www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-apple.fr.html proprieta...


From: GNUN
Subject: www/proprietary malware-apple.fr.html proprieta...
Date: Mon, 19 Oct 2015 19:00:53 +0000

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     15/10/19 19:00:53

Modified files:
        proprietary    : malware-apple.fr.html 
                         proprietary-back-doors.fr.html 
                         proprietary-censorship.fr.html 
                         proprietary-insecurity.fr.html 
        proprietary/po : malware-apple.fr-en.html 
                         proprietary-back-doors.fr-en.html 
                         proprietary-censorship.fr-en.html 
                         proprietary-insecurity.fr-en.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.fr.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.fr.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-censorship.fr.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.fr.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.fr-en.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr-en.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.fr-en.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr-en.html?cvsroot=www&r1=1.10&r2=1.11

Patches:
Index: malware-apple.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.fr.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- malware-apple.fr.html       16 Oct 2015 21:01:44 -0000      1.11
+++ malware-apple.fr.html       19 Oct 2015 19:00:42 -0000      1.12
@@ -74,25 +74,39 @@
 
 <h3 id="back-doors">Portes dérobées</h3>
 <ul>
-  <li><p>L'iPhone a une porte dérobée <a
+<li><p>
+Pendant quatre ans, MacOS X a eu <a
+href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/";>
+une porte dérobée intentionnelle</a> qui pouvait être exploitée par des
+attaquants pour obtenir les privilèges du superutilisateur
+<cite>root</cite>.
+</p></li>
+
+<li><p>L'iPhone a une porte dérobée <a
 
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html";>
 qui permet à Apple de supprimer à distance les applications</a> qu'elle
 estime « inappropriées ». D'après ce que disait Jobs, il est acceptable
 qu'Apple possède ce pouvoir, car naturellement nous pouvons lui faire
-confiance.</p>
-  </li>
+confiance.
+</p></li>
 
-  <li><p>L'iPhone a une porte dérobée pour <a
+<li><p>L'iPhone a une porte dérobée pour <a
 
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone";>
 l'effacement complet à distance</a>. Elle n'est pas activée en permanence,
 mais les utilisateurs sont amenés à l'activer sans comprendre ce que cela
-implique.</p>
-  </li>
+implique.
+</p></li>
 </ul>
 
 <h3 id="censorship">Censure</h3>
 <ul>
 <li><p>
+Apple a <a href="http://ifixit.org/blog/7401/ifixit-app-pulled/";> banni un
+programme de l'App Store</a> parce que ses développeurs avaient commis
+l'énormité de désassembler certains iTrucs.
+</p></li>
+
+<li><p>
 Apple a rejeté une appli qui affichait les localisations des assassinats
 commis par des drones américains, en donnant diverses excuses. Chaque fois
 que les développeurs corrigeaient un « problème », Apple en amenait un 
autre
@@ -383,7 +397,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2015/10/16 21:01:44 $
+$Date: 2015/10/19 19:00:42 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-back-doors.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.fr.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary-back-doors.fr.html      17 Oct 2015 12:28:41 -0000      1.5
+++ proprietary-back-doors.fr.html      19 Oct 2015 19:00:42 -0000      1.6
@@ -19,6 +19,14 @@
 
 <ul>
 <li><p>
+Pendant quatre ans, MacOS X a eu <a
+href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/";>
+une porte dérobée intentionnelle</a> qui pouvait être exploitée par des
+attaquants pour obtenir les privilèges du superutilisateur
+<cite>root</cite>.
+</p></li>
+
+<li><p>
 Des utilisateurs rapportent que <a
 
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all";>
 Microsoft les force à remplacer Windows 7 et 8 par Windows 10, l'espion tous
@@ -300,7 +308,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2015/10/17 12:28:41 $
+$Date: 2015/10/19 19:00:42 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-censorship.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-censorship.fr.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary-censorship.fr.html      16 Oct 2015 15:59:45 -0000      1.4
+++ proprietary-censorship.fr.html      19 Oct 2015 19:00:42 -0000      1.5
@@ -22,6 +22,12 @@
 
 <ul>
 <li><p>
+Apple a <a href="http://ifixit.org/blog/7401/ifixit-app-pulled/";> banni un
+programme de l'App Store</a> parce que ses développeurs avaient commis
+l'énormité de désassembler certains iTrucs.
+</p></li>
+
+<li><p>
 Apple a rejeté une appli qui affichait les localisations des assassinats
 commis par des drones américains, en donnant diverses excuses. Chaque fois
 que les développeurs corrigeaient un « problème », Apple en amenait un 
autre
@@ -127,7 +133,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2015/10/16 15:59:45 $
+$Date: 2015/10/19 19:00:42 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-insecurity.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.fr.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- proprietary-insecurity.fr.html      7 Oct 2015 06:32:58 -0000       1.11
+++ proprietary-insecurity.fr.html      19 Oct 2015 19:00:42 -0000      1.12
@@ -26,31 +26,41 @@
 impuissants à les corriger</em>.</p>
 
 <ul>
+<li>
+<p>
+Pendant quatre ans, MacOS X a eu <a
+href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/";>
+une porte dérobée intentionnelle</a> qui pouvait être exploitée par des
+attaquants pour obtenir les privilèges du superutilisateur
+<cite>root</cite>.
+</p>
+</li>
 
 <li>
 <p>Des chercheurs en sécurité informatique ont découvert une <a
 
href="http://www.theguardian.com/technology/2015/aug/12/hack-car-brakes-sms-text";>
 vulnérabilité dans les dongles de diagnostic utilisés pour le traçage et
 l'assurance des véhicules</a>, qui permet de prendre le contrôle à distance
-d'une voiture ou d'un camion au moyen d'un SMS.</p>
+d'une voiture ou d'un camion au moyen d'un SMS.
+</p>
 </li>
 
-  <li>
-    <p>
-      Des crackers ont été en mesure de <a
+<li>
+<p>
+Des crackers ont été en mesure de <a
 
href="http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/";>
 prendre le contrôle à distance</a> de la « Jeep connectée ».
-      <br/>Ils ont pu suivre les déplacements de la voiture, démarrer et 
arrêter le
+<br/>Ils ont pu suivre les déplacements de la voiture, démarrer et arrêter 
le
 moteur, activer et désactiver les freins, et plus encore.
-    </p>
-    <p>
-      J'imagine que Chrysler et la NSA peuvent faire de même.
-    </p>
-    <p>
-      Si un jour je possède une voiture et qu'elle contient un téléphone 
portable,
+</p>
+<p>
+J'imagine que Chrysler et la NSA peuvent faire de même.
+</p>
+<p>
+Si un jour je possède une voiture et qu'elle contient un téléphone portable,
 je le désactiverai.
-    </p>
-  </li>
+</p>
+</li>
   
 <li>
 <p>
@@ -275,7 +285,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2015/10/07 06:32:58 $
+$Date: 2015/10/19 19:00:42 $
 
 <!-- timestamp end -->
 </p>

Index: po/malware-apple.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.fr-en.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- po/malware-apple.fr-en.html 16 Oct 2015 21:01:44 -0000      1.10
+++ po/malware-apple.fr-en.html 19 Oct 2015 19:00:52 -0000      1.11
@@ -61,23 +61,36 @@
 
 <h3 id="back-doors">Apple Back Doors</h3>
 <ul>
-  <li><p>The iPhone has a back door <a
-  
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html";>
-  that allows Apple to remotely delete apps</a> which Apple considers
-  &ldquo;inappropriate&rdquo;. Jobs said it's OK for Apple to have this
-  power because of course we can trust Apple.</p>
-  </li>
+<li><p>
+Mac OS X had an
+<a 
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/";>
+intentional local back door for 4 years</a>, which could be
+exploited by attackers to gain root privileges.
+</p></li>
 
-  <li><p>The iPhone has a back door for <a
-  
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone";>
-  remote wipe</a>.  It's not always enabled, but users are led into
-  enabling it without understanding.</p>
-  </li>
+<li><p>The iPhone has a back door <a
+href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html";>
+that allows Apple to remotely delete apps</a> which Apple considers
+&ldquo;inappropriate&rdquo;. Jobs said it's OK for Apple to have this
+power because of course we can trust Apple.
+</p></li>
+
+<li><p>The iPhone has a back door for <a
+href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone";>
+remote wipe</a>.  It's not always enabled, but users are led into
+enabling it without understanding.
+</p></li>
 </ul>
 
 <h3 id="censorship">Apple Censorship</h3>
 <ul>
 <li><p>
+Apple <a href="http://ifixit.org/blog/7401/ifixit-app-pulled/";>
+banned a program from the App Store</a> because its developers
+committed the enormity of disassembling some iThings.
+</p></li>
+
+<li><p>
 Apple rejected an app that displayed the locations of US drone
 assassinations, giving various excuses. Each time the developers
 fixed one &ldquo;problem&rdquo;, Apple complained about another.
@@ -329,7 +342,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/10/16 21:01:44 $
+$Date: 2015/10/19 19:00:52 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-back-doors.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr-en.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- po/proprietary-back-doors.fr-en.html        17 Oct 2015 12:28:42 -0000      
1.5
+++ po/proprietary-back-doors.fr-en.html        19 Oct 2015 19:00:52 -0000      
1.6
@@ -11,6 +11,11 @@
 
 <ul>
 <li><p>
+Mac OS X had an <a 
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/";>
+intentional local back door for 4 years</a>.
+</p></li>
+
+<li><p>
 Users report <a 
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all";>
 Microsoft is forcing them to replace Windows 7 and 8 with
 all-spying Windows 10</a>.</p>
@@ -254,7 +259,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/10/17 12:28:42 $
+$Date: 2015/10/19 19:00:52 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-censorship.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.fr-en.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- po/proprietary-censorship.fr-en.html        16 Oct 2015 15:59:46 -0000      
1.4
+++ po/proprietary-censorship.fr-en.html        19 Oct 2015 19:00:53 -0000      
1.5
@@ -17,6 +17,12 @@
 
 <ul>
 <li><p>
+Apple <a href="http://ifixit.org/blog/7401/ifixit-app-pulled/";>
+banned a program from the App Store</a> because its developers
+committed the enormity of disassembling some iThings.
+</p></li>
+
+<li><p>
 Apple rejected an app that displayed the locations of US drone
 assassinations, giving various excuses. Each time the developers
 fixed one &ldquo;problem&rdquo;, Apple complained about another.
@@ -100,7 +106,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/10/16 15:59:46 $
+$Date: 2015/10/19 19:00:53 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-insecurity.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr-en.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- po/proprietary-insecurity.fr-en.html        7 Oct 2015 06:33:00 -0000       
1.10
+++ po/proprietary-insecurity.fr-en.html        19 Oct 2015 19:00:53 -0000      
1.11
@@ -20,31 +20,40 @@
 deliberately, and <em>the users are helpless to fix them</em>.</p>
 
 <ul>
+<li>
+<p>
+Mac OS X had an
+<a 
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/";>
+intentional local back door for 4 years</a>, which could be
+exploited by attackers to gain root privileges.
+</p>
+</li>
 
 <li>
 <p>Security researchers discovered a
 <a 
href="http://www.theguardian.com/technology/2015/aug/12/hack-car-brakes-sms-text";>
 vulnerability in diagnostic dongles used for vehicle tracking and
 insurance</a> that let them take remote control of a car or
-lorry using an SMS.</p>
+lorry using an SMS.
+</p>
 </li>
 
-  <li>
-    <p>
-      Crackers were able to
-      <a 
href="http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/";>take
 remote control of the Jeep</a>
-      &ldquo;connected car&rdquo;.
-      <br/>They could track the car, start or stop the engine, and
-      activate or deactivate the brakes, and more.
-    </p>
-    <p>
-      I expect that Chrysler and the NSA can do this too.
-    </p>
-    <p>
-      If I ever own a car, and it contains a portable phone, I will
-      deactivate that.
-    </p>
-  </li>
+<li>
+<p>
+Crackers were able to
+<a 
href="http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/";>take
 remote control of the Jeep</a>
+&ldquo;connected car&rdquo;.
+<br/>They could track the car, start or stop the engine, and
+activate or deactivate the brakes, and more.
+</p>
+<p>
+I expect that Chrysler and the NSA can do this too.
+</p>
+<p>
+If I ever own a car, and it contains a portable phone, I will
+deactivate that.
+</p>
+</li>
   
 <li>
 <p>
@@ -233,7 +242,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/10/07 06:33:00 $
+$Date: 2015/10/19 19:00:53 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]