[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-cars.es.html malware-ga...
From: |
GNUN |
Subject: |
www/proprietary malware-cars.es.html malware-ga... |
Date: |
Mon, 17 Feb 2020 07:34:26 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 20/02/17 07:34:26
Modified files:
proprietary : malware-cars.es.html malware-games.es.html
malware-mobiles.es.html
proprietary-addictions.es.html
proprietary-deception.es.html
proprietary-sabotage.es.html
proprietary-surveillance.es.html
proprietary.es.html
proprietary/po : es.po malware-cars.es-en.html
malware-games.es-en.html malware-games.es.po
malware-mobiles.es-en.html
malware-mobiles.es.po
proprietary-addictions.es-en.html
proprietary-addictions.es.po
proprietary-deception.es-en.html
proprietary-sabotage.es-en.html
proprietary-surveillance.es-en.html
proprietary-surveillance.es.po
proprietary.es-en.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-cars.es.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-games.es.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.es.html?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-addictions.es.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-deception.es.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.es.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.es.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.es.html?cvsroot=www&r1=1.86&r2=1.87
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.243&r2=1.244
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.es-en.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.es-en.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.es.po?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es-en.html?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.166&r2=1.167
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.es-en.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.es.po?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.es-en.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.es-en.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es-en.html?cvsroot=www&r1=1.79&r2=1.80
Patches:
Index: malware-cars.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-cars.es.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- malware-cars.es.html 23 Nov 2019 11:33:14 -0000 1.2
+++ malware-cars.es.html 17 Feb 2020 12:34:25 -0000 1.3
@@ -58,6 +58,15 @@
<div class="column-limit" id="malware-cars"></div>
<ul class="blurbs">
+ <li id="M201912171">
+ <p>Ahora la mayor parte de los coches <a
+href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html">registran
+y envÃan al fabricante diversos tipos de datos</a>. Para el usuario, acceder
+a esos datos es casi imposible, ya que para ello es preciso introducirse en
+el ordenador del vehÃculo, que está siempre oculto y funciona con software
+privativo.</p>
+ </li>
+
<li id="M201909160">
<p>Los usuarios de Tesla denuncian que Tesla <a
href="https://www.reuters.com/article/us-tesla-battery/tesla-owner-lawsuit-claims-software-update-fraudulently-cut-battery-capacity-idUSKCN1UY2TW">ha
@@ -357,7 +366,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2017, 2018, 2019 Free Software Foundation, Inc.</p>
+<p>Copyright © 2017, 2018, 2019, 2020 Free Software Foundation, Inc.</p>
<p>Esta página está bajo licencia <a rel="license"
href="http://creativecommons.org/licenses/by/4.0/deed.es_ES">Creative
@@ -373,7 +382,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2019/11/23 11:33:14 $
+$Date: 2020/02/17 12:34:25 $
<!-- timestamp end -->
</p>
Index: malware-games.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-games.es.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- malware-games.es.html 23 Nov 2019 11:33:14 -0000 1.2
+++ malware-games.es.html 17 Feb 2020 12:34:25 -0000 1.3
@@ -96,6 +96,12 @@
<p>Juegos como World of Warcraft, que se consideran muy adictivos, emplean
varias de estas técnicas.</p>
+ <p style="margin-top: 1em">Las «cajas de botÃn» (<cite>loot
boxes</cite>) son una aplicación directa
+del mecanismo de recompensa aleatoria, y su adictividad se refuerza con
+seductoras animaciones. Son <a
+href="https://www.pcgamer.com/behind-the-addictive-psychology-and-seductive-art-of-loot-boxes/">semejantes
+a los juegos de apuestas</a>.</p>
+
<p style="margin-top: 1em">Los desarrolladores de aplicaciones gratuitas
para móviles aplican las
técnicas arriba descritas para <a
href="https://www.psychguides.com/interact/the-psychology-of-freemium/">convertir
@@ -106,7 +112,7 @@
desarrolladores estudian minuciosamente el comportamiento de millones de
usuarios a fin de incrementar la adictividad de sus juegos.</p>
- <p><small>(Desafortunadamente, el artÃculo utiliza el término
+ <p><small>(Desafortunadamente, estos dos últimos artÃculos utilizan el
término
«<cite>free</cite>» para significar «precio cero». Recomendamos en su lugar
decir «gratis».)</small></p>
@@ -416,7 +422,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2016, 2017, 2018, 2019 Free Software Foundation, Inc.</p>
+<p>Copyright © 2016, 2017, 2018, 2019, 2020 Free Software Foundation,
Inc.</p>
<p>Esta página está bajo licencia <a rel="license"
href="http://creativecommons.org/licenses/by/4.0/deed.es_ES">Creative
@@ -432,7 +438,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2019/11/23 11:33:14 $
+$Date: 2020/02/17 12:34:25 $
<!-- timestamp end -->
</p>
Index: malware-mobiles.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.es.html,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- malware-mobiles.es.html 21 Jan 2020 12:34:48 -0000 1.69
+++ malware-mobiles.es.html 17 Feb 2020 12:34:25 -0000 1.70
@@ -126,7 +126,8 @@
<!--<li>
<a href="#censorship">Censorship</a></li>-->
-<li><a href="#drm">DRM</a></li>
+<li><a href="#deception">Trampas</a></li>
+ <li><a href="#drm">DRM</a></li>
<li><a href="#insecurity">Inseguridad</a></li>
<li><a href="#interference">Intromisiones</a></li>
<li><a href="#manipulation">Manipulación</a></li>
@@ -220,6 +221,24 @@
</ul>
+<h3 id="deception">Trampas</h3>
+
+<ul class="blurbs">
+ <li id="M202002020">
+ <p>Muchas aplicaciones de Android engañan a los usuarios al pedirles que
+decidan qué permisos otorgar al programa, para a continuación <a
+href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/">ignorar
+sus preferencias</a>.</p>
+
+ <p>Se supone que el sistema Android evita el filtrado de datos al ejecutar
las
+aplicaciones en entornos aislados, pero los desarrolladores han encontrado
+maneras de acceder a los datos por otros medios. Y no hay nada que el
+usuario pueda hacer para evitarlo, ya que tanto el sistema como las
+aplicaciones son privativas.</p>
+ </li>
+</ul>
+
+
<h3 id="drm">DRM</h3>
<p>Gestión digital de restricciones, o «<abbr title="Digital Restrictions
@@ -467,6 +486,27 @@
de escucha a tiempo completo</a>.</p>
</li>
+ <li id="M201912220">
+ <p>La aplicación de mensajerÃa ToToc parece ser <a
+href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html">una
+herramienta de espionaje del Gobierno de Emiratos Ãrabes
+Unidos</a>. Cualquier programa que no sea libre puede estar espiándonos, lo
+cual es una buena razón para utilizar en su lugar software libre.</p>
+
+ <p><small>(Nota: en este artÃculo se utiliza el término
<cite>«free»</cite> en
+el sentido de «gratis».)</small></p>
+ </li>
+
+ <li id="M201912090">
+ <p>Cuando se utilizan en el trabajo, los iMonstruos y los teléfonos
Android
+proporcionan a los empleadores potentes <a
+href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">capacidades
+de espionaje y sabotaje</a> en el caso de que estos instalen su propio
+software en el dispositivo. Muchos empleadores exigen hacerlo. Para el
+empleado esto no es sino otro software privativo, tan fundamentalmente
+injusto y peligroso como cualquier otro software privativo.</p>
+ </li>
+
<li id="M201909091">
<p>La aplicación de Facebook <a
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">rastrea
@@ -1255,7 +1295,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2020/01/21 12:34:48 $
+$Date: 2020/02/17 12:34:25 $
<!-- timestamp end -->
</p>
Index: proprietary-addictions.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-addictions.es.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- proprietary-addictions.es.html 21 Nov 2019 12:03:45 -0000 1.12
+++ proprietary-addictions.es.html 17 Feb 2020 12:34:25 -0000 1.13
@@ -109,6 +109,12 @@
<p>Juegos como World of Warcraft, que se consideran muy adictivos, emplean
varias de estas técnicas.</p>
+ <p style="margin-top: 1em">Las «cajas de botÃn» (<cite>loot
boxes</cite>) son una aplicación directa
+del mecanismo de recompensa aleatoria, y su adictividad se refuerza con
+seductoras animaciones. Son <a
+href="https://www.pcgamer.com/behind-the-addictive-psychology-and-seductive-art-of-loot-boxes/">semejantes
+a los juegos de apuestas</a>.</p>
+
<p style="margin-top: 1em">Los desarrolladores de aplicaciones gratuitas
para móviles aplican las
técnicas arriba descritas para <a
href="https://www.psychguides.com/interact/the-psychology-of-freemium/">convertir
@@ -119,7 +125,7 @@
desarrolladores estudian minuciosamente el comportamiento de millones de
usuarios a fin de incrementar la adictividad de sus juegos.</p>
- <p><small>(Desafortunadamente, el artÃculo utiliza el término
+ <p><small>(Desafortunadamente, estos dos últimos artÃculos utilizan el
término
«<cite>free</cite>» para significar «precio cero». Recomendamos en su lugar
decir «gratis».)</small></p>
@@ -341,7 +347,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2019 Free Software Foundation, Inc.</p>
+<p>Copyright © 2019, 2020 Free Software Foundation, Inc.</p>
<p>Esta página está bajo licencia <a rel="license"
href="http://creativecommons.org/licenses/by/4.0/deed.es_ES">Creative
@@ -356,7 +362,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2019/11/21 12:03:45 $
+$Date: 2020/02/17 12:34:25 $
<!-- timestamp end -->
</p>
Index: proprietary-deception.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-deception.es.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary-deception.es.html 24 Nov 2019 12:02:27 -0000 1.7
+++ proprietary-deception.es.html 17 Feb 2020 12:34:25 -0000 1.8
@@ -67,6 +67,19 @@
<div class="column-limit" id="proprietary-deception"></div>
<ul class="blurbs">
+ <li id="M202002020">
+ <p>Muchas aplicaciones de Android engañan a los usuarios al pedirles que
+decidan qué permisos otorgar al programa, para a continuación <a
+href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/">ignorar
+sus preferencias</a>.</p>
+
+ <p>Se supone que el sistema Android evita el filtrado de datos al ejecutar
las
+aplicaciones en entornos aislados, pero los desarrolladores han encontrado
+maneras de acceder a los datos por otros medios. Y no hay nada que el
+usuario pueda hacer para evitarlo, ya que tanto el sistema como las
+aplicaciones son privativas.</p>
+ </li>
+
<li id="M201904150">
<p id="M201509210">Volkswagen programó los ordenadores que controlan el
motor de sus coches
para que <a
@@ -203,7 +216,8 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2015, 2016, 2017, 2018, 2019 Free Software Foundation,
Inc.</p>
+<p>Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Free Software
+Foundation, Inc.</p>
<p>Esta página está bajo licencia <a rel="license"
href="http://creativecommons.org/licenses/by/4.0/deed.es_ES">Creative
@@ -219,7 +233,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2019/11/24 12:02:27 $
+$Date: 2020/02/17 12:34:25 $
<!-- timestamp end -->
</p>
Index: proprietary-sabotage.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-sabotage.es.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- proprietary-sabotage.es.html 21 Nov 2019 22:30:02 -0000 1.12
+++ proprietary-sabotage.es.html 17 Feb 2020 12:34:25 -0000 1.13
@@ -66,6 +66,16 @@
<div class="column-limit" id="proprietary-sabotage"></div>
<ul class="blurbs">
+ <li id="M201912090">
+ <p>Cuando se utilizan en el trabajo, los iMonstruos y los teléfonos
Android
+proporcionan a los empleadores potentes <a
+href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">capacidades
+de espionaje y sabotaje</a> en el caso de que estos instalen su propio
+software en el dispositivo. Muchos empleadores exigen hacerlo. Para el
+empleado esto no es sino otro software privativo, tan fundamentalmente
+injusto y peligroso como cualquier otro software privativo.</p>
+ </li>
+
<li id="M201910071">
<p>Adobe ha <a
href="https://www.bleepingcomputer.com/news/software/adobe-to-ban-users-from-venezuela-due-to-us-executive-order/">cancelado
@@ -675,7 +685,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2013, 2015, 2016, 2017, 2018, 2019 Free Software
+<p>Copyright © 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software
Foundation, Inc.</p>
<p>Esta página está bajo licencia <a rel="license"
@@ -691,7 +701,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2019/11/21 22:30:02 $
+$Date: 2020/02/17 12:34:25 $
<!-- timestamp end -->
</p>
Index: proprietary-surveillance.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.es.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary-surveillance.es.html 3 Feb 2020 09:31:52 -0000 1.8
+++ proprietary-surveillance.es.html 17 Feb 2020 12:34:25 -0000 1.9
@@ -832,6 +832,17 @@
</div>
<ul class="blurbs">
+ <li id="M201912190">
+ <p>Se ha descubierto que algunas extensiones de Avast y AVG para Firefox y
+Chrome <a
+href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome">espÃan
+los hábitos de navegación de los usuarios</a>. Mozilla y Google retiraron
+las extensiones problemáticas de sus tiendas, pero esto muestra una vez más
+lo inseguro que puede el software privativo: herramientas que se supone que
+protegen un sistema privativo, en vez de eso están infectándolo con software
+malicioso adicional (siendo el sistema mismo el primer software malicioso).</p>
+ </li>
+
<li id="M201811020">
<p>El software para el tratamiento de gráficos de Foundry <a
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">envÃa
@@ -860,6 +871,27 @@
para Amazon y también para otras compañÃas</a>.</p>
</li>
+ <li id="M201912220">
+ <p>La aplicación de mensajerÃa ToToc parece ser <a
+href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html">una
+herramienta de espionaje del Gobierno de Emiratos Ãrabes
+Unidos</a>. Cualquier programa que no sea libre puede estar espiándonos, lo
+cual es una buena razón para utilizar en su lugar software libre.</p>
+
+ <p><small>(Nota: en este artÃculo se utiliza el término
<cite>«free»</cite> en
+el sentido de «gratis».)</small></p>
+ </li>
+
+ <li id="M201912090">
+ <p>Cuando se utilizan en el trabajo, los iMonstruos y los teléfonos
Android
+proporcionan a los empleadores potentes <a
+href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">capacidades
+de espionaje y sabotaje</a> en el caso de que estos instalen su propio
+software en el dispositivo. Muchos empleadores exigen hacerlo. Para el
+empleado esto no es sino otro software privativo, tan fundamentalmente
+injusto y peligroso como cualquier otro software privativo.</p>
+ </li>
+
<li id="M201910130">
<p>La aplicación del Partido Comunista Chino <cite>Study the Great
Nation</cite> requiere que los usuarios le permitan <a
@@ -2175,6 +2207,15 @@
</div>
<ul class="blurbs">
+ <li id="M201912171">
+ <p>Ahora la mayor parte de los coches <a
+href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html">registran
+y envÃan al fabricante diversos tipos de datos</a>. Para el usuario, acceder
+a esos datos es casi imposible, ya que para ello es preciso introducirse en
+el ordenador del vehÃculo, que está siempre oculto y funciona con software
+privativo.</p>
+ </li>
+
<li id="M201903290">
<p>Los vehÃculos Tesla recopilan multitud de datos personales, y <a
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">cuando
@@ -2662,7 +2703,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2020/02/03 09:31:52 $
+$Date: 2020/02/17 12:34:25 $
<!-- timestamp end -->
</p>
Index: proprietary.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.es.html,v
retrieving revision 1.86
retrieving revision 1.87
diff -u -b -r1.86 -r1.87
--- proprietary.es.html 3 Feb 2020 09:31:52 -0000 1.86
+++ proprietary.es.html 17 Feb 2020 12:34:25 -0000 1.87
@@ -183,105 +183,58 @@
<h3 id="latest">Añadidos recientes</h3>
<ul class="blurbs">
- <li id="M202001290">
- <p>La aplicación del timbre de Amazon <a
-href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report">espÃa
-para Amazon y también para otras compañÃas</a>.</p>
+ <li id="M202002020">
+ <p>Muchas aplicaciones de Android engañan a los usuarios al pedirles que
+decidan qué permisos otorgar al programa, para a continuación <a
+href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/">ignorar
+sus preferencias</a>.</p>
+
+ <p>Se supone que el sistema Android evita el filtrado de datos al ejecutar
las
+aplicaciones en entornos aislados, pero los desarrolladores han encontrado
+maneras de acceder a los datos por otros medios. Y no hay nada que el
+usuario pueda hacer para evitarlo, ya que tanto el sistema como las
+aplicaciones son privativas.</p>
</li>
- <li id="M202001090">
- <p>Los teléfonos Android subvencionados por el Gobierno estadounidense
llevan
-<a
-href="https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/">preinstalado
-software con fines publicitarios y una puerta trasera para forzar la
-instalación de aplicaciones</a>.</p>
-
- <p>El software publicitario es una versión modificada de una aplicación
-esencial para la configuración del sistema. La puerta trasera ha sido
-añadida subrepticiamente a un programa cuyo propósito explÃcito es ser una
-<a
-href="https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/">puerta
-trasera universal para <cite>firmware</cite></a>.</p>
+ <li id="M201912220">
+ <p>La aplicación de mensajerÃa ToToc parece ser <a
+href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html">una
+herramienta de espionaje del Gobierno de Emiratos Ãrabes
+Unidos</a>. Cualquier programa que no sea libre puede estar espiándonos, lo
+cual es una buena razón para utilizar en su lugar software libre.</p>
- <p>En otras palabras, un programa cuya razón de ser es maliciosa tiene un
-propósito secundario malicioso. Todo esto por añadidura al software
-malicioso del propio Android.</p>
+ <p><small>(Nota: en este artÃculo se utiliza el término
<cite>«free»</cite> en
+el sentido de «gratis».)</small></p>
</li>
- <li id="M201912170">
- <p>Algunos delincuentes informáticos (a los que equivocadamente se
refieren en
-este artÃculo como <a
-href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker"><cite>«hackers»</cite></a>)
-han conseguido entrar en el sistema privativo del Amazon Ring y <a
-href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras">acceder
-a la cámara, los altavoces y los micrófonos</a>.</p>
+ <li id="M201912190">
+ <p>Se ha descubierto que algunas extensiones de Avast y AVG para Firefox y
+Chrome <a
+href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome">espÃan
+los hábitos de navegación de los usuarios</a>. Mozilla y Google retiraron
+las extensiones problemáticas de sus tiendas, pero esto muestra una vez más
+lo inseguro que puede el software privativo: herramientas que se supone que
+protegen un sistema privativo, en vez de eso están infectándolo con software
+malicioso adicional (siendo el sistema mismo el primer software malicioso).</p>
</li>
- <li id="M201803210">
- <p>Algunas aplicaciones de <span>redes sociales</span> están <a
-href="https://www.jeffbullas.com/facebook-creates-addiction/">diseñadas para
-crear adicción en los usuarios</a>. Tratan de integrarse en su vida diaria
-explotando la presión social y el natural deseo de socialización,
-convirtiendo gestos habituales en una auténtica adicción. Como ya se señaló
-con respecto a los juegos, la adictividad se basa fundamentalmente en
-recompensas aleatorias. En ese caso, las recompensas son mensajes de amigos
-y seguidores, «likes», noticias, vÃdeos interesantes, etc. El software está
-diseñado para generar en el usuario el deseo de obtener esas gratificaciones
-y mantener vivo ese deseo el mayor tiempo posible.</p>
-
- <ul>
- <li>De manera predeterminada, las notificaciones se envÃan cada vez que
entra un
-nuevo contenido, en lugar de, por ejemplo, una vez al dÃa. Van vinculados a
-sonidos o vibraciones que los hacen aún más apremiantes. (Recuerde el
-experimento con ratas de Paulov.) Esos detonantes son opcionales, y a muchos
-usuarios no se les ocurre desactivarlos. Su mayor efectividad se da cuando
-la aplicación está instalada en un dispositivo móvil que el usuario lleva
-encima en todo momento y está siempre encendido. Como efecto colateral,
-pueden contribuir a la <a
-href="https://www.psychologytoday.com/us/blog/reading-between-the-headlines/201307/smartphone-addiction">adicción
-a los teléfonos «inteligentes»</a>.</li>
-
- <li>A los usuarios se les sirve material seleccionado que pueda suscitar
su
-interés, basándose en su <a
-href="https://theconversation.com/facebook-is-killing-democracy-with-its-personality-profiling-data-93611">perfil</a>.
-(A la vez, esto allana el camino a la <a
-href="/proprietary/proprietary-manipulation.html">manipulación</a>.)</li>
-
- <li>La interfaz de la aplicación está diseñada para que los usuarios
permanezcan
-en el sitio web el mayor tiempo posible, para lo que se utiliza, por
-ejemplo, el <a
-href="https://uxplanet.org/ux-infinite-scrolling-vs-pagination-1030d29376f1">deslizamiento
-infinito</a>.</li>
-
- <li>La compañÃa propietaria de la red social trata de cubrir las
necesidades del
-usuario de la manera más completa posible, <a
-href="https://en.wikipedia.org/wiki/List_of_mergers_and_acquisitions_by_Facebook">
-adquiriendo otras compañÃas</a> si es preciso. Una vez que los usuarios han
-concentrado la mayor parte de sus actividades en al red y gran cantidad de
-datos personales en una única plataforma (o en una serie de plataformas
-pertenecientes al mismo grupo), les resulta <a
-href="https://www.theguardian.com/lifeandstyle/2018/jan/01/antisocial-media-why-decided-cut-back-facebook-instagram">casi
-imposible dejarla</a>. E incluso si quisieran hacerlo, tendrÃan que
-enfrentarse a la ardua tarea de localizar las opciones adecuadas, y la
-aplicación no dejarÃa de atosigarles para que se quedaran.</li>
- </ul>
-
- <p>Una buena manera de disminuir el riesgo de adicción, aparte de
evitarlas, es
-desactivar las notificaciones y dejar la menor cantidad posible de datos
-personales en la plataforma.</p>
+ <li id="M201912171">
+ <p>Ahora la mayor parte de los coches <a
+href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html">registran
+y envÃan al fabricante diversos tipos de datos</a>. Para el usuario, acceder
+a esos datos es casi imposible, ya que para ello es preciso introducirse en
+el ordenador del vehÃculo, que está siempre oculto y funciona con software
+privativo.</p>
</li>
- <li id="M201910131">
- <p>Safari, de vez en cuando, <a
-href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">envÃa
-datos de navegación desde los dispositivos Apple situados en China al
-servicio <cite>Safe Browsing</cite> de Tencent</a>, a fin de verificar las
-URL que pudieran corresponder a sitios «fraudulentos». Dado que Tencent
-colabora con el Gobierno chino, su lista negra de «Navegación Segura»
-contiene sin duda sitios web de opositores polÃticos. Al relacionar las
-solicitudes procedentes de direcciones IP individuales, el Gobierno puede
-identificar a los disidentes de China y Hong Kong, lo que pone en riesgo sus
-vidas.</p>
+ <li id="M201912090">
+ <p>Cuando se utilizan en el trabajo, los iMonstruos y los teléfonos
Android
+proporcionan a los empleadores potentes <a
+href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">capacidades
+de espionaje y sabotaje</a> en el caso de que estos instalen su propio
+software en el dispositivo. Muchos empleadores exigen hacerlo. Para el
+empleado esto no es sino otro software privativo, tan fundamentalmente
+injusto y peligroso como cualquier otro software privativo.</p>
</li>
</ul>
@@ -362,7 +315,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2020/02/03 09:31:52 $
+$Date: 2020/02/17 12:34:25 $
<!-- timestamp end -->
</p>
Index: po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.243
retrieving revision 1.244
diff -u -b -r1.243 -r1.244
--- po/es.po 17 Feb 2020 08:35:25 -0000 1.243
+++ po/es.po 17 Feb 2020 12:34:25 -0000 1.244
@@ -4035,6 +4035,12 @@
"it involves cracking the car's computer, which is always hidden and running "
"with proprietary software."
msgstr ""
+"Ahora la mayor parte de los coches <a href=\"https://boingboing."
+"net/2019/12/17/cars-now-run-on-the-new-oil.html\">registran y envÃan al "
+"fabricante diversos tipos de datos</a>. Para el usuario, acceder a esos "
+"datos es casi imposible, ya que para ello es preciso introducirse en el "
+"ordenador del vehÃculo, que está siempre oculto y funciona con software "
+"privativo."
#. type: Content of: <div><ul><li><p>
msgid ""
@@ -4660,6 +4666,11 @@
"are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-"
"seductive-art-of-loot-boxes/\"> akin to gambling</a>."
msgstr ""
+"Las «cajas de botÃn» (<cite>loot boxes</cite>) son una aplicación directa
"
+"del mecanismo de recompensa aleatoria, y su adictividad se refuerza con "
+"seductoras animaciones. Son <a href=\"https://www.pcgamer.com/behind-the-"
+"addictive-psychology-and-seductive-art-of-loot-boxes/\">semejantes a los "
+"juegos de apuestas</a>."
#. type: Content of: <div><ul><li><p>
# | The {+developers of gratis mobile games apply the techniques described
@@ -7596,7 +7607,7 @@
#. type: Content of: <div><h3>
msgid "Deception"
-msgstr ""
+msgstr "Trampas"
#. type: Content of: <div><ul><li><p>
msgid ""
@@ -7605,6 +7616,10 @@
"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
"data/\"> bypassing these permissions</a>."
msgstr ""
+"Muchas aplicaciones de Android engañan a los usuarios al pedirles que "
+"decidan qué permisos otorgar al programa, para a continuación <a href="
+"\"https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-"
+"permissions-to-access-sensitive-data/\">ignorar sus preferencias</a>."
#. type: Content of: <div><ul><li><p>
msgid ""
@@ -7613,6 +7628,11 @@
"other means, and there is nothing the user can do to stop them from doing "
"so, since both the system and the apps are nonfree."
msgstr ""
+"Se supone que el sistema Android evita el filtrado de datos al ejecutar las "
+"aplicaciones en entornos aislados, pero los desarrolladores han encontrado "
+"maneras de acceder a los datos por otros medios. Y no hay nada que el "
+"usuario pueda hacer para evitarlo, ya que tanto el sistema como las "
+"aplicaciones son privativas."
#. type: Content of: <div><ul><li><p>
msgid ""
@@ -7981,6 +8001,11 @@
"government of the United Arab Emirates</a>. Any nonfree program could be "
"doing this, and that is a good reason to use free software instead."
msgstr ""
+"La aplicación de mensajerÃa ToToc parece ser <a href=\"https://www.nytimes."
+"com/2019/12/22/us/politics/totok-app-uae.html\">una herramienta de espionaje "
+"del Gobierno de Emiratos Ãrabes Unidos</a>. Cualquier programa que no sea "
+"libre puede estar espiándonos, lo cual es una buena razón para utilizar en "
+"su lugar software libre."
#. type: Content of: <div><ul><li><p>
# | [-<small>(Note that the-]{+<small>Note: this+} article [-refers to these
@@ -8007,6 +8032,13 @@
"to do this. For the employee, this is simply nonfree software, as "
"fundamentally unjust and as dangerous as any other nonfree software."
msgstr ""
+"Cuando se utilizan en el trabajo, los iMonstruos y los teléfonos Android "
+"proporcionan a los empleadores potentes <a href=\"https://www.fastcompany."
+"com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-"
+"privacy\">capacidades de espionaje y sabotaje</a> en el caso de que estos "
+"instalen su propio software en el dispositivo. Muchos empleadores exigen "
+"hacerlo. Para el empleado esto no es sino otro software privativo, tan "
+"fundamentalmente injusto y peligroso como cualquier otro software privativo."
#. type: Content of: <div><ul><li><p>
msgid ""
@@ -11877,6 +11909,14 @@
"supposed to protect a proprietary system are, instead, infecting it with "
"additional malware (the system itself being the original malware)."
msgstr ""
+"Se ha descubierto que algunas extensiones de Avast y AVG para Firefox y "
+"Chrome <a href=\"https://www.itpro.co.uk/security/internet-security/354417/"
+"avast-and-avg-extensions-pulled-from-chrome\">espÃan los hábitos de "
+"navegación de los usuarios</a>. Mozilla y Google retiraron las extensiones "
+"problemáticas de sus tiendas, pero esto muestra una vez más lo inseguro que
"
+"puede el software privativo: herramientas que se supone que protegen un "
+"sistema privativo, en vez de eso están infectándolo con software malicioso "
+"adicional (siendo el sistema mismo el primer software malicioso)."
#. type: Content of: <div><p>
# | Copyright © 2013, 2014, 2015, 2016, 2017, 2018, [-2019-] {+2019,
Index: po/malware-cars.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.es-en.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- po/malware-cars.es-en.html 23 Nov 2019 11:33:14 -0000 1.2
+++ po/malware-cars.es-en.html 17 Feb 2020 12:34:25 -0000 1.3
@@ -51,6 +51,15 @@
<div class="column-limit" id="malware-cars"></div>
<ul class="blurbs">
+ <li id="M201912171">
+ <p>Most modern cars now <a
+ href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html">
+ record and send various kinds of data to the manufacturer</a>. For
+ the user, access to the data is nearly impossible, as it involves
+ cracking the car's computer, which is always hidden and running with
+ proprietary software.</p>
+ </li>
+
<li id="M201909160">
<p>Tesla users claim Tesla <a
href="https://www.reuters.com/article/us-tesla-battery/tesla-owner-lawsuit-claims-software-update-fraudulently-cut-battery-capacity-idUSKCN1UY2TW">force-installed
@@ -332,7 +341,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2017, 2018, 2019 Free Software Foundation, Inc.</p>
+<p>Copyright © 2017, 2018, 2019, 2020 Free Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by/4.0/">Creative
@@ -342,7 +351,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/11/23 11:33:14 $
+$Date: 2020/02/17 12:34:25 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-games.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.es-en.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- po/malware-games.es-en.html 23 Nov 2019 11:33:14 -0000 1.2
+++ po/malware-games.es-en.html 17 Feb 2020 12:34:25 -0000 1.3
@@ -89,6 +89,12 @@
<p>Games such as World of Warcraft, which are considered very addictive,
use several of these techniques.</p>
+ <p style="margin-top: 1em">“Loot boxes” are a direct
+ application of the random reward mechanism, and their addictiveness
+ is enhanced by seductive animation. They are <a
+
href="https://www.pcgamer.com/behind-the-addictive-psychology-and-seductive-art-of-loot-boxes/">
+ akin to gambling</a>.</p>
+
<p style="margin-top: 1em">The developers of gratis
mobile games apply the techniques described above to <a
href="https://www.psychguides.com/interact/the-psychology-of-freemium/">
@@ -99,8 +105,8 @@
willing to spend. Thus developers carefully study the behavior of
millions of users to increase the addictiveness of their games.</p>
- <p><small>(Unfortunately, this article uses “free” to mean
- “zero price.” We recommend saying “gratis”
+ <p><small>(Unfortunately, the last two articles use “free” to
+ mean “zero price.” We recommend saying “gratis”
instead.)</small></p>
<p style="margin-top: 1em">However, the addictiveness of a game is
@@ -394,7 +400,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2016, 2017, 2018, 2019 Free Software Foundation, Inc.</p>
+<p>Copyright © 2016, 2017, 2018, 2019, 2020 Free Software Foundation,
Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by/4.0/">Creative
@@ -404,7 +410,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/11/23 11:33:14 $
+$Date: 2020/02/17 12:34:25 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-games.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.es.po,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- po/malware-games.es.po 17 Feb 2020 12:08:08 -0000 1.9
+++ po/malware-games.es.po 17 Feb 2020 12:34:25 -0000 1.10
@@ -199,8 +199,8 @@
#. type: Content of: <div><ul><li><p>
msgid ""
"<small>(Unfortunately, the last two articles use “free” to mean "
-"“zero price.” We recommend saying “gratis” "
-"instead.)</small>"
+"“zero price.” We recommend saying “gratis” instead.)"
+"</small>"
msgstr ""
"<small>(Desafortunadamente, estos dos últimos artÃculos utilizan el
término "
"«<cite>free</cite>» para significar «precio cero». Recomendamos en su
lugar "
Index: po/malware-mobiles.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es-en.html,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- po/malware-mobiles.es-en.html 21 Jan 2020 12:34:48 -0000 1.64
+++ po/malware-mobiles.es-en.html 17 Feb 2020 12:34:25 -0000 1.65
@@ -114,6 +114,7 @@
<ul>
<li><a href="#back-doors">Back doors</a></li>
<!--<li><a href="#censorship">Censorship</a></li>-->
+ <li><a href="#deception">Deception</a></li>
<li><a href="#drm">DRM</a></li>
<li><a href="#insecurity">Insecurity</a></li>
<li><a href="#interference">Interference</a></li>
@@ -203,6 +204,23 @@
</ul>
+<h3 id="deception">Deception</h3>
+
+<ul class="blurbs">
+ <li id="M202002020">
+ <p>Many Android apps fool their users by asking
+ them to decide what permissions to give the program, and then <a
+
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/">
+ bypassing these permissions</a>.</p>
+
+ <p>The Android system is supposed to prevent data leaks by running apps
+ in isolated sandboxes, but developers have found ways to access the
+ data by other means, and there is nothing the user can do to stop
+ them from doing so, since both the system and the apps are nonfree.</p>
+ </li>
+</ul>
+
+
<h3 id="drm">DRM</h3>
<p>Digital restrictions management, or “DRM,” refers to
@@ -444,6 +462,27 @@
full-time listening devices</a>.</p>
</li>
+ <li id="M201912220">
+ <p>The ToToc messaging app seems to be a <a
+ href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html">
+ spying tool for the government of the United Arab Emirates</a>.
+ Any nonfree program could be doing this, and that is a good
+ reason to use free software instead.</p>
+
+ <p><small>Note: this article uses the word “free” in
+ the sense of “gratis.”</small></p>
+ </li>
+
+ <li id="M201912090">
+ <p>iMonsters and Android phones,
+ when used for work, give employers powerful <a
+
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">
+ snooping and sabotage capabilities</a> if they install their own
+ software on the device. Many employers demand to do this. For the
+ employee, this is simply nonfree software, as fundamentally unjust
+ and as dangerous as any other nonfree software.</p>
+ </li>
+
<li id="M201909091">
<p>The Facebook app <a
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">
@@ -1186,7 +1225,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/01/21 12:34:48 $
+$Date: 2020/02/17 12:34:25 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.166
retrieving revision 1.167
diff -u -b -r1.166 -r1.167
--- po/malware-mobiles.es.po 17 Feb 2020 12:08:08 -0000 1.166
+++ po/malware-mobiles.es.po 17 Feb 2020 12:34:25 -0000 1.167
@@ -1442,8 +1442,8 @@
#. type: Content of: <div><ul><li><p>
msgid ""
"<small>(Note that this article misuses the words “<a href=\"/"
-"philosophy/free-sw.html\">free software</a>” referring to zero "
-"price.)</small>"
+"philosophy/free-sw.html\">free software</a>” referring to zero price.)"
+"</small>"
msgstr ""
"<small>(Advierta que este artÃculo emplea mal las palabras “<a
href=\"/"
"philosophy/free-sw.html\">software libre</a>” para referirse a "
Index: po/proprietary-addictions.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.es-en.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- po/proprietary-addictions.es-en.html 21 Nov 2019 12:03:46 -0000
1.10
+++ po/proprietary-addictions.es-en.html 17 Feb 2020 12:34:25 -0000
1.11
@@ -99,6 +99,12 @@
<p>Games such as World of Warcraft, which are considered very addictive,
use several of these techniques.</p>
+ <p style="margin-top: 1em">“Loot boxes” are a direct
+ application of the random reward mechanism, and their addictiveness
+ is enhanced by seductive animation. They are <a
+
href="https://www.pcgamer.com/behind-the-addictive-psychology-and-seductive-art-of-loot-boxes/">
+ akin to gambling</a>.</p>
+
<p style="margin-top: 1em">The developers of gratis
mobile games apply the techniques described above to <a
href="https://www.psychguides.com/interact/the-psychology-of-freemium/">
@@ -109,8 +115,8 @@
willing to spend. Thus developers carefully study the behavior of
millions of users to increase the addictiveness of their games.</p>
- <p><small>(Unfortunately, this article uses “free” to mean
- “zero price.” We recommend saying “gratis”
+ <p><small>(Unfortunately, the last two articles use “free” to
+ mean “zero price.” We recommend saying “gratis”
instead.)</small></p>
<p style="margin-top: 1em">However, the addictiveness of a game is
@@ -316,7 +322,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2019 Free Software Foundation, Inc.</p>
+<p>Copyright © 2019, 2020 Free Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by/4.0/">Creative
@@ -326,7 +332,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/11/21 12:03:46 $
+$Date: 2020/02/17 12:34:25 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-addictions.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.es.po,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- po/proprietary-addictions.es.po 17 Feb 2020 12:08:08 -0000 1.34
+++ po/proprietary-addictions.es.po 17 Feb 2020 12:34:25 -0000 1.35
@@ -215,8 +215,8 @@
#. type: Content of: <div><ul><li><p>
msgid ""
"<small>(Unfortunately, the last two articles use “free” to mean "
-"“zero price.” We recommend saying “gratis” "
-"instead.)</small>"
+"“zero price.” We recommend saying “gratis” instead.)"
+"</small>"
msgstr ""
"<small>(Desafortunadamente, estos dos últimos artÃculos utilizan el
término "
"«<cite>free</cite>» para significar «precio cero». Recomendamos en su
lugar "
Index: po/proprietary-deception.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.es-en.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- po/proprietary-deception.es-en.html 24 Nov 2019 12:02:32 -0000 1.5
+++ po/proprietary-deception.es-en.html 17 Feb 2020 12:34:25 -0000 1.6
@@ -60,6 +60,18 @@
<div class="column-limit" id="proprietary-deception"></div>
<ul class="blurbs">
+ <li id="M202002020">
+ <p>Many Android apps fool their users by asking
+ them to decide what permissions to give the program, and then <a
+
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/">
+ bypassing these permissions</a>.</p>
+
+ <p>The Android system is supposed to prevent data leaks by running apps
+ in isolated sandboxes, but developers have found ways to access the
+ data by other means, and there is nothing the user can do to stop
+ them from doing so, since both the system and the apps are nonfree.</p>
+ </li>
+
<li id="M201904150">
<p id="M201509210">Volkswagen programmed its car engine computers to <a
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions">
@@ -180,7 +192,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2015, 2016, 2017, 2018, 2019 Free Software Foundation,
Inc.</p>
+<p>Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Free Software
Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by/4.0/">Creative
@@ -190,7 +202,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/11/24 12:02:32 $
+$Date: 2020/02/17 12:34:25 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-sabotage.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.es-en.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- po/proprietary-sabotage.es-en.html 21 Nov 2019 22:30:04 -0000 1.11
+++ po/proprietary-sabotage.es-en.html 17 Feb 2020 12:34:25 -0000 1.12
@@ -56,6 +56,16 @@
<div class="column-limit" id="proprietary-sabotage"></div>
<ul class="blurbs">
+ <li id="M201912090">
+ <p>iMonsters and Android phones,
+ when used for work, give employers powerful <a
+
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">
+ snooping and sabotage capabilities</a> if they install their own
+ software on the device. Many employers demand to do this. For the
+ employee, this is simply nonfree software, as fundamentally unjust
+ and as dangerous as any other nonfree software.</p>
+ </li>
+
<li id="M201910071">
<p>Adobe has <a
href="https://www.bleepingcomputer.com/news/software/adobe-to-ban-users-from-venezuela-due-to-us-executive-order/">
@@ -643,7 +653,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2013, 2015, 2016, 2017, 2018, 2019 Free Software
Foundation, Inc.</p>
+<p>Copyright © 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software
Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by/4.0/">Creative
@@ -653,7 +663,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/11/21 22:30:04 $
+$Date: 2020/02/17 12:34:25 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-surveillance.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- po/proprietary-surveillance.es-en.html 3 Feb 2020 09:31:53 -0000
1.6
+++ po/proprietary-surveillance.es-en.html 17 Feb 2020 12:34:25 -0000
1.7
@@ -795,6 +795,17 @@
</div>
<ul class="blurbs">
+ <li id="M201912190">
+ <p>Some Avast and AVG extensions
+ for Firefox and Chrome were found to <a
+
href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome">
+ snoop on users' detailed browsing habits</a>. Mozilla and Google
+ removed the problematic extensions from their stores, but this shows
+ once more how unsafe nonfree software can be. Tools that are supposed
+ to protect a proprietary system are, instead, infecting it with
+ additional malware (the system itself being the original malware).</p>
+ </li>
+
<li id="M201811020">
<p>Foundry's graphics software <a
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
@@ -822,6 +833,27 @@
surveillance for other companies as well as for Amazon</a>.</p>
</li>
+ <li id="M201912220">
+ <p>The ToToc messaging app seems to be a <a
+ href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html">
+ spying tool for the government of the United Arab Emirates</a>.
+ Any nonfree program could be doing this, and that is a good
+ reason to use free software instead.</p>
+
+ <p><small>Note: this article uses the word “free” in
+ the sense of “gratis.”</small></p>
+ </li>
+
+ <li id="M201912090">
+ <p>iMonsters and Android phones,
+ when used for work, give employers powerful <a
+
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">
+ snooping and sabotage capabilities</a> if they install their own
+ software on the device. Many employers demand to do this. For the
+ employee, this is simply nonfree software, as fundamentally unjust
+ and as dangerous as any other nonfree software.</p>
+ </li>
+
<li id="M201910130">
<p>The Chinese Communist Party's “Study
the Great Nation” app requires users to grant it <a
@@ -2093,6 +2125,15 @@
</div>
<ul class="blurbs">
+ <li id="M201912171">
+ <p>Most modern cars now <a
+ href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html">
+ record and send various kinds of data to the manufacturer</a>. For
+ the user, access to the data is nearly impossible, as it involves
+ cracking the car's computer, which is always hidden and running with
+ proprietary software.</p>
+ </li>
+
<li id="M201903290">
<p>Tesla cars collect lots of personal data, and <a
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">
@@ -2542,7 +2583,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/02/03 09:31:53 $
+$Date: 2020/02/17 12:34:25 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- po/proprietary-surveillance.es.po 17 Feb 2020 12:08:08 -0000 1.24
+++ po/proprietary-surveillance.es.po 17 Feb 2020 12:34:25 -0000 1.25
@@ -2222,8 +2222,8 @@
#. type: Content of: <div><ul><li><p>
msgid ""
"<small>(Note that this article misuses the words “<a href=\"/"
-"philosophy/free-sw.html\">free software</a>” referring to zero "
-"price.)</small>"
+"philosophy/free-sw.html\">free software</a>” referring to zero price.)"
+"</small>"
msgstr ""
"<small>(Advierta que este artÃculo emplea mal las palabras “<a
href=\"/"
"philosophy/free-sw.html\">software libre</a>” para referirse a "
Index: po/proprietary.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es-en.html,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- po/proprietary.es-en.html 3 Feb 2020 09:31:53 -0000 1.79
+++ po/proprietary.es-en.html 17 Feb 2020 12:34:25 -0000 1.80
@@ -173,100 +173,57 @@
<h3 id="latest">Latest additions</h3>
<ul class="blurbs">
- <li id="M202001290">
- <p>The Amazon Ring app does <a
-
href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report">
- surveillance for other companies as well as for Amazon</a>.</p>
+ <li id="M202002020">
+ <p>Many Android apps fool their users by asking
+ them to decide what permissions to give the program, and then <a
+
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/">
+ bypassing these permissions</a>.</p>
+
+ <p>The Android system is supposed to prevent data leaks by running apps
+ in isolated sandboxes, but developers have found ways to access the
+ data by other means, and there is nothing the user can do to stop
+ them from doing so, since both the system and the apps are nonfree.</p>
</li>
- <li id="M202001090">
- <p>Android phones subsidized by the US government come with <a
-
href="https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/">
- preinstalled adware and a back door for forcing installation of
- apps</a>.</p>
-
- <p>The adware is in a modified version of an
- essential system configuration app. The back door is a
- surreptitious addition to a program whose stated purpose is to be a <a
-
href="https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/">
- universal back door for firmware</a>.</p>
-
- <p>In other words, a program whose raison d'être is malicious has
- a secret secondary malicious purpose. All this is in addition to the
- malware of Android itself.</p>
+ <li id="M201912220">
+ <p>The ToToc messaging app seems to be a <a
+ href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html">
+ spying tool for the government of the United Arab Emirates</a>.
+ Any nonfree program could be doing this, and that is a good
+ reason to use free software instead.</p>
+
+ <p><small>Note: this article uses the word “free” in
+ the sense of “gratis.”</small></p>
</li>
- <li id="M201912170">
- <p>Some security breakers (wrongly referred in this article as <a
-
href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker">“hackers”</a>)
- managed to interfere the Amazon Ring proprietary system, and <a
-
href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras">access
- its camera, speakers and microphones</a>.</p>
+ <li id="M201912190">
+ <p>Some Avast and AVG extensions
+ for Firefox and Chrome were found to <a
+
href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome">
+ snoop on users' detailed browsing habits</a>. Mozilla and Google
+ removed the problematic extensions from their stores, but this shows
+ once more how unsafe nonfree software can be. Tools that are supposed
+ to protect a proprietary system are, instead, infecting it with
+ additional malware (the system itself being the original malware).</p>
</li>
- <li id="M201803210">
- <p>Some <span>social networking</span> apps are <a
- href="https://www.jeffbullas.com/facebook-creates-addiction/">
- designed to get users addicted</a>. These try to merge into your daily
- routine by exploiting social pressure and your natural desire for
- socialization, converting habitual gestures into thorough addiction. As
- already noted for games, addictiveness is essentially based on random
- rewards. In the present case, the rewards are messages from friends
- and followers, “likes,” news, interesting videos, etc. The
- software is designed to trigger users' desire for these rewards,
- and keep this desire alive as long as possible.</p>
-
- <ul>
- <li>By default, notifications are sent every time a new item comes
- in, instead of, say, once a day. They are associated with sounds or
- vibrations which make them even more compelling. (Remember Pavlov's
- experiments with rats.) These triggers are often opt-out, and many
- users don't try to turn them off. They are most effective when the
- app is installed on a mobile device which is always on and never
- leaves the user. As a side effect, they may contribute to the <a
-
href="https://www.psychologytoday.com/us/blog/reading-between-the-headlines/201307/smartphone-addiction">
- addictiveness of “smart” phones</a>.</li>
-
- <li>Users are served selected material
- that is likely to interest them, based on <a
-
href="https://theconversation.com/facebook-is-killing-democracy-with-its-personality-profiling-data-93611">
- profiling</a>. (This paves the way to <a
- href="/proprietary/proprietary-manipulation.html">manipulation</a>,
- by the way.)</li>
-
- <li>The app interface is designed to make users
- stay on the site as long as possible, using <a
-
href="https://uxplanet.org/ux-infinite-scrolling-vs-pagination-1030d29376f1">
- infinite scrolling</a> for example.</li>
-
- <li>The company that owns the social network tries
- to cover users' needs as extensively as possible, by <a
-
href="https://en.wikipedia.org/wiki/List_of_mergers_and_acquisitions_by_Facebook">
- acquiring other companies</a> if needed. Once users
- have concentrated most of their online activities and
- a lot of their personal data on a single platform (or
- a set of platforms that belong to the same group), they find it <a
-
href="https://www.theguardian.com/lifeandstyle/2018/jan/01/antisocial-media-why-decided-cut-back-facebook-instagram">
- almost impossible to leave</a>. And even if they wanted to, they
- would have a hard time digging out the relevant options, and the
- app would aggressively nag them to stay.</li>
- </ul>
-
- <p>A good way to minimize the risk of addiction, short of avoiding
- social media altogether, is to turn off notifications and leave as
- little as possible of your own data on the platform.</p>
+ <li id="M201912171">
+ <p>Most modern cars now <a
+ href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html">
+ record and send various kinds of data to the manufacturer</a>. For
+ the user, access to the data is nearly impossible, as it involves
+ cracking the car's computer, which is always hidden and running with
+ proprietary software.</p>
</li>
- <li id="M201910131">
- <p>Safari occasionally <a
-
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">
- sends browsing data from Apple devices in China to the Tencent Safe
- Browsing service</a>, to check URLs that possibly correspond to
- “fraudulent” websites. Since Tencent collaborates
- with the Chinese government, its Safe Browsing black list most certainly
- contains the websites of political opponents. By linking the requests
- originating from single IP addresses, the government can identify
- dissenters in China and Hong Kong, thus endangering their lives.</p>
+ <li id="M201912090">
+ <p>iMonsters and Android phones,
+ when used for work, give employers powerful <a
+
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">
+ snooping and sabotage capabilities</a> if they install their own
+ software on the device. Many employers demand to do this. For the
+ employee, this is simply nonfree software, as fundamentally unjust
+ and as dangerous as any other nonfree software.</p>
</li>
</ul>
@@ -329,7 +286,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/02/03 09:31:53 $
+$Date: 2020/02/17 12:34:25 $
<!-- timestamp end -->
</p>
</div>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary malware-cars.es.html malware-ga...,
GNUN <=