[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary proprietary-back-doors.html pro...
From: |
Dora Scilipoti |
Subject: |
www/proprietary proprietary-back-doors.html pro... |
Date: |
Mon, 11 Jan 2016 19:57:47 +0000 |
CVSROOT: /web/www
Module name: www
Changes by: Dora Scilipoti <dora> 16/01/11 19:57:47
Modified files:
proprietary : proprietary-back-doors.html
proprietary-surveillance.html
Log message:
Add new items (RTs #1070132, #1073015, #1078028).
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.html?cvsroot=www&r1=1.40&r2=1.41
Patches:
Index: proprietary-back-doors.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary-back-doors.html 22 Dec 2015 11:34:53 -0000 1.17
+++ proprietary-back-doors.html 11 Jan 2016 19:57:45 -0000 1.18
@@ -9,7 +9,24 @@
<p>Here are examples of demonstrated back doors in proprietary software.</p>
+<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
<ul>
+ <li><p>Modern gratis game cr…apps
+ <a
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
+ collect a wide range of data about their users and their users'
+ friends and associates</a>.</p>
+
+ <p>Even nastier, they do it through ad networks that merge the data
+ collected by various cr…apps and sites made by different
+ companies.</p>
+
+ <p>They use this data to manipulate people to buy things, and hunt
+ for “whales” who can be led to spend a lot of money. They
+ also use a back door to manipulate the game play for specific
players.</p>
+
+ <p>While the article describes gratis games, games that cost money
+ can use the same tactics.</p>
+ </li>
<li>
<p>Dell computers, shipped with Windows, had a bogus root
certificate that
@@ -291,7 +308,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2015/12/22 11:34:53 $
+$Date: 2016/01/11 19:57:45 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.html,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- proprietary-surveillance.html 12 Dec 2015 08:28:46 -0000 1.40
+++ proprietary-surveillance.html 11 Jan 2016 19:57:46 -0000 1.41
@@ -52,12 +52,14 @@
<li><a href="#SpywareInTVSets">Spyware in TV Sets</a></li>
</ul>
</li>
+ <li><a href="#SpywareAtPlay">Spyware at Play</a></li>
<li><a href="#SpywareOnTheWeb">Spyware on the Web</a>
<ul>
<li><a href="#SpywareInChrome">Spyware in Chrome</a></li>
<li><a href="#SpywareInFlash">Spyware in Flash</a></li>
</ul>
</li>
+ <li><a href="#SpywareEverywhere">Spyware Everywhere</a></li>
</ul>
</div><!-- /class="toc" -->
@@ -107,6 +109,10 @@
</div>
<ul>
+ <li>It appears
+ <a
href="http://www.ghacks.net/2016/01/05/microsoft-may-be-collecting-more-data-than-initially-thought/">
+ Windows 10 sends data to Microsoft about what applications are
+ running</a>.</li>
<li><p>A downgrade to Windows 10 deleted surveillance-detection
applications. Then another downgrade inserted a general spying
program. Users noticed this and complained, so Microsoft
@@ -707,10 +713,33 @@
</li>
</ul>
+<!-- #SpywareAtPlay -->
+<div class="big-section">
+ <h3 id="SpywareAtPlay">Spyware at Play</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtPlay">#SpywareAtPlay</a>)</span>
+</div>
+<div style="clear: left;"></div>
+<ul>
+ <li><p>Modern gratis game cr…apps
+ <a
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
+ collect a wide range of data about their users and their users'
+ friends and associates</a>.</p>
+
+ <p>Even nastier, they do it through ad networks that merge the data
+ collected by various cr…apps and sites made by different
+ companies.</p>
+
+ <p>They use this data to manipulate people to buy things, and hunt
+ for “whales” who can be led to spend a lot of money. They
+ also use a back door to manipulate the game play for specific
players.</p>
+
+ <p>While the article describes gratis games, games that cost money
+ can use the same tactics.</p>
+ </li>
+</ul>
<!-- #SpywareOnTheWeb -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
<div class="big-section">
<h3 id="SpywareOnTheWeb">Spyware on the Web</h3>
@@ -760,6 +789,7 @@
</li>
</ul>
+<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
<div class="big-subsection">
<h4 id="SpywareInChrome">Spyware in Chrome</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInChrome">#SpywareInChrome</a>)</span>
@@ -792,6 +822,20 @@
<p><a href="/philosophy/javascript-trap.html">Javascript code</a>
is another method of “fingerprinting” devices.</p>
+
+<!-- #SpywareEverywhere -->
+<div class="big-section">
+ <h3 id="SpywareEverywhere">Spyware Everywhere</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareEverywhere">#SpywareEverywhere</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p><a
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping">
+ Intel devices will be able to listen for speech all the time, even when
“off.”</a></p>
+ </li>
+</ul>
+
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
<div id="footer">
@@ -849,7 +893,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2015/12/12 08:28:46 $
+$Date: 2016/01/11 19:57:46 $
<!-- timestamp end -->
</p>
</div>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary proprietary-back-doors.html pro...,
Dora Scilipoti <=