www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-mobiles.de.html malware...


From: GNUN
Subject: www/proprietary malware-mobiles.de.html malware...
Date: Tue, 26 Sep 2017 07:00:50 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     17/09/26 07:00:50

Modified files:
        proprietary    : malware-mobiles.de.html malware-mobiles.it.html 
        proprietary/po : malware-mobiles.de-diff.html 
                         malware-mobiles.it-diff.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.de.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.it.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.6&r2=1.7

Patches:
Index: malware-mobiles.de.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.de.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- malware-mobiles.de.html     20 Jul 2017 12:59:45 -0000      1.17
+++ malware-mobiles.de.html     26 Sep 2017 11:00:49 -0000      1.18
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/malware-mobiles.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/malware-mobiles.de.po">
+ https://www.gnu.org/proprietary/po/malware-mobiles.de.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/malware-mobiles.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/malware-mobiles.de-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2017-07-28" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/malware-mobiles.en.html" -->
 
 <!--#include virtual="/server/header.de.html" -->
 <!-- Parent-Version: 1.83 -->
@@ -8,6 +13,7 @@
 
 <!--#include virtual="/proprietary/po/malware-mobiles.translist" -->
 <!--#include virtual="/server/banner.de.html" -->
+<!--#include virtual="/server/outdated.de.html" -->
 <h2>Schadprogramme auf Mobilgeräten</h2>
 
 <p><a href="/proprietary/">Weitere Beispiele proprietärer 
Schadsoftware</a></p>
@@ -635,7 +641,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Letzte Änderung:
 
-$Date: 2017/07/20 12:59:45 $
+$Date: 2017/09/26 11:00:49 $
 
 <!-- timestamp end -->
 </p>

Index: malware-mobiles.it.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.it.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- malware-mobiles.it.html     6 Jul 2017 20:59:54 -0000       1.17
+++ malware-mobiles.it.html     26 Sep 2017 11:00:49 -0000      1.18
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/malware-mobiles.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/malware-mobiles.it.po">
+ https://www.gnu.org/proprietary/po/malware-mobiles.it.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/malware-mobiles.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/malware-mobiles.it-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2017-07-28" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/malware-mobiles.en.html" -->
 
 <!--#include virtual="/server/header.it.html" -->
 <!-- Parent-Version: 1.83 -->
@@ -8,6 +13,7 @@
 
 <!--#include virtual="/proprietary/po/malware-mobiles.translist" -->
 <!--#include virtual="/server/banner.it.html" -->
+<!--#include virtual="/server/outdated.it.html" -->
 <h2>Malware nei dispositivi mobili</h2>
 
 <p><a href="/proprietary/proprietary.html">Altri esempi di malware
@@ -512,7 +518,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2017/07/06 20:59:54 $
+$Date: 2017/09/26 11:00:49 $
 
 <!-- timestamp end -->
 </p>

Index: po/malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- po/malware-mobiles.de-diff.html     17 Jul 2017 05:30:12 -0000      1.5
+++ po/malware-mobiles.de-diff.html     26 Sep 2017 11:00:50 -0000      1.6
@@ -11,10 +11,15 @@
 </style></head>
 <body><pre>
 &lt;!--#include virtual="/server/header.html" --&gt;
-&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.79</strong></del></span> <span 
class="inserted"><ins><em>1.83</em></ins></span> --&gt;
+&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.83</strong></del></span> <span 
class="inserted"><ins><em>1.84</em></ins></span> --&gt;
 &lt;title&gt;Malware in Mobile Devices
 - GNU Project - Free Software Foundation&lt;/title&gt;
- &lt;!--#include virtual="/proprietary/po/malware-mobiles.translist" --&gt;
+<span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;&lt;!--
+li dl { margin-top: .3em; }
+li dl dt { margin: .3em 0 0 0; font-weight: normal; font-style: italic; }
+li dl dd { margin: 0 3%; }
+--&gt;&lt;/style&gt;</em></ins></span>
+&lt;!--#include virtual="/proprietary/po/malware-mobiles.translist" --&gt;
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Malware in Mobile Devices&lt;/h2&gt;
 
@@ -66,20 +71,20 @@
 
 &lt;h3 id="back-doors"&gt;Mobile Back Doors&lt;/h3&gt;
 &lt;ul&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The</strong></del></span>
-  <span class="inserted"><ins><em>&lt;li id="back-door-microphone"&gt;
-    &lt;p&gt;The</em></ins></span> universal back door in portable phones &lt;a
-    
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;is
-    employed to listen through their microphones&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Most</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="back-door-malicious"&gt;
-    &lt;p&gt;Most</em></ins></span> mobile phones have a universal back door, 
which has been
-      used to &lt;a
-  
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
+  <span class="removed"><del><strong>&lt;li 
id="back-door-microphone"&gt;</strong></del></span>
+  <span class="inserted"><ins><em>&lt;li&gt;</em></ins></span>
+    &lt;p&gt;The universal back door in portable phones
+      &lt;a
+    <span 
class="removed"><del><strong>href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;is</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;
+        is</em></ins></span> employed to listen through their 
microphones&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;/li&gt;
+
+  &lt;li id="back-door-malicious"&gt;</strong></del></span>
+    &lt;p&gt;Most mobile phones have <span 
class="removed"><del><strong>a</strong></del></span> <span 
class="inserted"><ins><em>this</em></ins></span> universal back door, which has 
been
+      used to
+      &lt;a 
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
   turn them malicious&lt;/a&gt;.&lt;/p&gt;
+    <span class="inserted"><ins><em>&lt;p&gt;More about &lt;a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;the
 nature of this problem&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor"&gt;
@@ -95,7 +100,7 @@
   &lt;li&gt;
   &lt;p&gt;In Android, &lt;a
   
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"&gt;
-  Google has a back door to remotely delete apps.&lt;/a&gt;  (It is in a 
program
+  Google has a back door to remotely delete <span 
class="removed"><del><strong>apps.&lt;/a&gt;  (It</strong></del></span> <span 
class="inserted"><ins><em>apps&lt;/a&gt; (it</em></ins></span> is in a program
   called GTalkService).
   &lt;/p&gt;
 
@@ -127,6 +132,12 @@
 &lt;ul&gt;
 
 &lt;li&gt;
+  <span class="inserted"><ins><em>&lt;p&gt;Siri, Alexa, and all the other 
voice-control systems can be
+  &lt;a 
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;hijacked
 by programs that play commands in ultrasound that humans can't hear&lt;/a&gt;.
+  &lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;</em></ins></span>
   &lt;p&gt;Many Android devices &lt;a 
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/"&gt;
        can be hijacked through their Wi-Fi chips&lt;/a&gt; because of a bug in
        Broadcom's non-free firmware.&lt;/p&gt;
@@ -136,7 +147,8 @@
 &lt;p&gt;Samsung
 phones &lt;a 
href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"&gt;have
 a security hole that allows an SMS message to install
-ransomeware&lt;/a&gt;.&lt;/p&gt;
+<span 
class="removed"><del><strong>ransomeware&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+<span 
class="inserted"><ins><em>ransomware&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
 &lt;/li&gt;
 
 &lt;li&gt;
@@ -160,9 +172,19 @@
 
 &lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
 &lt;ul&gt;
+  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;The Sarahah app 
+      &lt;a 
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
+      uploads all phone numbers and email addresses&lt;/a&gt; in user's address
+      book to developer's server.  Note that this article misuses the words
+      &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
+      referring to zero price.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Some portable phones &lt;a 
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+      sold with spyware sending lots of data to 
China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;</em></ins></span>
 
 &lt;li&gt;
-  <span class="inserted"><ins><em>&lt;p&gt;Facebook's app listens all the 
time, &lt;a 
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop
+  &lt;p&gt;Facebook's app listens all the time, &lt;a 
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop
   on what people are listening to or watching&lt;/a&gt;. In addition, it may
   be analyzing people's conversations to serve them with targeted
   advertisements.&lt;/p&gt;
@@ -231,7 +253,7 @@
   perfectly.&lt;/p&gt;
 &lt;/li&gt;
 
-&lt;li&gt;</em></ins></span>
+&lt;li&gt;
   &lt;p&gt;A study found 234 Android apps that track users by
        &lt;a 
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
        to ultrasound from beacons placed in stores or played by TV 
programs&lt;/a&gt;.
@@ -358,7 +380,7 @@
   Journal (in an article blocked from us by a paywall) reports that &lt;a
   
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
   the FBI can remotely activate the GPS and microphone in Android phones
-  and <span class="inserted"><ins><em>in</em></ins></span> laptops&lt;/a&gt;. 
(I suspect this means Windows laptops.) Here is &lt;a
+  and in laptops&lt;/a&gt;. (I suspect this means Windows laptops.) Here is 
&lt;a
   href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -386,7 +408,7 @@
 &lt;h3 id="drm"&gt;Mobile DRM&lt;/h3&gt;
 &lt;ul&gt;
 
-<span class="inserted"><ins><em>&lt;li id="android-apps-detect-rooting"&gt;
+&lt;li id="android-apps-detect-rooting"&gt;
 &lt;p&gt;Google now allows Android apps to detect whether a device has been
 rooted, &lt;a 
href="http://www.androidpolice.com/2017/05/13/netflix-confirms-blocking-rootedunlocked-devices-app-still-working-now/"&gt;and
 refuse to install
 if so&lt;/a&gt;.&lt;/p&gt;
@@ -394,7 +416,7 @@
 &lt;p&gt;Update: Google &lt;i&gt;intentionally&lt;/i&gt; &lt;a 
href="https://torrentfreak.com/netflix-use-of-google-drm-means-rooted-android-devices-are-banned-170515/"&gt;
 changed Android so that apps can detect rooted devices and refuse to
 run on them&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;</em></ins></span>
+&lt;/li&gt;
 
   &lt;li&gt;
   &lt;p&gt;The iPhone 7 contains DRM specifically designed to &lt;a
@@ -487,7 +509,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2017/07/17 05:30:12 $
+$Date: 2017/09/26 11:00:50 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- po/malware-mobiles.it-diff.html     26 Mar 2017 19:00:34 -0000      1.6
+++ po/malware-mobiles.it-diff.html     26 Sep 2017 11:00:50 -0000      1.7
@@ -11,16 +11,15 @@
 </style></head>
 <body><pre>
 &lt;!--#include virtual="/server/header.html" --&gt;
-&lt;!-- Parent-Version: 1.79 --&gt;
+&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.83</strong></del></span> <span 
class="inserted"><ins><em>1.84</em></ins></span> --&gt;
 &lt;title&gt;Malware in Mobile Devices
 - GNU Project - Free Software Foundation&lt;/title&gt;
- &lt;!--#include virtual="/proprietary/po/malware-mobiles.translist" --&gt;
-<span class="removed"><del><strong>&lt;style type="text/css" 
media="print,screen"&gt;
-&lt;!--
-#content div.toc li { list-style: none; margin-bottom: 1em; }
-#content div.toc { margin-top: 1em; }
---&gt;
-&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;&lt;!--
+li dl { margin-top: .3em; }
+li dl dt { margin: .3em 0 0 0; font-weight: normal; font-style: italic; }
+li dl dd { margin: 0 3%; }
+--&gt;&lt;/style&gt;</em></ins></span>
+&lt;!--#include virtual="/proprietary/po/malware-mobiles.translist" --&gt;
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Malware in Mobile Devices&lt;/h2&gt;
 
@@ -50,21 +49,18 @@
 the &lt;a href="/proprietary/malware-apple.html"&gt;the Apple malware
 page&lt;/a&gt; for malicious functionalities specific to the Apple 
iThings.&lt;/p&gt;
 
-&lt;div <span class="removed"><del><strong>class="toc"&gt;
-&lt;div class="malfunctions"&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="summary" style="margin-top: 1em"&gt;
-&lt;h3&gt;Type&nbsp;of malware&lt;/h3&gt;</em></ins></span>
+&lt;div class="summary" style="margin-top: 1em"&gt;
+&lt;h3&gt;Type&nbsp;of malware&lt;/h3&gt;
 &lt;ul&gt;
-<span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 &lt;li&gt;&lt;a href="#back-doors"&gt;Back doors&lt;/a&gt;&lt;/li&gt;
 &lt;!--&lt;li&gt;&lt;a 
href="#censorship"&gt;Censorship&lt;/a&gt;&lt;/li&gt;--&gt;
 &lt;li&gt;&lt;a href="#insecurity"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;
 &lt;!--&lt;li&gt;&lt;a href="#sabotage"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;--&gt;
 &lt;!--&lt;li&gt;&lt;a 
href="#interference"&gt;Interference&lt;/a&gt;&lt;/li&gt;--&gt;
 &lt;li&gt;&lt;a href="#surveillance"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
-<span class="removed"><del><strong>&lt;!--&lt;li&gt;&lt;a</strong></del></span>
-<span class="inserted"><ins><em>&lt;li&gt;&lt;a</em></ins></span> 
href="#drm"&gt;Digital restrictions
+&lt;li&gt;&lt;a href="#drm"&gt;Digital restrictions
     management&lt;/a&gt; or &ldquo;DRM&rdquo; means functionalities designed
-    to restrict what users can do with the data in their <span 
class="removed"><del><strong>computers.&lt;/li&gt;--&gt;</strong></del></span> 
<span class="inserted"><ins><em>computers.&lt;/li&gt;</em></ins></span>
+    to restrict what users can do with the data in their computers.&lt;/li&gt;
 &lt;li&gt;&lt;a href="#jails"&gt;Jails&lt;/a&gt;&mdash;systems
     that impose censorship on application programs.&lt;/li&gt;
 &lt;li&gt;&lt;a href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems
@@ -72,19 +68,23 @@
     manufacturer.&lt;/li&gt;
 &lt;/ul&gt;
 &lt;/div&gt;
-<span class="removed"><del><strong>&lt;/div&gt;</strong></del></span>
 
 &lt;h3 id="back-doors"&gt;Mobile Back Doors&lt;/h3&gt;
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;The universal back door in portable phones &lt;a
-    
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;is
-    employed to listen through their microphones&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Most mobile phones have a universal back door, which has 
been
-  used to &lt;a
-  
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
+  <span class="removed"><del><strong>&lt;li 
id="back-door-microphone"&gt;</strong></del></span>
+  <span class="inserted"><ins><em>&lt;li&gt;</em></ins></span>
+    &lt;p&gt;The universal back door in portable phones
+      &lt;a
+    <span 
class="removed"><del><strong>href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;is</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;
+        is</em></ins></span> employed to listen through their 
microphones&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;/li&gt;
+
+  &lt;li id="back-door-malicious"&gt;</strong></del></span>
+    &lt;p&gt;Most mobile phones have <span 
class="removed"><del><strong>a</strong></del></span> <span 
class="inserted"><ins><em>this</em></ins></span> universal back door, which has 
been
+      used to
+      &lt;a 
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
   turn them malicious&lt;/a&gt;.&lt;/p&gt;
+    <span class="inserted"><ins><em>&lt;p&gt;More about &lt;a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;the
 nature of this problem&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor"&gt;
@@ -100,7 +100,7 @@
   &lt;li&gt;
   &lt;p&gt;In Android, &lt;a
   
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"&gt;
-  Google has a back door to remotely delete apps.&lt;/a&gt;  (It is in a 
program
+  Google has a back door to remotely delete <span 
class="removed"><del><strong>apps.&lt;/a&gt;  (It</strong></del></span> <span 
class="inserted"><ins><em>apps&lt;/a&gt; (it</em></ins></span> is in a program
   called GTalkService).
   &lt;/p&gt;
 
@@ -123,15 +123,35 @@
 &lt;/ul&gt;
 
 &lt;h3 id="insecurity"&gt;Mobile Insecurity&lt;/h3&gt;
+
+&lt;p&gt;These bugs are/were not intentional, so unlike the rest of the file
+  they do not count as malware. We mention them to refute the
+  supposition that prestigious proprietary software doesn't have grave
+  bugs.&lt;/p&gt;
+
 &lt;ul&gt;
+
 &lt;li&gt;
-<span class="inserted"><ins><em>&lt;p&gt;Samsung
+  <span class="inserted"><ins><em>&lt;p&gt;Siri, Alexa, and all the other 
voice-control systems can be
+  &lt;a 
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;hijacked
 by programs that play commands in ultrasound that humans can't hear&lt;/a&gt;.
+  &lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;</em></ins></span>
+  &lt;p&gt;Many Android devices &lt;a 
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/"&gt;
+       can be hijacked through their Wi-Fi chips&lt;/a&gt; because of a bug in
+       Broadcom's non-free firmware.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Samsung
 phones &lt;a 
href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"&gt;have
 a security hole that allows an SMS message to install
-ransomeware&lt;/a&gt;.&lt;/p&gt;
+<span 
class="removed"><del><strong>ransomeware&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+<span 
class="inserted"><ins><em>ransomware&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
 &lt;/li&gt;
 
-&lt;li&gt;</em></ins></span>
+&lt;li&gt;
 &lt;p&gt;Many proprietary payment apps &lt;a
 
href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data"&gt;
 transmit personal data in an insecure way&lt;/a&gt;.
@@ -152,9 +172,152 @@
 
 &lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
 &lt;ul&gt;
-<span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;The Meitu photo-editing
+  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;The Sarahah app 
+      &lt;a 
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
+      uploads all phone numbers and email addresses&lt;/a&gt; in user's address
+      book to developer's server.  Note that this article misuses the words
+      &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
+      referring to zero price.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Some portable phones &lt;a 
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+      sold with spyware sending lots of data to 
China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;</em></ins></span>
+
+&lt;li&gt;
+  &lt;p&gt;Facebook's app listens all the time, &lt;a 
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop
+  on what people are listening to or watching&lt;/a&gt;. In addition, it may
+  be analyzing people's conversations to serve them with targeted
+  advertisements.&lt;/p&gt;
+&lt;/li&gt;
+
+
+&lt;li&gt;
+  &lt;p&gt;A
+    &lt;a 
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
+      research paper&lt;/a&gt; that investigated the privacy and security
+    of 283 Android VPN apps concluded that &ldquo;in spite of the
+    promises for privacy, security, and anonymity given by the
+    majority of VPN apps&mdash;millions of users may be unawarely subject
+    to poor security guarantees and abusive practices inflicted by
+    VPN apps.&rdquo;&lt;/p&gt;
+
+  &lt;p&gt;Following is a non-exhaustive list of proprietary VPN apps from
+    the research paper that tracks and infringes the privacy of
+    users:&lt;/p&gt;
+
+  &lt;dl&gt;
+    &lt;dt&gt;SurfEasy&lt;/dt&gt;
+      &lt;dd&gt;Includes tracking libraries such as NativeX and Appflood,
+      meant to track users and show them targeted ads.&lt;/dd&gt;
+
+    &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
+      &lt;dd&gt;Requests the &lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
+      permissions upon installation, meaning it has full access to
+      users' text messages.&lt;/dd&gt;
+
+    &lt;dt&gt;DroidVPN and TigerVPN&lt;/dt&gt;
+      &lt;dd&gt;Requests the &lt;code&gt;READ_LOGS&lt;/code&gt; permission to 
read logs
+      for other apps and also core system logs. TigerVPN developers
+      have confirmed this.&lt;/dd&gt;
+
+    &lt;dt&gt;HideMyAss&lt;/dt&gt;
+      &lt;dd&gt;Sends traffic to LinkedIn. Also, it stores detailed logs
+      and may turn them over to the UK government if
+      requested.&lt;/dd&gt;
+
+    &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
+      &lt;dd&gt;Injects JavaScript code into the HTML pages returned to the
+      users. The stated purpose of the JS injection is to display
+      ads. Uses roughly 5 tracking libraries. Also, it redirects the
+      user's traffic through valueclick.com (an advertising
+      website).&lt;/dd&gt;
+
+    &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
+      &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses
+      roughly 5 tracking libraries. Developers of this app have
+      confirmed that the non-premium version of the app does
+      JavaScript injection for tracking and display ads.&lt;/dd&gt;
+  &lt;/dl&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A 
study in 2015&lt;/a&gt; found that 90% of the top-ranked gratis
+  proprietary Android apps contained recognizable tracking libraries. For 
+  the paid proprietary apps, it was only 60%.&lt;/p&gt;
+
+  &lt;p&gt;The article confusingly describes gratis apps as &ldquo;free&rdquo;,
+  but most of them are not in fact
+  &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.
+  It also uses the ugly word &ldquo;monetize&rdquo;. A good replacement
+  for that word is &ldquo;exploit&rdquo;; nearly always that will fit
+  perfectly.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;A study found 234 Android apps that track users by
+       &lt;a 
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
+       to ultrasound from beacons placed in stores or played by TV 
programs&lt;/a&gt;.
+       &lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+               &lt;p&gt;Faceapp appears to do lots of surveillance, judging by 
+    &lt;a 
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+               how much access it demands to personal data in the 
device&lt;/a&gt;.
+               &lt;/p&gt;
+ &lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Pairs of Android apps can collude to transmit users' personal data
+       to servers. &lt;a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
+       tens of thousands of pairs that collude.&lt;/a&gt;&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Google Play intentionally sends app developers &lt;a
+href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
+the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not enough
+to legitimize actions like this.  At this point, most users have
+stopped reading the &ldquo;Terms and Conditions&rdquo; that spell out
+what they are &ldquo;consenting&rdquo; to.  Google should clearly
+and honestly identify the information it collects on users, instead
+of hiding it in an obscurely worded EULA.&lt;/p&gt;
+
+&lt;p&gt;However, to truly protect people's privacy, we must prevent Google
+and other companies from getting this personal information in the first
+place!&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Google Play (a component of Android) &lt;a
+  
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
+  tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;Even if you disable Google Maps and location tracking, you must
+  disable Google Play itself to completely stop the tracking.  This is
+  yet another example of nonfree software pretending to obey the user,
+  when it's actually doing something else.  Such a thing would be almost
+  unthinkable with free software.&lt;/p&gt;
+
+&lt;/li&gt;
+&lt;li&gt;
+   &lt;p&gt;Verizon &lt;a 
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
+        announced an opt-in proprietary search app that it will&lt;/a&gt;
+        pre-install on some of its phones. The app will give Verizon the same
+   information about the users' searches that Google normally gets when
+   they use its search engine.&lt;/p&gt;
+
+   &lt;p&gt;Currently, the app is &lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed on only one phone&lt;/a&gt;, and the
+    user must explicitly opt-in before the app takes effect. However, the
+    app remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
+    still spyware.&lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;&lt;p&gt;The Meitu photo-editing
 app &lt;a 
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-user data to a Chinese 
company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;</em></ins></span>
+user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
 &lt;li&gt;
 &lt;p&gt;A half-blind security critique of a tracking app: it found that &lt;a
@@ -217,7 +380,7 @@
   Journal (in an article blocked from us by a paywall) reports that &lt;a
   
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
   the FBI can remotely activate the GPS and microphone in Android phones
-  and laptops&lt;/a&gt;. (I suspect this means Windows laptops.) Here is &lt;a
+  and in laptops&lt;/a&gt;. (I suspect this means Windows laptops.) Here is 
&lt;a
   href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -242,14 +405,37 @@
   &lt;/li&gt;
 &lt;/ul&gt;
 
-&lt;h3 <span class="inserted"><ins><em>id="drm"&gt;Mobile DRM&lt;/h3&gt;
+&lt;h3 id="drm"&gt;Mobile DRM&lt;/h3&gt;
 &lt;ul&gt;
+
+&lt;li id="android-apps-detect-rooting"&gt;
+&lt;p&gt;Google now allows Android apps to detect whether a device has been
+rooted, &lt;a 
href="http://www.androidpolice.com/2017/05/13/netflix-confirms-blocking-rootedunlocked-devices-app-still-working-now/"&gt;and
 refuse to install
+if so&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Update: Google &lt;i&gt;intentionally&lt;/i&gt; &lt;a 
href="https://torrentfreak.com/netflix-use-of-google-drm-means-rooted-android-devices-are-banned-170515/"&gt;
+changed Android so that apps can detect rooted devices and refuse to
+run on them&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+  &lt;li&gt;
+  &lt;p&gt;The iPhone 7 contains DRM specifically designed to &lt;a
+  
href="https://motherboard.vice.com/en_us/article/iphone-7-home-button-unreplaceable-repair-software-lock"&gt;
+  brick it if an &ldquo;unauthorized&rdquo; repair shop fixes it&lt;/a&gt;.
+  &ldquo;Unauthorized&rdquo; essentially means anyone besides Apple.&lt;/p&gt;
+
+  &lt;p&gt;The article uses the term &ldquo;lock&rdquo; to describe the DRM,
+  but we prefer to use the term &lt;a
+  href="https://gnu.org/philosophy/words-to-avoid.html#DigitalLocks"&gt;
+  digital handcuffs&lt;/a&gt;.&lt;/p&gt;
+ &lt;/li&gt;
+
   &lt;li&gt;&lt;p&gt;Android &lt;a 
href="https://developer.android.com/reference/android/drm/package-summary.html"&gt;contains
         facilities specifically to support DRM&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
-&lt;h3</em></ins></span> id="jails"&gt;Mobile Jails&lt;/h3&gt;
+&lt;h3 id="jails"&gt;Mobile Jails&lt;/h3&gt;
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;&lt;a
   href="https://fsf.org/campaigns/secure-boot-vs-restricted-boot/"&gt;Mobile
@@ -313,7 +499,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2014, 2015, <span 
class="removed"><del><strong>2016</strong></del></span> <span 
class="inserted"><ins><em>2016, 2017</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, 
Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
@@ -323,7 +509,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2017/03/26 19:00:34 $
+$Date: 2017/09/26 11:00:50 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;



reply via email to

[Prev in Thread] Current Thread [Next in Thread]