[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary proprietary-back-doors.es.html ...
From: |
GNUN |
Subject: |
www/proprietary proprietary-back-doors.es.html ... |
Date: |
Sun, 20 Oct 2019 07:00:24 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/10/20 07:00:24
Modified files:
proprietary : proprietary-back-doors.es.html
proprietary-surveillance.es.html
proprietary/po : es.po malware-apple.es.po
proprietary-back-doors.es-en.html
proprietary-surveillance.es-en.html
proprietary.es.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.es.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.es.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.213&r2=1.214
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.es.po?cvsroot=www&r1=1.171&r2=1.172
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.es-en.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es-en.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.234&r2=1.235
Patches:
Index: proprietary-back-doors.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.es.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- proprietary-back-doors.es.html 4 Oct 2019 08:59:26 -0000 1.13
+++ proprietary-back-doors.es.html 20 Oct 2019 11:00:23 -0000 1.14
@@ -357,6 +357,22 @@
<h3 id='universal'>Control total</h3>
<ul class="blurbs">
+ <li id="M201910130.1">
+ <p>En la aplicación del Partido Comunista Chino <cite>Study the Great
+Nation</cite> se ha descubierto una <a
+href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">puerta
+trasera que permite a los desarrolladores ejecutar en el teléfono, como
+«supeusuarios», el código que deseen</a>.</p>
+
+ <p>Nota: La <a
+href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">versión
+del artÃculo en el Washington Post</a> (en parte ocultada, pero legible si
+se copia y pega en un editor de texto) incluye una explicación en la que
+dice que las pruebas se han hecho únicamente en la versión de la aplicación
+para Android, y que, según Apple, «esta clase de vigilancia como
+"superusuario" no puede llevarse a cabo en el sistema operativo de Apple».</p>
+ </li>
+
<li id="M201908220">
<p>Los ChromeBooks están programados para quedar obsoletos: ChromeOS
tiene una
puerta trasera universal que es utilizada para las actualizaciones y que <a
@@ -652,12 +668,12 @@
<div class="translators-credits">
<!--TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.-->
-<strong>Traducción: Javier Fdez. Retenaga, 2019.</strong></div>
+<strong>Traducción: Equipo de traductores al español de GNU.</strong>.</div>
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2019/10/04 08:59:26 $
+$Date: 2019/10/20 11:00:23 $
<!-- timestamp end -->
</p>
Index: proprietary-surveillance.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.es.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- proprietary-surveillance.es.html 4 Oct 2019 08:59:26 -0000 1.3
+++ proprietary-surveillance.es.html 20 Oct 2019 11:00:23 -0000 1.4
@@ -837,6 +837,25 @@
</div>
<ul class="blurbs">
+ <li id="M201910130">
+ <p>La aplicación del Partido Comunista Chino <cite>Study the Great
+Nation</cite> requiere que los usuarios le permitan <a
+href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
+acceder al micrófono del teléfono, a las fotos, mensajes de texto, contactos
+e historial de navegación</a>, y en la versión para Android se ha
+descubierto una puerta trasera que permite a los desarrolladores ejecutar en
+el teléfono, como «supeusuarios», el código que deseen. Descargarse y
+utilizar esta aplicación es obligatorio en algunos centros de trabajo.</p>
+
+ <p>Nota: La <a
+href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">versión
+del artÃculo en el Washington Post</a> (en parte ocultada, pero legible si
+se copia y pega en un editor de texto) incluye una explicación en la que
+dice que las pruebas se han hecho únicamente en la versión de la aplicación
+para Android, y que, según Apple, «esta clase de vigilancia como
+"superusuario" no puede llevarse a cabo en el sistema operativo de Apple».</p>
+ </li>
+
<li id="M201909091">
<p>La aplicación de Facebook <a
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">rastrea
@@ -2617,7 +2636,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2019/10/04 08:59:26 $
+$Date: 2019/10/20 11:00:23 $
<!-- timestamp end -->
</p>
Index: po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.213
retrieving revision 1.214
diff -u -b -r1.213 -r1.214
--- po/es.po 20 Oct 2019 10:30:42 -0000 1.213
+++ po/es.po 20 Oct 2019 11:00:23 -0000 1.214
@@ -1781,6 +1781,15 @@
"“superusers.” Downloading and using this app is mandatory at "
"some workplaces."
msgstr ""
+"La aplicación del Partido Comunista Chino <cite>Study the Great Nation</"
+"cite> requiere que los usuarios le permitan <a href=\"https://www.ndtv.com/"
+"world-news/chinese-app-allows-officials-access-to-100-million-users-phone-"
+"report-2115962\"> acceder al micrófono del teléfono, a las fotos, mensajes "
+"de texto, contactos e historial de navegación</a>, y en la versión para "
+"Android se ha descubierto una puerta trasera que permite a los "
+"desarrolladores ejecutar en el teléfono, como «supeusuarios», el código
que "
+"deseen. Descargarse y utilizar esta aplicación es obligatorio en algunos "
+"centros de trabajo."
#. type: Content of: <ul><li><p>
msgid ""
@@ -1794,6 +1803,15 @@
"kind of ‘superuser’ surveillance could not be conducted on "
"Apple's operating system.”"
msgstr ""
+"Nota: La <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\">versión del artÃculo en el "
+"Washington Post</a> (en parte ocultada, pero legible si se copia y pega en "
+"un editor de texto) incluye una explicación en la que dice que las pruebas "
+"se han hecho únicamente en la versión de la aplicación para Android, y
que, "
+"según Apple, «esta clase de vigilancia como \"superusuario\" no puede "
+"llevarse a cabo en el sistema operativo de Apple»."
#. type: Content of: <ul><li><p>
# | In spite of Apple's supposed commitment to privacy, iPhone apps contain
@@ -9612,6 +9630,11 @@
"door allowing developers to run any code they wish</a> in the users' phone, "
"as “superusers.”"
msgstr ""
+"En la aplicación del Partido Comunista Chino <cite>Study the Great Nation</"
+"cite> se ha descubierto una <a href=\"https://www.ndtv.com/world-news/"
+"chinese-app-allows-officials-access-to-100-million-users-phone-"
+"report-2115962\">puerta trasera que permite a los desarrolladores ejecutar "
+"en el teléfono, como «supeusuarios», el código que deseen</a>."
#. type: Content of: <ul><li><p>
msgid ""
Index: po/malware-apple.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.es.po,v
retrieving revision 1.171
retrieving revision 1.172
diff -u -b -r1.171 -r1.172
--- po/malware-apple.es.po 20 Oct 2019 10:33:54 -0000 1.171
+++ po/malware-apple.es.po 20 Oct 2019 11:00:23 -0000 1.172
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-10-20 10:25+0000\n"
"X-Generator: Poedit 2.2.1\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
Index: po/proprietary-back-doors.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.es-en.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- po/proprietary-back-doors.es-en.html 4 Oct 2019 08:59:26 -0000
1.10
+++ po/proprietary-back-doors.es-en.html 20 Oct 2019 11:00:23 -0000
1.11
@@ -350,6 +350,24 @@
<h3 id='universal'>Full control</h3>
<ul class="blurbs">
+ <li id="M201910130.1">
+ <p>The Chinese Communist Party's <a
+ href="/proprietary/proprietary-surveillance.html#M201910130">
+ “Study the Great Nation” app</a> was found to contain <a
+
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
+ a back-door allowing developers to run any code they wish</a> in the
+ users' phone, as “superusers.”</p>
+
+ <p>Note: The <a
+
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
+ Washington Post version of the article</a> (partly obfuscated, but
+ readable after copy-pasting in a text editor) includes a clarification
+ saying that the tests were only performed on the Android version
+ of the app, and that, according to Apple, “this kind of
+ ‘superuser’ surveillance could not be conducted on
+ Apple's operating system.”</p>
+ </li>
+
<li id="M201908220">
<p>ChromeBooks are programmed for obsolescence:
ChromeOS has a universal back door that is used for updates and <a
@@ -630,7 +648,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/04 08:59:26 $
+$Date: 2019/10/20 11:00:23 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-surveillance.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es-en.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- po/proprietary-surveillance.es-en.html 4 Oct 2019 08:59:26 -0000
1.2
+++ po/proprietary-surveillance.es-en.html 20 Oct 2019 11:00:24 -0000
1.3
@@ -804,6 +804,26 @@
</div>
<ul class="blurbs">
+ <li id="M201910130">
+ <p>The Chinese Communist Party's “Study
+ the Great Nation” app requires users to grant it <a
+
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
+ access to the phone's microphone, photos, text messages, contacts, and
+ internet history</a>, and the Android version was found to contain a
+ back-door allowing developers to run any code they wish in the users'
+ phone, as “superusers.” Downloading and using this
+ app is mandatory at some workplaces.</p>
+
+ <p>Note: The <a
+
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
+ Washington Post version of the article</a> (partly obfuscated, but
+ readable after copy-pasting in a text editor) includes a clarification
+ saying that the tests were only performed on the Android version
+ of the app, and that, according to Apple, “this kind of
+ ‘superuser’ surveillance could not be conducted on
+ Apple's operating system.”</p>
+ </li>
+
<li id="M201909091">
<p>The Facebook app <a
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">
@@ -2502,7 +2522,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/04 08:59:26 $
+$Date: 2019/10/20 11:00:24 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.234
retrieving revision 1.235
diff -u -b -r1.234 -r1.235
--- po/proprietary.es.po 20 Oct 2019 10:33:43 -0000 1.234
+++ po/proprietary.es.po 20 Oct 2019 11:00:24 -0000 1.235
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-10-20 10:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.2.1\n"
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary proprietary-back-doors.es.html ...,
GNUN <=