[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www home.es.html po/home.es-en.html po/home.es....
From: |
GNUN |
Subject: |
www home.es.html po/home.es-en.html po/home.es.... |
Date: |
Tue, 25 Feb 2020 07:30:48 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 20/02/25 07:30:48
Modified files:
. : home.es.html
po : home.es-en.html home.es.po
proprietary : malware-appliances.es.html
proprietary-insecurity.es.html
proprietary-surveillance.es.html
proprietary.es.html
proprietary/po : es.po malware-appliances.es-en.html
proprietary-insecurity.es-en.html
proprietary-surveillance.es-en.html
proprietary-surveillance.es.po
proprietary.es-en.html proprietary.es.po
software : software.es.html
software/po : software.es-en.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/home.es.html?cvsroot=www&r1=1.382&r2=1.383
http://web.cvs.savannah.gnu.org/viewcvs/www/po/home.es-en.html?cvsroot=www&r1=1.154&r2=1.155
http://web.cvs.savannah.gnu.org/viewcvs/www/po/home.es.po?cvsroot=www&r1=1.522&r2=1.523
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.es.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.es.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.es.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.es.html?cvsroot=www&r1=1.87&r2=1.88
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.246&r2=1.247
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.es-en.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.es-en.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es-en.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es-en.html?cvsroot=www&r1=1.80&r2=1.81
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.257&r2=1.258
http://web.cvs.savannah.gnu.org/viewcvs/www/software/software.es.html?cvsroot=www&r1=1.85&r2=1.86
http://web.cvs.savannah.gnu.org/viewcvs/www/software/po/software.es-en.html?cvsroot=www&r1=1.55&r2=1.56
Patches:
Index: home.es.html
===================================================================
RCS file: /web/www/www/home.es.html,v
retrieving revision 1.382
retrieving revision 1.383
diff -u -b -r1.382 -r1.383
--- home.es.html 25 Feb 2020 10:31:12 -0000 1.382
+++ home.es.html 25 Feb 2020 12:30:45 -0000 1.383
@@ -424,7 +424,7 @@
<li><strong>Apoye los esfuerzos para la neutralidad de la red <a
href="https://www.freepress.net/issues/free-open-internet/net-neutrality"
title="Neutralidad de la red en los Estados Unidos de América">en los
-EE.UU.</a></strong>, y en su propio paÃs.</li>
+EE. UU.</a></strong>, y en su propio paÃs.</li>
<li>Defienda la <a
href="https://www.laquadrature.net/en/personnal-data/">privacidad</a> y
@@ -585,7 +585,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2020/02/25 10:31:12 $
+$Date: 2020/02/25 12:30:45 $
<!-- timestamp end -->
</p>
Index: po/home.es-en.html
===================================================================
RCS file: /web/www/www/po/home.es-en.html,v
retrieving revision 1.154
retrieving revision 1.155
diff -u -b -r1.154 -r1.155
--- po/home.es-en.html 17 Feb 2020 09:33:20 -0000 1.154
+++ po/home.es-en.html 25 Feb 2020 12:30:46 -0000 1.155
@@ -1,4 +1,4 @@
-<!--#include virtual="/server/html5-header.html" -->
+<!--#include virtual="/server/header.html" -->
<!-- Parent-Version: 1.91 -->
<!--#if expr="$QUERY_STRING = /distro=([^&#]+)/"
--><!--#set var="DISTRO" value="$1"
@@ -184,45 +184,6 @@
<div id="home">
<div class="first-column">
-<div style="max-width: 40em; margin: 2.3em auto 0">
-<video width="100%" controls="controls" crossorigin="anonymous"
-poster="https://static.fsf.org/nosvn/videos/fsf-shoetool/thumbnails/ShoeTool-Cover-1.jpg">
-
-<source
-src="https://static.fsf.org/nosvn/videos/fsf-shoetool/fsf-shoetool-720p.webm"
-type="video/webm" />
-<source
-src="https://static.fsf.org/nosvn/videos/fsf-shoetool/fsf-shoetool-720p.ogv"
-type="video/ogg" />
-<source
-src="https://static.fsf.org/nosvn/videos/fsf-shoetool/fsf-shoetool-720p.mp4"
-type="video/mp4" />
-
-<!-- GNUN: localize URL /server/banners/shoetoolfsf.vtt -->
-<track kind="subtitles" label="default" default="default"
-src="/server/banners/shoetoolfsf.vtt" />
-<track kind="subtitles" label="English" srclang="en"
-src="/server/banners/shoetoolfsf.en.vtt" />
-<track kind="subtitles" label="español" srclang="es"
-src="/server/banners/shoetoolfsf.es.vtt" />
-<track kind="subtitles" label="euskara" srclang="eu"
-src="https://static.fsf.org/nosvn/videos/fsf-shoetool/captions/shoetoolfsf_eu.vtt"
/>
-<track kind="subtitles" label="français" srclang="fr"
-src="/server/banners/shoetoolfsf.fr.vtt" />
-<track kind="subtitles" label="Nederlands" srclang="nl"
-src="/server/banners/shoetoolfsf.nl.vtt" />
-<track kind="subtitles" label="românÄ" srclang="ro"
-src="https://static.fsf.org/nosvn/videos/fsf-shoetool/captions/shoetoolfsf_ro.vtt"
/>
-<track kind="subtitles" label="தமிழà¯" srclang="ta"
-src="https://static.fsf.org/nosvn/videos/fsf-shoetool/captions/shoetoolfsf_ta.vtt"
/>
-<track kind="subtitles" label="ÑкÑаÑнÑÑка" srclang="uk"
-src="/server/banners/shoetoolfsf.uk.vtt" />
-</video>
-</div>
-<p class="c">
-<a
href="https://www.fsf.org/blogs/community/presenting-shoetool-happy-holidays-from-the-fsf">
-ShoeTool — HAPPY HOLIDAYS FROM THE FSF!</a></p>
-
<h2 class="first">What is GNU?</h2>
<p>GNU is an operating system that
@@ -473,6 +434,7 @@
<ul>
<li><span class="gnun-split"></span>
<a href="/software/cfengine/">cfengine</a>,
+ <a href="/software/freedink/">freedink</a>,
<a href="/software/freetalk/">freetalk</a>,
<a href="/software/halifax/">halifax</a>,
<a href="/software/mcron/">mcron</a>,
@@ -578,7 +540,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/02/17 09:33:20 $
+$Date: 2020/02/25 12:30:46 $
<!-- timestamp end -->
</p>
</div>
Index: po/home.es.po
===================================================================
RCS file: /web/www/www/po/home.es.po,v
retrieving revision 1.522
retrieving revision 1.523
diff -u -b -r1.522 -r1.523
--- po/home.es.po 25 Feb 2020 12:22:36 -0000 1.522
+++ po/home.es.po 25 Feb 2020 12:30:47 -0000 1.523
@@ -240,8 +240,8 @@
#. type: Attribute 'alt' of: <div><div><table><tr><td><a><img>
msgid " [Screenshot of Parabola 2020 with LXDE desktop] "
msgstr ""
-" [Captura de pantalla de Parabola 2020 con el escritorio "
-"LXDE] "
+" [Captura de pantalla de Parabola 2020 con el escritorio LXDE]"
+" "
#. type: Content of: <div><div><table><tr><td><a>
msgid "<a href=\"/home.html?distro=pureos#gnu-linux\">"
Index: proprietary/malware-appliances.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-appliances.es.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary/malware-appliances.es.html 19 Dec 2019 11:31:49 -0000
1.5
+++ proprietary/malware-appliances.es.html 25 Feb 2020 12:30:47 -0000
1.6
@@ -67,6 +67,20 @@
a la cámara, los altavoces y los micrófonos</a>.</p>
</li>
+ <li id="M201911190">
+ <p>El Amazon Ring, que está subordinado a un servidor, tiene una
vulnerabilidad
+que permite a los atacantes <a
+href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">acceder
+a la contraseña de la wifi del usuario</a> y espiar en la casa a través de
+los dispositivos de vigilancia conectados a la red.</p>
+
+ <p>Conocer la contraseña de la wifi no serÃa suficiente para llevar a
cabo
+ninguna vigilancia significativa si los dispositivos dispusieran de medidas
+de seguridad adecuadas, incluido el cifrado. Pero muchos dispositivos con
+software privativo carecen de ello. Por supuesto, también sus fabricantes
+los utilizan para espiar.</p>
+ </li>
+
<li id="M201904260">
<p>Los robots de juguete Jibo estaban conectados al servidor del
fabricante. La
empresa cerró el servidor e <a
@@ -952,7 +966,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2016, 2017, 2018, 2019 Free Software Foundation, Inc.</p>
+<p>Copyright © 2016, 2017, 2018, 2019, 2020 Free Software Foundation,
Inc.</p>
<p>Esta página está bajo licencia <a rel="license"
href="http://creativecommons.org/licenses/by/4.0/deed.es_ES">Creative
@@ -968,7 +982,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2019/12/19 11:31:49 $
+$Date: 2020/02/25 12:30:47 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-insecurity.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.es.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- proprietary/proprietary-insecurity.es.html 21 Jan 2020 12:34:48 -0000
1.11
+++ proprietary/proprietary-insecurity.es.html 25 Feb 2020 12:30:47 -0000
1.12
@@ -83,6 +83,20 @@
a la cámara, los altavoces y los micrófonos</a>.</p>
</li>
+ <li id="M201911190">
+ <p>El Amazon Ring, que está subordinado a un servidor, tiene una
vulnerabilidad
+que permite a los atacantes <a
+href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">acceder
+a la contraseña de la wifi del usuario</a> y espiar en la casa a través de
+los dispositivos de vigilancia conectados a la red.</p>
+
+ <p>Conocer la contraseña de la wifi no serÃa suficiente para llevar a
cabo
+ninguna vigilancia significativa si los dispositivos dispusieran de medidas
+de seguridad adecuadas, incluido el cifrado. Pero muchos dispositivos con
+software privativo carecen de ello. Por supuesto, también sus fabricantes
+los utilizan para espiar.</p>
+ </li>
+
<li id="M201908310">
<p>Una serie de vulnerabilidades <a
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/">halladas
@@ -765,7 +779,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2013, 2015, 2016, 2017, 2018, 2019 Free Software
+<p>Copyright © 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software
Foundation, Inc.</p>
<p>Esta página está bajo licencia <a rel="license"
@@ -781,7 +795,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2020/01/21 12:34:48 $
+$Date: 2020/02/25 12:30:47 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-surveillance.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.es.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- proprietary/proprietary-surveillance.es.html 17 Feb 2020 12:34:25
-0000 1.9
+++ proprietary/proprietary-surveillance.es.html 25 Feb 2020 12:30:47
-0000 1.10
@@ -2041,6 +2041,20 @@
</div>
<ul class="blurbs">
+ <li id="M201911190">
+ <p>El Amazon Ring, que está subordinado a un servidor, tiene una
vulnerabilidad
+que permite a los atacantes <a
+href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">acceder
+a la contraseña de la wifi del usuario</a> y espiar en la casa a través de
+los dispositivos de vigilancia conectados a la red.</p>
+
+ <p>Conocer la contraseña de la wifi no serÃa suficiente para llevar a
cabo
+ninguna vigilancia significativa si los dispositivos dispusieran de medidas
+de seguridad adecuadas, incluido el cifrado. Pero muchos dispositivos con
+software privativo carecen de ello. Por supuesto, también sus fabricantes
+los utilizan para espiar.</p>
+ </li>
+
<li id="M201907210">
<p>El «Asistente» de Google graba las conversaciones de los usuarios <a
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">incluso
@@ -2703,7 +2717,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2020/02/17 12:34:25 $
+$Date: 2020/02/25 12:30:47 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.es.html,v
retrieving revision 1.87
retrieving revision 1.88
diff -u -b -r1.87 -r1.88
--- proprietary/proprietary.es.html 17 Feb 2020 12:34:25 -0000 1.87
+++ proprietary/proprietary.es.html 25 Feb 2020 12:30:47 -0000 1.88
@@ -183,17 +183,18 @@
<h3 id="latest">Añadidos recientes</h3>
<ul class="blurbs">
- <li id="M202002020">
- <p>Muchas aplicaciones de Android engañan a los usuarios al pedirles que
-decidan qué permisos otorgar al programa, para a continuación <a
-href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/">ignorar
-sus preferencias</a>.</p>
-
- <p>Se supone que el sistema Android evita el filtrado de datos al ejecutar
las
-aplicaciones en entornos aislados, pero los desarrolladores han encontrado
-maneras de acceder a los datos por otros medios. Y no hay nada que el
-usuario pueda hacer para evitarlo, ya que tanto el sistema como las
-aplicaciones son privativas.</p>
+ <li id="M201911190">
+ <p>El Amazon Ring, que está subordinado a un servidor, tiene una
vulnerabilidad
+que permite a los atacantes <a
+href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">acceder
+a la contraseña de la wifi del usuario</a> y espiar en la casa a través de
+los dispositivos de vigilancia conectados a la red.</p>
+
+ <p>Conocer la contraseña de la wifi no serÃa suficiente para llevar a
cabo
+ninguna vigilancia significativa si los dispositivos dispusieran de medidas
+de seguridad adecuadas, incluido el cifrado. Pero muchos dispositivos con
+software privativo carecen de ello. Por supuesto, también sus fabricantes
+los utilizan para espiar.</p>
</li>
<li id="M201912220">
@@ -218,6 +219,19 @@
malicioso adicional (siendo el sistema mismo el primer software malicioso).</p>
</li>
+ <li id="M202002020">
+ <p>Muchas aplicaciones de Android engañan a los usuarios al pedirles que
+decidan qué permisos otorgar al programa, para a continuación <a
+href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/">ignorar
+sus preferencias</a>.</p>
+
+ <p>Se supone que el sistema Android evita el filtrado de datos al ejecutar
las
+aplicaciones en entornos aislados, pero los desarrolladores han encontrado
+maneras de acceder a los datos por otros medios. Y no hay nada que el
+usuario pueda hacer para evitarlo, ya que tanto el sistema como las
+aplicaciones son privativas.</p>
+ </li>
+
<li id="M201912171">
<p>Ahora la mayor parte de los coches <a
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html">registran
@@ -226,16 +240,6 @@
el ordenador del vehÃculo, que está siempre oculto y funciona con software
privativo.</p>
</li>
-
- <li id="M201912090">
- <p>Cuando se utilizan en el trabajo, los iMonstruos y los teléfonos
Android
-proporcionan a los empleadores potentes <a
-href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">capacidades
-de espionaje y sabotaje</a> en el caso de que estos instalen su propio
-software en el dispositivo. Muchos empleadores exigen hacerlo. Para el
-empleado esto no es sino otro software privativo, tan fundamentalmente
-injusto y peligroso como cualquier otro software privativo.</p>
- </li>
</ul>
</div>
@@ -315,7 +319,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2020/02/17 12:34:25 $
+$Date: 2020/02/25 12:30:47 $
<!-- timestamp end -->
</p>
Index: proprietary/po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.246
retrieving revision 1.247
diff -u -b -r1.246 -r1.247
--- proprietary/po/es.po 24 Feb 2020 17:03:36 -0000 1.246
+++ proprietary/po/es.po 25 Feb 2020 12:30:47 -0000 1.247
@@ -2448,6 +2448,11 @@
"the user's wifi password</a>, and snoop on the household through connected "
"surveillance devices."
msgstr ""
+"El Amazon Ring, que está subordinado a un servidor, tiene una vulnerabilidad
"
+"que permite a los atacantes <a href=\"https://www.commondreams.org/"
+"newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-"
+"and-password\">acceder a la contraseña de la wifi del usuario</a> y espiar "
+"en la casa a través de los dispositivos de vigilancia conectados a la red."
#. type: Content of: <div><ul><li><p>
msgid ""
@@ -2456,6 +2461,11 @@
"including encryption. But many devices with proprietary software lack this. "
"Of course, they are also used by their manufacturers for snooping."
msgstr ""
+"Conocer la contraseña de la wifi no serÃa suficiente para llevar a cabo "
+"ninguna vigilancia significativa si los dispositivos dispusieran de medidas "
+"de seguridad adecuadas, incluido el cifrado. Pero muchos dispositivos con "
+"software privativo carecen de ello. Por supuesto, también sus fabricantes "
+"los utilizan para espiar."
#. type: Content of: <div><ul><li><p>
msgid ""
Index: proprietary/po/malware-appliances.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.es-en.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary/po/malware-appliances.es-en.html 19 Dec 2019 11:31:50
-0000 1.5
+++ proprietary/po/malware-appliances.es-en.html 25 Feb 2020 12:30:47
-0000 1.6
@@ -59,6 +59,20 @@
its camera, speakers and microphones</a>.</p>
</li>
+ <li id="M201911190">
+ <p>Internet-tethered Amazon Ring had
+ a security vulnerability that enabled attackers to <a
+
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
+ access the user's wifi password</a>, and snoop on the household
+ through connected surveillance devices.</p>
+
+ <p>Knowledge of the wifi password would not be sufficient to carry
+ out any significant surveillance if the devices implemented proper
+ security, including encryption. But many devices with proprietary
+ software lack this. Of course, they are also used by their
+ manufacturers for snooping.</p>
+ </li>
+
<li id="M201904260">
<p>The Jibo robot toys were tethered to the manufacturer's server,
and <a href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648">
@@ -930,7 +944,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2016, 2017, 2018, 2019 Free Software Foundation, Inc.</p>
+<p>Copyright © 2016, 2017, 2018, 2019, 2020 Free Software Foundation,
Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by/4.0/">Creative
@@ -940,7 +954,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/12/19 11:31:50 $
+$Date: 2020/02/25 12:30:47 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-insecurity.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.es-en.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- proprietary/po/proprietary-insecurity.es-en.html 19 Dec 2019 11:31:50
-0000 1.9
+++ proprietary/po/proprietary-insecurity.es-en.html 25 Feb 2020 12:30:47
-0000 1.10
@@ -73,6 +73,20 @@
its camera, speakers and microphones</a>.</p>
</li>
+ <li id="M201911190">
+ <p>Internet-tethered Amazon Ring had
+ a security vulnerability that enabled attackers to <a
+
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
+ access the user's wifi password</a>, and snoop on the household
+ through connected surveillance devices.</p>
+
+ <p>Knowledge of the wifi password would not be sufficient to carry
+ out any significant surveillance if the devices implemented proper
+ security, including encryption. But many devices with proprietary
+ software lack this. Of course, they are also used by their
+ manufacturers for snooping.</p>
+ </li>
+
<li id="M201908310">
<p>A series of vulnerabilities <a
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/">found
@@ -726,7 +740,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2013, 2015, 2016, 2017, 2018, 2019 Free Software
Foundation, Inc.</p>
+<p>Copyright © 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software
Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by/4.0/">Creative
@@ -736,7 +750,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/12/19 11:31:50 $
+$Date: 2020/02/25 12:30:47 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es-en.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary/po/proprietary-surveillance.es-en.html 23 Feb 2020 11:03:35
-0000 1.8
+++ proprietary/po/proprietary-surveillance.es-en.html 25 Feb 2020 12:30:47
-0000 1.9
@@ -1964,6 +1964,20 @@
</div>
<ul class="blurbs">
+ <li id="M201911190">
+ <p>Internet-tethered Amazon Ring had
+ a security vulnerability that enabled attackers to <a
+
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
+ access the user's wifi password</a>, and snoop on the household
+ through connected surveillance devices.</p>
+
+ <p>Knowledge of the wifi password would not be sufficient to carry
+ out any significant surveillance if the devices implemented proper
+ security, including encryption. But many devices with proprietary
+ software lack this. Of course, they are also used by their
+ manufacturers for snooping.</p>
+ </li>
+
<li id="M201907210">
<p>Google “Assistant” records users' conversations <a
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
@@ -2583,7 +2597,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/02/23 11:03:35 $
+$Date: 2020/02/25 12:30:47 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary/po/proprietary-surveillance.es.po 25 Feb 2020 12:21:35
-0000 1.30
+++ proprietary/po/proprietary-surveillance.es.po 25 Feb 2020 12:30:47
-0000 1.31
@@ -2222,8 +2222,8 @@
#. type: Content of: <div><ul><li><p>
msgid ""
"<small>(Note that this article misuses the words “<a href=\"/"
-"philosophy/free-sw.html\">free software</a>” referring to zero "
-"price.)</small>"
+"philosophy/free-sw.html\">free software</a>” referring to zero price.)"
+"</small>"
msgstr ""
"<small>(Advierta que este artÃculo emplea mal las palabras “<a
href=\"/"
"philosophy/free-sw.html\">software libre</a>” para referirse a "
Index: proprietary/po/proprietary.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es-en.html,v
retrieving revision 1.80
retrieving revision 1.81
diff -u -b -r1.80 -r1.81
--- proprietary/po/proprietary.es-en.html 17 Feb 2020 12:34:25 -0000
1.80
+++ proprietary/po/proprietary.es-en.html 25 Feb 2020 12:30:47 -0000
1.81
@@ -173,16 +173,18 @@
<h3 id="latest">Latest additions</h3>
<ul class="blurbs">
- <li id="M202002020">
- <p>Many Android apps fool their users by asking
- them to decide what permissions to give the program, and then <a
-
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/">
- bypassing these permissions</a>.</p>
-
- <p>The Android system is supposed to prevent data leaks by running apps
- in isolated sandboxes, but developers have found ways to access the
- data by other means, and there is nothing the user can do to stop
- them from doing so, since both the system and the apps are nonfree.</p>
+ <li id="M201911190">
+ <p>Internet-tethered Amazon Ring had
+ a security vulnerability that enabled attackers to <a
+
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
+ access the user's wifi password</a>, and snoop on the household
+ through connected surveillance devices.</p>
+
+ <p>Knowledge of the wifi password would not be sufficient to carry
+ out any significant surveillance if the devices implemented proper
+ security, including encryption. But many devices with proprietary
+ software lack this. Of course, they are also used by their
+ manufacturers for snooping.</p>
</li>
<li id="M201912220">
@@ -207,6 +209,18 @@
additional malware (the system itself being the original malware).</p>
</li>
+ <li id="M202002020">
+ <p>Many Android apps fool their users by asking
+ them to decide what permissions to give the program, and then <a
+
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/">
+ bypassing these permissions</a>.</p>
+
+ <p>The Android system is supposed to prevent data leaks by running apps
+ in isolated sandboxes, but developers have found ways to access the
+ data by other means, and there is nothing the user can do to stop
+ them from doing so, since both the system and the apps are nonfree.</p>
+ </li>
+
<li id="M201912171">
<p>Most modern cars now <a
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html">
@@ -215,16 +229,6 @@
cracking the car's computer, which is always hidden and running with
proprietary software.</p>
</li>
-
- <li id="M201912090">
- <p>iMonsters and Android phones,
- when used for work, give employers powerful <a
-
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">
- snooping and sabotage capabilities</a> if they install their own
- software on the device. Many employers demand to do this. For the
- employee, this is simply nonfree software, as fundamentally unjust
- and as dangerous as any other nonfree software.</p>
- </li>
</ul>
</div>
@@ -286,7 +290,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/02/17 12:34:25 $
+$Date: 2020/02/25 12:30:47 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.257
retrieving revision 1.258
diff -u -b -r1.257 -r1.258
--- proprietary/po/proprietary.es.po 25 Feb 2020 12:21:35 -0000 1.257
+++ proprietary/po/proprietary.es.po 25 Feb 2020 12:30:47 -0000 1.258
@@ -16,7 +16,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2020-02-24 16:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.2.1\n"
Index: software/software.es.html
===================================================================
RCS file: /web/www/www/software/software.es.html,v
retrieving revision 1.85
retrieving revision 1.86
diff -u -b -r1.85 -r1.86
--- software/software.es.html 24 Nov 2019 12:02:34 -0000 1.85
+++ software/software.es.html 25 Feb 2020 12:30:48 -0000 1.86
@@ -343,7 +343,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2015, 2016, 2018, 2019 Free Software Foundation, Inc.</p>
+<p>Copyright © 2015, 2016, 2018, 2019, 2020 Free Software Foundation,
Inc.</p>
<p>Esta página está bajo licencia <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/deed.es_ES">Creative
@@ -359,7 +359,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2019/11/24 12:02:34 $
+$Date: 2020/02/25 12:30:48 $
<!-- timestamp end -->
</p>
Index: software/po/software.es-en.html
===================================================================
RCS file: /web/www/www/software/po/software.es-en.html,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- software/po/software.es-en.html 24 Nov 2019 12:02:35 -0000 1.55
+++ software/po/software.es-en.html 25 Feb 2020 12:30:48 -0000 1.56
@@ -365,7 +365,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2015, 2016, 2018, 2019 Free Software Foundation, Inc.</p>
+<p>Copyright © 2015, 2016, 2018, 2019, 2020 Free Software Foundation,
Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -375,7 +375,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/11/24 12:02:35 $
+$Date: 2020/02/25 12:30:48 $
<!-- timestamp end -->
</p>
</div>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www home.es.html po/home.es-en.html po/home.es....,
GNUN <=