same back
+ door would permit Tesla (perhaps under the command of some
+ government) to remotely order the car to use none of its battery. Or
+ perhaps to drive its passenger to a torture prison.</p>
+ </li>
+
+ <li id="M201702170">
+ <p>The mobile apps for communicating <a
+
href="https://www.bleepingcomputer.com/news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/">with
+ a smart but foolish car have very bad security</a>.</p>
+
+ <p>This is in addition to the fact that the car contains a cellular
+ modem that tells big brother all the time where it is. If you own
+ such a car, it would be wise to disconnect the modem so as to turn
+ off the tracking.</p>
+ </li>
+
+ <li id="M201611060">
+ <p><a
+
href="http://jalopnik.com/america-figured-out-a-new-way-audi-cheated-on-emissions-1788630969">
+ Audi's proprietary software used a simple method to cheat on emissions
+ tests</a>: to activate a special low-emission gearshifting mode until
+ the first time the car made a turn.</p>
+ </li>
+
+ <li id="M201608110">
+ <p>Due to weak security, <a
+
href="http://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844">it
+ is easy to open the doors of 100 million cars built by
+ Volkswagen</a>.</p>
+ </li>
+
+ <li id="M201607160">
+ <p id="car-spying">Computerized cars with nonfree software are <a
+
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
+ snooping devices</a>.</p>
+ </li>
+
+ <li id="M201602240">
+ <p id="nissan-modem">The Nissan Leaf has a built-in
+ cell phone modem which allows effectively anyone to <a
+ href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">
+ access its computers remotely and make changes in various
+ settings</a>.</p>
+
+ <p>That's easy to do because the system has no authentication
+ when accessed through the modem. However, even if it asked
+ for authentication, you couldn't be confident that Nissan
+ has no access. The software in the car is proprietary, <a
+ href="/philosophy/free-software-even-more-important.html">which means
+ it demands blind faith from its users</a>.</p>
+
+ <p>Even if no one connects to the car remotely, the cell phone modem
+ enables the phone company to track the car's movements all the time;
+ it is possible to physically remove the cell phone modem, though.</p>
+ </li>
+
+ <li id="M201511194">
+ <p>Caterpillar vehicles come with <a
+
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">
+ a back door to shutoff the engine</a> remotely.</p>
+ </li>
+
+ <li id="M201508120">
+ <p>Security researchers discovered a <a
+
href="http://www.theguardian.com/technology/2015/aug/12/hack-car-brakes-sms-text">
+ vulnerability in diagnostic dongles used for vehicle tracking and
+ insurance</a> that let them take remote control of a car or lorry
+ using an SMS.</p>
+ </li>
+
+ <li id="M201507214">
+ <p>Crackers were able to <a
+
href="http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/">
+ take remote control of the Jeep</a> “connected car”. They
+ could track the car, start or stop the engine, and activate or
+ deactivate the brakes, and more.</p>
+
+ <p>We expect that Chrysler and the NSA can do this too.</p>
+
+ <p>If you own a car that contains a phone modem, it would be a good
+ idea to deactivate this.</p>
+ </li>
+
+ <li id="M201311130">
+ <p><a
+
href="https://www.eff.org/deeplinks/2013/11/drm-cars-will-drive-consumers-crazy">
+ DRM in cars will drive consumers crazy</a>.</p>
+ </li>
+
+ <li id="M201306140">
+ <p>Tesla cars allow the company to extract
+ data remotely and determine the car's location
+ at any time. (See Section 2, paragraphs b and c of the <a
+
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ privacy statement</a>.) The company says it doesn't store this
+ information, but if the state orders it to get the data and hand it
+ over, the state can store it.</p>
+ </li>
+
+ <li id="M201303250">
+ <p id="records-drivers">Proprietary software in cars <a
+
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">
+ records information about drivers' movements</a>, which is made
+ available to car manufacturers, insurance companies, and others.</p>
+
+ <p>The case of toll-collection systems, mentioned in this article,
+ is not really a matter of proprietary surveillance. These systems
+ are an intolerable invasion of privacy, and should be replaced with
+ anonymous payment systems, but the invasion isn't done by malware. The
+ other cases mentioned are done by proprietary malware in the car.</p>
+ </li>
+
+ <li id="M201103110">
+ <p>It is possible to <a
+
href="http://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/">
+ take control of some car computers through malware in music files</a>.
+ Also <a
+ href="http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0">
+ by radio</a>. More information in <a
+ href="http://www.autosec.org/faq.html"> Automotive Security And
+ Privacy Center</a>.</p>
+ </li>
+</ul>
+
+
+</div><!-- for id="content", starts in the include above -->
+<!--#include virtual="/server/footer.html" -->
+<div id="footer">
+<div class="unprintable">
+
+<p>Please send general FSF & GNU inquiries to
+<a href="mailto:address@hidden"><address@hidden></a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF. Broken links and other corrections or suggestions can be sent
+to <a href="mailto:address@hidden"><address@hidden></a>.</p>
+
+<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
+ replace it with the translation of these two:
+
+ We work hard and do our best to provide accurate, good quality
+ translations. However, we are not exempt from imperfection.
+ Please send your comments and general suggestions in this regard
+ to <a href="mailto:address@hidden">
+ <address@hidden></a>.</p>
+
+ <p>For information on coordinating and submitting translations of
+ our web pages, see <a
+ href="/server/standards/README.translations.html">Translations
+ README</a>. -->
+Please see the <a
+href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and submitting translations
+of this article.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+ files generated as part of manuals) on the GNU web server should
+ be under CC BY-ND 4.0. Please do NOT change or remove this
+ without talking with the webmasters or licensing team first.
+ Please make sure the copyright date is consistent with the
+ document. For web pages, it is ok to list just the latest year the
+ document was modified, or published.
+
+ If you wish to list earlier years, that is ok too.
+ Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+ years, as long as each year in the range is in fact a copyrightable
+ year, i.e., a year in which the document was published (including
+ being publicly visible on the web or in a revision control system).
+
+ There is more detail about copyright years in the GNU Maintainers
+ Information document, www.gnu.org/prep/maintain. -->
+
+<p>Copyright © 2017, 2018, 2019 Free Software Foundation, Inc.</p>
+
+<p>This page is licensed under a <a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/">Creative
+Commons Attribution 4.0 International License</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.html" -->
+
+<p class="unprintable">Updated:
+<!-- timestamp start -->
+$Date: 2019/09/24 10:00:05 $
+<!-- timestamp end -->
+</p>
+</div>
+</div><!-- for class="inner", starts in the banner include -->
+</body>
+</html>
Index: proprietary/po/malware-games.es-en.html
===================================================================
RCS file: proprietary/po/malware-games.es-en.html
diff -N proprietary/po/malware-games.es-en.html
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ proprietary/po/malware-games.es-en.html 24 Sep 2019 10:00:05 -0000
1.1
@@ -0,0 +1,411 @@
+<!--#include virtual="/server/header.html" -->
+<!-- Parent-Version: 1.86 -->
+<!--
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ Please do not edit <ul class="blurbs">!
+ Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+ See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
+<title>Malware in Games
+- GNU Project - Free Software Foundation</title>
+ <!--#include virtual="/proprietary/po/malware-games.translist" -->
+<!--#include virtual="/server/banner.html" -->
+<h2>Malware in Games</h2>
+
+<p><a href="/proprietary/proprietary.html">Other examples of proprietary
+malware</a></p>
+
+<div class="comment">
+<p>
+<em>Malware</em> means software designed to function in ways that
+mistreat or harm the user. (This does not include accidental errors.)
+</p>
+
+<p>
+Malware and nonfree software are two different issues. The difference
+between <a href="/philosophy/free-sw.html">free software</a> and
+nonfree software is in <a
+href="/philosophy/free-software-even-more-important.html">
+whether the users have control of the program or vice versa</a>. It's
+not directly a question of what the program <em>does</em> when it
+runs. However, in practice nonfree software is often malware, because
+the developer's awareness that the users would be powerless to fix any
+malicious functionalities tempts the developer to impose some.
+</p>
+
+<p>Some examples of malware in games are listed below.</p>
+
+<div class="important">
+<p>If you know of an example that ought to be in this page but isn't
+here, please write
+to <a href="mailto:address@hidden"><address@hidden></a>
+to inform us. Please include the URL of a trustworthy reference or two
+to serve as specific substantiation.</p>
+</div>
+</div>
+<div class="column-limit" id="malware-games"></div>
+
+<ul class="blurbs">
+ <li id="M209900000">
+ <p id="addictiveness">Many games are designed to
+ keep gamers compulsively playing—and renewing
+ their subscription. To achieve this result, developers use <a
+
href="http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html">
+ techniques that derive from behavioral and brain research</a>:</p>
+
+ <dl class="compact"><dt>The Skinner Box</dt>
+ <dd>An environment in which the user is trained
+ to “push the lever“, i.e. do a certain action over and
+ over again in order to get a reward.</dd>
+
+ <dt>Virtual food pellets</dt>
+ <dd>Items that have nothing to do with the game itself, but are
+ valuable to gamers because of the work required to obtain them
+ (e.g., EverQuest); some people will end up collecting them for the
+ sake of collecting.</dd>
+
+ <dt>Random rewards</dt>
+ <dd>They turn the game into the equivalent of a slot machine (e.g.,
+ World of Warcraft, ZT Online).</dd>
+
+ <dt>Elaborate cycles</dt>
+ <dd>Gamers' behavior can be “shaped” by making cycles
+ (progress from one level to the next) slower and slower, designing
+ complex tasks that are difficult to get out of (e.g. World of
+ Warcraft), or conversely dividing them up in small chunks to avoid
+ frustration (e.g., New Super Mario Bros.Wii).</dd>
+
+ <dt>Decay of game assets</dt>
+ <dd>This makes it necessary for a gamer to keep playing, without
+ vacations, simply to avoid losing what they have earned so far
+ (e.g., Farmville, Ultima Online, Animal Crossing).</dd>
+ </dl>
+
+ <p>Games such as World of Warcraft, which are considered very addictive,
+ use several of these techniques.</p>
+
+ <p>However, the addictiveness of a game is only one of the determinants
+ of addiction. Equally important are the psychological make-up and life
+ circumstances of the gamer. Gaming addiction, like other addictions,
+ is a form of mental escape from an unrewarding life. The sad truth
+ is that, in the long run, it leads to an even worse life.</p>
+
+ <p><em>Note:</em> We are not gamers. If you think we
+ have misunderstood some point, or have suggestions for making
+ this text clearer or more correct, please send them to <<a
+ href="mailto:address@hidden">address@hidden</a>>.</p>
+ </li>
+
+ <li id="M209800000">
+ <p>The developers of gratis mobile games apply <a
+ href="/proprietary/proprietary-addictions.html#addictiveness">
+ behavioral manipulation techniques</a> to <a
+ href="https://www.psychguides.com/interact/the-psychology-of-freemium/">
+ turn their products into slot machines</a>. This is clearly described
+ in an infographic.</p>
+
+ <p>The revenue generated by these games is directly related to the
+ number of strongly addicted gamers (called “whales”) and
+ to the amount of money they are willing to spend. Thus developers
+ carefully study the behavior of millions of users to increase the
+ addictiveness of their games.</p>
+
+ <p>Unfortunately, the article uses “free” to mean
+ “zero price.” We recommend saying “gratis”
+ instead.</p>
+ </li>
+
+ <li id="M201908210">
+ <p>Microsoft recorded users of Xboxes and had <a
+
href="https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
+ human workers listen to the recordings</a>.</p>
+
+ <p>Morally, we see no difference between having human workers listen and
+ having speech-recognition systems listen. Both intrude on privacy.</p>
+ </li>
+
+ <li id="M201907090">
+ <p>Resourceful children figured out how to <a
+ href="https://www.bbc.co.uk/news/technology-48908766"> empty their
+ parents' bank account</a> buying packs of special players for an
+ Electronic Arts soccer game.</p>
+
+ <p>The random element of these packs (also called “loot
+ boxes”) makes the game <a
+ href="/proprietary/proprietary-addictions#addictiveness">
+ strongly addictive</a>, but the fact that players
+ are pressured to spend more in order to get ahead of their
+ competitors further qualifies it as <em>predatory</em>.
+ Note that Belgium <a
+
href="https://www.rockpapershotgun.com/2019/01/29/fifa-ultimate-team-packs-blocked-in-belgium/">
+ made these loot boxes illegal</a> in 2018.</p>
+
+ <p>The only good reason to have a copy of such a proprietary
+ game is to study it for free software development.</p>
+ </li>
+
+ <li id="M201809210">
+ <p>Clash of Clans is a good example of a gratis mobile game that its
+ developers <a href="https://gamerant.com/clash-of-clans-addiction/">
+ made very addictive</a> for a large proportion of its users—and
+ turned into a cash machine for themselves—by using <a
+ href="/proprietary/proprietary-addictions.html#addictiveness">
+ psychological manipulation techniques</a>.</p>
+
+ <p>The article uses “free” to mean “zero
+ price,” which is a usage we should avoid. We recommend saying
+ “gratis” instead.</p>
+ </li>
+
+ <li id="M201807310">
+ <p>A nonfree video game, available through the nonfree Steam client, <a
+
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-">
+ included a “miner”</a>, i.e. an executable that hijacks
+ the CPU in users' computers to mine a cryptocurrency.</p>
+ </li>
+
+ <li id="M201806250">
+ <p>The game Metal Gear Rising for
+ MacOS was tethered to a server. The company <a
+
href="http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm">
+ shut down the server, and all copies stopped working</a>.</p>
+ </li>
+
+ <li id="M201806240">
+ <p>Red Shell is a spyware that
+ is found in many proprietary games. It <a
+
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
+ tracks data on users' computers and sends it to third parties</a>.</p>
+ </li>
+
+ <li id="M201804144">
+ <p>ArenaNet surreptitiously installed a spyware
+ program along with an update to the massive
+ multiplayer game Guild Wars 2. The spyware allowed ArenaNet <a
+
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave">
+ to snoop on all open processes running on its user's computer</a>.</p>
+ </li>
+
+ <li id="M201712060">
+ <p>Learn how <a
+
href="https://web.archive.org/web/20170319013045/https://www.huffingtonpost.com/joseph-farrell/the-fascinating-psycholog_b_6076502.html">
+ gratis-to-play-and-not-win-much games manipulate their useds
+ psychologically</a>.</p>
+
+ <p>These manipulative behaviors are malicious functionalities, and they
+ are possible because the game is proprietary. If it were free, people
+ could publish a non-manipulative version and play that instead.</p>
+ </li>
+
+ <li id="M201711070">
+ <p>The driver for a certain gaming keyboard <a
+
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
+ information to China</a>.</p>
+ </li>
+
+ <li id="M201612290">
+ <p>In the game Fruit Pop, the player buys boosts with coins to get
+ a high score. The player gets coins at the end of each game, and can
+ buy more coins with real money.</p>
+
+ <p>Getting a higher score once leads the player to desire higher
+ score again later. But the higher score resulting from the boost <a
+
href="https://qz.com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-warping-kids-understanding-of-basic-economic-ideas/">does
+ not give the player more coins, and does not help the player get
+ a higher score in subsequent games</a>. To get that, the player
+ will need a boost frequently, and usually has to pay real money
+ for that. Since boosts are exciting and entertaining, the player is
+ subtly pushed to purchase more coins with real money to get boosts,
+ and it can develop into a costly habit.</p>
+ </li>
+
+ <li id="M201611070">
+ <p>nVidia's proprietary GeForce Experience <a
+
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+ users identify themselves and then sends personal data about them to
+ nVidia servers</a>.</p>
+ </li>
+
+ <li id="M201609240">
+ <p>A Capcom's Street Fighter V update <a
+ href="https://www.theregister.co.uk/2016/09/23/capcom_street_fighter_v/">
+ installed a driver that could be used as a back door by
+ any application installed on a Windows computer</a>, but was <a
+
href="https://www.rockpapershotgun.com/2016/09/24/street-fighter-v-removes-new-anti-crack">
+ immediately rolled back</a> in response to public outcry.</p>
+ </li>
+
+ <li id="M201605200">
+ <p>Oculus Rift games now have <a
+
href="https://motherboard.vice.com/en_us/article/vv77ea/new-oculus-drm-cross-platform">
+ DRM meant to prevent running them on other systems</a>.</p>
+ </li>
+
+ <li id="M201512290">
+ <p>Many <a
+
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
+ video game consoles snoop on their users and report to the
+ internet</a>—even what their users weigh.</p>
+
+ <p>A game console is a computer, and you can't trust a computer with
+ a nonfree operating system.</p>
+ </li>
+
+ <li id="M201509160">
+ <p>Modern gratis game cr…apps <a
+
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
+ collect a wide range of data about their users and their users'
+ friends and associates</a>.</p>
+
+ <p>Even nastier, they do it through ad networks that merge the data
+ collected by various cr…apps and sites made by different
+ companies.</p>
+
+ <p>They use this data to manipulate people to buy things, and hunt for
+ “whales” who can be led to spend a lot of money. They also
+ use a back door to manipulate the game play for specific players.</p>
+
+ <p>While the article describes gratis games, games that cost money
+ can use the same tactics.</p>
+ </li>
+
+ <li id="M201507290">
+ <p>Game Of War: Fire Age is an iPhone game with <a
+
href="http://www.cracked.com/personal-experiences-1762-5-reasons-i-lost-249000-iphone-game.html">
+ addictive features</a> which are based on <a
+ href="/proprietary/proprietary-addictions.html#addictiveness">behavioral
+ manipulation techniques</a>, compounded with group emulation. After a
+ fairly easy start, the game slows down and becomes more difficult,
+ so gamers are led to spend more and more money in order to keep up
+ with their group. And if they stop playing for a while, the equipment
+ they invested in gets destroyed by the “enemy” unless
+ they buy an expensive “shield” to protect it. This game
+ is also deceptive, as it uses confusing menus and complex stats to
+ obfuscate true monetary costs.</p>
+ </li>
+
+ <li id="M201410130">
+ <p><a
+
href="https://www.eff.org/deeplinks/2014/10/nintendo-updates-take-wii-u-hostage-until-you-agree-new-legal-terms">Nintendo
+ remotely sabotaged all Wiis, making them refuse to work unless the
+ user agrees to a new EULA</a>.</p>
+
+ <p>We can be quite sure this EULA is unjust because injustice is the
+ only motive for imposing an EULA.</p>
+ </li>
+
+ <li id="M201401280">
+ <p>Angry Birds <a
+
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies for companies, and the NSA takes advantage
+ to spy through it too</a>. Here's information on <a
+
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ more spyware apps</a>.</p>
+
+ <p><a
+
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
+ More about NSA app spying</a>.</p>
+ </li>
+
+ <li id="M201401190">
+ <p>Some proprietary <a
+
href="http://www.theguardian.com/technology/2014/jan/19/apple-talking-cats-in-app-purchases">
+ games lure children to spend their parents' money</a>.</p>
+ </li>
+
+ <li id="M201105070">
+ <p><a href="https://www.defectivebydesign.org/sony">The Playstation
+ 3 is a tyrant</a>.</p>
+ </li>
+
+ <li id="M201003300">
+ <p>Sony <a
+
href="https://www.eff.org/deeplinks/2010/03/sony-steals-feature-from-your-playstation-3">sabotaged
+ the Playstation 3</a> with a firmware downgrade that removed the
+ feature that allowed users to run GNU/Linux on it.</p>
+
+ <p>Sony subsequently sent police after Geohot, after he cracked the
+ code that blocked users from changing the firmware, and we responded by
+ calling for a <a href="http://boycottsony.org">boycott of Sony</a>.</p>
+
+ <p>In a court settlement Sony is <a
+
href="http://arstechnica.com/tech-policy/2016/06/if-you-used-to-run-linux-on-your-ps3-you-could-get-55-from-sony/">
+ now paying for the sabotage</a>.</p>
+ </li>
+
+ <li id="M200510200">
+ <p>Blizzard Warden is a hidden
+ “cheating-prevention” program that <a
+ href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
+ spies on every process running on a gamer's computer and sniffs a
+ good deal of personal data</a>, including lots of activities which
+ have nothing to do with cheating.</p>
+ </li>
+</ul>
+
+
+</div><!-- for id="content", starts in the include above -->
+<!--#include virtual="/server/footer.html" -->
+<div id="footer">
+<div class="unprintable">
+
+<p>Please send general FSF & GNU inquiries to
+<a href="mailto:address@hidden"><address@hidden></a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF. Broken links and other corrections or suggestions can be sent
+to <a href="mailto:address@hidden"><address@hidden></a>.</p>
+
+<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
+ replace it with the translation of these two:
+
+ We work hard and do our best to provide accurate, good quality
+ translations. However, we are not exempt from imperfection.
+ Please send your comments and general suggestions in this regard
+ to <a href="mailto:address@hidden">
+ <address@hidden></a>.</p>
+
+ <p>For information on coordinating and submitting translations of
+ our web pages, see <a
+ href="/server/standards/README.translations.html">Translations
+ README</a>. -->
+Please see the <a
+href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and submitting translations
+of this article.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+ files generated as part of manuals) on the GNU web server should
+ be under CC BY-ND 4.0. Please do NOT change or remove this
+ without talking with the webmasters or licensing team first.
+ Please make sure the copyright date is consistent with the
+ document. For web pages, it is ok to list just the latest year the
+ document was modified, or published.
+
+ If you wish to list earlier years, that is ok too.
+ Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+ years, as long as each year in the range is in fact a copyrightable
+ year, i.e., a year in which the document was published (including
+ being publicly visible on the web or in a revision control system).
+
+ There is more detail about copyright years in the GNU Maintainers
+ Information document, www.gnu.org/prep/maintain. -->
+
+<p>Copyright © 2016, 2017, 2018, 2019 Free Software Foundation, Inc.</p>
+
+<p>This page is licensed under a <a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/">Creative
+Commons Attribution 4.0 International License</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.html" -->
+
+<p class="unprintable">Updated:
+<!-- timestamp start -->
+$Date: 2019/09/24 10:00:05 $
+<!-- timestamp end -->
+</p>
+</div>
+</div><!-- for class="inner", starts in the banner include -->
+</body>
+</html>
Index: proprietary/po/malware-webpages.es-en.html
===================================================================
RCS file: proprietary/po/malware-webpages.es-en.html
diff -N proprietary/po/malware-webpages.es-en.html
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ proprietary/po/malware-webpages.es-en.html 24 Sep 2019 10:00:05 -0000
1.1
@@ -0,0 +1,270 @@
+<!--#include virtual="/server/header.html" -->
+<!-- Parent-Version: 1.86 -->
+<!--
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ Please do not edit <ul class="blurbs">!
+ Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+ See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
+<title>Malware in Webpages
+- GNU Project - Free Software Foundation</title>
+<!--#include virtual="/proprietary/po/malware-webpages.translist" -->
+<!--#include virtual="/server/banner.html" -->
+<h2>Malware in Webpages</h2>
+
+<p><a href="/proprietary/proprietary.html">Other examples of proprietary
+ malware</a></p>
+
+<div class="comment">
+ <p>
+ <em>Malware</em> means software designed to function in ways that
+ mistreat or harm the user. (This does not include accidental errors.)
+ </p>
+
+ <p>
+ Malware and nonfree software are two different issues. The difference
+ between <a href="/philosophy/free-sw.html">free software</a> and
+ nonfree software is in
+ <a href="/philosophy/free-software-even-more-important.html">
+ whether the users have control of the program or vice versa</a>. It's
+ not directly a question of what the program <em>does</em> when it
+ runs. However, in practice nonfree software is often malware, because
+ the developer's awareness that the users would be powerless to fix any
+ malicious functionalities tempts the developer to impose some.
+ </p>
+
+<p>This page lists web sites containing proprietary JavaScript programs that
spy
+on users or mislead them. They make use of what we call
+the <a href="/philosophy/javascript-trap.html">JavaScript Trap</a>. Of course,
+many sites collect information that the user sends, via forms or otherwise, but
+here we're not talking about that.</p>
+
+<div class="important">
+<p>If you know of an example that ought to be in this page but isn't
+here, please write
+to <a href="mailto:address@hidden"><address@hidden></a>
+to inform us. Please include the URL of a trustworthy reference or two
+to serve as specific substantiation.</p>
+</div>
+</div>
+<div class="column-limit" id="malware-webpages"></div>
+
+<ul class="blurbs">
+ <li id="M201811270">
+ <p>Many web sites use JavaScript code <a
+
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
+ to snoop on information that users have typed into a
+ form but not sent</a>, in order to learn their identity. Some are <a
+
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
+ getting sued</a> for this.</p>
+
+ <p>The chat facilities of some customer services use the same sort of
+ malware to <a
+
href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119">
+ read what the user is typing before it is posted</a>.</p>
+ </li>
+
+ <li id="M201807190">
+ <p>British Airways used <a
+
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security">nonfree
+ JavaScript on its web site to give other companies personal data on
+ its customers</a>.</p>
+ </li>
+
+ <li id="M201805170">
+ <p>The Storyful program <a
+
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch">spies
+ on the reporters that use it</a>.</p>
+ </li>
+
+ <li id="M201805080">
+ <p>A cracker used an exploit in outdated software to <a
+
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito">
+ inject a “miner” in web pages</a> served to visitors. This
+ type of malware hijacks the computer's processor to mine a
+ cryptocurrency. (Note that the article refers to the infected software
+ as “content management system”. A better term would be
+ “<a href="/philosophy/words-to-avoid.html#Content">website
+ revision system</a>”.)</p>
+
+ <p>Since the miner was a nonfree JavaScript program,
+ visitors wouldn't have been affected if they had used <a
+ href="/software/librejs/index.html">LibreJS</a>. Some
+ browser extensions that <a
+
href="https://www.cnet.com/how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/">
+ specifically block JavaScript miners</a> are also available.</p>
+ </li>
+
+ <li id="M201712300">
+ <p>Some JavaScript malware <a
+
href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research">
+ swipes usernames from browser-based password managers</a>.</p>
+ </li>
+
+ <li id="M201711150">
+ <p>Some websites send
+ JavaScript code to collect all the user's input, <a
+
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/">which
+ can then be used to reproduce the whole session</a>.</p>
+
+ <p>If you use LibreJS, it will block that malicious JavaScript
+ code.</p>
+ </li>
+
+ <li id="M201701060">
+ <p>When a page uses Disqus
+ for comments, the proprietary Disqus software <a
+
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook">loads
+ a Facebook software package into the browser of every anonymous visitor
+ to the page, and makes the page's URL available to Facebook</a>.</p>
+ </li>
+
+ <li id="M201612064">
+ <p>Online sales, with tracking and surveillance of customers, <a
+
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices">enables
+ businesses to show different people different prices</a>. Most of
+ the tracking is done by recording interactions with servers, but
+ proprietary software contributes.</p>
+ </li>
+
+ <li id="M201611160.1">
+ <p>A <a
+
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
+ research paper</a> that investigated the privacy and security of
+ 283 Android VPN apps concluded that “in spite of the promises
+ for privacy, security, and anonymity given by the majority of VPN
+ apps—millions of users may be unawarely subject to poor security
+ guarantees and abusive practices inflicted by VPN apps.”</p>
+
+ <p>Here are two examples, taken from the research paper, of
+ proprietary VPN apps that use JavaScript to track users and infringe
+ their privacy:</p>
+
+ <dl class="compact">
+ <dt>VPN Services HotspotShield</dt>
+ <dd>Injects JavaScript code into the HTML pages returned to the
+ users. The stated purpose of the JS injection is to display ads. Uses
+ roughly five tracking libraries. Also, it redirects the user's
+ traffic through valueclick.com (an advertising website).</dd>
+
+ <dt>WiFi Protector VPN</dt>
+ <dd>Injects JavaScript code into HTML pages, and also uses roughly
+ five tracking libraries. Developers of this app have confirmed that
+ the non-premium version of the app does JavaScript injection for
+ tracking the user and displaying ads.</dd>
+ </dl>
+ </li>
+
+ <li id="M201603080">
+ <p>E-books can contain JavaScript code, and <a
+
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
+ sometimes this code snoops on readers</a>.</p>
+ </li>
+
+ <li id="M201310110">
+ <p>Flash and JavaScript are used for <a
+
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
+ “fingerprinting” devices</a> to identify users.</p>
+ </li>
+
+ <li id="M201210240">
+ <p>Many web sites rat their visitors to advertising
+ networks that track users. Of the top 1000 web sites, <a
+
href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/">84%
+ (as of 5/17/2012) fed their visitors third-party cookies, allowing
+ other sites to track them</a>.</p>
+ </li>
+
+ <li id="M201208210">
+ <p>Many web sites report all their visitors
+ to Google by using the Google Analytics service, which <a
+
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
+ tells Google the IP address and the page that was visited</a>.</p>
+ </li>
+
+ <li id="M201200000">
+ <p>Many web sites try to collect users' address books (the user's list
+ of other people's phone numbers or email addresses). This violates
+ the privacy of those other people.</p>
+ </li>
+
+ <li id="M201110040">
+ <p>Pages that contain “Like” buttons <a
+
href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html">
+ enable Facebook to track visitors to those pages</a>—even users
+ that don't have Facebook accounts.</p>
+ </li>
+
+ <li id="M201003010">
+ <p>Flash Player's <a
+
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">
+ cookie feature helps web sites track visitors</a>.</p>
+ </li>
+</ul>
+
+
+</div><!-- for id="content", starts in the include above -->
+<!--#include virtual="/server/footer.html" -->
+<div id="footer">
+<div class="unprintable">
+
+<p>Please send general FSF & GNU inquiries to
+<a href="mailto:address@hidden"><address@hidden></a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF. Broken links and other corrections or suggestions can be sent
+to <a href="mailto:address@hidden"><address@hidden></a>.</p>
+
+<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
+ replace it with the translation of these two:
+
+ We work hard and do our best to provide accurate, good quality
+ translations. However, we are not exempt from imperfection.
+ Please send your comments and general suggestions in this regard
+ to <a href="mailto:address@hidden">
+ <address@hidden></a>.</p>
+
+ <p>For information on coordinating and submitting translations of
+ our web pages, see <a
+ href="/server/standards/README.translations.html">Translations
+ README</a>. -->
+Please see the <a
+href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and submitting translations
+of this article.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+ files generated as part of manuals) on the GNU web server should
+ be under CC BY-ND 4.0. Please do NOT change or remove this
+ without talking with the webmasters or licensing team first.
+ Please make sure the copyright date is consistent with the
+ document. For web pages, it is ok to list just the latest year the
+ document was modified, or published.
+
+ If you wish to list earlier years, that is ok too.
+ Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+ years, as long as each year in the range is in fact a copyrightable
+ year, i.e., a year in which the document was published (including
+ being publicly visible on the web or in a revision control system).
+
+ There is more detail about copyright years in the GNU Maintainers
+ Information document, www.gnu.org/prep/maintain. -->
+
+<p>Copyright © 2017, 2018, 2019 Free Software Foundation, Inc.</p>
+
+<p>This page is licensed under a <a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/">Creative
+Commons Attribution 4.0 International License</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.html" -->
+
+<p class="unprintable">Updated:
+<!-- timestamp start -->
+$Date: 2019/09/24 10:00:05 $
+<!-- timestamp end -->
+</p>
+</div>
+</div><!-- for class="inner", starts in the banner include -->
+</body>
+</html>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www proprietary/po/es.po proprietary/po/malware...,
GNUN <=