[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary proprietary.es.html po/propriet...
From: |
GNUN |
Subject: |
www/proprietary proprietary.es.html po/propriet... |
Date: |
Wed, 4 Aug 2021 05:30:51 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 21/08/04 05:30:51
Modified files:
proprietary : proprietary.es.html
proprietary/po : proprietary.es-en.html proprietary.es.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.es.html?cvsroot=www&r1=1.172&r2=1.173
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es-en.html?cvsroot=www&r1=1.163&r2=1.164
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.502&r2=1.503
Patches:
Index: proprietary.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.es.html,v
retrieving revision 1.172
retrieving revision 1.173
diff -u -b -r1.172 -r1.173
--- proprietary.es.html 2 Aug 2021 09:32:12 -0000 1.172
+++ proprietary.es.html 4 Aug 2021 09:30:50 -0000 1.173
@@ -197,29 +197,6 @@
<h3 id="latest">Añadidos recientes</h3>
<ul class="blurbs">
- <li id="M202107190">
-
- <!--#set var="DATE" value='<small class="date-tag">
-2021-07</small>'
- -->
-<!--#echo encoding="none" var="DATE" -->
-<p><a
-href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/">Delincuentes
-informáticos han aprovechado un fallo en las iCosas de Apple para instalar
-software espÃa</a> en los dispositivos de los usuarios, muchos de ellos
-periodistas, aun cuando estuvieran utilizando la última versión del programa
-privativo instalado en sus dispositivos.</p>
-
- <p>Nadie puede hacer nada frente a estas vulnerabilidades y los usuarios
tienen
-que esperar a que Apple solucione esos agujeros de seguridad, si es que
-decide hacerlo. Un sistema operativo libre permitirÃa a la gente identificar
-el agujero y solucionar el problema.</p>
-
- <p><small>(Advierta que en ese artÃculo se refieren erróneamente a los
-«<cite>crackers</cite>» como <a
-href="/philosophy/words-to-avoid.es.html#Hacker">«<cite>hackers</cite>»</a>).</small></p>
- </li>
-
<li id="M202107180">
<!--#set var="DATE" value='<small class="date-tag">
@@ -305,6 +282,20 @@
privativo, que es su puerta de entrada) hasta el punto de que ni siquiera
las compañÃas más poderosas se atrevan a introducirlas.</p>
</li>
+
+ <li id="M202106190">
+
+ <!--#set var="DATE" value='<small class="date-tag">
+2021-06</small>'
+ -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://arstechnica.com/gadgets/2021/06/even-creepier-covid-tracking-google-silently-pushed-app-to-users-phones/">Google
+ha instalado automáticamente una aplicación en muchos teléfonos privativos
+Android</a>. La aplicación podrÃa no hacer nada malicioso o podrÃa hacerlo;
+en cualquier caso, el poder que tiene Google sobre los teléfonos privativos
+Android es peligroso.</p>
+ </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">Ver más…</a></p>
@@ -387,7 +378,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2021/08/02 09:32:12 $
+$Date: 2021/08/04 09:30:50 $
<!-- timestamp end -->
</p>
Index: po/proprietary.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es-en.html,v
retrieving revision 1.163
retrieving revision 1.164
diff -u -b -r1.163 -r1.164
--- po/proprietary.es-en.html 2 Aug 2021 09:32:14 -0000 1.163
+++ po/proprietary.es-en.html 4 Aug 2021 09:30:50 -0000 1.164
@@ -186,26 +186,6 @@
<h3 id="latest">Latest additions</h3>
<ul class="blurbs">
- <li id="M202107190">
- <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
-
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/">Crackers
- used an exploit in Apple iThings to install
- spyware</a> on people's devices, many of them to be journalists, even
- if they were using the latest version of the proprietary operating
- system installed on their iDevice.</p>
-
- <p>Nobody can do anything about these vulnerabilities and people
- have to wait until Apple fixes these security holes, if it decides
- to fix it. A free operating system would let people to identify the
- hole and fix it.</p>
-
- <p><small>Please note that the article
- wrongly refers to crackers as “<a
-
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
- </li>
-
<li id="M202107180">
<!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -278,6 +258,16 @@
features (and the proprietary software that is their entry path)
to the point that even the most powerful companies don't dare.</p>
</li>
+
+ <li id="M202106190">
+ <!--#set var="DATE" value='<small class="date-tag">2021-06</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://arstechnica.com/gadgets/2021/06/even-creepier-covid-tracking-google-silently-pushed-app-to-users-phones/">Google
+ automatically installed an app on many proprietary Android phones</a>. The
app
+ might or might not do malicious things but the power Google has over
proprietary
+ Android phones is dangerous.</p>
+ </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -340,7 +330,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/08/02 09:32:14 $
+$Date: 2021/08/04 09:30:50 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.502
retrieving revision 1.503
diff -u -b -r1.502 -r1.503
--- po/proprietary.es.po 4 Aug 2021 09:16:30 -0000 1.502
+++ po/proprietary.es.po 4 Aug 2021 09:30:50 -0000 1.503
@@ -461,11 +461,6 @@
"privativo, que es su puerta de entrada) hasta el punto de que ni siquiera "
"las compañÃas más poderosas se atrevan a introducirlas."
-# | <a
-# |
href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-tracking-google-silently-pushed-app-to-users-phones/\">Google
-# | automatically installed an app on many {+proprietary+} Android phones</a>.
-# | The app {+might or+} might not do malicious things but the power Google
-# | has over proprietary Android phones is dangerous.
#. type: Content of: <div><ul><li><p>
msgid ""
"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-"
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary proprietary.es.html po/propriet...,
GNUN <=