www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-microsoft.es.html malwa...


From: GNUN
Subject: www/proprietary malware-microsoft.es.html malwa...
Date: Fri, 4 Oct 2019 04:59:27 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     19/10/04 04:59:26

Modified files:
        proprietary    : malware-microsoft.es.html 
                         malware-mobiles.es.html malware-mobiles.fr.html 
                         proprietary-back-doors.es.html 
                         proprietary-back-doors.fr.html 
                         proprietary-surveillance.es.html 
                         proprietary-tethers.es.html proprietary.es.html 
                         proprietary.fr.html 
        proprietary/po : es.po malware-microsoft.es-en.html 
                         malware-mobiles.es-en.html 
                         malware-mobiles.fr-en.html 
                         proprietary-back-doors.es-en.html 
                         proprietary-back-doors.es.po 
                         proprietary-back-doors.fr-en.html 
                         proprietary-surveillance.es-en.html 
                         proprietary-tethers.es-en.html 
                         proprietary-tethers.es.po 
                         proprietary.es-en.html proprietary.fr-en.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.es.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.es.html?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.fr.html?cvsroot=www&r1=1.91&r2=1.92
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.es.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.fr.html?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.es.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-tethers.es.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.es.html?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.fr.html?cvsroot=www&r1=1.125&r2=1.126
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.203&r2=1.204
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.es-en.html?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es-en.html?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr-en.html?cvsroot=www&r1=1.82&r2=1.83
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.es-en.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.es.po?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr-en.html?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es-en.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.es-en.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.es.po?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es-en.html?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr-en.html?cvsroot=www&r1=1.115&r2=1.116

Patches:
Index: malware-microsoft.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.es.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- malware-microsoft.es.html   19 Sep 2019 09:29:37 -0000      1.73
+++ malware-microsoft.es.html   4 Oct 2019 08:59:26 -0000       1.74
@@ -72,6 +72,8 @@
   <li><a href="#sabotage">Sabotaje</a></li>
   <li><a href="#subscriptions">Suscripciones</a></li>
   <li><a href="#surveillance">Vigilancia</a></li>
+  <li><a href="#tethers">Subordinación a un servidor</a>: funcionalidades que
+requieren la conexión a un servidor.</li>
   <li><a href="#tyrants">Tiranos</a>: Son sistemas que rechazan cualquier 
sistema
 operativo que no esté «autorizado» por el fabricante.</li>
 </ul>
@@ -588,6 +590,19 @@
 </ul>
 
 
+<h3 id="tethers">Subordinación a un servidor</h3>
+
+<ul class="blurbs">
+  <li id="M201708310">
+    <p>Las versiones más recientes de Microsoft Office exigen que el usuario 
se <a
+href="https://products.office.com/en-us/microsoft-office-for-home-and-school-faq?legRedir=true&amp;CorrelationId=c9c5b549-11ad-4f71-bf81-b7e069fdb372";>
+conecte a los servidores de Microsoft al menos una vez cada treintaiún
+días</a>. De lo contrario, el software rechazará editar cualquier documento
+o crear uno nuevo. Se limitará a mostrar e imprimir documentos anteriores.</p>
+  </li>
+</ul>
+
+
 <h3 id="jails">Prisiones</h3>
 
 <ul class="blurbs">
@@ -611,7 +626,6 @@
   </li>
 </ul>
 
-
 <h3 id="tyrants">Tiranos</h3>
 
 <ul class="blurbs">
@@ -712,7 +726,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2019/09/19 09:29:37 $
+$Date: 2019/10/04 08:59:26 $
 
 <!-- timestamp end -->
 </p>

Index: malware-mobiles.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.es.html,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- malware-mobiles.es.html     19 Sep 2019 09:29:37 -0000      1.65
+++ malware-mobiles.es.html     4 Oct 2019 08:59:26 -0000       1.66
@@ -150,6 +150,20 @@
 convertirlos en dispositivos de escucha a tiempo completo.</p>
   </li>
 
+  <li id="M201908270">
+    <p>Una aplicación muy popular que se halla en la tienda Google Play 
contenía un
+módulo que estaba diseñado para <a
+href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/";>instalar
+furtivamente programas maliciosos en el aparato del usuario</a>. Los
+desarrolladores de la aplicación lo usaban regularmente para hacer que el
+equipo del usuario descargara y ejecutara cualquier código que ellos
+quisieran.</p>
+
+    <p>Este es un ejemplo concreto de los riesgos que corren los usuarios 
cuando
+ejecutan software que no es libre. Nunca puede estar seguros de que una
+aplicación privativa sea segura.</p>
+  </li>
+
   <li id="M201609130">
     <p>Los teléfonos Xiaomi contienen <a
 
href="https://web.archive.org/web/20190424082647/http://blog.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered/";>una
@@ -425,6 +439,14 @@
 <h3 id="surveillance">Vigilancia</h3>
 
 <ul class="blurbs">
+  <li id="M201909091">
+    <p>La aplicación de Facebook <a
+href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/";>rastrea
+a los usuarios incluso cuando está cerrada</a>, tras haberles embaucado para
+que den a la aplicación amplios permisos a fin de utilizar una de sus
+funcionalidades.</p>
+  </li>
+
   <li id="M201909090">
     <p>Algunas aplicaciones privativas para controlar el ciclo menstrual, 
incluidas
 MIA Fem y Maya <a
@@ -1196,7 +1218,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2019/09/19 09:29:37 $
+$Date: 2019/10/04 08:59:26 $
 
 <!-- timestamp end -->
 </p>

Index: malware-mobiles.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.fr.html,v
retrieving revision 1.91
retrieving revision 1.92
diff -u -b -r1.91 -r1.92
--- malware-mobiles.fr.html     3 Oct 2019 11:30:33 -0000       1.91
+++ malware-mobiles.fr.html     4 Oct 2019 08:59:26 -0000       1.92
@@ -149,6 +149,18 @@
 convertir en appareils d'écoute permanente.</p>
   </li>
 
+  <li id="M201908270">
+    <p>Une appli très populaire de Google Play contenait un module conçu 
pour <a
+href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/";>installer
+furtivement un logiciel malveillant sur l'ordinateur de
+l'utilisateur</a>. Les développeurs de l'appli s'en servaient régulièrement
+pour forcer l'ordinateur à télécharger et exécuter le code de leur 
choix.</p>
+
+    <p>Voilà un exemple concret de ce que à quoi s'exposent les utilisateurs 
d'une
+appli non libre. Ils ne peuvent jamais être complètement sûrs qu'elle est
+sans danger.</p>
+  </li>
+
   <li id="M201609130">
     <p>Les téléphones Xiaomi sont livrés avec une <a
 
href="https://web.archive.org/web/20190424082647/http://blog.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered/";>porte
@@ -1207,7 +1219,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2019/10/03 11:30:33 $
+$Date: 2019/10/04 08:59:26 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-back-doors.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.es.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- proprietary-back-doors.es.html      15 Sep 2019 21:06:07 -0000      1.12
+++ proprietary-back-doors.es.html      4 Oct 2019 08:59:26 -0000       1.13
@@ -230,6 +230,20 @@
 <h3 id='install-delete'>Instalar, borrar o deshabilitar programas</h3>
 
 <ul class="blurbs">
+  <li id="M201908270">
+    <p>Una aplicación muy popular que se halla en la tienda Google Play 
contenía un
+módulo que estaba diseñado para <a
+href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/";>instalar
+furtivamente programas maliciosos en el aparato del usuario</a>. Los
+desarrolladores de la aplicación lo usaban regularmente para hacer que el
+equipo del usuario descargara y ejecutara cualquier código que ellos
+quisieran.</p>
+
+    <p>Este es un ejemplo concreto de los riesgos que corren los usuarios 
cuando
+ejecutan software que no es libre. Nunca puede estar seguros de que una
+aplicación privativa sea segura.</p>
+  </li>
+
   <li id="M201907100">
     <p>Parece que Apple dice que <a
 href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/";>hay
@@ -643,7 +657,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2019/09/15 21:06:07 $
+$Date: 2019/10/04 08:59:26 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-back-doors.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.fr.html,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- proprietary-back-doors.fr.html      11 Sep 2019 09:59:58 -0000      1.76
+++ proprietary-back-doors.fr.html      4 Oct 2019 08:59:26 -0000       1.77
@@ -229,6 +229,18 @@
 <h3 id='install-delete'>Installer, supprimer ou désactiver des programmes</h3>
 
 <ul class="blurbs">
+  <li id="M201908270">
+    <p>Une appli très populaire de Google Play contenait un module conçu 
pour <a
+href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/";>installer
+furtivement un logiciel malveillant sur l'ordinateur de
+l'utilisateur</a>. Les développeurs de l'appli s'en servaient régulièrement
+pour forcer l'ordinateur à télécharger et exécuter le code de leur 
choix.</p>
+
+    <p>Voilà un exemple concret de ce que à quoi s'exposent les utilisateurs 
d'une
+appli non libre. Ils ne peuvent jamais être complètement sûrs qu'elle est
+sans danger.</p>
+  </li>
+
   <li id="M201907100">
     <p>Apple semble dire que <a
 href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/";>MacOS
@@ -653,7 +665,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2019/09/11 09:59:58 $
+$Date: 2019/10/04 08:59:26 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-surveillance.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.es.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- proprietary-surveillance.es.html    21 Sep 2019 11:59:12 -0000      1.2
+++ proprietary-surveillance.es.html    4 Oct 2019 08:59:26 -0000       1.3
@@ -837,6 +837,14 @@
 </div>
 
 <ul class="blurbs">
+  <li id="M201909091">
+    <p>La aplicación de Facebook <a
+href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/";>rastrea
+a los usuarios incluso cuando está cerrada</a>, tras haberles embaucado para
+que den a la aplicación amplios permisos a fin de utilizar una de sus
+funcionalidades.</p>
+  </li>
+
   <li id="M201909090">
     <p>Algunas aplicaciones privativas para controlar el ciclo menstrual, 
incluidas
 MIA Fem y Maya <a
@@ -2609,7 +2617,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2019/09/21 11:59:12 $
+$Date: 2019/10/04 08:59:26 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-tethers.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-tethers.es.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- proprietary-tethers.es.html 22 Sep 2019 20:28:48 -0000      1.1
+++ proprietary-tethers.es.html 4 Oct 2019 08:59:26 -0000       1.2
@@ -147,6 +147,14 @@
 tentación para cometer sabotaje.</p>
   </li>
 
+  <li id="M201708310">
+    <p>Las versiones más recientes de Microsoft Office exigen que el usuario 
se <a
+href="https://products.office.com/en-us/microsoft-office-for-home-and-school-faq?legRedir=true&amp;CorrelationId=c9c5b549-11ad-4f71-bf81-b7e069fdb372";>
+conecte a los servidores de Microsoft al menos una vez cada treintaiún
+días</a>. De lo contrario, el software rechazará editar cualquier documento
+o crear uno nuevo. Se limitará a mostrar e imprimir documentos anteriores.</p>
+  </li>
+
   <li id="M201705180">
     <p>Una empresa creó pájaros y conejos de compañía para Second Life e 
hizo que
 su alimento dependiera de un servidor. <a
@@ -288,7 +296,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2019/09/22 20:28:48 $
+$Date: 2019/10/04 08:59:26 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.es.html,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- proprietary.es.html 19 Sep 2019 09:29:37 -0000      1.75
+++ proprietary.es.html 4 Oct 2019 08:59:26 -0000       1.76
@@ -159,6 +159,36 @@
 <h3 id="latest">Añadidos recientes</h3>
 
 <ul class="blurbs">
+  <li id="M201908270">
+    <p>Una aplicación muy popular que se halla en la tienda Google Play 
contenía un
+módulo que estaba diseñado para <a
+href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/";>instalar
+furtivamente programas maliciosos en el aparato del usuario</a>. Los
+desarrolladores de la aplicación lo usaban regularmente para hacer que el
+equipo del usuario descargara y ejecutara cualquier código que ellos
+quisieran.</p>
+
+    <p>Este es un ejemplo concreto de los riesgos que corren los usuarios 
cuando
+ejecutan software que no es libre. Nunca puede estar seguros de que una
+aplicación privativa sea segura.</p>
+  </li>
+
+  <li id="M201909091">
+    <p>La aplicación de Facebook <a
+href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/";>rastrea
+a los usuarios incluso cuando está cerrada</a>, tras haberles embaucado para
+que den a la aplicación amplios permisos a fin de utilizar una de sus
+funcionalidades.</p>
+  </li>
+
+  <li id="M201708310">
+    <p>Las versiones más recientes de Microsoft Office exigen que el usuario 
se <a
+href="https://products.office.com/en-us/microsoft-office-for-home-and-school-faq?legRedir=true&amp;CorrelationId=c9c5b549-11ad-4f71-bf81-b7e069fdb372";>
+conecte a los servidores de Microsoft al menos una vez cada treintaiún
+días</a>. De lo contrario, el software rechazará editar cualquier documento
+o crear uno nuevo. Se limitará a mostrar e imprimir documentos anteriores.</p>
+  </li>
+
   <li id="M201909090">
     <p>Algunas aplicaciones privativas para controlar el ciclo menstrual, 
incluidas
 MIA Fem y Maya <a
@@ -176,39 +206,6 @@
     <p>Esto significa que el software privativo puede llegar a ser un 
instrumento
 para cometer perjurio impunemente.</p>
   </li>
-
-  <li id="M201908220">
-    <p>Los ChromeBooks están programados para quedar obsoletos: ChromeOS 
tiene una
-puerta trasera universal que es utilizada para las actualizaciones y que <a
-href="https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/";>deja
-de funcionar en una fecha predeterminada</a>. A partir de ese momento parece
-que el ordenador deja de recibir toda asistencia.</p>
-
-    <p>En otras palabras, cuando uno deja de ser ultrajado por la puerta 
trasera,
-empieza a ser ultrajado por la obsolescencia.</p>
-  </li>
-
-  <li id="M201908210">
-    <p>Microsoft ha grabado a los usuarios de la Xbox y tenía <a
-href="https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana";>trabajadores
-dedicados a escuchar las grabaciones</a>.</p>
-
-    <p>Desde el punto de vista moral no vemos ninguna diferencia entre tener
-trabajadores humanos a la escucha y tener sistemas de reconocimiento del
-habla.</p>
-  </li>
-
-  <li id="M201909060">
-    <p>Mantener un registro de quienes se descargan un programa privativo es 
una
-forma de vigilancia. Existe un programa privativo para ajustar la mira de
-cierto rifle telescópico. <a
-href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/";>Un
-fiscal estadounidense ha solicitado la lista de las 10.000 o más personas
-que se lo han instalado</a>.</p>
-
-    <p>Con un programa libre no existiría ninguna lista de los que se lo han
-descargado.</p>
-  </li>
 </ul>
 
 
@@ -287,7 +284,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2019/09/19 09:29:37 $
+$Date: 2019/10/04 08:59:26 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.fr.html,v
retrieving revision 1.125
retrieving revision 1.126
diff -u -b -r1.125 -r1.126
--- proprietary.fr.html 3 Oct 2019 11:30:33 -0000       1.125
+++ proprietary.fr.html 4 Oct 2019 08:59:26 -0000       1.126
@@ -159,6 +159,18 @@
 <h3 id="latest">Ajouts récents</h3>
 
 <ul class="blurbs">
+  <li id="M201908270">
+    <p>Une appli très populaire de Google Play contenait un module conçu 
pour <a
+href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/";>installer
+furtivement un logiciel malveillant sur l'ordinateur de
+l'utilisateur</a>. Les développeurs de l'appli s'en servaient régulièrement
+pour forcer l'ordinateur à télécharger et exécuter le code de leur 
choix.</p>
+
+    <p>Voilà un exemple concret de ce que à quoi s'exposent les utilisateurs 
d'une
+appli non libre. Ils ne peuvent jamais être complètement sûrs qu'elle est
+sans danger.</p>
+  </li>
+
   <li id="M201909091">
     <p>L'appli de Facebook <a
 
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/";>piste
@@ -193,17 +205,6 @@
     <p>Cela signifie qu'un logiciel privateur peut être un moyen de se 
parjurer en
 toute impunité.</p>
   </li>
-
-  <li id="M201908220">
-    <p>Les ChromeBooks sont programmés pour l'obsolescence: ChromeOS a une 
porte
-dérobée universelle qui est utilisée pour les mises à jour et <a
-href="https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/";>cesse
-de fonctionner à une date prédéterminée</a>. Ensuite, il semble que
-l'ordinateur n'ait plus aucun suivi.</p>
-
-    <p>En d'autres termes, quand vous cessez de vous faire avoir par la porte
-dérobée, vous commencez à vous faire avoir par l'obsolescence.</p>
-  </li>
 </ul>
 
 
@@ -282,7 +283,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2019/10/03 11:30:33 $
+$Date: 2019/10/04 08:59:26 $
 
 <!-- timestamp end -->
 </p>

Index: po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.203
retrieving revision 1.204
diff -u -b -r1.203 -r1.204
--- po/es.po    4 Oct 2019 08:00:44 -0000       1.203
+++ po/es.po    4 Oct 2019 08:59:26 -0000       1.204
@@ -5767,6 +5767,8 @@
 "<a href=\"#tethers\">Tethers</a>&mdash;functionalities that require "
 "connection to a server."
 msgstr ""
+"<a href=\"#tethers\">Subordinación a un servidor</a>: funcionalidades que "
+"requieren la conexión a un servidor."
 
 #. type: Content of: <h3>
 msgid "Microsoft Back Doors"
@@ -6773,6 +6775,13 @@
 "the software will refuse to edit any documents or create new ones. It will "
 "be restricted to viewing and printing."
 msgstr ""
+"Las versiones más recientes de Microsoft Office exigen que el usuario se <a "
+"href=\"https://products.office.com/en-us/microsoft-office-for-home-and-";
+"school-faq?legRedir=true&amp;CorrelationId=c9c5b549-11ad-4f71-bf81-"
+"b7e069fdb372\"> conecte a los servidores de Microsoft al menos una vez cada "
+"treintaiún días</a>. De lo contrario, el software rechazará editar 
cualquier "
+"documento o crear uno nuevo. Se limitará a mostrar e imprimir documentos "
+"anteriores."
 
 #. type: Content of: <h3>
 msgid "Microsoft Jails"
@@ -7014,12 +7023,22 @@
 "app developers regularly used it to make the computer download and execute "
 "any code they wanted."
 msgstr ""
+"Una aplicación muy popular que se halla en la tienda Google Play contenía 
un "
+"módulo que estaba diseñado para <a href=\"https://arstechnica.com/";
+"information-technology/2019/08/google-play-app-with-100-million-downloads-"
+"executed-secret-payloads/\">instalar furtivamente programas maliciosos en el "
+"aparato del usuario</a>. Los desarrolladores de la aplicación lo usaban "
+"regularmente para hacer que el equipo del usuario descargara y ejecutara "
+"cualquier código que ellos quisieran."
 
 #. type: Content of: <ul><li><p>
 msgid ""
 "This is a concrete example of what users are exposed to when they run "
 "nonfree apps. They can never be completely sure that a nonfree app is safe."
 msgstr ""
+"Este es un ejemplo concreto de los riesgos que corren los usuarios cuando "
+"ejecutan software que no es libre. Nunca puede estar seguros de que una "
+"aplicación privativa sea segura."
 
 #. type: Content of: <ul><li><p>
 # | Xiaomi phones come with <a
@@ -7491,6 +7510,11 @@
 "tricking them into giving the app broad permissions in order to use one of "
 "its functionalities."
 msgstr ""
+"La aplicación de Facebook <a href=\"https://eu.usatoday.com/story/tech/";
+"talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
+"move/2270305001/\">rastrea a los usuarios incluso cuando está cerrada</a>, "
+"tras haberles embaucado para que den a la aplicación amplios permisos a fin "
+"de utilizar una de sus funcionalidades."
 
 #. type: Content of: <ul><li><p>
 msgid ""

Index: po/malware-microsoft.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.es-en.html,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- po/malware-microsoft.es-en.html     19 Sep 2019 09:29:37 -0000      1.68
+++ po/malware-microsoft.es-en.html     4 Oct 2019 08:59:26 -0000       1.69
@@ -60,6 +60,8 @@
   <li><a href="#sabotage">Sabotage</a></li>
   <li><a href="#subscriptions">Subscriptions</a></li>
   <li><a href="#surveillance">Surveillance</a></li>
+  <li><a href="#tethers">Tethers</a>&mdash;functionalities that require
+    connection to a server.</li>
   <li><a href="#tyrants">Tyrants</a>&mdash;systems
     that reject any operating system not &ldquo;authorized&rdquo; by the
     manufacturer.</li>
@@ -569,6 +571,19 @@
 </ul>
 
 
+<h3 id="tethers">Microsoft Tethers</h3>
+
+<ul class="blurbs">
+  <li id="M201708310">
+    <p>The recent versions of Microsoft Office require the user to <a
+    
href="https://products.office.com/en-us/microsoft-office-for-home-and-school-faq?legRedir=true&amp;CorrelationId=c9c5b549-11ad-4f71-bf81-b7e069fdb372";>
+    connect to Microsoft servers at least every thirty-one
+    days</a>. Otherwise, the software will refuse to edit any documents
+    or create new ones. It will be restricted to viewing and printing.</p>
+  </li>
+</ul>
+
+
 <h3 id="jails">Microsoft Jails</h3>
 
 <ul class="blurbs">
@@ -593,7 +608,6 @@
   </li>
 </ul>
 
-
 <h3 id="tyrants">Microsoft Tyrants</h3>
 
 <ul class="blurbs">
@@ -674,7 +688,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/09/19 09:29:37 $
+$Date: 2019/10/04 08:59:26 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-mobiles.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es-en.html,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- po/malware-mobiles.es-en.html       19 Sep 2019 09:29:37 -0000      1.61
+++ po/malware-mobiles.es-en.html       4 Oct 2019 08:59:26 -0000       1.62
@@ -136,6 +136,19 @@
     them into full-time listening devices.</p>
   </li>
 
+  <li id="M201908270">
+    <p>A very popular app found in the
+    Google Play store contained a module that was designed to <a
+    
href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/";>secretly
+    install malware on the user's computer</a>. The app developers
+    regularly used it to make the computer download and execute any code
+    they wanted.</p>
+
+    <p>This is a concrete example of what users are exposed to when they
+    run nonfree apps. They can never be completely sure that a nonfree
+    app is safe.</p>
+  </li>
+
   <li id="M201609130">
     <p>Xiaomi phones come with <a
     
href="https://web.archive.org/web/20190424082647/http://blog.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered/";>
@@ -405,6 +418,14 @@
 <h3 id="surveillance">Mobile Surveillance</h3>
 
 <ul class="blurbs">
+  <li id="M201909091">
+    <p>The Facebook app <a
+    
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/";>
+    tracks users even when it is turned off</a>, after tricking them
+    into giving the app broad permissions in order to use one of its
+    functionalities.</p>
+  </li>
+
   <li id="M201909090">
     <p>Some nonfree period-tracking apps including MIA Fem and Maya <a
     
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem";>
@@ -1131,7 +1152,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/09/19 09:29:37 $
+$Date: 2019/10/04 08:59:26 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-mobiles.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr-en.html,v
retrieving revision 1.82
retrieving revision 1.83
diff -u -b -r1.82 -r1.83
--- po/malware-mobiles.fr-en.html       3 Oct 2019 11:30:33 -0000       1.82
+++ po/malware-mobiles.fr-en.html       4 Oct 2019 08:59:26 -0000       1.83
@@ -136,6 +136,19 @@
     them into full-time listening devices.</p>
   </li>
 
+  <li id="M201908270">
+    <p>A very popular app found in the
+    Google Play store contained a module that was designed to <a
+    
href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/";>secretly
+    install malware on the user's computer</a>. The app developers
+    regularly used it to make the computer download and execute any code
+    they wanted.</p>
+
+    <p>This is a concrete example of what users are exposed to when they
+    run nonfree apps. They can never be completely sure that a nonfree
+    app is safe.</p>
+  </li>
+
   <li id="M201609130">
     <p>Xiaomi phones come with <a
     
href="https://web.archive.org/web/20190424082647/http://blog.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered/";>
@@ -1139,7 +1152,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/10/03 11:30:33 $
+$Date: 2019/10/04 08:59:26 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-back-doors.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.es-en.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- po/proprietary-back-doors.es-en.html        12 Sep 2019 11:03:21 -0000      
1.9
+++ po/proprietary-back-doors.es-en.html        4 Oct 2019 08:59:26 -0000       
1.10
@@ -219,6 +219,19 @@
 <h3 id='install-delete'>Installing, deleting or disabling programs</h3>
 
 <ul class="blurbs">
+  <li id="M201908270">
+    <p>A very popular app found in the
+    Google Play store contained a module that was designed to <a
+    
href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/";>secretly
+    install malware on the user's computer</a>. The app developers
+    regularly used it to make the computer download and execute any code
+    they wanted.</p>
+
+    <p>This is a concrete example of what users are exposed to when they
+    run nonfree apps. They can never be completely sure that a nonfree
+    app is safe.</p>
+  </li>
+
   <li id="M201907100">
     <p>Apple appears to say that <a
     href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/";>
@@ -617,7 +630,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/09/12 11:03:21 $
+$Date: 2019/10/04 08:59:26 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-back-doors.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.es.po,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- po/proprietary-back-doors.es.po     4 Oct 2019 08:00:46 -0000       1.22
+++ po/proprietary-back-doors.es.po     4 Oct 2019 08:59:26 -0000       1.23
@@ -14,7 +14,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2019-10-04 07:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -422,12 +421,22 @@
 "app developers regularly used it to make the computer download and execute "
 "any code they wanted."
 msgstr ""
+"Una aplicación muy popular que se halla en la tienda Google Play contenía 
un "
+"módulo que estaba diseñado para <a href=\"https://arstechnica.com/";
+"information-technology/2019/08/google-play-app-with-100-million-downloads-"
+"executed-secret-payloads/\">instalar furtivamente programas maliciosos en el "
+"aparato del usuario</a>. Los desarrolladores de la aplicación lo usaban "
+"regularmente para hacer que el equipo del usuario descargara y ejecutara "
+"cualquier código que ellos quisieran."
 
 #. type: Content of: <ul><li><p>
 msgid ""
 "This is a concrete example of what users are exposed to when they run "
 "nonfree apps. They can never be completely sure that a nonfree app is safe."
 msgstr ""
+"Este es un ejemplo concreto de los riesgos que corren los usuarios cuando "
+"ejecutan software que no es libre. Nunca puede estar seguros de que una "
+"aplicación privativa sea segura."
 
 #. type: Content of: <ul><li><p>
 msgid ""

Index: po/proprietary-back-doors.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr-en.html,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- po/proprietary-back-doors.fr-en.html        11 Sep 2019 10:00:00 -0000      
1.68
+++ po/proprietary-back-doors.fr-en.html        4 Oct 2019 08:59:26 -0000       
1.69
@@ -219,6 +219,19 @@
 <h3 id='install-delete'>Installing, deleting or disabling programs</h3>
 
 <ul class="blurbs">
+  <li id="M201908270">
+    <p>A very popular app found in the
+    Google Play store contained a module that was designed to <a
+    
href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/";>secretly
+    install malware on the user's computer</a>. The app developers
+    regularly used it to make the computer download and execute any code
+    they wanted.</p>
+
+    <p>This is a concrete example of what users are exposed to when they
+    run nonfree apps. They can never be completely sure that a nonfree
+    app is safe.</p>
+  </li>
+
   <li id="M201907100">
     <p>Apple appears to say that <a
     href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/";>
@@ -617,7 +630,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/09/11 10:00:00 $
+$Date: 2019/10/04 08:59:26 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-surveillance.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es-en.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- po/proprietary-surveillance.es-en.html      20 Sep 2019 22:58:33 -0000      
1.1
+++ po/proprietary-surveillance.es-en.html      4 Oct 2019 08:59:26 -0000       
1.2
@@ -804,6 +804,14 @@
 </div>
 
 <ul class="blurbs">
+  <li id="M201909091">
+    <p>The Facebook app <a
+    
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/";>
+    tracks users even when it is turned off</a>, after tricking them
+    into giving the app broad permissions in order to use one of its
+    functionalities.</p>
+  </li>
+
   <li id="M201909090">
     <p>Some nonfree period-tracking apps including MIA Fem and Maya <a
     
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem";>
@@ -2494,7 +2502,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/09/20 22:58:33 $
+$Date: 2019/10/04 08:59:26 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-tethers.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.es-en.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- po/proprietary-tethers.es-en.html   22 Sep 2019 20:28:48 -0000      1.1
+++ po/proprietary-tethers.es-en.html   4 Oct 2019 08:59:26 -0000       1.2
@@ -137,6 +137,14 @@
     a temptation to commit sabotage.</p>
   </li>
 
+  <li id="M201708310">
+    <p>The recent versions of Microsoft Office require the user to <a
+    
href="https://products.office.com/en-us/microsoft-office-for-home-and-school-faq?legRedir=true&amp;CorrelationId=c9c5b549-11ad-4f71-bf81-b7e069fdb372";>
+    connect to Microsoft servers at least every thirty-one
+    days</a>. Otherwise, the software will refuse to edit any documents
+    or create new ones. It will be restricted to viewing and printing.</p>
+  </li>
+
   <li id="M201705180">
     <p>Bird and rabbit pets were implemented for Second
     Life by a company that tethered their food to a server.  <a
@@ -258,7 +266,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/09/22 20:28:48 $
+$Date: 2019/10/04 08:59:26 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-tethers.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.es.po,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- po/proprietary-tethers.es.po        4 Oct 2019 08:49:32 -0000       1.5
+++ po/proprietary-tethers.es.po        4 Oct 2019 08:59:26 -0000       1.6
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2019-10-03 10:26+0000\n"
 "Plural-Forms: nplurals=2; plural=(n != 1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -269,7 +268,6 @@
 "tentación para cometer sabotaje."
 
 #. type: Content of: <ul><li><p>
-#, fuzzy
 msgid ""
 "The recent versions of Microsoft Office require the user to <a href="
 "\"https://products.office.com/en-us/microsoft-office-for-home-and-school-faq?";

Index: po/proprietary.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es-en.html,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- po/proprietary.es-en.html   19 Sep 2019 09:29:37 -0000      1.68
+++ po/proprietary.es-en.html   4 Oct 2019 08:59:26 -0000       1.69
@@ -149,6 +149,35 @@
 <h3 id="latest">Latest additions</h3>
 
 <ul class="blurbs">
+  <li id="M201908270">
+    <p>A very popular app found in the
+    Google Play store contained a module that was designed to <a
+    
href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/";>secretly
+    install malware on the user's computer</a>. The app developers
+    regularly used it to make the computer download and execute any code
+    they wanted.</p>
+
+    <p>This is a concrete example of what users are exposed to when they
+    run nonfree apps. They can never be completely sure that a nonfree
+    app is safe.</p>
+  </li>
+
+  <li id="M201909091">
+    <p>The Facebook app <a
+    
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/";>
+    tracks users even when it is turned off</a>, after tricking them
+    into giving the app broad permissions in order to use one of its
+    functionalities.</p>
+  </li>
+
+  <li id="M201708310">
+    <p>The recent versions of Microsoft Office require the user to <a
+    
href="https://products.office.com/en-us/microsoft-office-for-home-and-school-faq?legRedir=true&amp;CorrelationId=c9c5b549-11ad-4f71-bf81-b7e069fdb372";>
+    connect to Microsoft servers at least every thirty-one
+    days</a>. Otherwise, the software will refuse to edit any documents
+    or create new ones. It will be restricted to viewing and printing.</p>
+  </li>
+
   <li id="M201909090">
     <p>Some nonfree period-tracking apps including MIA Fem and Maya <a
     
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem";>
@@ -165,38 +194,6 @@
     <p>This means that proprietary software can potentially be a way to
     commit perjury with impunity.</p>
   </li>
-
-  <li id="M201908220">
-    <p>ChromeBooks are programmed for obsolescence:
-    ChromeOS has a universal back door that is used for updates and <a
-    
href="https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/";>
-    ceases to operate at a predefined date</a>. From then on, there
-    appears to be no support whatsoever for the computer.</p>
-
-    <p>In other words, when you stop getting screwed by the back door,
-    you start getting screwed by the obsolescence.</p>
-  </li>
-
-  <li id="M201908210">
-    <p>Microsoft recorded users of Xboxes and had <a
-    
href="https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana";>
-    human workers listen to the recordings</a>.</p>
-
-    <p>Morally, we see no difference between having human workers listen and
-    having speech-recognition systems listen.  Both intrude on privacy.</p>
-  </li>
-
-  <li id="M201909060">
-    <p>Keeping track of who downloads a proprietary
-    program is a form of surveillance.  There is a
-    proprietary program for adjusting a certain telescopic rifle sight. <a
-    
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/";>
-    A US prosecutor has demanded the list of all the 10,000 or more people
-    who have installed it</a>.</p>
-
-    <p>With a free program there would not be a list of who has installed
-    it.</p>
-  </li>
 </ul>
 
 
@@ -257,7 +254,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/09/19 09:29:37 $
+$Date: 2019/10/04 08:59:26 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr-en.html,v
retrieving revision 1.115
retrieving revision 1.116
diff -u -b -r1.115 -r1.116
--- po/proprietary.fr-en.html   3 Oct 2019 11:30:33 -0000       1.115
+++ po/proprietary.fr-en.html   4 Oct 2019 08:59:26 -0000       1.116
@@ -149,6 +149,19 @@
 <h3 id="latest">Latest additions</h3>
 
 <ul class="blurbs">
+  <li id="M201908270">
+    <p>A very popular app found in the
+    Google Play store contained a module that was designed to <a
+    
href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/";>secretly
+    install malware on the user's computer</a>. The app developers
+    regularly used it to make the computer download and execute any code
+    they wanted.</p>
+
+    <p>This is a concrete example of what users are exposed to when they
+    run nonfree apps. They can never be completely sure that a nonfree
+    app is safe.</p>
+  </li>
+
   <li id="M201909091">
     <p>The Facebook app <a
     
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/";>
@@ -181,17 +194,6 @@
     <p>This means that proprietary software can potentially be a way to
     commit perjury with impunity.</p>
   </li>
-
-  <li id="M201908220">
-    <p>ChromeBooks are programmed for obsolescence:
-    ChromeOS has a universal back door that is used for updates and <a
-    
href="https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/";>
-    ceases to operate at a predefined date</a>. From then on, there
-    appears to be no support whatsoever for the computer.</p>
-
-    <p>In other words, when you stop getting screwed by the back door,
-    you start getting screwed by the obsolescence.</p>
-  </li>
 </ul>
 
 
@@ -252,7 +254,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/10/03 11:30:33 $
+$Date: 2019/10/04 08:59:26 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]