www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary proprietary-interference.es.htm...


From: GNUN
Subject: www/proprietary proprietary-interference.es.htm...
Date: Fri, 29 May 2020 05:31:02 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     20/05/29 05:31:02

Modified files:
        proprietary    : proprietary-interference.es.html 
                         proprietary.es.html 
        proprietary/po : es.po proprietary-interference.es-en.html 
                         proprietary-interference.es.po 
                         proprietary.es-en.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-interference.es.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.es.html?cvsroot=www&r1=1.92&r2=1.93
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.259&r2=1.260
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.es-en.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.es.po?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es-en.html?cvsroot=www&r1=1.85&r2=1.86

Patches:
Index: proprietary-interference.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-interference.es.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary-interference.es.html    27 Dec 2019 12:32:03 -0000      1.6
+++ proprietary-interference.es.html    29 May 2020 09:31:01 -0000      1.7
@@ -13,7 +13,7 @@
 -->
 
 <!-- This file is automatically generated by GNUnited Nations! -->
-<title>Proprietary Interference - GNU Project - Free Software 
Foundation</title>
+<title>Proprietary Interference - Proyecto GNU - Free Software 
Foundation</title>
 <link rel="stylesheet" type="text/css" href="/proprietary/proprietary.css" 
media="screen,print" />
 
 <!--#include virtual="/proprietary/po/proprietary-interference.translist" -->
@@ -69,6 +69,19 @@
 <div class="column-limit" id="proprietary-interference"></div>
 
 <ul class="blurbs">
+  <li id="M202005250">
+    <p>Los coches Testa tienen una <a
+href="/proprietary/proprietary-back-doors.html#M201709090.1">puerta trasera
+universal remota</a>. Tesla la ha utilizado para <a
+href="https://www.theverge.com/2020/2/6/21127243/tesla-model-s-autopilot-disabled-remotely-used-car-update";>desactivar
+funciones del piloto automático</a> en los coches y así hacer que sus
+propietarios tuvieran que desembolsar más dinero para reactivarlas.</p>
+
+    <p>Esta clase de funcionalidades maliciosas solo es posible en el software
+privativo. En el software libre son los usuarios quienes tienen el control,
+y no permitirían que les hicieran tales cosas.</p>
+  </li>
+
   <li id="M201912170">
     <p>Algunos delincuentes informáticos (a los que equivocadamente se 
refieren en
 este artículo como <a
@@ -321,7 +334,8 @@
 
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright &copy; 2015, 2016, 2017, 2018, 2019 Free Software Foundation, 
Inc.</p>
+<p>Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Free Software
+Foundation, Inc.</p>
 
 <p>Esta página está bajo licencia <a rel="license"
 href="http://creativecommons.org/licenses/by/4.0/deed.es_ES";>Creative
@@ -336,7 +350,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2019/12/27 12:32:03 $
+$Date: 2020/05/29 09:31:01 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.es.html,v
retrieving revision 1.92
retrieving revision 1.93
diff -u -b -r1.92 -r1.93
--- proprietary.es.html 3 May 2020 11:01:00 -0000       1.92
+++ proprietary.es.html 29 May 2020 09:31:01 -0000      1.93
@@ -183,6 +183,19 @@
 <h3 id="latest">Añadidos recientes</h3>
 
 <ul class="blurbs">
+  <li id="M202005250">
+    <p>Los coches Testa tienen una <a
+href="/proprietary/proprietary-back-doors.html#M201709090.1">puerta trasera
+universal remota</a>. Tesla la ha utilizado para <a
+href="https://www.theverge.com/2020/2/6/21127243/tesla-model-s-autopilot-disabled-remotely-used-car-update";>desactivar
+funciones del piloto automático</a> en los coches y así hacer que sus
+propietarios tuvieran que desembolsar más dinero para reactivarlas.</p>
+
+    <p>Esta clase de funcionalidades maliciosas solo es posible en el software
+privativo. En el software libre son los usuarios quienes tienen el control,
+y no permitirían que les hicieran tales cosas.</p>
+  </li>
+
   <li id="M202004300">
     <p>Los teléfonos Xiaomi <a
 
href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/";>registran
@@ -227,20 +240,6 @@
 
href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html";>informa
 a la policía directamente</a>.</p>
   </li>
-
-  <li id="M201911190">
-    <p>El Amazon Ring, que está subordinado a un servidor, tiene una 
vulnerabilidad
-que permite a los atacantes <a
-href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password";>acceder
-a la contraseña de la wifi del usuario</a> y espiar en la casa a través de
-los dispositivos de vigilancia conectados a la red.</p>
-
-    <p>Conocer la contraseña de la wifi no sería suficiente para llevar a 
cabo
-ninguna vigilancia significativa si los dispositivos dispusieran de medidas
-de seguridad adecuadas, incluido el cifrado. Pero muchos dispositivos con
-software privativo carecen de ello. Por supuesto, también sus fabricantes
-los utilizan para espiar.</p>
-  </li>
 </ul>
 
 </div>
@@ -320,7 +319,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/05/03 11:01:00 $
+$Date: 2020/05/29 09:31:01 $
 
 <!-- timestamp end -->
 </p>

Index: po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.259
retrieving revision 1.260
diff -u -b -r1.259 -r1.260
--- po/es.po    25 May 2020 08:33:38 -0000      1.259
+++ po/es.po    29 May 2020 09:31:01 -0000      1.260
@@ -11487,6 +11487,12 @@
 "disabled-remotely-used-car-update\"> disable the autopilot features</a> on "
 "people's cars to make them pay extra for re-enabling the features."
 msgstr ""
+"Los coches Testa tienen una <a href=\"/proprietary/proprietary-back-doors."
+"html#M201709090.1\">puerta trasera universal remota</a>. Tesla la ha "
+"utilizado para <a href=\"https://www.theverge.com/2020/2/6/21127243/tesla-";
+"model-s-autopilot-disabled-remotely-used-car-update\">desactivar funciones "
+"del piloto automático</a> en los coches y así hacer que sus propietarios "
+"tuvieran que desembolsar más dinero para reactivarlas."
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
@@ -11494,6 +11500,9 @@
 "free software is controlled by its users who wouldn't let do such things to "
 "them."
 msgstr ""
+"Esta clase de funcionalidades maliciosas solo es posible en el software "
+"privativo. En el software libre son los usuarios quienes tienen el control, "
+"y no permitirían que les hicieran tales cosas."
 
 #. type: Content of: <div><ul><li><p>
 msgid ""

Index: po/proprietary-interference.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.es-en.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- po/proprietary-interference.es-en.html      27 Dec 2019 12:32:04 -0000      
1.5
+++ po/proprietary-interference.es-en.html      29 May 2020 09:31:01 -0000      
1.6
@@ -60,6 +60,19 @@
 <div class="column-limit" id="proprietary-interference"></div>
 
 <ul class="blurbs">
+  <li id="M202005250">
+    <p>Tesla's cars have a <a
+    href="/proprietary/proprietary-back-doors.html#M201709090.1">
+    universal remote back door</a>.  Tesla used it to <a
+    
href="https://www.theverge.com/2020/2/6/21127243/tesla-model-s-autopilot-disabled-remotely-used-car-update";>
+    disable the autopilot features</a> on people's cars to make them pay
+    extra for re-enabling the features.</p>
+
+    <p>This kind of malfeature is only possible with proprietary
+    software&mdash;free software is controlled by its users who wouldn't
+    let do such things to them.</p>
+  </li>
+
   <li id="M201912170">
     <p>Some security breakers (wrongly referred in this article as <a
     
href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker";>&ldquo;hackers&rdquo;</a>)
@@ -293,7 +306,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
 
-<p>Copyright &copy; 2015, 2016, 2017, 2018, 2019 Free Software Foundation, 
Inc.</p>
+<p>Copyright &copy; 2015, 2016, 2017, 2018, 2019, 2020 Free Software 
Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
 href="http://creativecommons.org/licenses/by/4.0/";>Creative
@@ -303,7 +316,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/12/27 12:32:04 $
+$Date: 2020/05/29 09:31:01 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-interference.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.es.po,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- po/proprietary-interference.es.po   29 May 2020 09:22:07 -0000      1.17
+++ po/proprietary-interference.es.po   29 May 2020 09:31:01 -0000      1.18
@@ -231,8 +231,8 @@
 msgid ""
 "<small>(Note that the article refers to the infected software as &ldquo;"
 "content management system&rdquo;. A better term would be &ldquo;<a href=\"/"
-"philosophy/words-to-avoid.html#Content\">website revision system</"
-"a>&rdquo;.)</small>"
+"philosophy/words-to-avoid.html#Content\">website revision system</a>&rdquo;.)"
+"</small>"
 msgstr ""
 "<small>(Observe que el artículo se refiere al software infectado como "
 "«sistema de gestión de contenidos». Un término más correcto sería 
&ldquo;<a "

Index: po/proprietary.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es-en.html,v
retrieving revision 1.85
retrieving revision 1.86
diff -u -b -r1.85 -r1.86
--- po/proprietary.es-en.html   3 May 2020 11:01:00 -0000       1.85
+++ po/proprietary.es-en.html   29 May 2020 09:31:01 -0000      1.86
@@ -173,6 +173,19 @@
 <h3 id="latest">Latest additions</h3>
 
 <ul class="blurbs">
+  <li id="M202005250">
+    <p>Tesla's cars have a <a
+    href="/proprietary/proprietary-back-doors.html#M201709090.1">
+    universal remote back door</a>.  Tesla used it to <a
+    
href="https://www.theverge.com/2020/2/6/21127243/tesla-model-s-autopilot-disabled-remotely-used-car-update";>
+    disable the autopilot features</a> on people's cars to make them pay
+    extra for re-enabling the features.</p>
+
+    <p>This kind of malfeature is only possible with proprietary
+    software&mdash;free software is controlled by its users who wouldn't
+    let do such things to them.</p>
+  </li>
+
   <li id="M202004300">
     <p>Xiaomi phones <a
     
href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/";>report
@@ -216,20 +229,6 @@
     
href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html";>
     tells the cops directly</a>.</p>
   </li>
-
-  <li id="M201911190">
-    <p>Internet-tethered Amazon Ring had
-    a security vulnerability that enabled attackers to <a
-    
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password";>
-    access the user's wifi password</a>, and snoop on the household
-    through connected surveillance devices.</p>
-
-    <p>Knowledge of the wifi password would not be sufficient to carry
-    out any significant surveillance if the devices implemented proper
-    security, including encryption. But many devices with proprietary
-    software lack this. Of course, they are also used by their
-    manufacturers for snooping.</p>
-  </li>
 </ul>
 
 </div>
@@ -291,7 +290,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/05/03 11:01:00 $
+$Date: 2020/05/29 09:31:01 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]