www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-apple.es.html malware-g...


From: GNUN
Subject: www/proprietary malware-apple.es.html malware-g...
Date: Sun, 1 Aug 2021 07:31:32 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     21/08/01 07:31:32

Modified files:
        proprietary    : malware-apple.es.html malware-google.es.html 
                         proprietary-insecurity.es.html 
                         proprietary.es.html 
        proprietary/po : malware-apple.es-en.html 
                         malware-google.es-en.html 
                         proprietary-insecurity.es-en.html 
                         proprietary.es-en.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.es.html?cvsroot=www&r1=1.106&r2=1.107
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-google.es.html?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.es.html?cvsroot=www&r1=1.46&r2=1.47
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.es.html?cvsroot=www&r1=1.170&r2=1.171
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.es-en.html?cvsroot=www&r1=1.96&r2=1.97
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.es-en.html?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.es-en.html?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es-en.html?cvsroot=www&r1=1.161&r2=1.162

Patches:
Index: malware-apple.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.es.html,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- malware-apple.es.html       13 Jun 2021 10:29:29 -0000      1.106
+++ malware-apple.es.html       1 Aug 2021 11:31:25 -0000       1.107
@@ -305,6 +305,52 @@
 que el software privativo de prestigio está libre de graves fallos.</p>
 
 <ul class="blurbs">
+  <li id="M202107190">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/";>Delincuentes
+informáticos han aprovechado un fallo en las iCosas de Apple para instalar
+software espía</a> en los dispositivos de los usuarios, muchos de ellos
+periodistas, aun cuando estuvieran utilizando la última versión del programa
+privativo instalado en sus dispositivos.</p>
+
+    <p>Nadie puede hacer nada frente a estas vulnerabilidades y los usuarios 
tienen
+que esperar a que Apple solucione esos agujeros de seguridad, si es que
+decide hacerlo. Un sistema operativo libre permitiría a la gente identificar
+el agujero y solucionar el problema.</p>
+
+    <p><small>Advierta que en ese artículo se refieren erróneamente a los
+«<cite>crackers</cite>» como <a
+href="/philosophy/words-to-avoid.es.html#Hacker">«<cite>hackers</cite>»</a>.</small></p>
+  </li>
+
+  <li id="M202107180">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones";>El
+programa espía Pegasus ha aprovechado vulnerabilidades existentes en los
+sistemas operativos privativos de los <cite>smartphones</cite></a> para
+vigilar a los usuarios. Aprovechando un fallo de seguridad, el programa
+puede grabar las conversaciones del usuario, copiar sus mensajes y tomar
+imágenes clandestinamente.</p>
+
+    <p>Un sistema operativo libre permitiría a los usuarios arreglar los 
fallos por
+sí mismos, pero ahora las personas afectadas se ven obligadas a esperar a
+que las empresas solucionen esos problemas.</p>
+
+    <p><small>Advierta que en ese artículo se refieren erróneamente a los
+«<cite>crackers</cite>» como <a
+href="/philosophy/words-to-avoid.es.html#Hacker">«<cite>hackers</cite>»</a>.</small></p>
+  </li>
+
   <li id="M202012200">
     
     <!--#set var="DATE" value='<small class="date-tag">
@@ -1452,7 +1498,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2021/06/13 10:29:29 $
+$Date: 2021/08/01 11:31:25 $
 
 <!-- timestamp end -->
 </p>

Index: malware-google.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-google.es.html,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- malware-google.es.html      8 Jul 2021 09:33:22 -0000       1.38
+++ malware-google.es.html      1 Aug 2021 11:31:25 -0000       1.39
@@ -296,6 +296,29 @@
 ese prestigioso sofware privativo no presenta fallos graves.</p>
 
 <ul class="blurbs">
+  <li id="M202107180">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones";>El
+programa espía Pegasus ha aprovechado vulnerabilidades existentes en los
+sistemas operativos privativos de los <cite>smartphones</cite></a> para
+vigilar a los usuarios. Aprovechando un fallo de seguridad, el programa
+puede grabar las conversaciones del usuario, copiar sus mensajes y tomar
+imágenes clandestinamente.</p>
+
+    <p>Un sistema operativo libre permitiría a los usuarios arreglar los 
fallos por
+sí mismos, pero ahora las personas afectadas se ven obligadas a esperar a
+que las empresas solucionen esos problemas.</p>
+
+    <p><small>Advierta que en ese artículo se refieren erróneamente a los
+«<cite>crackers</cite>» como <a
+href="/philosophy/words-to-avoid.es.html#Hacker">«<cite>hackers</cite>»</a>.</small></p>
+  </li>
+
   <li id="M202008110">
     
     <!--#set var="DATE" value='<small class="date-tag">
@@ -946,7 +969,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2021/07/08 09:33:22 $
+$Date: 2021/08/01 11:31:25 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-insecurity.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.es.html,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- proprietary-insecurity.es.html      16 Jul 2021 09:31:47 -0000      1.46
+++ proprietary-insecurity.es.html      1 Aug 2021 11:31:25 -0000       1.47
@@ -59,14 +59,23 @@
 software privativo con graves consecuencias o dignos de mención. Aun cuando
 la mayor parte de estos fallos de seguridad no son intencionados, de modo
 que en sentido estricto no son funcionalidades maliciosas, los mencionamos
-aquí para mostrar que el software privativo no es inmune a los fallos, y a
-menudo es bastante chapucero.</p>
+aquí para mostrar que el software privativo no es tan seguro como a menudo
+dicen los medios.</p>
+
+<p>Esto no significa que el software libre sea inmune a fallos y a defectos de
+seguridad. La diferencia a este respecto entre el software libre y el
+software privativo es la forma de manejar los fallos: los usuarios de
+software libre pueden estudiar el programa y/o arreglar los fallos (a menudo
+colectivamente, ya que pueden compartir el programa), mientras que los
+usuarios de programas privativos se ven obligados a confiar en que el
+desarrollador del programa los solucione.</p>
+
+
+<p>Si el desarrollador no se ocupa de arreglar el fallo (lo que sucede a menudo
+con el software embebido y las versiones antiguas), los usuarios están
+perdidos. Pero si el desarrollador envía una versión corregida, además del
+arreglo de los fallos esta puede contener nuevas funcionalidades 
maliciosas.</p>
 
-<p>Todo programa complejo, sea libre o privativo, contiene fallos. Lo que hace
-que los fallos sean más peligrosos en el software privativo es que los
-usuarios se ven <em>imposibilitados para subsanar cualquier problema de
-seguridad que surja</em>. El software privativo es culpable de mantener a
-los usuarios en la indefensión.</p>
 
 <div class="important">
 <p>Si conoce algún otro ejemplo que debería mencionarse en esta página,
@@ -78,6 +87,52 @@
 <div class="column-limit" id="proprietary-insecurity"></div>
 
 <ul class="blurbs">
+  <li id="M202107190">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/";>Delincuentes
+informáticos han aprovechado un fallo en las iCosas de Apple para instalar
+software espía</a> en los dispositivos de los usuarios, muchos de ellos
+periodistas, aun cuando estuvieran utilizando la última versión del programa
+privativo instalado en sus dispositivos.</p>
+
+    <p>Nadie puede hacer nada frente a estas vulnerabilidades y los usuarios 
tienen
+que esperar a que Apple solucione esos agujeros de seguridad, si es que
+decide hacerlo. Un sistema operativo libre permitiría a la gente identificar
+el agujero y solucionar el problema.</p>
+
+    <p><small>Advierta que en ese artículo se refieren erróneamente a los
+«<cite>crackers</cite>» como <a
+href="/philosophy/words-to-avoid.es.html#Hacker">«<cite>hackers</cite>»</a></small></p>
+  </li>
+
+  <li id="M202107180">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones";>El
+programa espía Pegasus ha aprovechado vulnerabilidades existentes en los
+sistemas operativos privativos de los <cite>smartphones</cite></a> para
+vigilar a los usuarios. Aprovechando un fallo de seguridad, el programa
+puede grabar las conversaciones del usuario, copiar sus mensajes y tomar
+imágenes clandestinamente.</p>
+
+    <p>Un sistema operativo libre permitiría a los usuarios arreglar los 
fallos por
+sí mismos, pero ahora las personas afectadas se ven obligadas a esperar a
+que las empresas solucionen esos problemas.</p>
+
+    <p><small>Advierta que en ese artículo se refieren erróneamente a los
+«<cite>crackers</cite>» como <a
+href="/philosophy/words-to-avoid.es.html#Hacker">«<cite>hackers</cite>»</a></small></p>
+  </li>
+
   <li id="M202107090">
     
     <!--#set var="DATE" value='<small class="date-tag">
@@ -1474,7 +1529,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2021/07/16 09:31:47 $
+$Date: 2021/08/01 11:31:25 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.es.html,v
retrieving revision 1.170
retrieving revision 1.171
diff -u -b -r1.170 -r1.171
--- proprietary.es.html 16 Jul 2021 09:31:47 -0000      1.170
+++ proprietary.es.html 1 Aug 2021 11:31:25 -0000       1.171
@@ -197,6 +197,52 @@
 <h3 id="latest">Añadidos recientes</h3>
 
 <ul class="blurbs">
+  <li id="M202107190">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/";>Delincuentes
+informáticos han aprovechado un fallo en las iCosas de Apple para instalar
+software espía</a> en los dispositivos de los usuarios, muchos de ellos
+periodistas, aun cuando estuvieran utilizando la última versión del programa
+privativo instalado en sus dispositivos.</p>
+
+    <p>Nadie puede hacer nada frente a estas vulnerabilidades y los usuarios 
tienen
+que esperar a que Apple solucione esos agujeros de seguridad, si es que
+decide hacerlo. Un sistema operativo libre permitiría a la gente identificar
+el agujero y solucionar el problema.</p>
+
+    <p><small>(Advierta que en ese artículo se refieren erróneamente a los
+«<cite>crackers</cite>» como <a
+href="/philosophy/words-to-avoid.es.html#Hacker">«<cite>hackers</cite>»</a>).</small></p>
+  </li>
+
+  <li id="M202107180">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones";>El
+programa espía Pegasus ha aprovechado vulnerabilidades existentes en los
+sistemas operativos privativos de los <cite>smartphones</cite></a> para
+vigilar a los usuarios. Aprovechando un fallo de seguridad, el programa
+puede grabar las conversaciones del usuario, copiar sus mensajes y tomar
+imágenes clandestinamente.</p>
+
+    <p>Un sistema operativo libre permitiría a los usuarios arreglar los 
fallos por
+sí mismos, pero ahora las personas afectadas se ven obligadas a esperar a
+que las empresas solucionen esos problemas.</p>
+
+    <p><small>(Advierta que en ese artículo se refieren erróneamente a los
+«<cite>crackers</cite>» como <a
+href="/philosophy/words-to-avoid.es.html#Hacker">«<cite>hackers</cite>»</a>).</small></p>
+  </li>
+
   <li id="M202107090">
     
     <!--#set var="DATE" value='<small class="date-tag">
@@ -259,35 +305,6 @@
 privativo, que es su puerta de entrada) hasta el punto de que ni siquiera
 las compañías más poderosas se atrevan a introducirlas.</p>
   </li>
-
-  <li id="M202106190">
-    
-    <!--#set var="DATE" value='<small class="date-tag">
-2021-06</small>'
-    -->
-<!--#echo encoding="none" var="DATE" -->
-<p><a
-href="https://arstechnica.com/gadgets/2021/06/even-creepier-covid-tracking-google-silently-pushed-app-to-users-phones/";>Google
-ha instalado automáticamente una aplicación en muchos teléfonos privativos
-Android</a>. La aplicación podría hacer algo malicioso o podría no hacerlo,
-pero el poder que tiene Google sobre los teléfonos privativos Android es
-peligroso.</p>
-  </li>
-
-  <li id="M202106170">
-    
-    <!--#set var="DATE" value='<small class="date-tag">
-2021-06</small>'
-    -->
-<!--#echo encoding="none" var="DATE" -->
-<p><a
-href="https://www.theguardian.com/technology/2021/jun/17/nine-out-of-10-health-apps-harvest-user-data-global-study-shows";>Casi
-todas las aplicaciones privativas de salud capturan datos de los
-usuarios</a>, incluida información sensible sobre su estado de salud,
-utilizando identificadores y cookies con el fin de rastrear sus
-actividades. Algunas de estas aplicaciones siguen el rastro de los usuarios
-por diferentes plataformas.</p>
-  </li>
 </ul>
 <p class="button right-align">
 <a href="/proprietary/all.html">Ver más&hellip;</a></p>
@@ -370,7 +387,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2021/07/16 09:31:47 $
+$Date: 2021/08/01 11:31:25 $
 
 <!-- timestamp end -->
 </p>

Index: po/malware-apple.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.es-en.html,v
retrieving revision 1.96
retrieving revision 1.97
diff -u -b -r1.96 -r1.97
--- po/malware-apple.es-en.html 13 Jun 2021 10:29:29 -0000      1.96
+++ po/malware-apple.es-en.html 1 Aug 2021 11:31:25 -0000       1.97
@@ -254,6 +254,45 @@
   bugs.</p>
 
 <ul class="blurbs">
+  <li id="M202107190">
+    <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/";>Crackers
+    used an exploit in Apple iThings to install
+    spyware</a> on people's devices, many of them to be journalists, even
+    if they were using the latest version of the proprietary operating
+    system installed on their iDevice.</p>
+
+    <p>Nobody can do anything about these vulnerabilities and people
+    have to wait until Apple fixes these security holes, if it decides
+    to fix it. A free operating system would let people to identify the
+    hole and fix it.</p>
+
+    <p><small>Please note that the article
+    wrongly refers to crackers as &ldquo;<a
+    
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo;.</small></p>
+  </li>
+
+  <li id="M202107180">
+    <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones";>
+    The pegasus spyware used vulnerabilities on proprietary smartphone
+    operating systems</a> to impose surveillance on people. It can record
+    people's calls, copy their messages, and secretly film them, using a
+    security vulnerability.</p>
+
+    <p>A free operating system would've let people to fix the bugs for
+    themselves but now infected people are forced to wait for corporations to
+    fix the problems.</p>
+
+    <p><small>Please note that the article
+    wrongly refers to crackers as &ldquo;<a
+    
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo;.</small></p>
+  </li>
+
   <li id="M202012200">
     <!--#set var="DATE" value='<small class="date-tag">2020-12</small>'
     --><!--#echo encoding="none" var="DATE" -->
@@ -1175,7 +1214,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/06/13 10:29:29 $
+$Date: 2021/08/01 11:31:25 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-google.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.es-en.html,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- po/malware-google.es-en.html        8 Jul 2021 09:33:22 -0000       1.36
+++ po/malware-google.es-en.html        1 Aug 2021 11:31:25 -0000       1.37
@@ -249,6 +249,25 @@
   bugs.</p>
 
 <ul class="blurbs">
+  <li id="M202107180">
+    <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones";>
+    The pegasus spyware used vulnerabilities on proprietary smartphone
+    operating systems</a> to impose surveillance on people. It can record
+    people's calls, copy their messages, and secretly film them, using a
+    security vulnerability.</p>
+
+    <p>A free operating system would've let people to fix the bugs for
+    themselves but now infected people are forced to wait for corporations to
+    fix the problems.</p>
+
+    <p><small>Please note that the article
+    wrongly refers to crackers as &ldquo;<a
+    
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo;.</small></p>
+  </li>
+
   <li id="M202008110">
     <!--#set var="DATE" value='<small class="date-tag">2020-08</small>'
     --><!--#echo encoding="none" var="DATE" -->
@@ -758,7 +777,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/07/08 09:33:22 $
+$Date: 2021/08/01 11:31:25 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-insecurity.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.es-en.html,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- po/proprietary-insecurity.es-en.html        16 Jul 2021 09:31:49 -0000      
1.41
+++ po/proprietary-insecurity.es-en.html        1 Aug 2021 11:31:27 -0000       
1.42
@@ -48,17 +48,25 @@
 </div>
 
 <div class="article">
-<p>This page lists clearly established cases of insecurity in
-proprietary software that has grave consequences or is otherwise
-noteworthy. Even though most of these security flaws are unintentional,
-thus are not malicious functionalities in a strict sense, we report
-them to show that proprietary software is not immune to bugs, and is
-often quite sloppy.</p>
-
-<p>All complex programs, whether free or proprietary, contain bugs. What
-makes bugs more dangerous in proprietary software is that users are
-<em>helpless to fix any security problems that arise</em>.  Keeping
-the users helpless is what's culpable about proprietary software.</p>
+<p>This page lists clearly established cases of insecurity in proprietary
+software that has grave consequences or is otherwise noteworthy. Even
+though most of these security flaws are unintentional, thus are not
+malicious functionalities in a strict sense, we report them to show that
+proprietary software is not as secure as mainstream media may say.</p>
+
+<p>This doesn't imply that free software is immune to bugs or insecurities.
+The difference between free and proprietary software in this respect is
+the handling of the bugs: free software users are able to study the
+program and/or fix the bugs they find, often in communities as they are
+able to share the program, while proprietary program users are forced to
+rely on the program's developer for fixes.</p>
+
+
+<p>If the developer does not care to fix the problem &mdash; often the case for
+embedded software and old releases &mdash; the users are sunk. But if the
+developer does send a corrected version, it may contain new malicious
+functionalities as well as bug fixes.</p>
+
 
 <div class="important">
 <p>If you know of an example that ought to be in this page but isn't
@@ -71,6 +79,45 @@
 <div class="column-limit" id="proprietary-insecurity"></div>
 
 <ul class="blurbs">
+  <li id="M202107190">
+    <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/";>Crackers
+    used an exploit in Apple iThings to install
+    spyware</a> on people's devices, many of them to be journalists, even
+    if they were using the latest version of the proprietary operating
+    system installed on their iDevice.</p>
+
+    <p>Nobody can do anything about these vulnerabilities and people
+    have to wait until Apple fixes these security holes, if it decides
+    to fix it. A free operating system would let people to identify the
+    hole and fix it.</p>
+
+    <p><small>Please note that the article
+    wrongly refers to crackers as &ldquo;<a
+    
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo;.</small></p>
+  </li>
+
+  <li id="M202107180">
+    <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones";>
+    The pegasus spyware used vulnerabilities on proprietary smartphone
+    operating systems</a> to impose surveillance on people. It can record
+    people's calls, copy their messages, and secretly film them, using a
+    security vulnerability.</p>
+
+    <p>A free operating system would've let people to fix the bugs for
+    themselves but now infected people are forced to wait for corporations to
+    fix the problems.</p>
+
+    <p><small>Please note that the article
+    wrongly refers to crackers as &ldquo;<a
+    
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo;.</small></p>
+  </li>
+
   <li id="M202107090">
     <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
     --><!--#echo encoding="none" var="DATE" -->
@@ -1158,7 +1205,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/07/16 09:31:49 $
+$Date: 2021/08/01 11:31:27 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es-en.html,v
retrieving revision 1.161
retrieving revision 1.162
diff -u -b -r1.161 -r1.162
--- po/proprietary.es-en.html   16 Jul 2021 09:31:49 -0000      1.161
+++ po/proprietary.es-en.html   1 Aug 2021 11:31:32 -0000       1.162
@@ -186,6 +186,45 @@
 <h3 id="latest">Latest additions</h3>
 
 <ul class="blurbs">
+  <li id="M202107190">
+    <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/";>Crackers
+    used an exploit in Apple iThings to install
+    spyware</a> on people's devices, many of them to be journalists, even
+    if they were using the latest version of the proprietary operating
+    system installed on their iDevice.</p>
+
+    <p>Nobody can do anything about these vulnerabilities and people
+    have to wait until Apple fixes these security holes, if it decides
+    to fix it. A free operating system would let people to identify the
+    hole and fix it.</p>
+
+    <p><small>Please note that the article
+    wrongly refers to crackers as &ldquo;<a
+    
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo;.</small></p>
+  </li>
+
+  <li id="M202107180">
+    <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones";>
+    The pegasus spyware used vulnerabilities on proprietary smartphone
+    operating systems</a> to impose surveillance on people. It can record
+    people's calls, copy their messages, and secretly film them, using a
+    security vulnerability.</p>
+
+    <p>A free operating system would've let people to fix the bugs for
+    themselves but now infected people are forced to wait for corporations to
+    fix the problems.</p>
+
+    <p><small>Please note that the article
+    wrongly refers to crackers as &ldquo;<a
+    
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo;.</small></p>
+  </li>
+
   <li id="M202107090">
     <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
     --><!--#echo encoding="none" var="DATE" -->
@@ -239,27 +278,6 @@
     features (and the proprietary software that is their entry path)
     to the point that even the most powerful companies don't dare.</p>
   </li>
-
-  <li id="M202106190">
-    <!--#set var="DATE" value='<small class="date-tag">2021-06</small>'
-    --><!--#echo encoding="none" var="DATE" -->
-    <p><a
-    
href="https://arstechnica.com/gadgets/2021/06/even-creepier-covid-tracking-google-silently-pushed-app-to-users-phones/";>Google
-    automatically installed an app on many proprietary Android phones</a>. The 
app
-    might or might not do malicious things but the power Google has over 
proprietary
-    Android phones is dangerous.</p>
-  </li>
-
-  <li id="M202106170">
-    <!--#set var="DATE" value='<small class="date-tag">2021-06</small>'
-    --><!--#echo encoding="none" var="DATE" -->
-    <p><a
-    
href="https://www.theguardian.com/technology/2021/jun/17/nine-out-of-10-health-apps-harvest-user-data-global-study-shows";>Almost
-    all proprietary health apps harvest users' data</a>, including
-    sensitive health information, tracking identifiers, and cookies to
-    track user activities. Some of these applications are tracking users
-    across different platforms.</p>
-  </li>
 </ul>
 <p class="button right-align">
 <a href="/proprietary/all.html">More items&hellip;</a></p>
@@ -322,7 +340,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/07/16 09:31:49 $
+$Date: 2021/08/01 11:31:32 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]