www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-amazon.es.html malware-...


From: GNUN
Subject: www/proprietary malware-amazon.es.html malware-...
Date: Thu, 19 Dec 2019 06:31:50 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     19/12/19 06:31:50

Modified files:
        proprietary    : malware-amazon.es.html 
                         malware-appliances.es.html 
                         proprietary-insecurity.es.html 
                         proprietary-interference.es.html 
                         proprietary.es.html 
        proprietary/po : es.po malware-amazon.es-en.html 
                         malware-appliances.es-en.html 
                         proprietary-insecurity.es-en.html 
                         proprietary-interference.es-en.html 
                         proprietary-interference.es.po 
                         proprietary.es-en.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-amazon.es.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.es.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.es.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-interference.es.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.es.html?cvsroot=www&r1=1.83&r2=1.84
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.233&r2=1.234
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.es-en.html?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.es-en.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.es-en.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.es-en.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.es.po?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es-en.html?cvsroot=www&r1=1.76&r2=1.77

Patches:
Index: malware-amazon.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-amazon.es.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- malware-amazon.es.html      2 Dec 2019 10:59:54 -0000       1.25
+++ malware-amazon.es.html      19 Dec 2019 11:31:49 -0000      1.26
@@ -223,6 +223,15 @@
 <div style="clear: left;"></div>
 
 <ul class="blurbs">
+  <li id="M201912170">
+    <p>Algunos delincuentes informáticos (a los que equivocadamente se 
refieren en
+este artículo como <a
+href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker";><cite>«hackers»</cite></a>)
+han conseguido entrar en el sistema privativo del Amazon Ring y <a
+href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras";>acceder
+a la cámara, los altavoces y los micrófonos</a>.</p>
+  </li>
+
   <li id="M201902270">
     <p>El videotimbre Ring (ahora Amazon) está diseñado de tal modo que el
 fabricante (ahora Amazon) puede estar observando todo el tiempo. Ahora
@@ -344,7 +353,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2019/12/02 10:59:54 $
+$Date: 2019/12/19 11:31:49 $
 
 <!-- timestamp end -->
 </p>

Index: malware-appliances.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-appliances.es.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- malware-appliances.es.html  3 Dec 2019 10:29:22 -0000       1.4
+++ malware-appliances.es.html  19 Dec 2019 11:31:49 -0000      1.5
@@ -58,6 +58,15 @@
 <div class="column-limit" id="malware-appliances"></div>
 
 <ul class="blurbs">
+  <li id="M201912170">
+    <p>Algunos delincuentes informáticos (a los que equivocadamente se 
refieren en
+este artículo como <a
+href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker";><cite>«hackers»</cite></a>)
+han conseguido entrar en el sistema privativo del Amazon Ring y <a
+href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras";>acceder
+a la cámara, los altavoces y los micrófonos</a>.</p>
+  </li>
+
   <li id="M201904260">
     <p>Los robots de juguete Jibo estaban conectados al servidor del 
fabricante. La
 empresa cerró el servidor e <a
@@ -959,7 +968,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2019/12/03 10:29:22 $
+$Date: 2019/12/19 11:31:49 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-insecurity.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.es.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- proprietary-insecurity.es.html      3 Dec 2019 10:29:22 -0000       1.9
+++ proprietary-insecurity.es.html      19 Dec 2019 11:31:49 -0000      1.10
@@ -74,6 +74,15 @@
 <div class="column-limit" id="proprietary-insecurity"></div>
 
 <ul class="blurbs">
+  <li id="M201912170">
+    <p>Algunos delincuentes informáticos (a los que equivocadamente se 
refieren en
+este artículo como <a
+href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker";><cite>«hackers»</cite></a>)
+han conseguido entrar en el sistema privativo del Amazon Ring y <a
+href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras";>acceder
+a la cámara, los altavoces y los micrófonos</a>.</p>
+  </li>
+
   <li id="M201908310">
     <p>Una serie de vulnerabilidades <a
 
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/";>halladas
@@ -772,7 +781,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2019/12/03 10:29:22 $
+$Date: 2019/12/19 11:31:49 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-interference.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-interference.es.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary-interference.es.html    21 Nov 2019 22:30:02 -0000      1.4
+++ proprietary-interference.es.html    19 Dec 2019 11:31:49 -0000      1.5
@@ -69,6 +69,15 @@
 <div class="column-limit" id="proprietary-interference"></div>
 
 <ul class="blurbs">
+  <li id="M201912170">
+    <p>Algunos delincuentes informáticos (a los que equivocadamente se 
refieren en
+este artículo como <a
+href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker";><cite>«hackers»</cite></a>)
+han conseguido entrar en el sistema privativo del Amazon Ring y <a
+href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras";>acceder
+a la cámara, los altavoces y los micrófonos</a>.</p>
+  </li>
+
   <li id="M201908150">
     <p>Apple está poniendo DRM en las baterías de los iPhone, y el software
 privativo del sistema <a
@@ -327,7 +336,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2019/11/21 22:30:02 $
+$Date: 2019/12/19 11:31:49 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.es.html,v
retrieving revision 1.83
retrieving revision 1.84
diff -u -b -r1.83 -r1.84
--- proprietary.es.html 21 Nov 2019 22:30:02 -0000      1.83
+++ proprietary.es.html 19 Dec 2019 11:31:49 -0000      1.84
@@ -183,6 +183,15 @@
 <h3 id="latest">Añadidos recientes</h3>
 
 <ul class="blurbs">
+  <li id="M201912170">
+    <p>Algunos delincuentes informáticos (a los que equivocadamente se 
refieren en
+este artículo como <a
+href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker";><cite>«hackers»</cite></a>)
+han conseguido entrar en el sistema privativo del Amazon Ring y <a
+href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras";>acceder
+a la cámara, los altavoces y los micrófonos</a>.</p>
+  </li>
+
   <li id="M201803210">
     <p>Algunas aplicaciones de <span>redes sociales</span> están <a
 href="https://www.jeffbullas.com/facebook-creates-addiction/";>diseñadas para
@@ -287,19 +296,6 @@
 para Android, y que, según Apple, «esta clase de vigilancia como
 "superusuario" no puede llevarse a cabo en el sistema operativo de Apple».</p>
   </li>
-
-  <li id="M201910070">
-    <p>Apple <a
-href="https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-hong-kong.html";>censura
-la bandera de Taiwan en iOS</a> en nombre del Gobierno chino. Cuando como
-región se indica Hong Kong, su bandera no es visible en la ventana de
-selección de emojis, aunque aún se puede acceder a ella. Cuando como región
-se indica China continental, cualquier intento de mostrarla acaba con un
-icono de «emoji vacío», como si la bandera nunca hubiera existido.</p>
-
-    <p>De modo que Apple utiliza no solo la <cite>App Store</cite> como 
instrumento
-de censura, también lo hace con el sistema operativo de las iCosas.</p>
-  </li>
 </ul>
 
 </div>
@@ -379,7 +375,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2019/11/21 22:30:02 $
+$Date: 2019/12/19 11:31:49 $
 
 <!-- timestamp end -->
 </p>

Index: po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.233
retrieving revision 1.234
diff -u -b -r1.233 -r1.234
--- po/es.po    18 Dec 2019 23:01:25 -0000      1.233
+++ po/es.po    19 Dec 2019 11:31:49 -0000      1.234
@@ -627,6 +627,12 @@
 "ring-hackers-reportedly-watching-talking-strangers-in-home-cameras\">access "
 "its camera, speakers and microphones</a>."
 msgstr ""
+"Algunos delincuentes informáticos (a los que equivocadamente se refieren en "
+"este artículo como <a href=\"https://www.gnu.org/philosophy/words-to-avoid.";
+"html#Hacker\"><cite>«hackers»</cite></a>) han conseguido entrar en el "
+"sistema privativo del Amazon Ring y <a href=\"https://www.theguardian.com/";
+"technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-"
+"home-cameras\">acceder a la cámara, los altavoces y los micrófonos</a>."
 
 #. type: Content of: <div><ul><li><p>
 # | The Ring (now Amazon) doorbell camera is designed so that the manufacturer

Index: po/malware-amazon.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.es-en.html,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- po/malware-amazon.es-en.html        2 Dec 2019 10:59:54 -0000       1.23
+++ po/malware-amazon.es-en.html        19 Dec 2019 11:31:50 -0000      1.24
@@ -212,6 +212,14 @@
 <div style="clear: left;"></div>
 
 <ul class="blurbs">
+  <li id="M201912170">
+    <p>Some security breakers (wrongly referred in this article as <a
+    
href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker";>&ldquo;hackers&rdquo;</a>)
+    managed to interfere the Amazon Ring proprietary system, and <a
+    
href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras";>access
+    its camera, speakers and microphones</a>.</p>
+  </li>
+
   <li id="M201902270">
     <p>The Ring (now Amazon) doorbell camera is designed so that the
     manufacturer (now Amazon) can watch all the time. Now it turns out
@@ -314,7 +322,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/12/02 10:59:54 $
+$Date: 2019/12/19 11:31:50 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-appliances.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.es-en.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- po/malware-appliances.es-en.html    3 Dec 2019 10:29:23 -0000       1.4
+++ po/malware-appliances.es-en.html    19 Dec 2019 11:31:50 -0000      1.5
@@ -51,6 +51,14 @@
 <div class="column-limit" id="malware-appliances"></div>
 
 <ul class="blurbs">
+  <li id="M201912170">
+    <p>Some security breakers (wrongly referred in this article as <a
+    
href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker";>&ldquo;hackers&rdquo;</a>)
+    managed to interfere the Amazon Ring proprietary system, and <a
+    
href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras";>access
+    its camera, speakers and microphones</a>.</p>
+  </li>
+
   <li id="M201904260">
     <p>The Jibo robot toys were tethered to the manufacturer's server,
     and <a href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648";>
@@ -932,7 +940,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/12/03 10:29:23 $
+$Date: 2019/12/19 11:31:50 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-insecurity.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.es-en.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- po/proprietary-insecurity.es-en.html        3 Dec 2019 10:29:23 -0000       
1.8
+++ po/proprietary-insecurity.es-en.html        19 Dec 2019 11:31:50 -0000      
1.9
@@ -65,6 +65,14 @@
 <div class="column-limit" id="proprietary-insecurity"></div>
 
 <ul class="blurbs">
+  <li id="M201912170">
+    <p>Some security breakers (wrongly referred in this article as <a
+    
href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker";>&ldquo;hackers&rdquo;</a>)
+    managed to interfere the Amazon Ring proprietary system, and <a
+    
href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras";>access
+    its camera, speakers and microphones</a>.</p>
+  </li>
+
   <li id="M201908310">
     <p>A series of vulnerabilities <a
     
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/";>found
@@ -728,7 +736,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/12/03 10:29:23 $
+$Date: 2019/12/19 11:31:50 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-interference.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.es-en.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- po/proprietary-interference.es-en.html      21 Nov 2019 22:30:04 -0000      
1.3
+++ po/proprietary-interference.es-en.html      19 Dec 2019 11:31:50 -0000      
1.4
@@ -60,6 +60,14 @@
 <div class="column-limit" id="proprietary-interference"></div>
 
 <ul class="blurbs">
+  <li id="M201912170">
+    <p>Some security breakers (wrongly referred in this article as <a
+    
href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker";>&ldquo;hackers&rdquo;</a>)
+    managed to interfere the Amazon Ring proprietary system, and <a
+    
href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras";>access
+    its camera, speakers and microphones</a>.</p>
+  </li>
+
   <li id="M201908150">
     <p>Apple is putting DRM on iPhone
     batteries, and the system proprietary software <a
@@ -295,7 +303,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/11/21 22:30:04 $
+$Date: 2019/12/19 11:31:50 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-interference.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.es.po,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- po/proprietary-interference.es.po   19 Dec 2019 11:23:37 -0000      1.11
+++ po/proprietary-interference.es.po   19 Dec 2019 11:31:50 -0000      1.12
@@ -205,8 +205,8 @@
 msgid ""
 "<small>(Note that the article refers to the infected software as &ldquo;"
 "content management system&rdquo;. A better term would be &ldquo;<a href=\"/"
-"philosophy/words-to-avoid.html#Content\">website revision system</"
-"a>&rdquo;.)</small>"
+"philosophy/words-to-avoid.html#Content\">website revision system</a>&rdquo;.)"
+"</small>"
 msgstr ""
 "<small>(Observe que el artículo se refiere al software infectado como "
 "«sistema de gestión de contenidos». Un término más correcto sería 
&ldquo;<a "

Index: po/proprietary.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es-en.html,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- po/proprietary.es-en.html   21 Nov 2019 22:30:04 -0000      1.76
+++ po/proprietary.es-en.html   19 Dec 2019 11:31:50 -0000      1.77
@@ -173,6 +173,14 @@
 <h3 id="latest">Latest additions</h3>
 
 <ul class="blurbs">
+  <li id="M201912170">
+    <p>Some security breakers (wrongly referred in this article as <a
+    
href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker";>&ldquo;hackers&rdquo;</a>)
+    managed to interfere the Amazon Ring proprietary system, and <a
+    
href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras";>access
+    its camera, speakers and microphones</a>.</p>
+  </li>
+
   <li id="M201803210">
     <p>Some <span>social networking</span> apps are <a
     href="https://www.jeffbullas.com/facebook-creates-addiction/";>
@@ -276,20 +284,6 @@
     &lsquo;superuser&rsquo; surveillance could not be conducted on
     Apple's operating system.&rdquo;</p>
   </li>
-
-  <li id="M201910070">
-    <p>Apple <a
-    
href="https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-hong-kong.html";>
-    censors the Taiwan flag in iOS</a> on behalf of the Chinese
-    government. When the region is set to Hong Kong, this flag is not
-    visible in the emoji selection widget but is still accessible. When the
-    region is set to mainland China, all attempts to display it will result
-    in the &ldquo;empty emoji&rdquo; icon as if the flag never existed.</p>
-
-    <p>Thus, not only does Apple use the App Store as an instrument
-    of censorship, it also uses the iThing operating system for that
-    purpose.</p>
-  </li>
 </ul>
 
 </div>
@@ -351,7 +345,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/11/21 22:30:04 $
+$Date: 2019/12/19 11:31:50 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]