www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-cars.es.html malware-ga...


From: GNUN
Subject: www/proprietary malware-cars.es.html malware-ga...
Date: Mon, 17 Feb 2020 07:34:26 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     20/02/17 07:34:26

Modified files:
        proprietary    : malware-cars.es.html malware-games.es.html 
                         malware-mobiles.es.html 
                         proprietary-addictions.es.html 
                         proprietary-deception.es.html 
                         proprietary-sabotage.es.html 
                         proprietary-surveillance.es.html 
                         proprietary.es.html 
        proprietary/po : es.po malware-cars.es-en.html 
                         malware-games.es-en.html malware-games.es.po 
                         malware-mobiles.es-en.html 
                         malware-mobiles.es.po 
                         proprietary-addictions.es-en.html 
                         proprietary-addictions.es.po 
                         proprietary-deception.es-en.html 
                         proprietary-sabotage.es-en.html 
                         proprietary-surveillance.es-en.html 
                         proprietary-surveillance.es.po 
                         proprietary.es-en.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-cars.es.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-games.es.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.es.html?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-addictions.es.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-deception.es.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.es.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.es.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.es.html?cvsroot=www&r1=1.86&r2=1.87
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.243&r2=1.244
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.es-en.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.es-en.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.es.po?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es-en.html?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.166&r2=1.167
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.es-en.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.es.po?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.es-en.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.es-en.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es-en.html?cvsroot=www&r1=1.79&r2=1.80

Patches:
Index: malware-cars.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-cars.es.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- malware-cars.es.html        23 Nov 2019 11:33:14 -0000      1.2
+++ malware-cars.es.html        17 Feb 2020 12:34:25 -0000      1.3
@@ -58,6 +58,15 @@
 <div class="column-limit" id="malware-cars"></div>
 
 <ul class="blurbs">
+  <li id="M201912171">
+    <p>Ahora la mayor parte de los coches <a
+href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html";>registran
+y envían al fabricante diversos tipos de datos</a>. Para el usuario, acceder
+a esos datos es casi imposible, ya que para ello es preciso introducirse en
+el ordenador del vehículo, que está siempre oculto y funciona con software
+privativo.</p>
+  </li>
+
   <li id="M201909160">
     <p>Los usuarios de Tesla denuncian que Tesla <a
 
href="https://www.reuters.com/article/us-tesla-battery/tesla-owner-lawsuit-claims-software-update-fraudulently-cut-battery-capacity-idUSKCN1UY2TW";>ha
@@ -357,7 +366,7 @@
      
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright &copy; 2017, 2018, 2019 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2017, 2018, 2019, 2020 Free Software Foundation, Inc.</p>
 
 <p>Esta página está bajo licencia <a rel="license"
 href="http://creativecommons.org/licenses/by/4.0/deed.es_ES";>Creative
@@ -373,7 +382,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2019/11/23 11:33:14 $
+$Date: 2020/02/17 12:34:25 $
 
 <!-- timestamp end -->
 </p>

Index: malware-games.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-games.es.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- malware-games.es.html       23 Nov 2019 11:33:14 -0000      1.2
+++ malware-games.es.html       17 Feb 2020 12:34:25 -0000      1.3
@@ -96,6 +96,12 @@
     <p>Juegos como World of Warcraft, que se consideran muy adictivos, emplean
 varias de estas técnicas.</p>
 
+    <p style="margin-top: 1em">Las «cajas de botín» (<cite>loot 
boxes</cite>) son una aplicación directa
+del mecanismo de recompensa aleatoria, y su adictividad se refuerza con
+seductoras animaciones. Son <a
+href="https://www.pcgamer.com/behind-the-addictive-psychology-and-seductive-art-of-loot-boxes/";>semejantes
+a los juegos de apuestas</a>.</p>
+
     <p style="margin-top: 1em">Los desarrolladores de aplicaciones gratuitas 
para móviles aplican las
 técnicas arriba descritas para <a
 
href="https://www.psychguides.com/interact/the-psychology-of-freemium/";>convertir
@@ -106,7 +112,7 @@
 desarrolladores estudian minuciosamente el comportamiento de millones de
 usuarios a fin de incrementar la adictividad de sus juegos.</p>
 
-    <p><small>(Desafortunadamente, el artículo utiliza el término
+    <p><small>(Desafortunadamente, estos dos últimos artículos utilizan el 
término
 «<cite>free</cite>» para significar «precio cero». Recomendamos en su lugar
 decir «gratis».)</small></p>
 
@@ -416,7 +422,7 @@
 
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, 
Inc.</p>
 
 <p>Esta página está bajo licencia <a rel="license"
 href="http://creativecommons.org/licenses/by/4.0/deed.es_ES";>Creative
@@ -432,7 +438,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2019/11/23 11:33:14 $
+$Date: 2020/02/17 12:34:25 $
 
 <!-- timestamp end -->
 </p>

Index: malware-mobiles.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.es.html,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- malware-mobiles.es.html     21 Jan 2020 12:34:48 -0000      1.69
+++ malware-mobiles.es.html     17 Feb 2020 12:34:25 -0000      1.70
@@ -126,7 +126,8 @@
 
   <!--<li>
 <a href="#censorship">Censorship</a></li>-->
-<li><a href="#drm">DRM</a></li>
+<li><a href="#deception">Trampas</a></li>
+  <li><a href="#drm">DRM</a></li>
   <li><a href="#insecurity">Inseguridad</a></li>
   <li><a href="#interference">Intromisiones</a></li>
   <li><a href="#manipulation">Manipulación</a></li>
@@ -220,6 +221,24 @@
 </ul>
 
 
+<h3 id="deception">Trampas</h3>
+
+<ul class="blurbs">
+  <li id="M202002020">
+    <p>Muchas aplicaciones de Android engañan a los usuarios al pedirles que
+decidan qué permisos otorgar al programa, para a continuación <a
+href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/";>ignorar
+sus preferencias</a>.</p>
+
+    <p>Se supone que el sistema Android evita el filtrado de datos al ejecutar 
las
+aplicaciones en entornos aislados, pero los desarrolladores han encontrado
+maneras de acceder a los datos por otros medios. Y no hay nada que el
+usuario pueda hacer para evitarlo, ya que tanto el sistema como las
+aplicaciones son privativas.</p>
+  </li>
+</ul>
+
+
 <h3 id="drm">DRM</h3>
 
 <p>Gestión digital de restricciones, o «<abbr title="Digital Restrictions
@@ -467,6 +486,27 @@
 de escucha a tiempo completo</a>.</p>
   </li>
 
+  <li id="M201912220">
+    <p>La aplicación de mensajería ToToc parece ser <a
+href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html";>una
+herramienta de espionaje del Gobierno de Emiratos Árabes
+Unidos</a>. Cualquier programa que no sea libre puede estar espiándonos, lo
+cual es una buena razón para utilizar en su lugar software libre.</p>
+
+    <p><small>(Nota: en este artículo se utiliza el término 
<cite>«free»</cite> en
+el sentido de «gratis».)</small></p>
+  </li>
+
+  <li id="M201912090">
+    <p>Cuando se utilizan en el trabajo, los iMonstruos y los teléfonos 
Android
+proporcionan a los empleadores potentes <a
+href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy";>capacidades
+de espionaje y sabotaje</a> en el caso de que estos instalen su propio
+software en el dispositivo. Muchos empleadores exigen hacerlo. Para el
+empleado esto no es sino otro software privativo, tan fundamentalmente
+injusto y peligroso como cualquier otro software privativo.</p>
+  </li>
+
   <li id="M201909091">
     <p>La aplicación de Facebook <a
 
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/";>rastrea
@@ -1255,7 +1295,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/01/21 12:34:48 $
+$Date: 2020/02/17 12:34:25 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-addictions.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-addictions.es.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- proprietary-addictions.es.html      21 Nov 2019 12:03:45 -0000      1.12
+++ proprietary-addictions.es.html      17 Feb 2020 12:34:25 -0000      1.13
@@ -109,6 +109,12 @@
     <p>Juegos como World of Warcraft, que se consideran muy adictivos, emplean
 varias de estas técnicas.</p>
 
+    <p style="margin-top: 1em">Las «cajas de botín» (<cite>loot 
boxes</cite>) son una aplicación directa
+del mecanismo de recompensa aleatoria, y su adictividad se refuerza con
+seductoras animaciones. Son <a
+href="https://www.pcgamer.com/behind-the-addictive-psychology-and-seductive-art-of-loot-boxes/";>semejantes
+a los juegos de apuestas</a>.</p>
+
     <p style="margin-top: 1em">Los desarrolladores de aplicaciones gratuitas 
para móviles aplican las
 técnicas arriba descritas para <a
 
href="https://www.psychguides.com/interact/the-psychology-of-freemium/";>convertir
@@ -119,7 +125,7 @@
 desarrolladores estudian minuciosamente el comportamiento de millones de
 usuarios a fin de incrementar la adictividad de sus juegos.</p>
 
-    <p><small>(Desafortunadamente, el artículo utiliza el término
+    <p><small>(Desafortunadamente, estos dos últimos artículos utilizan el 
término
 «<cite>free</cite>» para significar «precio cero». Recomendamos en su lugar
 decir «gratis».)</small></p>
 
@@ -341,7 +347,7 @@
      
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright &copy; 2019 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2019, 2020 Free Software Foundation, Inc.</p>
 
 <p>Esta página está bajo licencia <a rel="license"
 href="http://creativecommons.org/licenses/by/4.0/deed.es_ES";>Creative
@@ -356,7 +362,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2019/11/21 12:03:45 $
+$Date: 2020/02/17 12:34:25 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-deception.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-deception.es.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary-deception.es.html       24 Nov 2019 12:02:27 -0000      1.7
+++ proprietary-deception.es.html       17 Feb 2020 12:34:25 -0000      1.8
@@ -67,6 +67,19 @@
 <div class="column-limit" id="proprietary-deception"></div>
 
 <ul class="blurbs">
+  <li id="M202002020">
+    <p>Muchas aplicaciones de Android engañan a los usuarios al pedirles que
+decidan qué permisos otorgar al programa, para a continuación <a
+href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/";>ignorar
+sus preferencias</a>.</p>
+
+    <p>Se supone que el sistema Android evita el filtrado de datos al ejecutar 
las
+aplicaciones en entornos aislados, pero los desarrolladores han encontrado
+maneras de acceder a los datos por otros medios. Y no hay nada que el
+usuario pueda hacer para evitarlo, ya que tanto el sistema como las
+aplicaciones son privativas.</p>
+  </li>
+
   <li id="M201904150">
     <p id="M201509210">Volkswagen programó los ordenadores que controlan el 
motor de sus coches
 para que <a
@@ -203,7 +216,8 @@
 
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright &copy; 2015, 2016, 2017, 2018, 2019 Free Software Foundation, 
Inc.</p>
+<p>Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Free Software
+Foundation, Inc.</p>
 
 <p>Esta página está bajo licencia <a rel="license"
 href="http://creativecommons.org/licenses/by/4.0/deed.es_ES";>Creative
@@ -219,7 +233,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2019/11/24 12:02:27 $
+$Date: 2020/02/17 12:34:25 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-sabotage.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-sabotage.es.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- proprietary-sabotage.es.html        21 Nov 2019 22:30:02 -0000      1.12
+++ proprietary-sabotage.es.html        17 Feb 2020 12:34:25 -0000      1.13
@@ -66,6 +66,16 @@
 <div class="column-limit" id="proprietary-sabotage"></div>
 
 <ul class="blurbs">
+  <li id="M201912090">
+    <p>Cuando se utilizan en el trabajo, los iMonstruos y los teléfonos 
Android
+proporcionan a los empleadores potentes <a
+href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy";>capacidades
+de espionaje y sabotaje</a> en el caso de que estos instalen su propio
+software en el dispositivo. Muchos empleadores exigen hacerlo. Para el
+empleado esto no es sino otro software privativo, tan fundamentalmente
+injusto y peligroso como cualquier otro software privativo.</p>
+  </li>
+
   <li id="M201910071">
     <p>Adobe ha <a
 
href="https://www.bleepingcomputer.com/news/software/adobe-to-ban-users-from-venezuela-due-to-us-executive-order/";>cancelado
@@ -675,7 +685,7 @@
 
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software
+<p>Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software
 Foundation, Inc.</p>
 
 <p>Esta página está bajo licencia <a rel="license"
@@ -691,7 +701,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2019/11/21 22:30:02 $
+$Date: 2020/02/17 12:34:25 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-surveillance.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.es.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary-surveillance.es.html    3 Feb 2020 09:31:52 -0000       1.8
+++ proprietary-surveillance.es.html    17 Feb 2020 12:34:25 -0000      1.9
@@ -832,6 +832,17 @@
 </div>
 
 <ul class="blurbs">
+  <li id="M201912190">
+    <p>Se ha descubierto que algunas extensiones de Avast y AVG para Firefox y
+Chrome <a
+href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome";>espían
+los hábitos de navegación de los usuarios</a>. Mozilla y Google retiraron
+las extensiones problemáticas de sus tiendas, pero esto muestra una vez más
+lo inseguro que puede el software privativo: herramientas que se supone que
+protegen un sistema privativo, en vez de eso están infectándolo con software
+malicioso adicional (siendo el sistema mismo el primer software malicioso).</p>
+  </li>
+
   <li id="M201811020">
     <p>El software para el tratamiento de gráficos de Foundry <a
 
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/";>envía
@@ -860,6 +871,27 @@
 para Amazon y también para otras compañías</a>.</p>
   </li>
 
+  <li id="M201912220">
+    <p>La aplicación de mensajería ToToc parece ser <a
+href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html";>una
+herramienta de espionaje del Gobierno de Emiratos Árabes
+Unidos</a>. Cualquier programa que no sea libre puede estar espiándonos, lo
+cual es una buena razón para utilizar en su lugar software libre.</p>
+
+    <p><small>(Nota: en este artículo se utiliza el término 
<cite>«free»</cite> en
+el sentido de «gratis».)</small></p>
+  </li>
+
+  <li id="M201912090">
+    <p>Cuando se utilizan en el trabajo, los iMonstruos y los teléfonos 
Android
+proporcionan a los empleadores potentes <a
+href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy";>capacidades
+de espionaje y sabotaje</a> en el caso de que estos instalen su propio
+software en el dispositivo. Muchos empleadores exigen hacerlo. Para el
+empleado esto no es sino otro software privativo, tan fundamentalmente
+injusto y peligroso como cualquier otro software privativo.</p>
+  </li>
+
   <li id="M201910130">
     <p>La aplicación del Partido Comunista Chino <cite>Study the Great
 Nation</cite> requiere que los usuarios le permitan <a
@@ -2175,6 +2207,15 @@
 </div>
 
 <ul class="blurbs">
+  <li id="M201912171">
+    <p>Ahora la mayor parte de los coches <a
+href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html";>registran
+y envían al fabricante diversos tipos de datos</a>. Para el usuario, acceder
+a esos datos es casi imposible, ya que para ello es preciso introducirse en
+el ordenador del vehículo, que está siempre oculto y funciona con software
+privativo.</p>
+  </li>
+
   <li id="M201903290">
     <p>Los vehículos Tesla recopilan multitud de datos personales, y <a
 
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html";>cuando
@@ -2662,7 +2703,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/02/03 09:31:52 $
+$Date: 2020/02/17 12:34:25 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.es.html,v
retrieving revision 1.86
retrieving revision 1.87
diff -u -b -r1.86 -r1.87
--- proprietary.es.html 3 Feb 2020 09:31:52 -0000       1.86
+++ proprietary.es.html 17 Feb 2020 12:34:25 -0000      1.87
@@ -183,105 +183,58 @@
 <h3 id="latest">Añadidos recientes</h3>
 
 <ul class="blurbs">
-  <li id="M202001290">
-    <p>La aplicación del timbre de Amazon <a
-href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report";>espía
-para Amazon y también para otras compañías</a>.</p>
+  <li id="M202002020">
+    <p>Muchas aplicaciones de Android engañan a los usuarios al pedirles que
+decidan qué permisos otorgar al programa, para a continuación <a
+href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/";>ignorar
+sus preferencias</a>.</p>
+
+    <p>Se supone que el sistema Android evita el filtrado de datos al ejecutar 
las
+aplicaciones en entornos aislados, pero los desarrolladores han encontrado
+maneras de acceder a los datos por otros medios. Y no hay nada que el
+usuario pueda hacer para evitarlo, ya que tanto el sistema como las
+aplicaciones son privativas.</p>
   </li>
 
-  <li id="M202001090">
-    <p>Los teléfonos Android subvencionados por el Gobierno estadounidense 
llevan
-<a
-href="https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/";>preinstalado
-software con fines publicitarios y una puerta trasera para forzar la
-instalación de aplicaciones</a>.</p>
-
-    <p>El software publicitario es una versión modificada de una aplicación
-esencial para la configuración del sistema. La puerta trasera ha sido
-añadida subrepticiamente a un programa cuyo propósito explícito es ser una
-<a
-href="https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/";>puerta
-trasera universal para <cite>firmware</cite></a>.</p>
+  <li id="M201912220">
+    <p>La aplicación de mensajería ToToc parece ser <a
+href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html";>una
+herramienta de espionaje del Gobierno de Emiratos Árabes
+Unidos</a>. Cualquier programa que no sea libre puede estar espiándonos, lo
+cual es una buena razón para utilizar en su lugar software libre.</p>
 
-    <p>En otras palabras, un programa cuya razón de ser es maliciosa tiene un
-propósito secundario malicioso. Todo esto por añadidura al software
-malicioso del propio Android.</p>
+    <p><small>(Nota: en este artículo se utiliza el término 
<cite>«free»</cite> en
+el sentido de «gratis».)</small></p>
   </li>
 
-  <li id="M201912170">
-    <p>Algunos delincuentes informáticos (a los que equivocadamente se 
refieren en
-este artículo como <a
-href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker";><cite>«hackers»</cite></a>)
-han conseguido entrar en el sistema privativo del Amazon Ring y <a
-href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras";>acceder
-a la cámara, los altavoces y los micrófonos</a>.</p>
+  <li id="M201912190">
+    <p>Se ha descubierto que algunas extensiones de Avast y AVG para Firefox y
+Chrome <a
+href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome";>espían
+los hábitos de navegación de los usuarios</a>. Mozilla y Google retiraron
+las extensiones problemáticas de sus tiendas, pero esto muestra una vez más
+lo inseguro que puede el software privativo: herramientas que se supone que
+protegen un sistema privativo, en vez de eso están infectándolo con software
+malicioso adicional (siendo el sistema mismo el primer software malicioso).</p>
   </li>
 
-  <li id="M201803210">
-    <p>Algunas aplicaciones de <span>redes sociales</span> están <a
-href="https://www.jeffbullas.com/facebook-creates-addiction/";>diseñadas para
-crear adicción en los usuarios</a>. Tratan de integrarse en su vida diaria
-explotando la presión social y el natural deseo de socialización,
-convirtiendo gestos habituales en una auténtica adicción. Como ya se señaló
-con respecto a los juegos, la adictividad se basa fundamentalmente en
-recompensas aleatorias. En ese caso, las recompensas son mensajes de amigos
-y seguidores, «likes», noticias, vídeos interesantes, etc. El software está
-diseñado para generar en el usuario el deseo de obtener esas gratificaciones
-y mantener vivo ese deseo el mayor tiempo posible.</p>
-
-    <ul>
-      <li>De manera predeterminada, las notificaciones se envían cada vez que 
entra un
-nuevo contenido, en lugar de, por ejemplo, una vez al día. Van vinculados a
-sonidos o vibraciones que los hacen aún más apremiantes. (Recuerde el
-experimento con ratas de Paulov.) Esos detonantes son opcionales, y a muchos
-usuarios no se les ocurre desactivarlos. Su mayor efectividad se da cuando
-la aplicación está instalada en un dispositivo móvil que el usuario lleva
-encima en todo momento y está siempre encendido. Como efecto colateral,
-pueden contribuir a la <a
-href="https://www.psychologytoday.com/us/blog/reading-between-the-headlines/201307/smartphone-addiction";>adicción
-a los teléfonos «inteligentes»</a>.</li>
-
-      <li>A los usuarios se les sirve material seleccionado que pueda suscitar 
su
-interés, basándose en su <a
-href="https://theconversation.com/facebook-is-killing-democracy-with-its-personality-profiling-data-93611";>perfil</a>.
-(A la vez, esto allana el camino a la <a
-href="/proprietary/proprietary-manipulation.html">manipulación</a>.)</li>
-
-      <li>La interfaz de la aplicación está diseñada para que los usuarios 
permanezcan
-en el sitio web el mayor tiempo posible, para lo que se utiliza, por
-ejemplo, el <a
-href="https://uxplanet.org/ux-infinite-scrolling-vs-pagination-1030d29376f1";>deslizamiento
-infinito</a>.</li>
-
-      <li>La compañía propietaria de la red social trata de cubrir las 
necesidades del
-usuario de la manera más completa posible, <a
-href="https://en.wikipedia.org/wiki/List_of_mergers_and_acquisitions_by_Facebook";>
-adquiriendo otras compañías</a> si es preciso. Una vez que los usuarios han
-concentrado la mayor parte de sus actividades en al red y gran cantidad de
-datos personales en una única plataforma (o en una serie de plataformas
-pertenecientes al mismo grupo), les resulta <a
-href="https://www.theguardian.com/lifeandstyle/2018/jan/01/antisocial-media-why-decided-cut-back-facebook-instagram";>casi
-imposible dejarla</a>. E incluso si quisieran hacerlo, tendrían que
-enfrentarse a la ardua tarea de localizar las opciones adecuadas, y la
-aplicación no dejaría de atosigarles para que se quedaran.</li>
-    </ul>
-
-    <p>Una buena manera de disminuir el riesgo de adicción, aparte de 
evitarlas, es
-desactivar las notificaciones y dejar la menor cantidad posible de datos
-personales en la plataforma.</p>
+  <li id="M201912171">
+    <p>Ahora la mayor parte de los coches <a
+href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html";>registran
+y envían al fabricante diversos tipos de datos</a>. Para el usuario, acceder
+a esos datos es casi imposible, ya que para ello es preciso introducirse en
+el ordenador del vehículo, que está siempre oculto y funciona con software
+privativo.</p>
   </li>
 
-  <li id="M201910131">
-    <p>Safari, de vez en cuando, <a
-href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/";>envía
-datos de navegación desde los dispositivos Apple situados en China al
-servicio <cite>Safe Browsing</cite> de Tencent</a>, a fin de verificar las
-URL que pudieran corresponder a sitios «fraudulentos». Dado que Tencent
-colabora con el Gobierno chino, su lista negra de «Navegación Segura»
-contiene sin duda sitios web de opositores políticos. Al relacionar las
-solicitudes procedentes de direcciones IP individuales, el Gobierno puede
-identificar a los disidentes de China y Hong Kong, lo que pone en riesgo sus
-vidas.</p>
+  <li id="M201912090">
+    <p>Cuando se utilizan en el trabajo, los iMonstruos y los teléfonos 
Android
+proporcionan a los empleadores potentes <a
+href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy";>capacidades
+de espionaje y sabotaje</a> en el caso de que estos instalen su propio
+software en el dispositivo. Muchos empleadores exigen hacerlo. Para el
+empleado esto no es sino otro software privativo, tan fundamentalmente
+injusto y peligroso como cualquier otro software privativo.</p>
   </li>
 </ul>
 
@@ -362,7 +315,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/02/03 09:31:52 $
+$Date: 2020/02/17 12:34:25 $
 
 <!-- timestamp end -->
 </p>

Index: po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.243
retrieving revision 1.244
diff -u -b -r1.243 -r1.244
--- po/es.po    17 Feb 2020 08:35:25 -0000      1.243
+++ po/es.po    17 Feb 2020 12:34:25 -0000      1.244
@@ -4035,6 +4035,12 @@
 "it involves cracking the car's computer, which is always hidden and running "
 "with proprietary software."
 msgstr ""
+"Ahora la mayor parte de los coches <a href=\"https://boingboing.";
+"net/2019/12/17/cars-now-run-on-the-new-oil.html\">registran y envían al "
+"fabricante diversos tipos de datos</a>. Para el usuario, acceder a esos "
+"datos es casi imposible, ya que para ello es preciso introducirse en el "
+"ordenador del vehículo, que está siempre oculto y funciona con software "
+"privativo."
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
@@ -4660,6 +4666,11 @@
 "are <a href=\"https://www.pcgamer.com/behind-the-addictive-psychology-and-";
 "seductive-art-of-loot-boxes/\"> akin to gambling</a>."
 msgstr ""
+"Las «cajas de botín» (<cite>loot boxes</cite>) son una aplicación directa 
"
+"del mecanismo de recompensa aleatoria, y su adictividad se refuerza con "
+"seductoras animaciones. Son <a href=\"https://www.pcgamer.com/behind-the-";
+"addictive-psychology-and-seductive-art-of-loot-boxes/\">semejantes a los "
+"juegos de apuestas</a>."
 
 #. type: Content of: <div><ul><li><p>
 # | The {+developers of gratis mobile games apply the techniques described
@@ -7596,7 +7607,7 @@
 
 #. type: Content of: <div><h3>
 msgid "Deception"
-msgstr ""
+msgstr "Trampas"
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
@@ -7605,6 +7616,10 @@
 "com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
 "data/\"> bypassing these permissions</a>."
 msgstr ""
+"Muchas aplicaciones de Android engañan a los usuarios al pedirles que "
+"decidan qué permisos otorgar al programa, para a continuación <a href="
+"\"https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-";
+"permissions-to-access-sensitive-data/\">ignorar sus preferencias</a>."
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
@@ -7613,6 +7628,11 @@
 "other means, and there is nothing the user can do to stop them from doing "
 "so, since both the system and the apps are nonfree."
 msgstr ""
+"Se supone que el sistema Android evita el filtrado de datos al ejecutar las "
+"aplicaciones en entornos aislados, pero los desarrolladores han encontrado "
+"maneras de acceder a los datos por otros medios. Y no hay nada que el "
+"usuario pueda hacer para evitarlo, ya que tanto el sistema como las "
+"aplicaciones son privativas."
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
@@ -7981,6 +8001,11 @@
 "government of the United Arab Emirates</a>.  Any nonfree program could be "
 "doing this, and that is a good reason to use free software instead."
 msgstr ""
+"La aplicación de mensajería ToToc parece ser <a href=\"https://www.nytimes.";
+"com/2019/12/22/us/politics/totok-app-uae.html\">una herramienta de espionaje "
+"del Gobierno de Emiratos Árabes Unidos</a>. Cualquier programa que no sea "
+"libre puede estar espiándonos, lo cual es una buena razón para utilizar en "
+"su lugar software libre."
 
 #. type: Content of: <div><ul><li><p>
 # | [-<small>(Note that the-]{+<small>Note: this+} article [-refers to these
@@ -8007,6 +8032,13 @@
 "to do this.  For the employee, this is simply nonfree software, as "
 "fundamentally unjust and as dangerous as any other nonfree software."
 msgstr ""
+"Cuando se utilizan en el trabajo, los iMonstruos y los teléfonos Android "
+"proporcionan a los empleadores potentes <a href=\"https://www.fastcompany.";
+"com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-"
+"privacy\">capacidades de espionaje y sabotaje</a> en el caso de que estos "
+"instalen su propio software en el dispositivo. Muchos empleadores exigen "
+"hacerlo. Para el empleado esto no es sino otro software privativo, tan "
+"fundamentalmente injusto y peligroso como cualquier otro software privativo."
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
@@ -11877,6 +11909,14 @@
 "supposed to protect a proprietary system are, instead, infecting it with "
 "additional malware (the system itself being the original malware)."
 msgstr ""
+"Se ha descubierto que algunas extensiones de Avast y AVG para Firefox y "
+"Chrome <a href=\"https://www.itpro.co.uk/security/internet-security/354417/";
+"avast-and-avg-extensions-pulled-from-chrome\">espían los hábitos de "
+"navegación de los usuarios</a>. Mozilla y Google retiraron las extensiones "
+"problemáticas de sus tiendas, pero esto muestra una vez más lo inseguro que 
"
+"puede el software privativo: herramientas que se supone que protegen un "
+"sistema privativo, en vez de eso están infectándolo con software malicioso "
+"adicional (siendo el sistema mismo el primer software malicioso)."
 
 #. type: Content of: <div><p>
 # | Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, [-2019-] {+2019,

Index: po/malware-cars.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.es-en.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- po/malware-cars.es-en.html  23 Nov 2019 11:33:14 -0000      1.2
+++ po/malware-cars.es-en.html  17 Feb 2020 12:34:25 -0000      1.3
@@ -51,6 +51,15 @@
 <div class="column-limit" id="malware-cars"></div>
 
 <ul class="blurbs">
+  <li id="M201912171">
+    <p>Most modern cars now <a
+    href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html";>
+    record and send various kinds of data to the manufacturer</a>. For
+    the user, access to the data is nearly impossible, as it involves
+    cracking the car's computer, which is always hidden and running with
+    proprietary software.</p>
+  </li>
+
   <li id="M201909160">
     <p>Tesla users claim Tesla <a
     
href="https://www.reuters.com/article/us-tesla-battery/tesla-owner-lawsuit-claims-software-update-fraudulently-cut-battery-capacity-idUSKCN1UY2TW";>force-installed
@@ -332,7 +341,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
 
-<p>Copyright &copy; 2017, 2018, 2019 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2017, 2018, 2019, 2020 Free Software Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
 href="http://creativecommons.org/licenses/by/4.0/";>Creative
@@ -342,7 +351,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/11/23 11:33:14 $
+$Date: 2020/02/17 12:34:25 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-games.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.es-en.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- po/malware-games.es-en.html 23 Nov 2019 11:33:14 -0000      1.2
+++ po/malware-games.es-en.html 17 Feb 2020 12:34:25 -0000      1.3
@@ -89,6 +89,12 @@
     <p>Games such as World of Warcraft, which are considered very addictive,
     use several of these techniques.</p>
 
+    <p style="margin-top: 1em">&ldquo;Loot boxes&rdquo; are a direct
+    application of the random reward mechanism, and their addictiveness
+    is enhanced by seductive animation. They are <a
+    
href="https://www.pcgamer.com/behind-the-addictive-psychology-and-seductive-art-of-loot-boxes/";>
+    akin to gambling</a>.</p>
+
     <p style="margin-top: 1em">The developers of gratis
     mobile games apply the techniques described above to <a
     href="https://www.psychguides.com/interact/the-psychology-of-freemium/";>
@@ -99,8 +105,8 @@
     willing to spend. Thus developers carefully study the behavior of
     millions of users to increase the addictiveness of their games.</p>
 
-    <p><small>(Unfortunately, this article uses &ldquo;free&rdquo; to mean
-    &ldquo;zero price.&rdquo;  We recommend saying &ldquo;gratis&rdquo;
+    <p><small>(Unfortunately, the last two articles use &ldquo;free&rdquo; to
+    mean &ldquo;zero price.&rdquo;  We recommend saying &ldquo;gratis&rdquo;
     instead.)</small></p>
 
     <p style="margin-top: 1em">However, the addictiveness of a game is
@@ -394,7 +400,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
 
-<p>Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, 
Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
 href="http://creativecommons.org/licenses/by/4.0/";>Creative
@@ -404,7 +410,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/11/23 11:33:14 $
+$Date: 2020/02/17 12:34:25 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-games.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.es.po,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- po/malware-games.es.po      17 Feb 2020 12:08:08 -0000      1.9
+++ po/malware-games.es.po      17 Feb 2020 12:34:25 -0000      1.10
@@ -199,8 +199,8 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<small>(Unfortunately, the last two articles use &ldquo;free&rdquo; to mean "
-"&ldquo;zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; "
-"instead.)</small>"
+"&ldquo;zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead.)"
+"</small>"
 msgstr ""
 "<small>(Desafortunadamente, estos dos últimos artículos utilizan el 
término "
 "«<cite>free</cite>» para significar «precio cero». Recomendamos en su 
lugar "

Index: po/malware-mobiles.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es-en.html,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- po/malware-mobiles.es-en.html       21 Jan 2020 12:34:48 -0000      1.64
+++ po/malware-mobiles.es-en.html       17 Feb 2020 12:34:25 -0000      1.65
@@ -114,6 +114,7 @@
 <ul>
   <li><a href="#back-doors">Back doors</a></li>
 <!--<li><a href="#censorship">Censorship</a></li>-->
+  <li><a href="#deception">Deception</a></li>
   <li><a href="#drm">DRM</a></li>
   <li><a href="#insecurity">Insecurity</a></li>
   <li><a href="#interference">Interference</a></li>
@@ -203,6 +204,23 @@
 </ul>
 
 
+<h3 id="deception">Deception</h3>
+
+<ul class="blurbs">
+  <li id="M202002020">
+    <p>Many Android apps fool their users by asking
+    them to decide what permissions to give the program, and then <a
+    
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/";>
+    bypassing these permissions</a>.</p>
+
+    <p>The Android system is supposed to prevent data leaks by running apps
+    in isolated sandboxes, but developers have found ways to access the
+    data by other means, and there is nothing the user can do to stop
+    them from doing so, since both the system and the apps are nonfree.</p>
+  </li>
+</ul>
+
+
 <h3 id="drm">DRM</h3>
 
 <p>Digital restrictions management, or &ldquo;DRM,&rdquo; refers to
@@ -444,6 +462,27 @@
     full-time listening devices</a>.</p>
   </li>
 
+  <li id="M201912220">
+    <p>The ToToc messaging app seems to be a <a
+    href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html";>
+    spying tool for the government of the United Arab Emirates</a>.
+    Any nonfree program could be doing this, and that is a good
+    reason to use free software instead.</p>
+
+    <p><small>Note: this article uses the word &ldquo;free&rdquo; in
+    the sense of &ldquo;gratis.&rdquo;</small></p>
+  </li>
+
+  <li id="M201912090">
+    <p>iMonsters and Android phones,
+    when used for work, give employers powerful <a
+    
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy";>
+    snooping and sabotage capabilities</a> if they install their own
+    software on the device.  Many employers demand to do this.  For the
+    employee, this is simply nonfree software, as fundamentally unjust
+    and as dangerous as any other nonfree software.</p>
+  </li>
+
   <li id="M201909091">
     <p>The Facebook app <a
     
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/";>
@@ -1186,7 +1225,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/01/21 12:34:48 $
+$Date: 2020/02/17 12:34:25 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.166
retrieving revision 1.167
diff -u -b -r1.166 -r1.167
--- po/malware-mobiles.es.po    17 Feb 2020 12:08:08 -0000      1.166
+++ po/malware-mobiles.es.po    17 Feb 2020 12:34:25 -0000      1.167
@@ -1442,8 +1442,8 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<small>(Note that this article misuses the words &ldquo;<a href=\"/"
-"philosophy/free-sw.html\">free software</a>&rdquo; referring to zero "
-"price.)</small>"
+"philosophy/free-sw.html\">free software</a>&rdquo; referring to zero price.)"
+"</small>"
 msgstr ""
 "<small>(Advierta que este artículo emplea mal las palabras &ldquo;<a 
href=\"/"
 "philosophy/free-sw.html\">software libre</a>&rdquo; para referirse a "

Index: po/proprietary-addictions.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.es-en.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- po/proprietary-addictions.es-en.html        21 Nov 2019 12:03:46 -0000      
1.10
+++ po/proprietary-addictions.es-en.html        17 Feb 2020 12:34:25 -0000      
1.11
@@ -99,6 +99,12 @@
     <p>Games such as World of Warcraft, which are considered very addictive,
     use several of these techniques.</p>
 
+    <p style="margin-top: 1em">&ldquo;Loot boxes&rdquo; are a direct
+    application of the random reward mechanism, and their addictiveness
+    is enhanced by seductive animation. They are <a
+    
href="https://www.pcgamer.com/behind-the-addictive-psychology-and-seductive-art-of-loot-boxes/";>
+    akin to gambling</a>.</p>
+
     <p style="margin-top: 1em">The developers of gratis
     mobile games apply the techniques described above to <a
     href="https://www.psychguides.com/interact/the-psychology-of-freemium/";>
@@ -109,8 +115,8 @@
     willing to spend. Thus developers carefully study the behavior of
     millions of users to increase the addictiveness of their games.</p>
 
-    <p><small>(Unfortunately, this article uses &ldquo;free&rdquo; to mean
-    &ldquo;zero price.&rdquo;  We recommend saying &ldquo;gratis&rdquo;
+    <p><small>(Unfortunately, the last two articles use &ldquo;free&rdquo; to
+    mean &ldquo;zero price.&rdquo;  We recommend saying &ldquo;gratis&rdquo;
     instead.)</small></p>
 
     <p style="margin-top: 1em">However, the addictiveness of a game is
@@ -316,7 +322,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
 
-<p>Copyright &copy; 2019 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2019, 2020 Free Software Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
 href="http://creativecommons.org/licenses/by/4.0/";>Creative
@@ -326,7 +332,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/11/21 12:03:46 $
+$Date: 2020/02/17 12:34:25 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-addictions.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.es.po,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- po/proprietary-addictions.es.po     17 Feb 2020 12:08:08 -0000      1.34
+++ po/proprietary-addictions.es.po     17 Feb 2020 12:34:25 -0000      1.35
@@ -215,8 +215,8 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<small>(Unfortunately, the last two articles use &ldquo;free&rdquo; to mean "
-"&ldquo;zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; "
-"instead.)</small>"
+"&ldquo;zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead.)"
+"</small>"
 msgstr ""
 "<small>(Desafortunadamente, estos dos últimos artículos utilizan el 
término "
 "«<cite>free</cite>» para significar «precio cero». Recomendamos en su 
lugar "

Index: po/proprietary-deception.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.es-en.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- po/proprietary-deception.es-en.html 24 Nov 2019 12:02:32 -0000      1.5
+++ po/proprietary-deception.es-en.html 17 Feb 2020 12:34:25 -0000      1.6
@@ -60,6 +60,18 @@
 <div class="column-limit" id="proprietary-deception"></div>
 
 <ul class="blurbs">
+  <li id="M202002020">
+    <p>Many Android apps fool their users by asking
+    them to decide what permissions to give the program, and then <a
+    
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/";>
+    bypassing these permissions</a>.</p>
+
+    <p>The Android system is supposed to prevent data leaks by running apps
+    in isolated sandboxes, but developers have found ways to access the
+    data by other means, and there is nothing the user can do to stop
+    them from doing so, since both the system and the apps are nonfree.</p>
+  </li>
+
   <li id="M201904150">
     <p id="M201509210">Volkswagen programmed its car engine computers to <a
     
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions";>
@@ -180,7 +192,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
 
-<p>Copyright &copy; 2015, 2016, 2017, 2018, 2019 Free Software Foundation, 
Inc.</p>
+<p>Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Free Software 
Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
 href="http://creativecommons.org/licenses/by/4.0/";>Creative
@@ -190,7 +202,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/11/24 12:02:32 $
+$Date: 2020/02/17 12:34:25 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-sabotage.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.es-en.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- po/proprietary-sabotage.es-en.html  21 Nov 2019 22:30:04 -0000      1.11
+++ po/proprietary-sabotage.es-en.html  17 Feb 2020 12:34:25 -0000      1.12
@@ -56,6 +56,16 @@
 <div class="column-limit" id="proprietary-sabotage"></div>
 
 <ul class="blurbs">
+  <li id="M201912090">
+    <p>iMonsters and Android phones,
+    when used for work, give employers powerful <a
+    
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy";>
+    snooping and sabotage capabilities</a> if they install their own
+    software on the device.  Many employers demand to do this.  For the
+    employee, this is simply nonfree software, as fundamentally unjust
+    and as dangerous as any other nonfree software.</p>
+  </li>
+
   <li id="M201910071">
     <p>Adobe has <a
     
href="https://www.bleepingcomputer.com/news/software/adobe-to-ban-users-from-venezuela-due-to-us-executive-order/";>
@@ -643,7 +653,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
 
-<p>Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software 
Foundation, Inc.</p>
+<p>Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software 
Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
 href="http://creativecommons.org/licenses/by/4.0/";>Creative
@@ -653,7 +663,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/11/21 22:30:04 $
+$Date: 2020/02/17 12:34:25 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-surveillance.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- po/proprietary-surveillance.es-en.html      3 Feb 2020 09:31:53 -0000       
1.6
+++ po/proprietary-surveillance.es-en.html      17 Feb 2020 12:34:25 -0000      
1.7
@@ -795,6 +795,17 @@
 </div>
 
 <ul class="blurbs">
+  <li id="M201912190">
+    <p>Some Avast and AVG extensions
+    for Firefox and Chrome were found to <a
+    
href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome";>
+    snoop on users' detailed browsing habits</a>. Mozilla and Google
+    removed the problematic extensions from their stores, but this shows
+    once more how unsafe nonfree software can be. Tools that are supposed
+    to protect a proprietary system are, instead, infecting it with
+    additional malware (the system itself being the original malware).</p>
+  </li>
+
   <li id="M201811020">
     <p>Foundry's graphics software <a
     
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/";>
@@ -822,6 +833,27 @@
     surveillance for other companies as well as for Amazon</a>.</p>
   </li>
 
+  <li id="M201912220">
+    <p>The ToToc messaging app seems to be a <a
+    href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html";>
+    spying tool for the government of the United Arab Emirates</a>.
+    Any nonfree program could be doing this, and that is a good
+    reason to use free software instead.</p>
+
+    <p><small>Note: this article uses the word &ldquo;free&rdquo; in
+    the sense of &ldquo;gratis.&rdquo;</small></p>
+  </li>
+
+  <li id="M201912090">
+    <p>iMonsters and Android phones,
+    when used for work, give employers powerful <a
+    
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy";>
+    snooping and sabotage capabilities</a> if they install their own
+    software on the device.  Many employers demand to do this.  For the
+    employee, this is simply nonfree software, as fundamentally unjust
+    and as dangerous as any other nonfree software.</p>
+  </li>
+
   <li id="M201910130">
     <p>The Chinese Communist Party's &ldquo;Study
     the Great Nation&rdquo; app requires users to grant it <a
@@ -2093,6 +2125,15 @@
 </div>
 
 <ul class="blurbs">
+  <li id="M201912171">
+    <p>Most modern cars now <a
+    href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html";>
+    record and send various kinds of data to the manufacturer</a>. For
+    the user, access to the data is nearly impossible, as it involves
+    cracking the car's computer, which is always hidden and running with
+    proprietary software.</p>
+  </li>
+
   <li id="M201903290">
     <p>Tesla cars collect lots of personal data, and <a
     
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html";>
@@ -2542,7 +2583,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/02/03 09:31:53 $
+$Date: 2020/02/17 12:34:25 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- po/proprietary-surveillance.es.po   17 Feb 2020 12:08:08 -0000      1.24
+++ po/proprietary-surveillance.es.po   17 Feb 2020 12:34:25 -0000      1.25
@@ -2222,8 +2222,8 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<small>(Note that this article misuses the words &ldquo;<a href=\"/"
-"philosophy/free-sw.html\">free software</a>&rdquo; referring to zero "
-"price.)</small>"
+"philosophy/free-sw.html\">free software</a>&rdquo; referring to zero price.)"
+"</small>"
 msgstr ""
 "<small>(Advierta que este artículo emplea mal las palabras &ldquo;<a 
href=\"/"
 "philosophy/free-sw.html\">software libre</a>&rdquo; para referirse a "

Index: po/proprietary.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es-en.html,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- po/proprietary.es-en.html   3 Feb 2020 09:31:53 -0000       1.79
+++ po/proprietary.es-en.html   17 Feb 2020 12:34:25 -0000      1.80
@@ -173,100 +173,57 @@
 <h3 id="latest">Latest additions</h3>
 
 <ul class="blurbs">
-  <li id="M202001290">
-    <p>The Amazon Ring app does <a
-    
href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report";>
-    surveillance for other companies as well as for Amazon</a>.</p>
+  <li id="M202002020">
+    <p>Many Android apps fool their users by asking
+    them to decide what permissions to give the program, and then <a
+    
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/";>
+    bypassing these permissions</a>.</p>
+
+    <p>The Android system is supposed to prevent data leaks by running apps
+    in isolated sandboxes, but developers have found ways to access the
+    data by other means, and there is nothing the user can do to stop
+    them from doing so, since both the system and the apps are nonfree.</p>
   </li>
 
-  <li id="M202001090">
-    <p>Android phones subsidized by the US government come with <a
-    
href="https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/";>
-    preinstalled adware and a back door for forcing installation of
-    apps</a>.</p>
-
-    <p>The adware is in a modified version of an
-    essential system configuration app. The back door is a
-    surreptitious addition to a program whose stated purpose is to be a <a
-    
href="https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/";>
-    universal back door for firmware</a>.</p>
-
-    <p>In other words, a program whose raison d'être is malicious has
-    a secret secondary malicious purpose. All this is in addition to the
-    malware of Android itself.</p>
+  <li id="M201912220">
+    <p>The ToToc messaging app seems to be a <a
+    href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html";>
+    spying tool for the government of the United Arab Emirates</a>.
+    Any nonfree program could be doing this, and that is a good
+    reason to use free software instead.</p>
+
+    <p><small>Note: this article uses the word &ldquo;free&rdquo; in
+    the sense of &ldquo;gratis.&rdquo;</small></p>
   </li>
 
-  <li id="M201912170">
-    <p>Some security breakers (wrongly referred in this article as <a
-    
href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker";>&ldquo;hackers&rdquo;</a>)
-    managed to interfere the Amazon Ring proprietary system, and <a
-    
href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras";>access
-    its camera, speakers and microphones</a>.</p>
+  <li id="M201912190">
+    <p>Some Avast and AVG extensions
+    for Firefox and Chrome were found to <a
+    
href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome";>
+    snoop on users' detailed browsing habits</a>. Mozilla and Google
+    removed the problematic extensions from their stores, but this shows
+    once more how unsafe nonfree software can be. Tools that are supposed
+    to protect a proprietary system are, instead, infecting it with
+    additional malware (the system itself being the original malware).</p>
   </li>
 
-  <li id="M201803210">
-    <p>Some <span>social networking</span> apps are <a
-    href="https://www.jeffbullas.com/facebook-creates-addiction/";>
-    designed to get users addicted</a>. These try to merge into your daily
-    routine by exploiting social pressure and your natural desire for
-    socialization, converting habitual gestures into thorough addiction. As
-    already noted for games, addictiveness is essentially based on random
-    rewards. In the present case, the rewards are messages from friends
-    and followers, &ldquo;likes,&rdquo; news, interesting videos, etc. The
-    software is designed to trigger users' desire for these rewards,
-    and keep this desire alive as long as possible.</p>
-
-    <ul>
-      <li>By default, notifications are sent every time a new item comes
-      in, instead of, say, once a day. They are associated with sounds or
-      vibrations which make them even more compelling. (Remember Pavlov's
-      experiments with rats.) These triggers are often opt-out, and many
-      users don't try to turn them off. They are most effective when the
-      app is installed on a mobile device which is always on and never
-      leaves the user. As a side effect, they may contribute to the <a
-      
href="https://www.psychologytoday.com/us/blog/reading-between-the-headlines/201307/smartphone-addiction";>
-      addictiveness of &ldquo;smart&rdquo; phones</a>.</li>
-
-      <li>Users are served selected material
-      that is likely to interest   them, based on <a
-      
href="https://theconversation.com/facebook-is-killing-democracy-with-its-personality-profiling-data-93611";>
-      profiling</a>. (This paves the way to <a
-      href="/proprietary/proprietary-manipulation.html">manipulation</a>,
-      by the way.)</li>
-
-      <li>The app interface is designed to make   users
-      stay on the site as long as possible, using <a
-      
href="https://uxplanet.org/ux-infinite-scrolling-vs-pagination-1030d29376f1";>
-      infinite scrolling</a> for example.</li>
-
-      <li>The company that owns the social network tries
-      to cover   users' needs as extensively as possible, by <a
-      
href="https://en.wikipedia.org/wiki/List_of_mergers_and_acquisitions_by_Facebook";>
-      acquiring other companies</a> if needed. Once users
-      have concentrated   most of their online activities and
-      a lot of their personal data on   a single platform (or
-      a set of platforms that belong to the same   group), they find it <a
-      
href="https://www.theguardian.com/lifeandstyle/2018/jan/01/antisocial-media-why-decided-cut-back-facebook-instagram";>
-      almost impossible to leave</a>. And even if they wanted to, they
-      would have a hard time digging out the relevant options, and the
-      app would aggressively nag them to stay.</li>
-    </ul>
-
-    <p>A good way to minimize the risk of addiction, short of avoiding
-    social media altogether, is to turn off notifications and leave as
-    little as possible of your own data on the platform.</p>
+  <li id="M201912171">
+    <p>Most modern cars now <a
+    href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html";>
+    record and send various kinds of data to the manufacturer</a>. For
+    the user, access to the data is nearly impossible, as it involves
+    cracking the car's computer, which is always hidden and running with
+    proprietary software.</p>
   </li>
 
-  <li id="M201910131">
-    <p>Safari occasionally <a
-    
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/";>
-    sends browsing data from Apple devices in China to the Tencent Safe
-    Browsing service</a>, to check URLs that possibly correspond to
-    &ldquo;fraudulent&rdquo; websites. Since Tencent collaborates
-    with the Chinese government, its Safe Browsing black list most certainly
-    contains the websites of political opponents. By linking the requests
-    originating from single IP addresses, the government can identify
-    dissenters in China and Hong Kong, thus endangering their lives.</p>
+  <li id="M201912090">
+    <p>iMonsters and Android phones,
+    when used for work, give employers powerful <a
+    
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy";>
+    snooping and sabotage capabilities</a> if they install their own
+    software on the device.  Many employers demand to do this.  For the
+    employee, this is simply nonfree software, as fundamentally unjust
+    and as dangerous as any other nonfree software.</p>
   </li>
 </ul>
 
@@ -329,7 +286,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/02/03 09:31:53 $
+$Date: 2020/02/17 12:34:25 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]