www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www home.es.html po/home.es-en.html po/home.es....


From: GNUN
Subject: www home.es.html po/home.es-en.html po/home.es....
Date: Tue, 25 Feb 2020 07:30:48 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     20/02/25 07:30:48

Modified files:
        .              : home.es.html 
        po             : home.es-en.html home.es.po 
        proprietary    : malware-appliances.es.html 
                         proprietary-insecurity.es.html 
                         proprietary-surveillance.es.html 
                         proprietary.es.html 
        proprietary/po : es.po malware-appliances.es-en.html 
                         proprietary-insecurity.es-en.html 
                         proprietary-surveillance.es-en.html 
                         proprietary-surveillance.es.po 
                         proprietary.es-en.html proprietary.es.po 
        software       : software.es.html 
        software/po    : software.es-en.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/home.es.html?cvsroot=www&r1=1.382&r2=1.383
http://web.cvs.savannah.gnu.org/viewcvs/www/po/home.es-en.html?cvsroot=www&r1=1.154&r2=1.155
http://web.cvs.savannah.gnu.org/viewcvs/www/po/home.es.po?cvsroot=www&r1=1.522&r2=1.523
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.es.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.es.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.es.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.es.html?cvsroot=www&r1=1.87&r2=1.88
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.246&r2=1.247
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.es-en.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.es-en.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es-en.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es-en.html?cvsroot=www&r1=1.80&r2=1.81
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.257&r2=1.258
http://web.cvs.savannah.gnu.org/viewcvs/www/software/software.es.html?cvsroot=www&r1=1.85&r2=1.86
http://web.cvs.savannah.gnu.org/viewcvs/www/software/po/software.es-en.html?cvsroot=www&r1=1.55&r2=1.56

Patches:
Index: home.es.html
===================================================================
RCS file: /web/www/www/home.es.html,v
retrieving revision 1.382
retrieving revision 1.383
diff -u -b -r1.382 -r1.383
--- home.es.html        25 Feb 2020 10:31:12 -0000      1.382
+++ home.es.html        25 Feb 2020 12:30:45 -0000      1.383
@@ -424,7 +424,7 @@
 <li><strong>Apoye los esfuerzos para la neutralidad de la red  <a
 href="https://www.freepress.net/issues/free-open-internet/net-neutrality";
 title="Neutralidad de la red en los Estados Unidos de América">en los
-EE.UU.</a></strong>, y en su propio país.</li>
+EE.&nbsp;UU.</a></strong>, y en su propio país.</li>
 
 <li>Defienda la <a
 href="https://www.laquadrature.net/en/personnal-data/";>privacidad</a> y
@@ -585,7 +585,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/02/25 10:31:12 $
+$Date: 2020/02/25 12:30:45 $
 
 <!-- timestamp end -->
 </p>

Index: po/home.es-en.html
===================================================================
RCS file: /web/www/www/po/home.es-en.html,v
retrieving revision 1.154
retrieving revision 1.155
diff -u -b -r1.154 -r1.155
--- po/home.es-en.html  17 Feb 2020 09:33:20 -0000      1.154
+++ po/home.es-en.html  25 Feb 2020 12:30:46 -0000      1.155
@@ -1,4 +1,4 @@
-<!--#include virtual="/server/html5-header.html" -->
+<!--#include virtual="/server/header.html" -->
 <!-- Parent-Version: 1.91 -->
    <!--#if expr="$QUERY_STRING = /distro=([^&#]+)/"
 --><!--#set var="DISTRO" value="$1"
@@ -184,45 +184,6 @@
 <div id="home">
 <div class="first-column">
 
-<div style="max-width: 40em; margin: 2.3em auto 0">
-<video width="100%" controls="controls" crossorigin="anonymous"
-poster="https://static.fsf.org/nosvn/videos/fsf-shoetool/thumbnails/ShoeTool-Cover-1.jpg";>
-
-<source
-src="https://static.fsf.org/nosvn/videos/fsf-shoetool/fsf-shoetool-720p.webm";
-type="video/webm" />
-<source
-src="https://static.fsf.org/nosvn/videos/fsf-shoetool/fsf-shoetool-720p.ogv";
-type="video/ogg" />
-<source
-src="https://static.fsf.org/nosvn/videos/fsf-shoetool/fsf-shoetool-720p.mp4";
-type="video/mp4" />
-
-<!-- GNUN: localize URL /server/banners/shoetoolfsf.vtt -->
-<track kind="subtitles" label="default" default="default"
-src="/server/banners/shoetoolfsf.vtt" />
-<track kind="subtitles" label="English" srclang="en"
-src="/server/banners/shoetoolfsf.en.vtt" />
-<track kind="subtitles" label="español" srclang="es"
-src="/server/banners/shoetoolfsf.es.vtt" />
-<track kind="subtitles" label="euskara" srclang="eu"
-src="https://static.fsf.org/nosvn/videos/fsf-shoetool/captions/shoetoolfsf_eu.vtt";
 />
-<track kind="subtitles" label="français" srclang="fr"
-src="/server/banners/shoetoolfsf.fr.vtt" />
-<track kind="subtitles" label="Nederlands" srclang="nl"
-src="/server/banners/shoetoolfsf.nl.vtt" />
-<track kind="subtitles" label="română" srclang="ro"
-src="https://static.fsf.org/nosvn/videos/fsf-shoetool/captions/shoetoolfsf_ro.vtt";
 />
-<track kind="subtitles" label="தமிழ்" srclang="ta"
-src="https://static.fsf.org/nosvn/videos/fsf-shoetool/captions/shoetoolfsf_ta.vtt";
 />
-<track kind="subtitles" label="українська" srclang="uk"
-src="/server/banners/shoetoolfsf.uk.vtt" />
-</video>
-</div>
-<p class="c">
-<a 
href="https://www.fsf.org/blogs/community/presenting-shoetool-happy-holidays-from-the-fsf";>
-ShoeTool &mdash; HAPPY HOLIDAYS FROM THE FSF!</a></p>
-
 <h2 class="first">What is GNU?</h2>
 
 <p>GNU is an operating system that
@@ -473,6 +434,7 @@
 <ul>
 <li><span class="gnun-split"></span>
   <a href="/software/cfengine/">cfengine</a>,
+  <a href="/software/freedink/">freedink</a>,
   <a href="/software/freetalk/">freetalk</a>,
   <a href="/software/halifax/">halifax</a>,
   <a href="/software/mcron/">mcron</a>,
@@ -578,7 +540,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/02/17 09:33:20 $
+$Date: 2020/02/25 12:30:46 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/home.es.po
===================================================================
RCS file: /web/www/www/po/home.es.po,v
retrieving revision 1.522
retrieving revision 1.523
diff -u -b -r1.522 -r1.523
--- po/home.es.po       25 Feb 2020 12:22:36 -0000      1.522
+++ po/home.es.po       25 Feb 2020 12:30:47 -0000      1.523
@@ -240,8 +240,8 @@
 #. type: Attribute 'alt' of: <div><div><table><tr><td><a><img>
 msgid "&nbsp;[Screenshot of Parabola&nbsp;2020 with LXDE desktop]&nbsp;"
 msgstr ""
-"&nbsp;[Captura de pantalla de Parabola&nbsp;2020 con el escritorio "
-"LXDE]&nbsp;"
+"&nbsp;[Captura de pantalla de Parabola&nbsp;2020 con el escritorio LXDE]"
+"&nbsp;"
 
 #. type: Content of: <div><div><table><tr><td><a>
 msgid "<a href=\"/home.html?distro=pureos#gnu-linux\">"

Index: proprietary/malware-appliances.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-appliances.es.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary/malware-appliances.es.html      19 Dec 2019 11:31:49 -0000      
1.5
+++ proprietary/malware-appliances.es.html      25 Feb 2020 12:30:47 -0000      
1.6
@@ -67,6 +67,20 @@
 a la cámara, los altavoces y los micrófonos</a>.</p>
   </li>
 
+  <li id="M201911190">
+    <p>El Amazon Ring, que está subordinado a un servidor, tiene una 
vulnerabilidad
+que permite a los atacantes <a
+href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password";>acceder
+a la contraseña de la wifi del usuario</a> y espiar en la casa a través de
+los dispositivos de vigilancia conectados a la red.</p>
+
+    <p>Conocer la contraseña de la wifi no sería suficiente para llevar a 
cabo
+ninguna vigilancia significativa si los dispositivos dispusieran de medidas
+de seguridad adecuadas, incluido el cifrado. Pero muchos dispositivos con
+software privativo carecen de ello. Por supuesto, también sus fabricantes
+los utilizan para espiar.</p>
+  </li>
+
   <li id="M201904260">
     <p>Los robots de juguete Jibo estaban conectados al servidor del 
fabricante. La
 empresa cerró el servidor e <a
@@ -952,7 +966,7 @@
 
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, 
Inc.</p>
 
 <p>Esta página está bajo licencia <a rel="license"
 href="http://creativecommons.org/licenses/by/4.0/deed.es_ES";>Creative
@@ -968,7 +982,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2019/12/19 11:31:49 $
+$Date: 2020/02/25 12:30:47 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-insecurity.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.es.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- proprietary/proprietary-insecurity.es.html  21 Jan 2020 12:34:48 -0000      
1.11
+++ proprietary/proprietary-insecurity.es.html  25 Feb 2020 12:30:47 -0000      
1.12
@@ -83,6 +83,20 @@
 a la cámara, los altavoces y los micrófonos</a>.</p>
   </li>
 
+  <li id="M201911190">
+    <p>El Amazon Ring, que está subordinado a un servidor, tiene una 
vulnerabilidad
+que permite a los atacantes <a
+href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password";>acceder
+a la contraseña de la wifi del usuario</a> y espiar en la casa a través de
+los dispositivos de vigilancia conectados a la red.</p>
+
+    <p>Conocer la contraseña de la wifi no sería suficiente para llevar a 
cabo
+ninguna vigilancia significativa si los dispositivos dispusieran de medidas
+de seguridad adecuadas, incluido el cifrado. Pero muchos dispositivos con
+software privativo carecen de ello. Por supuesto, también sus fabricantes
+los utilizan para espiar.</p>
+  </li>
+
   <li id="M201908310">
     <p>Una serie de vulnerabilidades <a
 
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/";>halladas
@@ -765,7 +779,7 @@
 
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software
+<p>Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software
 Foundation, Inc.</p>
 
 <p>Esta página está bajo licencia <a rel="license"
@@ -781,7 +795,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/01/21 12:34:48 $
+$Date: 2020/02/25 12:30:47 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-surveillance.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.es.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- proprietary/proprietary-surveillance.es.html        17 Feb 2020 12:34:25 
-0000      1.9
+++ proprietary/proprietary-surveillance.es.html        25 Feb 2020 12:30:47 
-0000      1.10
@@ -2041,6 +2041,20 @@
 </div>
 
 <ul class="blurbs">
+  <li id="M201911190">
+    <p>El Amazon Ring, que está subordinado a un servidor, tiene una 
vulnerabilidad
+que permite a los atacantes <a
+href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password";>acceder
+a la contraseña de la wifi del usuario</a> y espiar en la casa a través de
+los dispositivos de vigilancia conectados a la red.</p>
+
+    <p>Conocer la contraseña de la wifi no sería suficiente para llevar a 
cabo
+ninguna vigilancia significativa si los dispositivos dispusieran de medidas
+de seguridad adecuadas, incluido el cifrado. Pero muchos dispositivos con
+software privativo carecen de ello. Por supuesto, también sus fabricantes
+los utilizan para espiar.</p>
+  </li>
+
   <li id="M201907210">
     <p>El «Asistente» de Google graba las conversaciones de los usuarios <a
 
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/";>incluso
@@ -2703,7 +2717,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/02/17 12:34:25 $
+$Date: 2020/02/25 12:30:47 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.es.html,v
retrieving revision 1.87
retrieving revision 1.88
diff -u -b -r1.87 -r1.88
--- proprietary/proprietary.es.html     17 Feb 2020 12:34:25 -0000      1.87
+++ proprietary/proprietary.es.html     25 Feb 2020 12:30:47 -0000      1.88
@@ -183,17 +183,18 @@
 <h3 id="latest">Añadidos recientes</h3>
 
 <ul class="blurbs">
-  <li id="M202002020">
-    <p>Muchas aplicaciones de Android engañan a los usuarios al pedirles que
-decidan qué permisos otorgar al programa, para a continuación <a
-href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/";>ignorar
-sus preferencias</a>.</p>
-
-    <p>Se supone que el sistema Android evita el filtrado de datos al ejecutar 
las
-aplicaciones en entornos aislados, pero los desarrolladores han encontrado
-maneras de acceder a los datos por otros medios. Y no hay nada que el
-usuario pueda hacer para evitarlo, ya que tanto el sistema como las
-aplicaciones son privativas.</p>
+  <li id="M201911190">
+    <p>El Amazon Ring, que está subordinado a un servidor, tiene una 
vulnerabilidad
+que permite a los atacantes <a
+href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password";>acceder
+a la contraseña de la wifi del usuario</a> y espiar en la casa a través de
+los dispositivos de vigilancia conectados a la red.</p>
+
+    <p>Conocer la contraseña de la wifi no sería suficiente para llevar a 
cabo
+ninguna vigilancia significativa si los dispositivos dispusieran de medidas
+de seguridad adecuadas, incluido el cifrado. Pero muchos dispositivos con
+software privativo carecen de ello. Por supuesto, también sus fabricantes
+los utilizan para espiar.</p>
   </li>
 
   <li id="M201912220">
@@ -218,6 +219,19 @@
 malicioso adicional (siendo el sistema mismo el primer software malicioso).</p>
   </li>
 
+  <li id="M202002020">
+    <p>Muchas aplicaciones de Android engañan a los usuarios al pedirles que
+decidan qué permisos otorgar al programa, para a continuación <a
+href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/";>ignorar
+sus preferencias</a>.</p>
+
+    <p>Se supone que el sistema Android evita el filtrado de datos al ejecutar 
las
+aplicaciones en entornos aislados, pero los desarrolladores han encontrado
+maneras de acceder a los datos por otros medios. Y no hay nada que el
+usuario pueda hacer para evitarlo, ya que tanto el sistema como las
+aplicaciones son privativas.</p>
+  </li>
+
   <li id="M201912171">
     <p>Ahora la mayor parte de los coches <a
 
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html";>registran
@@ -226,16 +240,6 @@
 el ordenador del vehículo, que está siempre oculto y funciona con software
 privativo.</p>
   </li>
-
-  <li id="M201912090">
-    <p>Cuando se utilizan en el trabajo, los iMonstruos y los teléfonos 
Android
-proporcionan a los empleadores potentes <a
-href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy";>capacidades
-de espionaje y sabotaje</a> en el caso de que estos instalen su propio
-software en el dispositivo. Muchos empleadores exigen hacerlo. Para el
-empleado esto no es sino otro software privativo, tan fundamentalmente
-injusto y peligroso como cualquier otro software privativo.</p>
-  </li>
 </ul>
 
 </div>
@@ -315,7 +319,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/02/17 12:34:25 $
+$Date: 2020/02/25 12:30:47 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.246
retrieving revision 1.247
diff -u -b -r1.246 -r1.247
--- proprietary/po/es.po        24 Feb 2020 17:03:36 -0000      1.246
+++ proprietary/po/es.po        25 Feb 2020 12:30:47 -0000      1.247
@@ -2448,6 +2448,11 @@
 "the user's wifi password</a>, and snoop on the household through connected "
 "surveillance devices."
 msgstr ""
+"El Amazon Ring, que está subordinado a un servidor, tiene una vulnerabilidad 
"
+"que permite a los atacantes <a href=\"https://www.commondreams.org/";
+"newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-"
+"and-password\">acceder a la contraseña de la wifi del usuario</a> y espiar "
+"en la casa a través de los dispositivos de vigilancia conectados a la red."
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
@@ -2456,6 +2461,11 @@
 "including encryption. But many devices with proprietary software lack this. "
 "Of course, they are also used by their manufacturers for snooping."
 msgstr ""
+"Conocer la contraseña de la wifi no sería suficiente para llevar a cabo "
+"ninguna vigilancia significativa si los dispositivos dispusieran de medidas "
+"de seguridad adecuadas, incluido el cifrado. Pero muchos dispositivos con "
+"software privativo carecen de ello. Por supuesto, también sus fabricantes "
+"los utilizan para espiar."
 
 #. type: Content of: <div><ul><li><p>
 msgid ""

Index: proprietary/po/malware-appliances.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.es-en.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary/po/malware-appliances.es-en.html        19 Dec 2019 11:31:50 
-0000      1.5
+++ proprietary/po/malware-appliances.es-en.html        25 Feb 2020 12:30:47 
-0000      1.6
@@ -59,6 +59,20 @@
     its camera, speakers and microphones</a>.</p>
   </li>
 
+  <li id="M201911190">
+    <p>Internet-tethered Amazon Ring had
+    a security vulnerability that enabled attackers to <a
+    
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password";>
+    access the user's wifi password</a>, and snoop on the household
+    through connected surveillance devices.</p>
+
+    <p>Knowledge of the wifi password would not be sufficient to carry
+    out any significant surveillance if the devices implemented proper
+    security, including encryption. But many devices with proprietary
+    software lack this. Of course, they are also used by their
+    manufacturers for snooping.</p>
+  </li>
+
   <li id="M201904260">
     <p>The Jibo robot toys were tethered to the manufacturer's server,
     and <a href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648";>
@@ -930,7 +944,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
 
-<p>Copyright &copy; 2016, 2017, 2018, 2019 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2016, 2017, 2018, 2019, 2020 Free Software Foundation, 
Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
 href="http://creativecommons.org/licenses/by/4.0/";>Creative
@@ -940,7 +954,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/12/19 11:31:50 $
+$Date: 2020/02/25 12:30:47 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-insecurity.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.es-en.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- proprietary/po/proprietary-insecurity.es-en.html    19 Dec 2019 11:31:50 
-0000      1.9
+++ proprietary/po/proprietary-insecurity.es-en.html    25 Feb 2020 12:30:47 
-0000      1.10
@@ -73,6 +73,20 @@
     its camera, speakers and microphones</a>.</p>
   </li>
 
+  <li id="M201911190">
+    <p>Internet-tethered Amazon Ring had
+    a security vulnerability that enabled attackers to <a
+    
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password";>
+    access the user's wifi password</a>, and snoop on the household
+    through connected surveillance devices.</p>
+
+    <p>Knowledge of the wifi password would not be sufficient to carry
+    out any significant surveillance if the devices implemented proper
+    security, including encryption. But many devices with proprietary
+    software lack this. Of course, they are also used by their
+    manufacturers for snooping.</p>
+  </li>
+
   <li id="M201908310">
     <p>A series of vulnerabilities <a
     
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/";>found
@@ -726,7 +740,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
 
-<p>Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019 Free Software 
Foundation, Inc.</p>
+<p>Copyright &copy; 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software 
Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
 href="http://creativecommons.org/licenses/by/4.0/";>Creative
@@ -736,7 +750,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/12/19 11:31:50 $
+$Date: 2020/02/25 12:30:47 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-surveillance.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es-en.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary/po/proprietary-surveillance.es-en.html  23 Feb 2020 11:03:35 
-0000      1.8
+++ proprietary/po/proprietary-surveillance.es-en.html  25 Feb 2020 12:30:47 
-0000      1.9
@@ -1964,6 +1964,20 @@
 </div>
 
 <ul class="blurbs">
+  <li id="M201911190">
+    <p>Internet-tethered Amazon Ring had
+    a security vulnerability that enabled attackers to <a
+    
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password";>
+    access the user's wifi password</a>, and snoop on the household
+    through connected surveillance devices.</p>
+
+    <p>Knowledge of the wifi password would not be sufficient to carry
+    out any significant surveillance if the devices implemented proper
+    security, including encryption. But many devices with proprietary
+    software lack this. Of course, they are also used by their
+    manufacturers for snooping.</p>
+  </li>
+
   <li id="M201907210">
     <p>Google &ldquo;Assistant&rdquo; records users' conversations <a
     
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/";>even
@@ -2583,7 +2597,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/02/23 11:03:35 $
+$Date: 2020/02/25 12:30:47 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary/po/proprietary-surveillance.es.po       25 Feb 2020 12:21:35 
-0000      1.30
+++ proprietary/po/proprietary-surveillance.es.po       25 Feb 2020 12:30:47 
-0000      1.31
@@ -2222,8 +2222,8 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<small>(Note that this article misuses the words &ldquo;<a href=\"/"
-"philosophy/free-sw.html\">free software</a>&rdquo; referring to zero "
-"price.)</small>"
+"philosophy/free-sw.html\">free software</a>&rdquo; referring to zero price.)"
+"</small>"
 msgstr ""
 "<small>(Advierta que este artículo emplea mal las palabras &ldquo;<a 
href=\"/"
 "philosophy/free-sw.html\">software libre</a>&rdquo; para referirse a "

Index: proprietary/po/proprietary.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es-en.html,v
retrieving revision 1.80
retrieving revision 1.81
diff -u -b -r1.80 -r1.81
--- proprietary/po/proprietary.es-en.html       17 Feb 2020 12:34:25 -0000      
1.80
+++ proprietary/po/proprietary.es-en.html       25 Feb 2020 12:30:47 -0000      
1.81
@@ -173,16 +173,18 @@
 <h3 id="latest">Latest additions</h3>
 
 <ul class="blurbs">
-  <li id="M202002020">
-    <p>Many Android apps fool their users by asking
-    them to decide what permissions to give the program, and then <a
-    
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/";>
-    bypassing these permissions</a>.</p>
-
-    <p>The Android system is supposed to prevent data leaks by running apps
-    in isolated sandboxes, but developers have found ways to access the
-    data by other means, and there is nothing the user can do to stop
-    them from doing so, since both the system and the apps are nonfree.</p>
+  <li id="M201911190">
+    <p>Internet-tethered Amazon Ring had
+    a security vulnerability that enabled attackers to <a
+    
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password";>
+    access the user's wifi password</a>, and snoop on the household
+    through connected surveillance devices.</p>
+
+    <p>Knowledge of the wifi password would not be sufficient to carry
+    out any significant surveillance if the devices implemented proper
+    security, including encryption. But many devices with proprietary
+    software lack this. Of course, they are also used by their
+    manufacturers for snooping.</p>
   </li>
 
   <li id="M201912220">
@@ -207,6 +209,18 @@
     additional malware (the system itself being the original malware).</p>
   </li>
 
+  <li id="M202002020">
+    <p>Many Android apps fool their users by asking
+    them to decide what permissions to give the program, and then <a
+    
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/";>
+    bypassing these permissions</a>.</p>
+
+    <p>The Android system is supposed to prevent data leaks by running apps
+    in isolated sandboxes, but developers have found ways to access the
+    data by other means, and there is nothing the user can do to stop
+    them from doing so, since both the system and the apps are nonfree.</p>
+  </li>
+
   <li id="M201912171">
     <p>Most modern cars now <a
     href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html";>
@@ -215,16 +229,6 @@
     cracking the car's computer, which is always hidden and running with
     proprietary software.</p>
   </li>
-
-  <li id="M201912090">
-    <p>iMonsters and Android phones,
-    when used for work, give employers powerful <a
-    
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy";>
-    snooping and sabotage capabilities</a> if they install their own
-    software on the device.  Many employers demand to do this.  For the
-    employee, this is simply nonfree software, as fundamentally unjust
-    and as dangerous as any other nonfree software.</p>
-  </li>
 </ul>
 
 </div>
@@ -286,7 +290,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/02/17 12:34:25 $
+$Date: 2020/02/25 12:30:47 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.257
retrieving revision 1.258
diff -u -b -r1.257 -r1.258
--- proprietary/po/proprietary.es.po    25 Feb 2020 12:21:35 -0000      1.257
+++ proprietary/po/proprietary.es.po    25 Feb 2020 12:30:47 -0000      1.258
@@ -16,7 +16,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2020-02-24 16:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.2.1\n"
 

Index: software/software.es.html
===================================================================
RCS file: /web/www/www/software/software.es.html,v
retrieving revision 1.85
retrieving revision 1.86
diff -u -b -r1.85 -r1.86
--- software/software.es.html   24 Nov 2019 12:02:34 -0000      1.85
+++ software/software.es.html   25 Feb 2020 12:30:48 -0000      1.86
@@ -343,7 +343,7 @@
 
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright &copy; 2015, 2016, 2018, 2019 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2015, 2016, 2018, 2019, 2020 Free Software Foundation, 
Inc.</p>
 
 <p>Esta página está bajo licencia <a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/deed.es_ES";>Creative
@@ -359,7 +359,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2019/11/24 12:02:34 $
+$Date: 2020/02/25 12:30:48 $
 
 <!-- timestamp end -->
 </p>

Index: software/po/software.es-en.html
===================================================================
RCS file: /web/www/www/software/po/software.es-en.html,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- software/po/software.es-en.html     24 Nov 2019 12:02:35 -0000      1.55
+++ software/po/software.es-en.html     25 Feb 2020 12:30:48 -0000      1.56
@@ -365,7 +365,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
 
-<p>Copyright &copy; 2015, 2016, 2018, 2019 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2015, 2016, 2018, 2019, 2020 Free Software Foundation, 
Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative
@@ -375,7 +375,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/11/24 12:02:35 $
+$Date: 2020/02/25 12:30:48 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]