[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary proprietary-insecurity.fr.html ...
From: |
GNUN |
Subject: |
www/proprietary proprietary-insecurity.fr.html ... |
Date: |
Thu, 22 Oct 2015 15:31:44 +0000 |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 15/10/22 15:31:44
Modified files:
proprietary : proprietary-insecurity.fr.html
proprietary/po : proprietary-insecurity.fr-en.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.fr.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr-en.html?cvsroot=www&r1=1.11&r2=1.12
Patches:
Index: proprietary-insecurity.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.fr.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- proprietary-insecurity.fr.html 19 Oct 2015 19:00:42 -0000 1.12
+++ proprietary-insecurity.fr.html 22 Oct 2015 15:31:43 -0000 1.13
@@ -28,6 +28,16 @@
<ul>
<li>
<p>
+« Les disque durs à chiffrement automatique utilisent pour ce faire un
+micrologiciel <cite>[firmware]</cite> privateur, auquel par conséquent on ne
+peut pas se fier. Les disques « My Passport » de Western Digital <a
+href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">
+ont une porte dérobée</a>.
+</p>
+</li>
+
+<li>
+<p>
Pendant quatre ans, MacOS X a eu <a
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
une porte dérobée intentionnelle</a> qui pouvait être exploitée par des
@@ -285,7 +295,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2015/10/19 19:00:42 $
+$Date: 2015/10/22 15:31:43 $
<!-- timestamp end -->
</p>
Index: po/proprietary-insecurity.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr-en.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- po/proprietary-insecurity.fr-en.html 19 Oct 2015 19:00:53 -0000
1.11
+++ po/proprietary-insecurity.fr-en.html 22 Oct 2015 15:31:44 -0000
1.12
@@ -22,6 +22,15 @@
<ul>
<li>
<p>
+“Self-encrypting” disk drives do the encryption with proprietary
+firmware so you can't trust it. Western Digital's “My Passport”
+drives
+<a
href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">have
a back door</a>.
+</p>
+</li>
+
+<li>
+<p>
Mac OS X had an
<a
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
intentional local back door for 4 years</a>, which could be
@@ -242,7 +251,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2015/10/19 19:00:53 $
+$Date: 2015/10/22 15:31:44 $
<!-- timestamp end -->
</p>
</div>