www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary proprietary-back-doors.es.html ...


From: GNUN
Subject: www/proprietary proprietary-back-doors.es.html ...
Date: Sun, 20 Oct 2019 07:00:24 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     19/10/20 07:00:24

Modified files:
        proprietary    : proprietary-back-doors.es.html 
                         proprietary-surveillance.es.html 
        proprietary/po : es.po malware-apple.es.po 
                         proprietary-back-doors.es-en.html 
                         proprietary-surveillance.es-en.html 
                         proprietary.es.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.es.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.es.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.213&r2=1.214
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.es.po?cvsroot=www&r1=1.171&r2=1.172
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.es-en.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es-en.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.234&r2=1.235

Patches:
Index: proprietary-back-doors.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.es.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- proprietary-back-doors.es.html      4 Oct 2019 08:59:26 -0000       1.13
+++ proprietary-back-doors.es.html      20 Oct 2019 11:00:23 -0000      1.14
@@ -357,6 +357,22 @@
 <h3 id='universal'>Control total</h3>
 
 <ul class="blurbs">
+  <li id="M201910130.1">
+    <p>En la aplicación del Partido Comunista Chino <cite>Study the Great
+Nation</cite> se ha descubierto una <a
+href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962";>puerta
+trasera que permite a los desarrolladores ejecutar en el teléfono, como
+«supeusuarios», el código que deseen</a>.</p>
+
+    <p>Nota: La <a
+href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html";>versión
+del artículo en el Washington Post</a> (en parte ocultada, pero legible si
+se copia y pega en un editor de texto) incluye una explicación en la que
+dice que las pruebas se han hecho únicamente en la versión de la aplicación
+para Android, y que, según Apple, «esta clase de vigilancia como
+"superusuario" no puede llevarse a cabo en el sistema operativo de Apple».</p>
+  </li>
+
   <li id="M201908220">
     <p>Los ChromeBooks están programados para quedar obsoletos: ChromeOS 
tiene una
 puerta trasera universal que es utilizada para las actualizaciones y que <a
@@ -652,12 +668,12 @@
 <div class="translators-credits">
 
 <!--TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.-->
-<strong>Traducción: Javier Fdez. Retenaga, 2019.</strong></div>
+<strong>Traducción: Equipo de traductores al español de GNU.</strong>.</div>
 
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2019/10/04 08:59:26 $
+$Date: 2019/10/20 11:00:23 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-surveillance.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.es.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- proprietary-surveillance.es.html    4 Oct 2019 08:59:26 -0000       1.3
+++ proprietary-surveillance.es.html    20 Oct 2019 11:00:23 -0000      1.4
@@ -837,6 +837,25 @@
 </div>
 
 <ul class="blurbs">
+  <li id="M201910130">
+    <p>La aplicación del Partido Comunista Chino <cite>Study the Great
+Nation</cite> requiere que los usuarios le permitan <a
+href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962";>
+acceder al micrófono del teléfono, a las fotos, mensajes de texto, contactos
+e historial de navegación</a>, y en la versión para Android se ha
+descubierto una puerta trasera que permite a los desarrolladores ejecutar en
+el teléfono, como «supeusuarios», el código que deseen. Descargarse y
+utilizar esta aplicación es obligatorio en algunos centros de trabajo.</p>
+
+    <p>Nota: La <a
+href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html";>versión
+del artículo en el Washington Post</a> (en parte ocultada, pero legible si
+se copia y pega en un editor de texto) incluye una explicación en la que
+dice que las pruebas se han hecho únicamente en la versión de la aplicación
+para Android, y que, según Apple, «esta clase de vigilancia como
+"superusuario" no puede llevarse a cabo en el sistema operativo de Apple».</p>
+  </li>
+
   <li id="M201909091">
     <p>La aplicación de Facebook <a
 
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/";>rastrea
@@ -2617,7 +2636,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2019/10/04 08:59:26 $
+$Date: 2019/10/20 11:00:23 $
 
 <!-- timestamp end -->
 </p>

Index: po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.213
retrieving revision 1.214
diff -u -b -r1.213 -r1.214
--- po/es.po    20 Oct 2019 10:30:42 -0000      1.213
+++ po/es.po    20 Oct 2019 11:00:23 -0000      1.214
@@ -1781,6 +1781,15 @@
 "&ldquo;superusers.&rdquo; Downloading and using this app is mandatory at "
 "some workplaces."
 msgstr ""
+"La aplicación del Partido Comunista Chino <cite>Study the Great Nation</"
+"cite> requiere que los usuarios le permitan <a href=\"https://www.ndtv.com/";
+"world-news/chinese-app-allows-officials-access-to-100-million-users-phone-"
+"report-2115962\"> acceder al micrófono del teléfono, a las fotos, mensajes "
+"de texto, contactos e historial de navegación</a>, y en la versión para "
+"Android se ha descubierto una puerta trasera que permite a los "
+"desarrolladores ejecutar en el teléfono, como «supeusuarios», el código 
que "
+"deseen. Descargarse y utilizar esta aplicación es obligatorio en algunos "
+"centros de trabajo."
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -1794,6 +1803,15 @@
 "kind of &lsquo;superuser&rsquo; surveillance could not be conducted on "
 "Apple's operating system.&rdquo;"
 msgstr ""
+"Nota: La <a href=\"http://web-old.archive.org/web/20191015005153/https://www.";
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\">versión del artículo en el "
+"Washington Post</a> (en parte ocultada, pero legible si se copia y pega en "
+"un editor de texto) incluye una explicación en la que dice que las pruebas "
+"se han hecho únicamente en la versión de la aplicación para Android, y 
que, "
+"según Apple, «esta clase de vigilancia como \"superusuario\" no puede "
+"llevarse a cabo en el sistema operativo de Apple»."
 
 #. type: Content of: <ul><li><p>
 # | In spite of Apple's supposed commitment to privacy, iPhone apps contain
@@ -9612,6 +9630,11 @@
 "door allowing developers to run any code they wish</a> in the users' phone, "
 "as &ldquo;superusers.&rdquo;"
 msgstr ""
+"En la aplicación del Partido Comunista Chino <cite>Study the Great Nation</"
+"cite> se ha descubierto una <a href=\"https://www.ndtv.com/world-news/";
+"chinese-app-allows-officials-access-to-100-million-users-phone-"
+"report-2115962\">puerta trasera que permite a los desarrolladores ejecutar "
+"en el teléfono, como «supeusuarios», el código que deseen</a>."
 
 #. type: Content of: <ul><li><p>
 msgid ""

Index: po/malware-apple.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.es.po,v
retrieving revision 1.171
retrieving revision 1.172
diff -u -b -r1.171 -r1.172
--- po/malware-apple.es.po      20 Oct 2019 10:33:54 -0000      1.171
+++ po/malware-apple.es.po      20 Oct 2019 11:00:23 -0000      1.172
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-10-20 10:25+0000\n"
 "X-Generator: Poedit 2.2.1\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 

Index: po/proprietary-back-doors.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.es-en.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- po/proprietary-back-doors.es-en.html        4 Oct 2019 08:59:26 -0000       
1.10
+++ po/proprietary-back-doors.es-en.html        20 Oct 2019 11:00:23 -0000      
1.11
@@ -350,6 +350,24 @@
 <h3 id='universal'>Full control</h3>
 
 <ul class="blurbs">
+  <li id="M201910130.1">
+    <p>The Chinese Communist Party's <a
+    href="/proprietary/proprietary-surveillance.html#M201910130">
+    &ldquo;Study the Great Nation&rdquo; app</a> was found to contain <a
+    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962";>
+    a back-door allowing developers to run any code they wish</a> in the
+    users' phone, as &ldquo;superusers.&rdquo;</p>
+
+    <p>Note: The <a
+    
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html";>
+    Washington Post version of the article</a> (partly obfuscated, but
+    readable after copy-pasting in a text editor) includes a clarification
+    saying that the tests were only performed on the Android version
+    of the app, and that, according to Apple, &ldquo;this kind of
+    &lsquo;superuser&rsquo; surveillance could not be conducted on
+    Apple's operating system.&rdquo;</p>
+  </li>
+
   <li id="M201908220">
     <p>ChromeBooks are programmed for obsolescence:
     ChromeOS has a universal back door that is used for updates and <a
@@ -630,7 +648,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/10/04 08:59:26 $
+$Date: 2019/10/20 11:00:23 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-surveillance.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es-en.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- po/proprietary-surveillance.es-en.html      4 Oct 2019 08:59:26 -0000       
1.2
+++ po/proprietary-surveillance.es-en.html      20 Oct 2019 11:00:24 -0000      
1.3
@@ -804,6 +804,26 @@
 </div>
 
 <ul class="blurbs">
+  <li id="M201910130">
+    <p>The Chinese Communist Party's &ldquo;Study
+    the Great Nation&rdquo; app requires users to grant it <a
+    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962";>
+    access to the phone's microphone, photos, text messages, contacts, and
+    internet history</a>, and the Android version was found to contain a
+    back-door allowing developers to run any code they wish in the users'
+    phone, as &ldquo;superusers.&rdquo; Downloading and using this
+    app is mandatory at some workplaces.</p>
+
+    <p>Note: The <a
+    
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html";>
+    Washington Post version of the article</a> (partly obfuscated, but
+    readable after copy-pasting in a text editor) includes a clarification
+    saying that the tests were only performed on the Android version
+    of the app, and that, according to Apple, &ldquo;this kind of
+    &lsquo;superuser&rsquo; surveillance could not be conducted on
+    Apple's operating system.&rdquo;</p>
+  </li>
+
   <li id="M201909091">
     <p>The Facebook app <a
     
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/";>
@@ -2502,7 +2522,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/10/04 08:59:26 $
+$Date: 2019/10/20 11:00:24 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.234
retrieving revision 1.235
diff -u -b -r1.234 -r1.235
--- po/proprietary.es.po        20 Oct 2019 10:33:43 -0000      1.234
+++ po/proprietary.es.po        20 Oct 2019 11:00:24 -0000      1.235
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-10-20 10:25+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.2.1\n"
 



reply via email to

[Prev in Thread] Current Thread [Next in Thread]