[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www philosophy/words-to-avoid.es.html philosoph...
From: |
GNUN |
Subject: |
www philosophy/words-to-avoid.es.html philosoph... |
Date: |
Wed, 25 Nov 2020 06:29:42 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 20/11/25 06:29:42
Modified files:
philosophy : words-to-avoid.es.html
philosophy/po : words-to-avoid.es-en.html
proprietary : malware-in-online-conferencing.es.html
malware-microsoft.es.html
proprietary-back-doors.es.html
proprietary.es.html
proprietary/po : es.po malware-in-online-conferencing.es-en.html
malware-microsoft.es-en.html
malware-microsoft.es.po
proprietary-back-doors.es-en.html
proprietary.es-en.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/words-to-avoid.es.html?cvsroot=www&r1=1.154&r2=1.155
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/words-to-avoid.es-en.html?cvsroot=www&r1=1.98&r2=1.99
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-in-online-conferencing.es.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.es.html?cvsroot=www&r1=1.84&r2=1.85
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.es.html?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.es.html?cvsroot=www&r1=1.121&r2=1.122
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.340&r2=1.341
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-in-online-conferencing.es-en.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.es-en.html?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.es.po?cvsroot=www&r1=1.191&r2=1.192
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.es-en.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es-en.html?cvsroot=www&r1=1.113&r2=1.114
Patches:
Index: philosophy/words-to-avoid.es.html
===================================================================
RCS file: /web/www/www/philosophy/words-to-avoid.es.html,v
retrieving revision 1.154
retrieving revision 1.155
diff -u -b -r1.154 -r1.155
--- philosophy/words-to-avoid.es.html 15 Nov 2020 10:59:52 -0000 1.154
+++ philosophy/words-to-avoid.es.html 25 Nov 2020 11:29:40 -0000 1.155
@@ -865,7 +865,7 @@
La experiencia demuestra que estos productos a menudo <a
href="http://www.locusmag.com/Perspectives/2015/09/cory-doctorow-what-if-people-were-sensors-not-things-to-be-sensed/">espÃan
a los usuarios</a>. Están también diseñados para <a
-href="http://ieet.org/index.php/IEET/more/rinesi20150806">dar a la gente
+href="https://archive.ieet.org/articles/rinesi20150806.html">dar a la gente
consejos sesgados</a>. Además, el fabricante puede <a
href="/proprietary/proprietary-sabotage.html"> sabotear el producto</a>
desconectando el servidor del que depende.</p>
@@ -1445,7 +1445,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2020/11/15 10:59:52 $
+$Date: 2020/11/25 11:29:40 $
<!-- timestamp end -->
</p>
Index: philosophy/po/words-to-avoid.es-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/words-to-avoid.es-en.html,v
retrieving revision 1.98
retrieving revision 1.99
diff -u -b -r1.98 -r1.99
--- philosophy/po/words-to-avoid.es-en.html 15 Nov 2020 10:59:54 -0000
1.98
+++ philosophy/po/words-to-avoid.es-en.html 25 Nov 2020 11:29:41 -0000
1.99
@@ -871,7 +871,7 @@
<a
href="http://www.locusmag.com/Perspectives/2015/09/cory-doctorow-what-if-people-were-sensors-not-things-to-be-sensed/">
spy on their users</a>. They are also tailor-made for
-<a href="http://ieet.org/index.php/IEET/more/rinesi20150806">giving
+<a href="https://archive.ieet.org/articles/rinesi20150806.html">giving
people biased advice</a>. In addition, the manufacturer can <a
href="/proprietary/proprietary-sabotage.html"> sabotage the
product</a> by turning off the server it depends on.</p>
@@ -1418,7 +1418,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/15 10:59:54 $
+$Date: 2020/11/25 11:29:41 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/malware-in-online-conferencing.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-in-online-conferencing.es.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- proprietary/malware-in-online-conferencing.es.html 21 Nov 2020 12:29:50
-0000 1.3
+++ proprietary/malware-in-online-conferencing.es.html 25 Nov 2020 11:29:41
-0000 1.4
@@ -72,6 +72,19 @@
<div class="column-limit" id="malware-in-online-conferencing"></div>
<ul class="blurbs">
+ <li id="M202011090">
+ <p>Según la Comisión Federal de Comercio (<abbr lang="en" title="Federal
Trade
+Commission">FTC</abbr>), la compañÃa que gestiona el software de
+videoconferencia Zoom <a
+href="https://arstechnica.com/tech-policy/2020/11/zoom-lied-to-users-about-end-to-end-encryption-for-years-ftc-says/">ha
+engañado a los usuarios acerca de su cifrado de extremo a extremo</a>
+durante años, al menos desde 2016.</p>
+
+ <p>En su lugar se pueden utilizar programas libres tales como <a
+href="https://directory.fsf.org/wiki/Jitsi">Jitsi</a> o BigBlueButton, y
+mejor aún si se instalan en un servidor controlado por los propios
usuarios.</p>
+ </li>
+
<li id="M202009270">
<p>Muchos empresarios están utilizando software privativo, incluido
software de
videoconferencia, para <a
@@ -173,7 +186,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2020/11/21 12:29:50 $
+$Date: 2020/11/25 11:29:41 $
<!-- timestamp end -->
</p>
Index: proprietary/malware-microsoft.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.es.html,v
retrieving revision 1.84
retrieving revision 1.85
diff -u -b -r1.84 -r1.85
--- proprietary/malware-microsoft.es.html 17 Nov 2020 10:00:04 -0000
1.84
+++ proprietary/malware-microsoft.es.html 25 Nov 2020 11:29:41 -0000
1.85
@@ -97,8 +97,8 @@
puede imponer a los usuarios todo tipo de modificaciones</a>.</p>
<p>De esto <a
-href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"> se
-informó en 2007</a> con respecto a XP y Vista, y parece que Microsoft
+href="https://web.archive.org/web/20200219180230/http://slated.org/windows_by_stealth_the_updates_you_dont_want">
+se informó en 2007</a> con respecto a XP y Vista, y parece que Microsoft
utilizó el mismo método para forzar la <a
href="/proprietary/malware-microsoft.html#windows10-forcing"> actualización
a Windows 10</a> de ordenadores que funcionaban con Windows 7 y 8.</p>
@@ -782,7 +782,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2020/11/17 10:00:04 $
+$Date: 2020/11/25 11:29:41 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-back-doors.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.es.html,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- proprietary/proprietary-back-doors.es.html 23 Nov 2020 14:35:43 -0000
1.26
+++ proprietary/proprietary-back-doors.es.html 25 Nov 2020 11:29:41 -0000
1.27
@@ -551,11 +551,11 @@
puede imponer a los usuarios todo tipo de modificaciones</a>.</p>
<p>De esto <a
-href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"> se
-informó en 2007</a> con respecto a XP y Vista, y parece que Microsoft
+href="https://web.archive.org/web/20200219180230/http://slated.org/windows_by_stealth_the_updates_you_dont_want">
+se informó en 2007</a> con respecto a XP y Vista, y parece que Microsoft
utilizó el mismo método para forzar la <a
href="/proprietary/malware-microsoft.html#windows10-forcing"> actualización
-regresiva a Windows 10</a> en ordenadores que funcionaban con Windows 7 y
8.</p>
+a Windows 10</a> de ordenadores que funcionaban con Windows 7 y 8.</p>
<p>En Windows 10, la puerta trasera universal ya no está oculta: todas las
«actualizaciones» <a
@@ -768,7 +768,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2020/11/23 14:35:43 $
+$Date: 2020/11/25 11:29:41 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.es.html,v
retrieving revision 1.121
retrieving revision 1.122
diff -u -b -r1.121 -r1.122
--- proprietary/proprietary.es.html 21 Nov 2020 12:59:52 -0000 1.121
+++ proprietary/proprietary.es.html 25 Nov 2020 11:29:41 -0000 1.122
@@ -185,6 +185,19 @@
<h3 id="latest">Añadidos recientes</h3>
<ul class="blurbs">
+ <li id="M202011090">
+ <p>Según la Comisión Federal de Comercio (<abbr lang="en" title="Federal
Trade
+Commission">FTC</abbr>), la compañÃa que gestiona el software de
+videoconferencia Zoom <a
+href="https://arstechnica.com/tech-policy/2020/11/zoom-lied-to-users-about-end-to-end-encryption-for-years-ftc-says/">ha
+engañado a los usuarios acerca de su cifrado de extremo a extremo</a>
+durante años, al menos desde 2016.</p>
+
+ <p>En su lugar se pueden utilizar programas libres tales como <a
+href="https://directory.fsf.org/wiki/Jitsi">Jitsi</a> o BigBlueButton, y
+mejor aún si se instalan en un servidor controlado por los propios
usuarios.</p>
+ </li>
+
<li id="M202004150">
<p>Riot Gamesâ new anti-cheat is malware; <a
href="https://www.extremetech.com/gaming/309320-riot-games-new-anti-cheat-system-runs-at-system-boot-uses-kernel-driver">runs
@@ -219,19 +232,6 @@
software que no es libre, Microsoft rastrea sus vidas fuera del ordenador y
viola su privacidad.</p>
</li>
-
- <li id="M202006120">
- <p>La empresa que está tras Zoom no solo niega la libertad informática
de los
-usuarios al desarrollar este software privativo, también vulnera los
-derechos civiles de los mismos al <a
-href="https://www.theverge.com/2020/6/12/21288995/zoom-blocking-feature-chinese-government-censorship">prohibir
-eventos y censurar a los usuarios</a> siguiendo indicaciones de gobiernos.</p>
-
- <p>En su lugar se pueden utilizar programas respetuosos con la libertad
tales
-como <a href="https://directory.fsf.org/wiki/Jitsi">Jitsi</a> o
-BigBlueButton, y mejor aún si se instalan en un servidor controlado por los
-propios usuarios.</p>
- </li>
</ul>
</div>
@@ -314,7 +314,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2020/11/21 12:59:52 $
+$Date: 2020/11/25 11:29:41 $
<!-- timestamp end -->
</p>
Index: proprietary/po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.340
retrieving revision 1.341
diff -u -b -r1.340 -r1.341
--- proprietary/po/es.po 24 Nov 2020 13:05:15 -0000 1.340
+++ proprietary/po/es.po 25 Nov 2020 11:29:41 -0000 1.341
@@ -6464,6 +6464,12 @@
"to-end-encryption-for-years-ftc-says/\">has lied to users about its end-to-"
"end encryption</a> for years, at least since 2016."
msgstr ""
+"Según la Comisión Federal de Comercio (<abbr lang=\"en\" title=\"Federal "
+"Trade Commission\">FTC</abbr>), la compañÃa que gestiona el software de "
+"videoconferencia Zoom <a href=\"https://arstechnica.com/tech-policy/2020/11/"
+"zoom-lied-to-users-about-end-to-end-encryption-for-years-ftc-says/\">ha "
+"engañado a los usuarios acerca de su cifrado de extremo a extremo</a> "
+"durante años, al menos desde 2016."
#. type: Content of: <div><div><ul><li><p>
# | [-Freedom respecting-]{+People can use free (as in freedom)+} programs
Index: proprietary/po/malware-in-online-conferencing.es-en.html
===================================================================
RCS file:
/web/www/www/proprietary/po/malware-in-online-conferencing.es-en.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- proprietary/po/malware-in-online-conferencing.es-en.html 21 Nov 2020
12:29:50 -0000 1.3
+++ proprietary/po/malware-in-online-conferencing.es-en.html 25 Nov 2020
11:29:42 -0000 1.4
@@ -65,6 +65,18 @@
<div class="column-limit" id="malware-in-online-conferencing"></div>
<ul class="blurbs">
+ <li id="M202011090">
+ <p>According to FTC, the
+ company behind the Zoom conferencing software <a
+
href="https://arstechnica.com/tech-policy/2020/11/zoom-lied-to-users-about-end-to-end-encryption-for-years-ftc-says/">has
+ lied to users about its end-to-end encryption</a> for years, at least
+ since 2016.</p>
+
+ <p>People can use free (as in freedom) programs such as <a
+ href="https://directory.fsf.org/wiki/Jitsi">Jitsi</a> or BigBlueButton,
+ better still if installed in a server controlled by the users.</p>
+ </li>
+
<li id="M202009270">
<p>Many employers are using nonfree
software, including videoconference software, to <a
@@ -157,7 +169,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/21 12:29:50 $
+$Date: 2020/11/25 11:29:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-microsoft.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.es-en.html,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- proprietary/po/malware-microsoft.es-en.html 17 Nov 2020 10:00:04 -0000
1.79
+++ proprietary/po/malware-microsoft.es-en.html 25 Nov 2020 11:29:42 -0000
1.80
@@ -88,7 +88,7 @@
any change whatsoever can be imposed on the users</a>.</p>
<p>This was <a
- href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
+
href="https://web.archive.org/web/20200219180230/http://slated.org/windows_by_stealth_the_updates_you_dont_want">
reported in 2007</a> for XP and Vista, and it seems
that Microsoft used the same method to push the <a
href="/proprietary/malware-microsoft.html#windows10-forcing">
@@ -745,7 +745,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/17 10:00:04 $
+$Date: 2020/11/25 11:29:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-microsoft.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.es.po,v
retrieving revision 1.191
retrieving revision 1.192
diff -u -b -r1.191 -r1.192
--- proprietary/po/malware-microsoft.es.po 25 Nov 2020 11:11:30 -0000
1.191
+++ proprietary/po/malware-microsoft.es.po 25 Nov 2020 11:29:42 -0000
1.192
@@ -895,17 +895,17 @@
"windows-diagnostic-data-in-your-organization#full-level\"> “"
"Full” telemetry mode</a> allows Microsoft Windows engineers to access, "
"among other things, registry keys <a href=\"https://docs.microsoft.com/en-us/"
-"previous-versions/windows/it-pro/windows-2000-server/"
-"cc939702(v=technet.10)\"> which can contain sensitive information like "
+"previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\"> which can contain sensitive information like "
"administrator's login password</a>."
msgstr ""
"El <a href=\"https://docs.microsoft.com/en-us/windows/privacy/configure-"
"windows-diagnostic-data-in-your-organization#full-level\">nivel de "
"telemetrÃa «Completo»</a> permite a los ingenieros de Microsoft acceder, "
"entre otras cosas, a claves de registro <a href=\"https://docs.microsoft.com/"
-"en-us/previous-versions/windows/it-pro/windows-2000-server/"
-"cc939702(v=technet.10)\">que contienen información sensible, como la "
-"contraseña de inicio de sesión del administrador</a>."
+"en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\">que contienen información sensible, como la contraseña de "
+"inicio de sesión del administrador</a>."
#. type: Content of: <div><div><ul><li><p>
msgid ""
Index: proprietary/po/proprietary-back-doors.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.es-en.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- proprietary/po/proprietary-back-doors.es-en.html 23 Nov 2020 14:35:46
-0000 1.24
+++ proprietary/po/proprietary-back-doors.es-en.html 25 Nov 2020 11:29:42
-0000 1.25
@@ -542,7 +542,7 @@
any change whatsoever can be imposed on the users</a>.</p>
<p>This was <a
- href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
+
href="https://web.archive.org/web/20200219180230/http://slated.org/windows_by_stealth_the_updates_you_dont_want">
reported in 2007</a> for XP and Vista, and it seems
that Microsoft used the same method to push the <a
href="/proprietary/malware-microsoft.html#windows10-forcing">
@@ -738,7 +738,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/23 14:35:46 $
+$Date: 2020/11/25 11:29:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es-en.html,v
retrieving revision 1.113
retrieving revision 1.114
diff -u -b -r1.113 -r1.114
--- proprietary/po/proprietary.es-en.html 21 Nov 2020 12:59:52 -0000
1.113
+++ proprietary/po/proprietary.es-en.html 25 Nov 2020 11:29:42 -0000
1.114
@@ -174,6 +174,18 @@
<h3 id="latest">Latest additions</h3>
<ul class="blurbs">
+ <li id="M202011090">
+ <p>According to FTC, the
+ company behind the Zoom conferencing software <a
+
href="https://arstechnica.com/tech-policy/2020/11/zoom-lied-to-users-about-end-to-end-encryption-for-years-ftc-says/">has
+ lied to users about its end-to-end encryption</a> for years, at least
+ since 2016.</p>
+
+ <p>People can use free (as in freedom) programs such as <a
+ href="https://directory.fsf.org/wiki/Jitsi">Jitsi</a> or BigBlueButton,
+ better still if installed in a server controlled by the users.</p>
+ </li>
+
<li id="M202004150">
<p>Riot Gamesâ new anti-cheat is malware; <a
href="https://www.extremetech.com/gaming/309320-riot-games-new-anti-cheat-system-runs-at-system-boot-uses-kernel-driver">runs
@@ -208,19 +220,6 @@
nonfree software, Microsoft is tracking their lives outside the computer
and
violates their privacy.</p>
</li>
-
- <li id="M202006120">
- <p>The company behind Zoom does not only deny
- users' computer freedom by developing this piece
- of nonfree software, it also violates users' civil rights by <a
-
href="https://www.theverge.com/2020/6/12/21288995/zoom-blocking-feature-chinese-government-censorship">banning
- events and censoring users</a> to serve the agenda of governments.</p>
-
- <p>Freedom respecting programs such as <a
- href="https://directory.fsf.org/wiki/Jitsi">Jitsi</a> or BigBlueButton
- can be used instead, better still if installed in a server controlled
- by its users.</p>
- </li>
</ul>
</div>
@@ -283,7 +282,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/21 12:59:52 $
+$Date: 2020/11/25 11:29:42 $
<!-- timestamp end -->
</p>
</div>