www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-mobiles.de.html po/malw...


From: GNUN
Subject: www/proprietary malware-mobiles.de.html po/malw...
Date: Sun, 07 Jun 2015 19:31:59 +0000

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     15/06/07 19:31:59

Modified files:
        proprietary    : malware-mobiles.de.html 
Added files:
        proprietary/po : malware-mobiles.de-diff.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.de.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&rev=1.1

Patches:
Index: malware-mobiles.de.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.de.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- malware-mobiles.de.html     15 Apr 2015 13:02:19 -0000      1.1
+++ malware-mobiles.de.html     7 Jun 2015 19:31:58 -0000       1.2
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/malware-mobiles.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/malware-mobiles.de.po">
+ http://www.gnu.org/proprietary/po/malware-mobiles.de.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/malware-mobiles.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/malware-mobiles.de-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2015-04-08" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/malware-mobiles.en.html" -->
 
 <!--#include virtual="/server/header.de.html" -->
 <!-- Parent-Version: 1.77 -->
@@ -8,6 +13,7 @@
 
 <!--#include virtual="/proprietary/po/malware-mobiles.translist" -->
 <!--#include virtual="/server/banner.de.html" -->
+<!--#include virtual="/server/outdated.de.html" -->
 <h2>Schadprogramme auf Mobilgeräten</h2>
 
 <a href="/philosophy/proprietary/">Weitere Beispiele für proprietäre
@@ -277,7 +283,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Aktualisierung:
 
-$Date: 2015/04/15 13:02:19 $
+$Date: 2015/06/07 19:31:58 $
 
 <!-- timestamp end -->
 </p>

Index: po/malware-mobiles.de-diff.html
===================================================================
RCS file: po/malware-mobiles.de-diff.html
diff -N po/malware-mobiles.de-diff.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/malware-mobiles.de-diff.html     7 Jun 2015 19:31:59 -0000       1.1
@@ -0,0 +1,220 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/proprietary/malware-mobiles.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;!-- Parent-Version: 1.77 --&gt;
+&lt;title&gt;Malware in Mobile Devices
+- GNU Project - Free Software Foundation&lt;/title&gt;
+ &lt;!--#include virtual="/proprietary/po/malware-mobiles.translist" --&gt;
+&lt;!--#include virtual="/server/banner.html" --&gt;
+&lt;h2&gt;Malware in Mobile Devices&lt;/h2&gt;
+
+&lt;a href="/philosophy/proprietary.html"&gt;Other examples of proprietary
+malware&lt;/a&gt;
+
+&lt;p&gt;
+&lt;em&gt;Malware&lt;/em&gt; means software designed to function in ways that
+mistreat or harm the user.  (This does not include accidental errors.)
+&lt;/p&gt;
+
+&lt;p&gt;
+Malware and nonfree software are two different issues.  The difference
+between &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt; and
+nonfree software is in &lt;a
+href="/philosophy/free-software-even-more-important.html"&gt;
+whether the users have control of the program or vice versa&lt;/a&gt;.  It's
+not directly a question of what the program &lt;em&gt;does&lt;/em&gt; when it
+runs.  However, in practice nonfree software is often malware, because
+the developer's awareness that the users would be powerless to fix any
+malicious functionalities tempts the developer to impose some.
+&lt;/p&gt;
+
+&lt;p&gt;Here are examples of malware in mobile devices.  See also
+the &lt;a href="/philosophy/malware-apple.html"&gt;the Apple malware
+page&lt;/a&gt; for malicious functionalities specific to the Apple 
iThings.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Many proprietary apps for mobile devices report which 
other
+       apps the user has
+       installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+       is doing this in a way that at least is visible and
+       optional&lt;/a&gt;. Not as bad as what the others do.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Portable phones with GPS will send their GPS location on 
remote
+  command and users cannot stop them: &lt;a
+  
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+  
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
+  (The US says it will eventually require all new portable phones to have
+  GPS.)&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Most mobile phones have a universal back door, which has 
been
+  used to &lt;a
+  
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
+  turn them malicious&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor"&gt;
+  Samsung Galaxy devices running proprietary Android versions come with a
+  back door&lt;/a&gt; that provides remote access to the data stored on the
+  device.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
+  The NSA can tap data in smart phones, including iPhones, Android, and
+  BlackBerry&lt;/a&gt;. While there is not much detail here, it seems that this
+  does not operate via the universal back door that we know nearly all
+  portable phones have. It may involve exploiting various bugs. There are
+  &lt;a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
+  lots of bugs in the phones' radio software&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones: &lt;a
+  
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+  
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in Android phones (and Windows? laptops): The 
Wall Street
+  Journal (in an article blocked from us by a paywall) reports that &lt;a
+  
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
+  the FBI can remotely activate the GPS and microphone in Android phones
+  and laptops&lt;/a&gt;. (I suspect this means Windows laptops.) Here is &lt;a
+  href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Some Motorola phones modify Android to &lt;a
+  href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+  send personal data to Motorola.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Some manufacturers add a &lt;a
+  
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+  hidden general surveillance package such as Carrier IQ.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;Widely used &lt;a
+  
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+  QR-code scanner apps snoop on the user&lt;/a&gt;. This is in addition to
+  the snooping done by the phone company, and perhaps by the OS in the
+  phone.&lt;/p&gt;
+
+  &lt;p&gt;Don't be distracted by the question of whether the app developers 
get
+  users to say &ldquo;I agree&rdquo;. That is no excuse for malware.&lt;/p&gt;
+  &lt;/li&gt;</em></ins></span>
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="/philosophy/proprietary/proprietary-back-doors.html#samsung"&gt;
+  Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+  &lt;p&gt;In Android, &lt;a
+  
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"&gt;
+  Google has a back door to remotely delete apps.&lt;/a&gt;  (It is in a 
program
+  called GTalkService).
+  &lt;/p&gt;
+
+  &lt;p&gt;
+  Google can
+  also &lt;a 
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"&gt;forcibly
+  and remotely install apps&lt;/a&gt; through GTalkService (which seems, since
+  that article, to have been merged into Google Play).  This adds up to
+  a universal back door.
+  &lt;/p&gt;
+
+  &lt;p&gt;
+  Although Google's &lt;em&gt;exercise&lt;/em&gt; of this power has not been
+  malicious so far, the point is that nobody should have such power,
+  which could also be used maliciously.  You might well decide to let a
+  security service remotely &lt;em&gt;deactivate&lt;/em&gt; programs that it
+  considers malicious.  But there is no excuse for allowing it
+  to &lt;em&gt;delete&lt;/em&gt; the programs, and you should have the right to
+  decide who (if anyone) to trust in this way.
+  &lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html"&gt;
+  Some Android phones are tyrants&lt;/a&gt; (though someone found a way to 
crack
+  the restriction). Fortunately, most Android devices are not 
tyrants.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/"&gt;
+  Mobile devices that come with Windows 8 are tyrants&lt;/a&gt;. &lt;a
+  
href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown"&gt;
+  Windows 8 on &ldquo;mobile devices&rdquo; is a jail.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
+&lt;!--#include virtual="/server/footer.html" --&gt;
+&lt;div id="footer"&gt;
+&lt;div class="unprintable"&gt;
+
+&lt;p&gt;Please send general FSF &amp; GNU inquiries to
+&lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.
+There are also &lt;a href="/contact/"&gt;other ways to contact&lt;/a&gt;
+the FSF.  Broken links and other corrections or suggestions can be sent
+to &lt;a 
href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to &lt;a href="mailto:address@hidden"&gt;
+        &lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;For information on coordinating and submitting translations of
+        our web pages, see &lt;a
+        href="/server/standards/README.translations.html"&gt;Translations
+        README&lt;/a&gt;. --&gt;
+Please see the &lt;a
+href="/server/standards/README.translations.html"&gt;Translations
+README&lt;/a&gt; for information on coordinating and submitting translations
+of this article.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 3.0 US.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. --&gt;
+
+&lt;p&gt;Copyright &copy; <span 
class="removed"><del><strong>2014</strong></del></span> <span 
class="inserted"><ins><em>2014, 2015</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
+
+&lt;p&gt;This page is licensed under a &lt;a rel="license"
+href="http://creativecommons.org/licenses/by-nd/3.0/us/"&gt;Creative
+Commons Attribution-NoDerivs 3.0 United States License&lt;/a&gt;.&lt;/p&gt;
+
+&lt;!--#include virtual="/server/bottom-notes.html" --&gt;
+
+&lt;p class="unprintable"&gt;Updated:
+&lt;!-- timestamp start --&gt;
+$Date: 2015/06/07 19:31:59 $
+&lt;!-- timestamp end --&gt;
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;
+&lt;/body&gt;
+&lt;/html&gt;
+</pre></body></html>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]