[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-appliances.de.html malw...
From: |
GNUN |
Subject: |
www/proprietary malware-appliances.de.html malw... |
Date: |
Tue, 23 May 2017 13:59:41 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 17/05/23 13:59:41
Modified files:
proprietary : malware-appliances.de.html
malware-appliances.fr.html
malware-appliances.ru.html
malware-google.fr.html malware-google.ru.html
malware-mobiles.es.html malware-mobiles.fr.html
malware-mobiles.ru.html
proprietary-surveillance.de.html
proprietary-surveillance.fr.html
proprietary-surveillance.it.html
proprietary-surveillance.ru.html
proprietary/po : malware-appliances.de-en.html
malware-appliances.fr-en.html
malware-appliances.ru-en.html
malware-google.fr-en.html
malware-google.ru-en.html
malware-mobiles.es-en.html
malware-mobiles.fr-en.html
malware-mobiles.ja-diff.html
malware-mobiles.ru-en.html
proprietary-surveillance.de-en.html
proprietary-surveillance.fr-en.html
proprietary-surveillance.it-en.html
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ru-en.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.de.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.fr.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.ru.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-google.fr.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-google.ru.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.es.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.fr.html?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.ru.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.de.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.fr.html?cvsroot=www&r1=1.82&r2=1.83
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.it.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.ru.html?cvsroot=www&r1=1.82&r2=1.83
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de-en.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.fr-en.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.ru-en.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.fr-en.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.ru-en.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es-en.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr-en.html?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru-en.html?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-en.html?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr-en.html?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-en.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru-en.html?cvsroot=www&r1=1.78&r2=1.79
Patches:
Index: malware-appliances.de.html
===================================================================
RCS file: /web/www/www/proprietary/malware-appliances.de.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- malware-appliances.de.html 8 May 2017 03:04:34 -0000 1.2
+++ malware-appliances.de.html 23 May 2017 17:59:40 -0000 1.3
@@ -304,7 +304,7 @@
Autos lässt Verbraucher verrückt werden</a>.</p>
</li>
-<li>
+<li id="cameras-bugs">
<p>Ãberwachungskameras mit Verbindung ins Internet von mehr als <a
href="//www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"
title="Remote Code Execution in CCTV-DVR affecting over 70 different
@@ -494,7 +494,7 @@
einem Botnetz</a> gemacht, um Kreditkartendaten von Kunden zu sammeln.</p>
</li>
-<li>
+<li id="vizio-snoop">
<p>Vizio<ins>, ein nicht börsennotiertes US-Unternehmen im Bereich
Unterhaltungselektronik,</ins> <a
href="//boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"
@@ -761,7 +761,7 @@
<p class="unprintable"><!-- timestamp start -->
Letzte Ãnderung:
-$Date: 2017/05/08 03:04:34 $
+$Date: 2017/05/23 17:59:40 $
<!-- timestamp end -->
</p>
Index: malware-appliances.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-appliances.fr.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- malware-appliances.fr.html 24 Apr 2017 14:29:20 -0000 1.19
+++ malware-appliances.fr.html 23 May 2017 17:59:40 -0000 1.20
@@ -267,7 +267,7 @@
DRM des voitures vont conduire les consommateurs à la démence</a>.</p>
</li>
-<li>
+<li id="cameras-bugs">
<p>Plus de 70 modèles de caméras de surveillance connectées au réseau <a
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">ont
des failles de sécurité qui permettent à n'importe qui de s'en servir pour
@@ -429,7 +429,7 @@
en botnet afin de récupérer les numéros de cartes de crédit des
clients</a>.</p>
</li>
-<li>
+<li id="vizio-snoop">
<p>Vizio <a
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">a
utilisé une « mise à niveau » du micrologiciel <cite>[firmware]</cite>
pour
@@ -661,7 +661,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2017/04/24 14:29:20 $
+$Date: 2017/05/23 17:59:40 $
<!-- timestamp end -->
</p>
Index: malware-appliances.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-appliances.ru.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- malware-appliances.ru.html 24 Apr 2017 11:01:40 -0000 1.18
+++ malware-appliances.ru.html 23 May 2017 17:59:40 -0000 1.19
@@ -259,7 +259,7 @@
беÑенÑÑво</a>.</p>
</li>
-<li>
+<li id="cameras-bugs">
<p>РкамеÑаÑ
наблÑÐ´ÐµÐ½Ð¸Ñ Ð±Ð¾Ð»ÐµÐµ 70 маÑок
обнаÑÑÐ¶ÐµÐ½Ñ <a
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">недоÑеÑÑ
безопаÑноÑÑи, позволÑÑÑие ÐºÐ¾Ð¼Ñ Ñгодно
подглÑдÑваÑÑ ÑеÑез ниÑ
</a>.</p>
@@ -420,7 +420,7 @@
каÑÑ ÐºÐ»Ð¸ÐµÐ½Ñов.</p>
</li>
-<li>
+<li id="vizio-snoop">
<p>Vizio <a
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
воÑполÑзовалаÑÑ “обновлением”
пÑогÑамм в ÑÑÑÑойÑÑваÑ
, ÑÑобÑ
@@ -650,7 +650,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2017/04/24 11:01:40 $
+$Date: 2017/05/23 17:59:40 $
<!-- timestamp end -->
</p>
Index: malware-google.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-google.fr.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- malware-google.fr.html 18 May 2017 16:29:14 -0000 1.11
+++ malware-google.fr.html 23 May 2017 17:59:40 -0000 1.12
@@ -192,7 +192,8 @@
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">enregistre
toutes les conversations</a>.</p>
</li>
- <li><p>Les thermomètres de Nest envoient au serveur <a
+ <li id="nest-thermometers">
+ <p>Les thermomètres de Nest envoient au serveur <a
href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">beaucoup de
données concernant l'utilisateur</a>.</p>
</li>
@@ -330,7 +331,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2017/05/18 16:29:14 $
+$Date: 2017/05/23 17:59:40 $
<!-- timestamp end -->
</p>
Index: malware-google.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-google.ru.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- malware-google.ru.html 18 May 2017 09:29:12 -0000 1.11
+++ malware-google.ru.html 23 May 2017 17:59:40 -0000 1.12
@@ -183,7 +183,8 @@
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">ведеÑ
пÑоÑокол вÑеÑ
пеÑеговоÑов</a>.</p>
</li>
- <li><p>ТеÑмомеÑÑÑ Nest <a
+ <li id="nest-thermometers">
+ <p>ТеÑмомеÑÑÑ Nest <a
href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">вÑÑÑлаÑÑ
много
даннÑÑ
о полÑзоваÑеле</a>.</p>
</li>
@@ -322,7 +323,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2017/05/18 09:29:12 $
+$Date: 2017/05/23 17:59:40 $
<!-- timestamp end -->
</p>
Index: malware-mobiles.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.es.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- malware-mobiles.es.html 19 May 2017 16:28:44 -0000 1.21
+++ malware-mobiles.es.html 23 May 2017 17:59:40 -0000 1.22
@@ -68,13 +68,15 @@
<h3 id="back-doors">Puertas traseras en los móviles</h3>
<ul>
- <li><p>La puerta trasera universal en los teléfonos móviles <a
+ <li id="back-door-microphone">
+ <p>La puerta trasera universal en los teléfonos móviles <a
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html/">se
emplea para convertirlos en dispositivos de escucha a través de sus
micrófonos</a>.</p>
</li>
- <li><p>La mayorÃa de los teléfonos móviles tienen una puerta trasera
universal que
+ <li id="back-door-malicious">
+ <p>La mayorÃa de los teléfonos móviles tienen una puerta trasera
universal que
ha sido utilizada para <a
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
convertirlos en maliciosos</a>.</p>
@@ -455,7 +457,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2017/05/19 16:28:44 $
+$Date: 2017/05/23 17:59:40 $
<!-- timestamp end -->
</p>
Index: malware-mobiles.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.fr.html,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- malware-mobiles.fr.html 18 May 2017 16:59:14 -0000 1.23
+++ malware-mobiles.fr.html 23 May 2017 17:59:40 -0000 1.24
@@ -66,12 +66,14 @@
<h3 id="back-doors">Portes dérobées</h3>
<ul>
- <li><p>La porte dérobée universelle des téléphones portables <a
+ <li id="back-door-microphone">
+ <p>La porte dérobée universelle des téléphones portables <a
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">est
utilisée pour écouter leur micro</a>.</p>
</li>
- <li><p>La plupart des téléphones mobiles ont une porte dérobée
universelle qui a
+ <li id="back-door-malicious">
+ <p>La plupart des téléphones mobiles ont une porte dérobée universelle
qui a
été utilisée pour <a
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">les
rendre malfaisants</a>.</p>
@@ -460,7 +462,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2017/05/18 16:59:14 $
+$Date: 2017/05/23 17:59:40 $
<!-- timestamp end -->
</p>
Index: malware-mobiles.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.ru.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- malware-mobiles.ru.html 18 May 2017 09:29:12 -0000 1.25
+++ malware-mobiles.ru.html 23 May 2017 17:59:40 -0000 1.26
@@ -65,12 +65,14 @@
<h3 id="back-doors">Ðазейки</h3>
<ul>
- <li><p>УнивеÑÑалÑнÑй ÑеÑнÑй Ñ
од в мобилÑнÑÑ
ÑелеÑонаÑ
<a
+ <li id="back-door-microphone">
+ <p>УнивеÑÑалÑнÑй ÑеÑнÑй Ñ
од в мобилÑнÑÑ
ÑелеÑонаÑ
<a
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
задейÑÑвÑеÑÑÑ Ð´Ð»Ñ Ð¿ÑоÑлÑÑÐ¸Ð²Ð°Ð½Ð¸Ñ ÑеÑез иÑ
микÑоÑонÑ</a>.</p>
</li>
- <li><p><a
+ <li id="back-door-malicious">
+ <p><a
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
РболÑÑинÑÑве мобилÑнÑÑ
ÑелеÑонов еÑÑÑ
ÑнивеÑÑалÑнÑй ÑеÑнÑй Ñ
од</a>, коÑоÑÑй
пÑименÑли Ð´Ð»Ñ Ð¿ÑевÑаÑÐµÐ½Ð¸Ñ Ð¸Ñ
во
вÑедоноÑнÑе ÑÑÑÑойÑÑва.</p>
@@ -452,7 +454,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2017/05/18 09:29:12 $
+$Date: 2017/05/23 17:59:40 $
<!-- timestamp end -->
</p>
Index: proprietary-surveillance.de.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.de.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- proprietary-surveillance.de.html 10 May 2017 14:30:06 -0000 1.25
+++ proprietary-surveillance.de.html 23 May 2017 17:59:40 -0000 1.26
@@ -1077,7 +1077,7 @@
unter: bloomberg.com 2016.">schnüffeln Geräte aus</a>.</p>
</li>
- <li><p>Das <ins>GroÃserien-Elektroauto</ins> <b>Nissan Leaf</b> hat ein
eingebautes
+ <li id="nissan-modem"><p>Das <ins>GroÃserien-Elektroauto</ins> <b>Nissan
Leaf</b> hat ein eingebautes
Infotainment-System, das praktisch jedermann via Mobilfunkmodem erlaubt <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"
title="Controlling vehicle features of Nissan LEAFs across the globe via
@@ -1099,7 +1099,7 @@
â¦</p>
</li>
- <li><p>Proprietäre Software in Autos <a
+ <li id="records-drivers"><p>Proprietäre Software in Autos <a
href="//www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"
title="Chris Woodyard and Jayne O'Donnell, Your car may be invading your
privacy, unter: www.usatoday.com 2013.">zeichnet Informationen über
@@ -1667,7 +1667,7 @@
<p class="unprintable"><!-- timestamp start -->
Letzte Ãnderung:
-$Date: 2017/05/10 14:30:06 $
+$Date: 2017/05/23 17:59:40 $
<!-- timestamp end -->
</p>
Index: proprietary-surveillance.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.fr.html,v
retrieving revision 1.82
retrieving revision 1.83
diff -u -b -r1.82 -r1.83
--- proprietary-surveillance.fr.html 10 May 2017 14:30:06 -0000 1.82
+++ proprietary-surveillance.fr.html 23 May 2017 17:59:40 -0000 1.83
@@ -960,7 +960,7 @@
des instruments d'espionnage</a>.</p>
</li>
- <li><p>La « Leaf » de Nissan a un modem de téléphonie mobile intégré
qui permet Ã
+ <li id="nissan-modem"><p>La « Leaf » de Nissan a un modem de
téléphonie mobile intégré qui permet Ã
n'importe qui <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">d'accéder
à distance à ses ordinateurs et de changer différents réglages</a>.</p>
@@ -978,7 +978,7 @@
physiquement.</p>
</li>
- <li><p>Dans certaines voitures, un logiciel privateur <a
+ <li id="records-drivers"><p>Dans certaines voitures, un logiciel privateur <a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">enregistre
l'information concernant les mouvements des conducteurs</a>, information qui
est mise à disposition des constructeurs automobiles et des compagnies
@@ -1438,7 +1438,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2017/05/10 14:30:06 $
+$Date: 2017/05/23 17:59:40 $
<!-- timestamp end -->
</p>
Index: proprietary-surveillance.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.it.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- proprietary-surveillance.it.html 11 May 2017 21:29:25 -0000 1.34
+++ proprietary-surveillance.it.html 23 May 2017 17:59:40 -0000 1.35
@@ -945,7 +945,7 @@
spiano gli utenti</a>.</p>
</li>
- <li><p>La Nissan Leaf ha un modem che permette a chiunque di <a
+ <li id="nissan-modem"><p>La Nissan Leaf ha un modem che permette a chiunque
di <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">accedere
da remoto al computer di bordo e modificare alcune impostazioni</a>.</p>
@@ -961,7 +961,7 @@
ma è possibile rimuovere il modem.</p>
</li>
- <li><p>Il software proprietario nelle auto <a
+ <li id="records-drivers"><p>Il software proprietario nelle auto <a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">registra
informazioni sui movimenti dei guidatori</a> e ke rende disponibili ai
produttori di auto, alle compagnie assicurative e ad altri.</p>
@@ -1401,7 +1401,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2017/05/11 21:29:25 $
+$Date: 2017/05/23 17:59:40 $
<!-- timestamp end -->
</p>
Index: proprietary-surveillance.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.ru.html,v
retrieving revision 1.82
retrieving revision 1.83
diff -u -b -r1.82 -r1.83
--- proprietary-surveillance.ru.html 10 May 2017 14:30:06 -0000 1.82
+++ proprietary-surveillance.ru.html 23 May 2017 17:59:40 -0000 1.83
@@ -950,7 +950,7 @@
ÑпионÑÑими ÑÑÑÑойÑÑвами</a>.</p>
</li>
- <li><p>Ð Nissan Leaf еÑÑÑ Ð²ÑÑÑоеннÑй ÑелеÑоннÑй
модем, позволÑÑÑий ÑакÑиÑеÑки комÑ
+ <li id="nissan-modem"><p>Ð Nissan Leaf еÑÑÑ Ð²ÑÑÑоеннÑй
ÑелеÑоннÑй модем, позволÑÑÑий ÑакÑиÑеÑки
комÑ
Ñгодно <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">полÑÑаÑÑ
ÑдаленнÑй доÑÑÑп к компÑÑÑеÑам и вноÑиÑÑ
Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ Ð² ÑазлиÑнÑе
@@ -967,7 +967,7 @@
авÑомобилÑ; Ñ
оÑÑ Ð¼Ð¾Ð¶Ð½Ð¾ ÑизиÑеÑки ÑдалиÑÑ
модем ÑоÑовой ÑвÑзи.</p>
</li>
- <li><p>ÐеÑвободнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð² авÑомобилÑÑ
<a
+ <li id="records-drivers"><p>ÐеÑвободнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð²
авÑомобилÑÑ
<a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">запиÑÑваÑÑ
ÑÐ²ÐµÐ´ÐµÐ½Ð¸Ñ Ð¾ движениÑÑ
водиÑелей</a>, а заÑем
пеÑедаÑÑ Ð¸Ñ
пÑоизводиÑелÑм
авÑомобилÑ, ÑÑÑаÑ
овÑм компаниÑм и
пÑоÑим.</p>
@@ -1415,7 +1415,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2017/05/10 14:30:06 $
+$Date: 2017/05/23 17:59:40 $
<!-- timestamp end -->
</p>
Index: po/malware-appliances.de-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de-en.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- po/malware-appliances.de-en.html 8 May 2017 03:04:34 -0000 1.2
+++ po/malware-appliances.de-en.html 23 May 2017 17:59:40 -0000 1.3
@@ -243,7 +243,7 @@
DRM in cars will drive consumers crazy</a>.</p>
</li>
-<li>
+<li id="cameras-bugs">
<p>Over 70 brands of network-connected surveillance cameras have <a
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
security bugs that allow anyone to watch through them</a>.</p>
@@ -401,7 +401,7 @@
numbers.</p>
</li>
-<li>
+<li id="vizio-snoop">
<p>Vizio
<a href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
used a firmware “upgrade” to make its TVs snoop on what
@@ -607,7 +607,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/05/08 03:04:34 $
+$Date: 2017/05/23 17:59:40 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-appliances.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.fr-en.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- po/malware-appliances.fr-en.html 24 Apr 2017 14:29:20 -0000 1.19
+++ po/malware-appliances.fr-en.html 23 May 2017 17:59:40 -0000 1.20
@@ -243,7 +243,7 @@
DRM in cars will drive consumers crazy</a>.</p>
</li>
-<li>
+<li id="cameras-bugs">
<p>Over 70 brands of network-connected surveillance cameras have <a
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
security bugs that allow anyone to watch through them</a>.</p>
@@ -401,7 +401,7 @@
numbers.</p>
</li>
-<li>
+<li id="vizio-snoop">
<p>Vizio
<a href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
used a firmware “upgrade” to make its TVs snoop on what
@@ -607,7 +607,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/04/24 14:29:20 $
+$Date: 2017/05/23 17:59:40 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-appliances.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.ru-en.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- po/malware-appliances.ru-en.html 24 Apr 2017 11:01:41 -0000 1.19
+++ po/malware-appliances.ru-en.html 23 May 2017 17:59:40 -0000 1.20
@@ -243,7 +243,7 @@
DRM in cars will drive consumers crazy</a>.</p>
</li>
-<li>
+<li id="cameras-bugs">
<p>Over 70 brands of network-connected surveillance cameras have <a
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
security bugs that allow anyone to watch through them</a>.</p>
@@ -401,7 +401,7 @@
numbers.</p>
</li>
-<li>
+<li id="vizio-snoop">
<p>Vizio
<a href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
used a firmware “upgrade” to make its TVs snoop on what
@@ -607,7 +607,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/04/24 11:01:41 $
+$Date: 2017/05/23 17:59:40 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-google.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.fr-en.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- po/malware-google.fr-en.html 18 May 2017 16:29:14 -0000 1.10
+++ po/malware-google.fr-en.html 23 May 2017 17:59:40 -0000 1.11
@@ -167,7 +167,8 @@
<li><p>Google's new voice messaging app <a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
all conversations</a>.</p>
</li>
- <li><p>Nest thermometers
+ <li id="nest-thermometers">
+ <p>Nest thermometers
send <a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
lot of data about the user</a>.</p>
</li>
@@ -277,7 +278,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/05/18 16:29:14 $
+$Date: 2017/05/23 17:59:40 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-google.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.ru-en.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- po/malware-google.ru-en.html 18 May 2017 09:29:13 -0000 1.11
+++ po/malware-google.ru-en.html 23 May 2017 17:59:40 -0000 1.12
@@ -167,7 +167,8 @@
<li><p>Google's new voice messaging app <a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
all conversations</a>.</p>
</li>
- <li><p>Nest thermometers
+ <li id="nest-thermometers">
+ <p>Nest thermometers
send <a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
lot of data about the user</a>.</p>
</li>
@@ -277,7 +278,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/05/18 09:29:13 $
+$Date: 2017/05/23 17:59:40 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-mobiles.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es-en.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- po/malware-mobiles.es-en.html 19 May 2017 16:28:45 -0000 1.19
+++ po/malware-mobiles.es-en.html 23 May 2017 17:59:40 -0000 1.20
@@ -54,12 +54,14 @@
<h3 id="back-doors">Mobile Back Doors</h3>
<ul>
- <li><p>The universal back door in portable phones <a
+ <li id="back-door-microphone">
+ <p>The universal back door in portable phones <a
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">is
employed to listen through their microphones</a>.</p>
</li>
- <li><p>Most mobile phones have a universal back door, which has been
+ <li id="back-door-malicious">
+ <p>Most mobile phones have a universal back door, which has been
used to <a
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
turn them malicious</a>.</p>
@@ -400,7 +402,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/05/19 16:28:45 $
+$Date: 2017/05/23 17:59:40 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-mobiles.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr-en.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- po/malware-mobiles.fr-en.html 18 May 2017 16:59:14 -0000 1.22
+++ po/malware-mobiles.fr-en.html 23 May 2017 17:59:40 -0000 1.23
@@ -54,12 +54,14 @@
<h3 id="back-doors">Mobile Back Doors</h3>
<ul>
- <li><p>The universal back door in portable phones <a
+ <li id="back-door-microphone">
+ <p>The universal back door in portable phones <a
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">is
employed to listen through their microphones</a>.</p>
</li>
- <li><p>Most mobile phones have a universal back door, which has been
+ <li id="back-door-malicious">
+ <p>Most mobile phones have a universal back door, which has been
used to <a
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
turn them malicious</a>.</p>
@@ -400,7 +402,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/05/18 16:59:14 $
+$Date: 2017/05/23 17:59:40 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- po/malware-mobiles.ja-diff.html 18 May 2017 05:32:18 -0000 1.10
+++ po/malware-mobiles.ja-diff.html 23 May 2017 17:59:40 -0000 1.11
@@ -75,12 +75,17 @@
<h3 id="back-doors">Mobile Back Doors</h3>
<ul>
- <li><p>The universal back door in portable phones <a
+ <span
class="removed"><del><strong><li><p>The</strong></del></span>
+ <span class="inserted"><ins><em><li id="back-door-microphone">
+ <p>The</em></ins></span> universal back door in portable phones <a
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">is
employed to listen through their microphones</a>.</p>
</li>
- <li><p>Most mobile phones have a universal back door, which has
been
+ <span
class="removed"><del><strong><li><p>Most</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="back-door-malicious">
+ <p>Most</em></ins></span> mobile phones have a universal back door,
which has been
used to <a
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
turn them malicious</a>.</p>
@@ -421,7 +426,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/05/18 05:32:18 $
+$Date: 2017/05/23 17:59:40 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-mobiles.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru-en.html,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- po/malware-mobiles.ru-en.html 18 May 2017 09:29:13 -0000 1.23
+++ po/malware-mobiles.ru-en.html 23 May 2017 17:59:40 -0000 1.24
@@ -54,12 +54,14 @@
<h3 id="back-doors">Mobile Back Doors</h3>
<ul>
- <li><p>The universal back door in portable phones <a
+ <li id="back-door-microphone">
+ <p>The universal back door in portable phones <a
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">is
employed to listen through their microphones</a>.</p>
</li>
- <li><p>Most mobile phones have a universal back door, which has been
+ <li id="back-door-malicious">
+ <p>Most mobile phones have a universal back door, which has been
used to <a
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
turn them malicious</a>.</p>
@@ -400,7 +402,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/05/18 09:29:13 $
+$Date: 2017/05/23 17:59:40 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-surveillance.de-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-en.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- po/proprietary-surveillance.de-en.html 10 May 2017 14:30:06 -0000
1.22
+++ po/proprietary-surveillance.de-en.html 23 May 2017 17:59:40 -0000
1.23
@@ -906,7 +906,7 @@
snooping devices</a>.</p>
</li>
- <li><p>The Nissan Leaf has a built-in cell phone modem which allows
+ <li id="nissan-modem"><p>The Nissan Leaf has a built-in cell phone modem
which allows
effectively
anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
access its computers remotely and make changes in various
@@ -925,7 +925,7 @@
though.</p>
</li>
- <li><p>Proprietary software in cars
+ <li id="records-drivers"><p>Proprietary software in cars
<a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
which is made available to car manufacturers, insurance companies, and
others.</p>
@@ -1325,7 +1325,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/05/10 14:30:06 $
+$Date: 2017/05/23 17:59:40 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-surveillance.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr-en.html,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- po/proprietary-surveillance.fr-en.html 10 May 2017 14:30:06 -0000
1.75
+++ po/proprietary-surveillance.fr-en.html 23 May 2017 17:59:40 -0000
1.76
@@ -906,7 +906,7 @@
snooping devices</a>.</p>
</li>
- <li><p>The Nissan Leaf has a built-in cell phone modem which allows
+ <li id="nissan-modem"><p>The Nissan Leaf has a built-in cell phone modem
which allows
effectively
anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
access its computers remotely and make changes in various
@@ -925,7 +925,7 @@
though.</p>
</li>
- <li><p>Proprietary software in cars
+ <li id="records-drivers"><p>Proprietary software in cars
<a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
which is made available to car manufacturers, insurance companies, and
others.</p>
@@ -1325,7 +1325,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/05/10 14:30:06 $
+$Date: 2017/05/23 17:59:40 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-surveillance.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-en.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- po/proprietary-surveillance.it-en.html 11 May 2017 21:29:25 -0000
1.31
+++ po/proprietary-surveillance.it-en.html 23 May 2017 17:59:40 -0000
1.32
@@ -906,7 +906,7 @@
snooping devices</a>.</p>
</li>
- <li><p>The Nissan Leaf has a built-in cell phone modem which allows
+ <li id="nissan-modem"><p>The Nissan Leaf has a built-in cell phone modem
which allows
effectively
anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
access its computers remotely and make changes in various
@@ -925,7 +925,7 @@
though.</p>
</li>
- <li><p>Proprietary software in cars
+ <li id="records-drivers"><p>Proprietary software in cars
<a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
which is made available to car manufacturers, insurance companies, and
others.</p>
@@ -1325,7 +1325,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/05/11 21:29:25 $
+$Date: 2017/05/23 17:59:40 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- po/proprietary-surveillance.ja-diff.html 10 May 2017 14:30:06 -0000
1.19
+++ po/proprietary-surveillance.ja-diff.html 23 May 2017 17:59:40 -0000
1.20
@@ -771,34 +771,33 @@
<p>The company's statement that it <span
class="removed"><del><strong>anonymizes</strong></del></span> <span
class="inserted"><ins><em>was anonymizing</em></ins></span> the data may be
true, but it doesn't really matter. If it <span
class="removed"><del><strong>sells</strong></del></span> <span
class="inserted"><ins><em>had sold</em></ins></span> the data to a
data broker, the data broker <span
class="removed"><del><strong>can</strong></del></span> <span
class="inserted"><ins><em>would have been able to</em></ins></span> figure out
- who the <span class="removed"><del><strong>user is.</p>
- </li>
-
- <li><p>A computerized
- vibrator <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">snoops
- on its users through the proprietary control app</a>.</p>
-
- <p>The app reports</strong></del></span> <span
class="inserted"><ins><em>user was.</p>
+ who the user <span
class="removed"><del><strong>is.</p></strong></del></span> <span
class="inserted"><ins><em>was.</p>
<p>Following this lawsuit,
- <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></em></ins></span>
- the <span
class="removed"><del><strong>temperature</strong></del></span> <span
class="inserted"><ins><em>company has been ordered to pay a
total</em></ins></span> of <span class="inserted"><ins><em>C$4m</a>
- to its customers.</p>
+ <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company has been ordered to pay a total of C$4m</a>
+ to its customers.</p></em></ins></span>
</li>
- <li><p> “CloudPets” toys with microphones
- <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to</em></ins></span> the <span
class="removed"><del><strong>vibrator minute by
- minute (thus, indirectly, whether it is surrounded
by</strong></del></span>
+ <span class="removed"><del><strong><li><p>A computerized
+ vibrator</strong></del></span>
+
+ <span class="inserted"><ins><em><li><p> “CloudPets”
toys with microphones</em></ins></span>
+ <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">snoops
+ on its users through the proprietary control app</a>.</p>
+
+ <p>The app reports</strong></del></span> <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to</em></ins></span> the <span
class="removed"><del><strong>temperature of</strong></del></span>
<span class="inserted"><ins><em>manufacturer</a>. Guess what?
- <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found</em></ins></span> a <span class="removed"><del><strong>person's
- body), and</strong></del></span> <span class="inserted"><ins><em>way to
access</em></ins></span> the <span class="removed"><del><strong>vibration
frequency.</p>
+ <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a way to access</em></ins></span> the <span
class="removed"><del><strong>vibrator minute by
+ minute (thus, indirectly, whether it is surrounded</strong></del></span>
<span class="inserted"><ins><em>data</a>
+ collected</em></ins></span> by <span class="removed"><del><strong>a
person's
+ body), and</strong></del></span> the <span
class="removed"><del><strong>vibration frequency.</p>
- <p>Note</strong></del></span> <span
class="inserted"><ins><em>data</a>
- collected by</em></ins></span> the <span
class="removed"><del><strong>totally inadequate proposed response: a labeling
- standard with which manufacturers would make statements about
- their products, rather than free software which users can
check</strong></del></span> <span class="inserted"><ins><em>manufacturer's
snooping.</p>
+ <p>Note</strong></del></span> <span
class="inserted"><ins><em>manufacturer's snooping.</p>
- <p>That the manufacturer</em></ins></span> and <span
class="removed"><del><strong>change.</p>
+ <p>That</em></ins></span> the <span
class="removed"><del><strong>totally inadequate proposed response: a labeling
+ standard with which manufacturers would make statements about
+ their products, rather than free software which users can
check</strong></del></span> <span
class="inserted"><ins><em>manufacturer</em></ins></span> and <span
class="removed"><del><strong>change.</p>
</li></strong></del></span> <span class="inserted"><ins><em>the FBI
could listen to these conversations
was unacceptable by itself.</p></li></em></ins></span>
@@ -935,7 +934,9 @@
snooping devices</a>.</p>
</li>
- <li><p>The Nissan Leaf has a built-in cell phone modem which
allows
+ <span
class="removed"><del><strong><li><p>The</strong></del></span>
+
+ <span class="inserted"><ins><em><li
id="nissan-modem"><p>The</em></ins></span> Nissan Leaf has a built-in
cell phone modem which allows
effectively
anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
access its computers remotely and make changes in various
@@ -954,7 +955,9 @@
though.</p>
</li>
- <li><p>Proprietary software in cars
+ <span
class="removed"><del><strong><li><p>Proprietary</strong></del></span>
+
+ <span class="inserted"><ins><em><li
id="records-drivers"><p>Proprietary</em></ins></span> software in cars
<a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
which is made available to car manufacturers, insurance companies, and
others.</p>
@@ -1355,7 +1358,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/05/10 14:30:06 $
+$Date: 2017/05/23 17:59:40 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-surveillance.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru-en.html,v
retrieving revision 1.78
retrieving revision 1.79
diff -u -b -r1.78 -r1.79
--- po/proprietary-surveillance.ru-en.html 10 May 2017 14:30:06 -0000
1.78
+++ po/proprietary-surveillance.ru-en.html 23 May 2017 17:59:40 -0000
1.79
@@ -906,7 +906,7 @@
snooping devices</a>.</p>
</li>
- <li><p>The Nissan Leaf has a built-in cell phone modem which allows
+ <li id="nissan-modem"><p>The Nissan Leaf has a built-in cell phone modem
which allows
effectively
anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
access its computers remotely and make changes in various
@@ -925,7 +925,7 @@
though.</p>
</li>
- <li><p>Proprietary software in cars
+ <li id="records-drivers"><p>Proprietary software in cars
<a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
which is made available to car manufacturers, insurance companies, and
others.</p>
@@ -1325,7 +1325,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/05/10 14:30:06 $
+$Date: 2017/05/23 17:59:40 $
<!-- timestamp end -->
</p>
</div>
- www/proprietary malware-appliances.de.html malw...,
GNUN <=