www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary proprietary-insecurity.fr.html ...


From: GNUN
Subject: www/proprietary proprietary-insecurity.fr.html ...
Date: Thu, 22 Oct 2015 15:31:44 +0000

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     15/10/22 15:31:44

Modified files:
        proprietary    : proprietary-insecurity.fr.html 
        proprietary/po : proprietary-insecurity.fr-en.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.fr.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr-en.html?cvsroot=www&r1=1.11&r2=1.12

Patches:
Index: proprietary-insecurity.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.fr.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- proprietary-insecurity.fr.html      19 Oct 2015 19:00:42 -0000      1.12
+++ proprietary-insecurity.fr.html      22 Oct 2015 15:31:43 -0000      1.13
@@ -28,6 +28,16 @@
 <ul>
 <li>
 <p>
+« Les disque durs à chiffrement automatique utilisent pour ce faire un
+micrologiciel <cite>[firmware]</cite> privateur, auquel par conséquent on ne
+peut pas se fier. Les disques « My Passport » de Western Digital <a
+href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption";>
+ont une porte dérobée</a>.
+</p>
+</li>
+
+<li>
+<p>
 Pendant quatre ans, MacOS X a eu <a
 
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/";>
 une porte dérobée intentionnelle</a> qui pouvait être exploitée par des
@@ -285,7 +295,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2015/10/19 19:00:42 $
+$Date: 2015/10/22 15:31:43 $
 
 <!-- timestamp end -->
 </p>

Index: po/proprietary-insecurity.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr-en.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- po/proprietary-insecurity.fr-en.html        19 Oct 2015 19:00:53 -0000      
1.11
+++ po/proprietary-insecurity.fr-en.html        22 Oct 2015 15:31:44 -0000      
1.12
@@ -22,6 +22,15 @@
 <ul>
 <li>
 <p>
+&ldquo;Self-encrypting&rdquo; disk drives do the encryption with proprietary
+firmware so you can't trust it. Western Digital's &ldquo;My Passport&rdquo;
+drives
+<a 
href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption";>have
 a back door</a>.
+</p>
+</li>
+
+<li>
+<p>
 Mac OS X had an
 <a 
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/";>
 intentional local back door for 4 years</a>, which could be
@@ -242,7 +251,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/10/19 19:00:53 $
+$Date: 2015/10/22 15:31:44 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]