[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-mobiles.html
From: |
Félicien PILLOT |
Subject: |
www/proprietary malware-mobiles.html |
Date: |
Fri, 28 Jul 2017 06:44:50 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: FĂ©licien PILLOT <felandral> 17/07/28 06:44:50
Modified files:
proprietary : malware-mobiles.html
Log message:
Replace <dl> list by <ul> sub-list, to preserve structure (as in
malware-webpages.html)
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.html?cvsroot=www&r1=1.44&r2=1.45
Patches:
Index: malware-mobiles.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.html,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- malware-mobiles.html 25 Jun 2017 12:20:25 -0000 1.44
+++ malware-mobiles.html 28 Jul 2017 10:44:49 -0000 1.45
@@ -168,39 +168,39 @@
the research paper that tracks and infringes the privacy of
users:</p>
- <dl>
- <dt>SurfEasy</dt>
- <dd>Includes tracking libraries such as NativeX and Appflood,
- meant to track users and show them targeted ads.</dd>
+ <ul>
+ <li><em>SurfEasy</em><br />
+ Includes tracking libraries such as NativeX and Appflood,
+ meant to track users and show them targeted ads.</li>
- <dt>sFly Network Booster</dt>
- <dd>Requests the <code>READ_SMS</code> and <code>SEND_SMS</code>
+ <li><em>sFly Network Booster</em><br />
+ Requests the <code>READ_SMS</code> and <code>SEND_SMS</code>
permissions upon installation, meaning it has full access to
- users' text messages.</dd>
+ users' text messages.</li>
- <dt>DroidVPN and TigerVPN</dt>
- <dd>Requests the <code>READ_LOGS</code> permission to read logs
+ <li><em>DroidVPN and TigerVPN</em><br />
+ Requests the <code>READ_LOGS</code> permission to read logs
for other apps and also core system logs. TigerVPN developers
- have confirmed this.</dd>
+ have confirmed this.</li>
- <dt>HideMyAss</dt>
- <dd>Sends traffic to LinkedIn. Also, it stores detailed logs
+ <li><em>HideMyAss</em><br />
+ Sends traffic to LinkedIn. Also, it stores detailed logs
and may turn them over to the UK government if
- requested.</dd>
+ requested.</li>
- <dt>VPN Services HotspotShield</dt>
- <dd>Injects JavaScript code into the HTML pages returned to the
+ <li><em>VPN Services HotspotShield</em><br />
+ Injects JavaScript code into the HTML pages returned to the
users. The stated purpose of the JS injection is to display
ads. Uses roughly 5 tracking libraries. Also, it redirects the
user's traffic through valueclick.com (an advertising
- website).</dd>
+ website).</li>
- <dt>WiFi Protector VPN</dt>
- <dd>Injects JavaScript code into HTML pages, and also uses
+ <li><em>WiFi Protector VPN</em><br />
+ Injects JavaScript code into HTML pages, and also uses
roughly 5 tracking libraries. Developers of this app have
confirmed that the non-premium version of the app does
- JavaScript injection for tracking and display ads.</dd>
- </dl>
+ JavaScript injection for tracking and display ads.</li>
+ </ul>
</li>
<li>
@@ -472,7 +472,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/06/25 12:20:25 $
+$Date: 2017/07/28 10:44:49 $
<!-- timestamp end -->
</p>
</div>
- www/proprietary malware-mobiles.html,
Félicien PILLOT <=