www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www philosophy/words-to-avoid.es.html philosoph...


From: GNUN
Subject: www philosophy/words-to-avoid.es.html philosoph...
Date: Wed, 25 Nov 2020 06:29:42 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     20/11/25 06:29:42

Modified files:
        philosophy     : words-to-avoid.es.html 
        philosophy/po  : words-to-avoid.es-en.html 
        proprietary    : malware-in-online-conferencing.es.html 
                         malware-microsoft.es.html 
                         proprietary-back-doors.es.html 
                         proprietary.es.html 
        proprietary/po : es.po malware-in-online-conferencing.es-en.html 
                         malware-microsoft.es-en.html 
                         malware-microsoft.es.po 
                         proprietary-back-doors.es-en.html 
                         proprietary.es-en.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/words-to-avoid.es.html?cvsroot=www&r1=1.154&r2=1.155
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/words-to-avoid.es-en.html?cvsroot=www&r1=1.98&r2=1.99
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-in-online-conferencing.es.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.es.html?cvsroot=www&r1=1.84&r2=1.85
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.es.html?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.es.html?cvsroot=www&r1=1.121&r2=1.122
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.340&r2=1.341
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-in-online-conferencing.es-en.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.es-en.html?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.es.po?cvsroot=www&r1=1.191&r2=1.192
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.es-en.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es-en.html?cvsroot=www&r1=1.113&r2=1.114

Patches:
Index: philosophy/words-to-avoid.es.html
===================================================================
RCS file: /web/www/www/philosophy/words-to-avoid.es.html,v
retrieving revision 1.154
retrieving revision 1.155
diff -u -b -r1.154 -r1.155
--- philosophy/words-to-avoid.es.html   15 Nov 2020 10:59:52 -0000      1.154
+++ philosophy/words-to-avoid.es.html   25 Nov 2020 11:29:40 -0000      1.155
@@ -865,7 +865,7 @@
 La experiencia demuestra que estos productos a menudo <a
 
href="http://www.locusmag.com/Perspectives/2015/09/cory-doctorow-what-if-people-were-sensors-not-things-to-be-sensed/";>espían
 a los usuarios</a>.  Están también diseñados para <a
-href="http://ieet.org/index.php/IEET/more/rinesi20150806";>dar a la gente
+href="https://archive.ieet.org/articles/rinesi20150806.html";>dar a la gente
 consejos sesgados</a>. Además, el fabricante puede <a
 href="/proprietary/proprietary-sabotage.html"> sabotear el producto</a>
 desconectando el servidor del que depende.</p>
@@ -1445,7 +1445,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/11/15 10:59:52 $
+$Date: 2020/11/25 11:29:40 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/po/words-to-avoid.es-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/words-to-avoid.es-en.html,v
retrieving revision 1.98
retrieving revision 1.99
diff -u -b -r1.98 -r1.99
--- philosophy/po/words-to-avoid.es-en.html     15 Nov 2020 10:59:54 -0000      
1.98
+++ philosophy/po/words-to-avoid.es-en.html     25 Nov 2020 11:29:41 -0000      
1.99
@@ -871,7 +871,7 @@
 <a
 
href="http://www.locusmag.com/Perspectives/2015/09/cory-doctorow-what-if-people-were-sensors-not-things-to-be-sensed/";>
 spy on their users</a>.  They are also tailor-made for 
-<a href="http://ieet.org/index.php/IEET/more/rinesi20150806";>giving
+<a href="https://archive.ieet.org/articles/rinesi20150806.html";>giving
 people biased advice</a>.  In addition, the manufacturer can <a
 href="/proprietary/proprietary-sabotage.html"> sabotage the
 product</a> by turning off the server it depends on.</p>
@@ -1418,7 +1418,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/11/15 10:59:54 $
+$Date: 2020/11/25 11:29:41 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/malware-in-online-conferencing.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-in-online-conferencing.es.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- proprietary/malware-in-online-conferencing.es.html  21 Nov 2020 12:29:50 
-0000      1.3
+++ proprietary/malware-in-online-conferencing.es.html  25 Nov 2020 11:29:41 
-0000      1.4
@@ -72,6 +72,19 @@
 <div class="column-limit" id="malware-in-online-conferencing"></div>
 
 <ul class="blurbs">
+  <li id="M202011090">
+    <p>Según la Comisión Federal de Comercio (<abbr lang="en" title="Federal 
Trade
+Commission">FTC</abbr>), la compañía que gestiona el software de
+videoconferencia Zoom <a
+href="https://arstechnica.com/tech-policy/2020/11/zoom-lied-to-users-about-end-to-end-encryption-for-years-ftc-says/";>ha
+engañado a los usuarios acerca de su cifrado de extremo a extremo</a>
+durante años, al menos desde 2016.</p>
+
+    <p>En su lugar se pueden utilizar programas libres tales como <a
+href="https://directory.fsf.org/wiki/Jitsi";>Jitsi</a> o BigBlueButton, y
+mejor aún si se instalan en un servidor controlado por los propios 
usuarios.</p>
+  </li>
+
   <li id="M202009270">
     <p>Muchos empresarios están utilizando software privativo, incluido 
software de
 videoconferencia, para <a
@@ -173,7 +186,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/11/21 12:29:50 $
+$Date: 2020/11/25 11:29:41 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/malware-microsoft.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.es.html,v
retrieving revision 1.84
retrieving revision 1.85
diff -u -b -r1.84 -r1.85
--- proprietary/malware-microsoft.es.html       17 Nov 2020 10:00:04 -0000      
1.84
+++ proprietary/malware-microsoft.es.html       25 Nov 2020 11:29:41 -0000      
1.85
@@ -97,8 +97,8 @@
 puede imponer a los usuarios todo tipo de modificaciones</a>.</p>
 
     <p>De esto <a
-href="http://slated.org/windows_by_stealth_the_updates_you_dont_want";> se
-informó en 2007</a> con respecto a XP y Vista, y parece que Microsoft
+href="https://web.archive.org/web/20200219180230/http://slated.org/windows_by_stealth_the_updates_you_dont_want";>
+se informó en 2007</a> con respecto a XP y Vista, y parece que Microsoft
 utilizó el mismo método para forzar la <a
 href="/proprietary/malware-microsoft.html#windows10-forcing"> actualización
 a Windows 10</a> de ordenadores que funcionaban con Windows 7 y 8.</p>
@@ -782,7 +782,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/11/17 10:00:04 $
+$Date: 2020/11/25 11:29:41 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-back-doors.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.es.html,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- proprietary/proprietary-back-doors.es.html  23 Nov 2020 14:35:43 -0000      
1.26
+++ proprietary/proprietary-back-doors.es.html  25 Nov 2020 11:29:41 -0000      
1.27
@@ -551,11 +551,11 @@
 puede imponer a los usuarios todo tipo de modificaciones</a>.</p>
 
     <p>De esto <a
-href="http://slated.org/windows_by_stealth_the_updates_you_dont_want";> se
-informó en 2007</a> con respecto a XP y Vista, y parece que Microsoft
+href="https://web.archive.org/web/20200219180230/http://slated.org/windows_by_stealth_the_updates_you_dont_want";>
+se informó en 2007</a> con respecto a XP y Vista, y parece que Microsoft
 utilizó el mismo método para forzar la <a
 href="/proprietary/malware-microsoft.html#windows10-forcing"> actualización
-regresiva a Windows 10</a> en ordenadores que funcionaban con Windows 7 y 
8.</p>
+a Windows 10</a> de ordenadores que funcionaban con Windows 7 y 8.</p>
 
     <p>En Windows 10, la puerta trasera universal ya no está oculta: todas las
 «actualizaciones» <a
@@ -768,7 +768,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/11/23 14:35:43 $
+$Date: 2020/11/25 11:29:41 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.es.html,v
retrieving revision 1.121
retrieving revision 1.122
diff -u -b -r1.121 -r1.122
--- proprietary/proprietary.es.html     21 Nov 2020 12:59:52 -0000      1.121
+++ proprietary/proprietary.es.html     25 Nov 2020 11:29:41 -0000      1.122
@@ -185,6 +185,19 @@
 <h3 id="latest">Añadidos recientes</h3>
 
 <ul class="blurbs">
+  <li id="M202011090">
+    <p>Según la Comisión Federal de Comercio (<abbr lang="en" title="Federal 
Trade
+Commission">FTC</abbr>), la compañía que gestiona el software de
+videoconferencia Zoom <a
+href="https://arstechnica.com/tech-policy/2020/11/zoom-lied-to-users-about-end-to-end-encryption-for-years-ftc-says/";>ha
+engañado a los usuarios acerca de su cifrado de extremo a extremo</a>
+durante años, al menos desde 2016.</p>
+
+    <p>En su lugar se pueden utilizar programas libres tales como <a
+href="https://directory.fsf.org/wiki/Jitsi";>Jitsi</a> o BigBlueButton, y
+mejor aún si se instalan en un servidor controlado por los propios 
usuarios.</p>
+  </li>
+
   <li id="M202004150">
     <p>Riot Games’ new anti-cheat is malware; <a
 
href="https://www.extremetech.com/gaming/309320-riot-games-new-anti-cheat-system-runs-at-system-boot-uses-kernel-driver";>runs
@@ -219,19 +232,6 @@
 software que no es libre, Microsoft rastrea sus vidas fuera del ordenador y
 viola su privacidad.</p>
   </li>
-
-  <li id="M202006120">
-    <p>La empresa que está tras Zoom no solo niega la libertad informática 
de los
-usuarios al desarrollar este software privativo, también vulnera los
-derechos civiles de los mismos al <a
-href="https://www.theverge.com/2020/6/12/21288995/zoom-blocking-feature-chinese-government-censorship";>prohibir
-eventos y censurar a los usuarios</a> siguiendo indicaciones de gobiernos.</p>
-
-    <p>En su lugar se pueden utilizar programas respetuosos con la libertad 
tales
-como <a href="https://directory.fsf.org/wiki/Jitsi";>Jitsi</a> o
-BigBlueButton, y mejor aún si se instalan en un servidor controlado por los
-propios usuarios.</p>
-  </li>
 </ul>
 
 </div>
@@ -314,7 +314,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2020/11/21 12:59:52 $
+$Date: 2020/11/25 11:29:41 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.340
retrieving revision 1.341
diff -u -b -r1.340 -r1.341
--- proprietary/po/es.po        24 Nov 2020 13:05:15 -0000      1.340
+++ proprietary/po/es.po        25 Nov 2020 11:29:41 -0000      1.341
@@ -6464,6 +6464,12 @@
 "to-end-encryption-for-years-ftc-says/\">has lied to users about its end-to-"
 "end encryption</a> for years, at least since 2016."
 msgstr ""
+"Según la Comisión Federal de Comercio (<abbr lang=\"en\" title=\"Federal "
+"Trade Commission\">FTC</abbr>), la compañía que gestiona el software de "
+"videoconferencia Zoom <a href=\"https://arstechnica.com/tech-policy/2020/11/";
+"zoom-lied-to-users-about-end-to-end-encryption-for-years-ftc-says/\">ha "
+"engañado a los usuarios acerca de su cifrado de extremo a extremo</a> "
+"durante años, al menos desde 2016."
 
 #. type: Content of: <div><div><ul><li><p>
 # | [-Freedom respecting-]{+People can use free (as in freedom)+} programs

Index: proprietary/po/malware-in-online-conferencing.es-en.html
===================================================================
RCS file: 
/web/www/www/proprietary/po/malware-in-online-conferencing.es-en.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- proprietary/po/malware-in-online-conferencing.es-en.html    21 Nov 2020 
12:29:50 -0000      1.3
+++ proprietary/po/malware-in-online-conferencing.es-en.html    25 Nov 2020 
11:29:42 -0000      1.4
@@ -65,6 +65,18 @@
 <div class="column-limit" id="malware-in-online-conferencing"></div>
 
 <ul class="blurbs">
+  <li id="M202011090">
+    <p>According to FTC, the
+    company behind the Zoom conferencing software <a
+    
href="https://arstechnica.com/tech-policy/2020/11/zoom-lied-to-users-about-end-to-end-encryption-for-years-ftc-says/";>has
+    lied to users about its end-to-end encryption</a> for years, at least
+    since 2016.</p>
+
+    <p>People can use free (as in freedom) programs such as <a
+    href="https://directory.fsf.org/wiki/Jitsi";>Jitsi</a> or BigBlueButton,
+    better still if installed in a server controlled by the users.</p>
+  </li>
+
   <li id="M202009270">
     <p>Many employers are using nonfree
     software, including videoconference software, to <a
@@ -157,7 +169,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/11/21 12:29:50 $
+$Date: 2020/11/25 11:29:42 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-microsoft.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.es-en.html,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- proprietary/po/malware-microsoft.es-en.html 17 Nov 2020 10:00:04 -0000      
1.79
+++ proprietary/po/malware-microsoft.es-en.html 25 Nov 2020 11:29:42 -0000      
1.80
@@ -88,7 +88,7 @@
     any change whatsoever can be imposed on the users</a>.</p>
 
     <p>This was <a
-    href="http://slated.org/windows_by_stealth_the_updates_you_dont_want";>
+    
href="https://web.archive.org/web/20200219180230/http://slated.org/windows_by_stealth_the_updates_you_dont_want";>
     reported in 2007</a> for XP and Vista, and it seems
     that Microsoft used the same method to push the <a
     href="/proprietary/malware-microsoft.html#windows10-forcing">
@@ -745,7 +745,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/11/17 10:00:04 $
+$Date: 2020/11/25 11:29:42 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-microsoft.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.es.po,v
retrieving revision 1.191
retrieving revision 1.192
diff -u -b -r1.191 -r1.192
--- proprietary/po/malware-microsoft.es.po      25 Nov 2020 11:11:30 -0000      
1.191
+++ proprietary/po/malware-microsoft.es.po      25 Nov 2020 11:29:42 -0000      
1.192
@@ -895,17 +895,17 @@
 "windows-diagnostic-data-in-your-organization#full-level\"> &ldquo;"
 "Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers to access, "
 "among other things, registry keys <a href=\"https://docs.microsoft.com/en-us/";
-"previous-versions/windows/it-pro/windows-2000-server/"
-"cc939702(v=technet.10)\"> which can contain sensitive information like "
+"previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\"> which can contain sensitive information like "
 "administrator's login password</a>."
 msgstr ""
 "El <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-";
 "windows-diagnostic-data-in-your-organization#full-level\">nivel de "
 "telemetría «Completo»</a> permite a los ingenieros de Microsoft acceder, "
 "entre otras cosas, a claves de registro <a href=\"https://docs.microsoft.com/";
-"en-us/previous-versions/windows/it-pro/windows-2000-server/"
-"cc939702(v=technet.10)\">que contienen información sensible, como la "
-"contraseña de inicio de sesión del administrador</a>."
+"en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\">que contienen información sensible, como la contraseña de "
+"inicio de sesión del administrador</a>."
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""

Index: proprietary/po/proprietary-back-doors.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.es-en.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- proprietary/po/proprietary-back-doors.es-en.html    23 Nov 2020 14:35:46 
-0000      1.24
+++ proprietary/po/proprietary-back-doors.es-en.html    25 Nov 2020 11:29:42 
-0000      1.25
@@ -542,7 +542,7 @@
     any change whatsoever can be imposed on the users</a>.</p>
 
     <p>This was <a
-    href="http://slated.org/windows_by_stealth_the_updates_you_dont_want";>
+    
href="https://web.archive.org/web/20200219180230/http://slated.org/windows_by_stealth_the_updates_you_dont_want";>
     reported in 2007</a> for XP and Vista, and it seems
     that Microsoft used the same method to push the <a
     href="/proprietary/malware-microsoft.html#windows10-forcing">
@@ -738,7 +738,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/11/23 14:35:46 $
+$Date: 2020/11/25 11:29:42 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es-en.html,v
retrieving revision 1.113
retrieving revision 1.114
diff -u -b -r1.113 -r1.114
--- proprietary/po/proprietary.es-en.html       21 Nov 2020 12:59:52 -0000      
1.113
+++ proprietary/po/proprietary.es-en.html       25 Nov 2020 11:29:42 -0000      
1.114
@@ -174,6 +174,18 @@
 <h3 id="latest">Latest additions</h3>
 
 <ul class="blurbs">
+  <li id="M202011090">
+    <p>According to FTC, the
+    company behind the Zoom conferencing software <a
+    
href="https://arstechnica.com/tech-policy/2020/11/zoom-lied-to-users-about-end-to-end-encryption-for-years-ftc-says/";>has
+    lied to users about its end-to-end encryption</a> for years, at least
+    since 2016.</p>
+
+    <p>People can use free (as in freedom) programs such as <a
+    href="https://directory.fsf.org/wiki/Jitsi";>Jitsi</a> or BigBlueButton,
+    better still if installed in a server controlled by the users.</p>
+  </li>
+
   <li id="M202004150">
     <p>Riot Games’ new anti-cheat is malware; <a
     
href="https://www.extremetech.com/gaming/309320-riot-games-new-anti-cheat-system-runs-at-system-boot-uses-kernel-driver";>runs
@@ -208,19 +220,6 @@
     nonfree software, Microsoft is tracking their lives outside the computer 
and
     violates their privacy.</p>
   </li>
-
-  <li id="M202006120">
-    <p>The company behind Zoom does not only deny
-    users' computer freedom by developing this piece
-    of nonfree software, it also violates users' civil rights by <a
-    
href="https://www.theverge.com/2020/6/12/21288995/zoom-blocking-feature-chinese-government-censorship";>banning
-    events and censoring users</a> to serve the agenda of governments.</p>
-
-    <p>Freedom respecting programs such as <a
-    href="https://directory.fsf.org/wiki/Jitsi";>Jitsi</a> or BigBlueButton
-    can be used instead, better still if installed in a server controlled
-    by its users.</p>
-  </li>
 </ul>
 
 </div>
@@ -283,7 +282,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/11/21 12:59:52 $
+$Date: 2020/11/25 11:29:42 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]