[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www licenses/gpl-faq.fr.html licenses/po/gpl-fa...
From: |
GNUN |
Subject: |
www licenses/gpl-faq.fr.html licenses/po/gpl-fa... |
Date: |
Tue, 13 Mar 2018 07:59:17 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 18/03/13 07:59:17
Modified files:
licenses : gpl-faq.fr.html
licenses/po : gpl-faq.fr-en.html
proprietary : malware-mobiles.de.html
proprietary-back-doors.de.html
proprietary/po : malware-mobiles.de-diff.html
proprietary-back-doors.de-diff.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/licenses/gpl-faq.fr.html?cvsroot=www&r1=1.165&r2=1.166
http://web.cvs.savannah.gnu.org/viewcvs/www/licenses/po/gpl-faq.fr-en.html?cvsroot=www&r1=1.81&r2=1.82
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.de.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.de.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de-diff.html?cvsroot=www&r1=1.2&r2=1.3
Patches:
Index: licenses/gpl-faq.fr.html
===================================================================
RCS file: /web/www/www/licenses/gpl-faq.fr.html,v
retrieving revision 1.165
retrieving revision 1.166
diff -u -b -r1.165 -r1.166
--- licenses/gpl-faq.fr.html 9 Mar 2018 11:29:40 -0000 1.165
+++ licenses/gpl-faq.fr.html 13 Mar 2018 11:59:14 -0000 1.166
@@ -1983,8 +1983,8 @@
a-t-il un effet quelconque ? <span class="anchor-reference-id">(<a
href="#AggregateContainers" >#AggregateContainers</a>)</span></dt>
<dd><p>Non. L'analyse permettant de déterminer s'ils forment <a
-href="/licenses/gpl-faq.html#MereAggregation">une création unique ou un
-agrégat</a> est indépendante de la présence de conteneurs.</p></dd>
+href="#MereAggregation">une création unique ou un agrégat</a> est
+indépendante de la présence de conteneurs.</p></dd>
<dt id="AssignCopyright">Pourquoi la FSF demande-t-elle aux personnes qui
contribuent aux programmes
sous copyright de la FSF de lui transférer leur copyright ? Si je détiens le
@@ -2380,8 +2380,8 @@
sans jamais avoir à la redistribuer à d'autres. Ce que fait cette société
en
est un cas particulier. Par conséquent, la société n'est pas obligée de
publier les sources modifiées. La situation est différente quand le
-programme modifié est régi par la <a
-href="/licenses/gpl-faq.html#UnreleasedModsAGPL">GNU Affero GPL</a>.</p>
+programme modifié est régi par la <a href="#UnreleasedModsAGPL">GNU Affero
+GPL</a>.</p>
<p>Comparez ceci à la situation où le site web contient, ou met en lien, des
programmes indépendants sous GPL qui sont distribués à l'utilisateur
@@ -4122,7 +4122,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2018/03/09 11:29:40 $
+$Date: 2018/03/13 11:59:14 $
<!-- timestamp end -->
</p>
Index: licenses/po/gpl-faq.fr-en.html
===================================================================
RCS file: /web/www/www/licenses/po/gpl-faq.fr-en.html,v
retrieving revision 1.81
retrieving revision 1.82
diff -u -b -r1.81 -r1.82
--- licenses/po/gpl-faq.fr-en.html 9 Mar 2018 11:29:42 -0000 1.81
+++ licenses/po/gpl-faq.fr-en.html 13 Mar 2018 11:59:16 -0000 1.82
@@ -2000,7 +2000,7 @@
<span class="anchor-reference-id">(<a href="#AggregateContainers"
>#AggregateContainers</a>)</span></dt>
<dd><p>No, the analysis of whether they are a <a
-href="/licenses/gpl-faq.html#MereAggregation">single work or an
+href="#MereAggregation">single work or an
aggregate</a> is unchanged by the involvement of containers.</p></dd>
<dt id="AssignCopyright">Why does
@@ -2411,7 +2411,7 @@
case of that. Therefore, the company does not have to release the
modified sources. The situation is different when the modified program
is licensed under the terms of the <a
-href="/licenses/gpl-faq.html#UnreleasedModsAGPL">GNU Affero GPL</a>.</p>
+href="#UnreleasedModsAGPL">GNU Affero GPL</a>.</p>
<p>Compare this to a situation where the web site contains or links to
separate GPL'ed programs that are distributed to the user when they
@@ -3933,7 +3933,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/03/09 11:29:42 $
+$Date: 2018/03/13 11:59:16 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/malware-mobiles.de.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.de.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- proprietary/malware-mobiles.de.html 25 Oct 2017 12:31:02 -0000 1.19
+++ proprietary/malware-mobiles.de.html 13 Mar 2018 11:59:16 -0000 1.20
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/malware-mobiles.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/malware-mobiles.de.po">
+ https://www.gnu.org/proprietary/po/malware-mobiles.de.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/malware-mobiles.html"
+ --><!--#set var="DIFF_FILE"
value="/proprietary/po/malware-mobiles.de-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2018-01-12" --><!--#set
var="ENGLISH_PAGE" value="/proprietary/malware-mobiles.en.html" -->
<!--#include virtual="/server/header.de.html" -->
<!-- Parent-Version: 1.84 -->
@@ -14,6 +19,7 @@
<!--#include virtual="/proprietary/po/malware-mobiles.translist" -->
<!--#include virtual="/server/banner.de.html" -->
+<!--#include virtual="/server/outdated.de.html" -->
<h2>Schadprogramme auf Mobilgeräten</h2>
<p><a href="/proprietary/">Weitere Beispiele proprietärer
Schadsoftware</a></p>
@@ -669,7 +675,7 @@
<p class="unprintable"><!-- timestamp start -->
Letzte Ãnderung:
-$Date: 2017/10/25 12:31:02 $
+$Date: 2018/03/13 11:59:16 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-back-doors.de.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.de.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- proprietary/proprietary-back-doors.de.html 25 Oct 2017 12:31:02 -0000
1.25
+++ proprietary/proprietary-back-doors.de.html 13 Mar 2018 11:59:16 -0000
1.26
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE"
value="/proprietary/proprietary-back-doors.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/proprietary-back-doors.de.po">
+ https://www.gnu.org/proprietary/po/proprietary-back-doors.de.po</a>'
+ --><!--#set var="ORIGINAL_FILE"
value="/proprietary/proprietary-back-doors.html"
+ --><!--#set var="DIFF_FILE"
value="/proprietary/po/proprietary-back-doors.de-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2018-01-12" --><!--#set
var="ENGLISH_PAGE" value="/proprietary/proprietary-back-doors.en.html" -->
<!--#include virtual="/server/header.de.html" -->
<!-- Parent-Version: 1.84 -->
@@ -8,6 +13,7 @@
<!--#include virtual="/proprietary/po/proprietary-back-doors.translist" -->
<!--#include virtual="/server/banner.de.html" -->
+<!--#include virtual="/server/outdated.de.html" -->
<h2>Proprietäre Hintertüren</h2>
<p><a href="/proprietary/">Weitere Beispiele proprietärer
Schadsoftware</a></p>
@@ -570,7 +576,7 @@
<p class="unprintable"><!-- timestamp start -->
Letzte Ãnderung:
-$Date: 2017/10/25 12:31:02 $
+$Date: 2018/03/13 11:59:16 $
<!-- timestamp end -->
</p>
Index: proprietary/po/malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary/po/malware-mobiles.de-diff.html 26 Sep 2017 11:00:50 -0000
1.6
+++ proprietary/po/malware-mobiles.de-diff.html 13 Mar 2018 11:59:16 -0000
1.7
@@ -11,14 +11,14 @@
</style></head>
<body><pre>
<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: <span
class="removed"><del><strong>1.83</strong></del></span> <span
class="inserted"><ins><em>1.84</em></ins></span> -->
+<!-- Parent-Version: <span
class="removed"><del><strong>1.84</strong></del></span> <span
class="inserted"><ins><em>1.85</em></ins></span> -->
<title>Malware in Mobile Devices
- GNU Project - Free Software Foundation</title>
-<span class="inserted"><ins><em><style type="text/css"
media="print,screen"><!--
+<style type="text/css" media="print,screen"><!--
li dl { margin-top: .3em; }
li dl dt { margin: .3em 0 0 0; font-weight: normal; font-style: italic; }
li dl dd { margin: 0 3%; }
---></style></em></ins></span>
+--></style>
<!--#include virtual="/proprietary/po/malware-mobiles.translist" -->
<!--#include virtual="/server/banner.html" -->
<h2>Malware in Mobile Devices</h2>
@@ -43,8 +43,49 @@
the developer's awareness that the users would be powerless to fix any
malicious functionalities tempts the developer to impose some.
</p>
+
+<span class="inserted"><ins><em><p>Nearly all mobile phones do two
grievous wrongs to their users:
+tracking their movements, and listening to their conversations. This
+is why we call them “Stalin's dream”.</p></em></ins></span>
</div>
+<span class="inserted"><ins><em><ul>
+ <li><p>The phone network
+ <a href="https://ssd.eff.org/en/module/problem-mobile-phones">
+ tracks the movements of each phone</a>.</p>
+ <p>This is inherent in the design of the phone network: as long as
+ the phone is in communication with the network, there is no way
+ to stop the network from recording its location. Many countries
+ (including the US and the EU) require the network to store all
+ these location data for months or years.</p>
+ </li>
+ <li><p id="universal-back-door">Almost every phone's
communication processor has
+ a universal back door which
+ is <a
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
+ often used to make a phone transmit all conversations it
+ hears</a>.</p>
+ <p>The back
+ door <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
+ may take the form of bugs that have gone 20 years unfixed</a>.
+ The choice to leave the security holes in place is morally
+ equivalent to writing a back door.</p>
+ <p>The back door is in the “modem processor”, whose
+ job is to communicate with the radio network. In most phones,
+ the modem processor controls the microphone. In most phones it
+ has the power to rewrite the software for the main processor
+ too.</p>
+ <p>A few phone models are specially designed so that the modem
+ processor does not control the microphone, and so that it can't
+ change the software in the main processor. They still have the
+ back door, but at least it is unable to turn the phone unto a
+ listening device.</p>
+ <p>The universal back door is apparently also used to make phones
+ <a
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
+ transmit even when they are turned off</a>. This means their
movements
+ are tracked, and may also make the listening feature work.</p>
+ </li>
+</ul></em></ins></span>
+
<p>Here are examples of malware in mobile devices. See also
the <a href="/proprietary/malware-apple.html">the Apple malware
page</a> for malicious functionalities specific to the Apple
iThings.</p>
@@ -71,20 +112,18 @@
<h3 id="back-doors">Mobile Back Doors</h3>
<ul>
- <span class="removed"><del><strong><li
id="back-door-microphone"></strong></del></span>
- <span class="inserted"><ins><em><li></em></ins></span>
- <p>The universal back door in portable phones
- <a
- <span
class="removed"><del><strong>href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">is</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
- is</em></ins></span> employed to listen through their
microphones</a>.</p>
- <span class="removed"><del><strong></li>
-
- <li id="back-door-malicious"></strong></del></span>
- <p>Most mobile phones have <span
class="removed"><del><strong>a</strong></del></span> <span
class="inserted"><ins><em>this</em></ins></span> universal back door, which has
been
+ <li>
+ <span class="removed"><del><strong><p>The</strong></del></span>
+ <span class="inserted"><ins><em><p>See above for the <a
href="#universal-back-door">general</em></ins></span> universal back <span
class="removed"><del><strong>door</strong></del></span>
+ <span class="inserted"><ins><em>door</a></em></ins></span> in
<span class="removed"><del><strong>portable phones
+ <a
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
+ is employed to listen through their microphones</a>.</p>
+ <p>Most</strong></del></span> <span
class="inserted"><ins><em>essentially all</em></ins></span> mobile <span
class="removed"><del><strong>phones have this universal back
door,</strong></del></span> <span
class="inserted"><ins><em>phones,</em></ins></span> which <span
class="removed"><del><strong>has been
used to
<a
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
- turn them malicious</a>.</p>
- <span class="inserted"><ins><em><p>More about <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">the
nature of this problem</a>.</p></em></ins></span>
+ turn</strong></del></span> <span class="inserted"><ins><em>permits
converting</em></ins></span>
+ them <span class="removed"><del><strong>malicious</a>.</p>
+ <p>More about <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">the
nature of this problem</a>.</p></strong></del></span> <span
class="inserted"><ins><em>into full-time listening
devices.</p></em></ins></span>
</li>
<li><p><a
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">
@@ -98,17 +137,25 @@
</li>
<li>
- <p>In Android, <a
-
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">
- Google has a back door to remotely delete <span
class="removed"><del><strong>apps.</a> (It</strong></del></span> <span
class="inserted"><ins><em>apps</a> (it</em></ins></span> is in a program
- called GTalkService).
+ <p>In Android,
+ <a
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">
+ Google has a back door to remotely delete <span
class="removed"><del><strong>apps</a> (it is</strong></del></span> <span
class="inserted"><ins><em>apps.</a> (It was</em></ins></span> in a
+ program called <span
class="removed"><del><strong>GTalkService).</strong></del></span> <span
class="inserted"><ins><em>GTalkService, which seems since then to have been
+ merged into Google Play.)</em></ins></span>
</p>
-<p>Google can also <a
-href="https://web.archive.org/web/20150520235257/https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"
-title="at the Wayback Machine (archived May 20, 2015)">forcibly and remotely
-install apps</a> through GTalkService (which seems, since that article,
to have
-been merged into Google Play). This adds up to a universal back door.
</p>
+<span class="removed"><del><strong><p>Google</strong></del></span>
+
+ <span class="inserted"><ins><em><p>
+ Google</em></ins></span> can also
+ <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20150520235257/https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"
+title="at the Wayback Machine (archived May 20,
2015)">forcibly</strong></del></span> <span
class="inserted"><ins><em>href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
+ forcibly</em></ins></span> and remotely install apps</a> through <span
class="removed"><del><strong>GTalkService (which seems, since that article, to
have
+been merged into</strong></del></span> Google <span
class="removed"><del><strong>Play).</strong></del></span> <span
class="inserted"><ins><em>Play.</em></ins></span>
+ This <span class="removed"><del><strong>adds up</strong></del></span> <span
class="inserted"><ins><em>is not equivalent</em></ins></span> to a universal
back <span class="removed"><del><strong>door.</strong></del></span> <span
class="inserted"><ins><em>door, but permits various
+ dirty tricks.</em></ins></span>
+ </p>
<p>
Although Google's <em>exercise</em> of this power has not been
@@ -132,12 +179,12 @@
<ul>
<li>
- <span class="inserted"><ins><em><p>Siri, Alexa, and all the other
voice-control systems can be
+ <p>Siri, Alexa, and all the other voice-control systems can be
<a
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">hijacked
by programs that play commands in ultrasound that humans can't hear</a>.
</p>
</li>
-<li></em></ins></span>
+<li>
<p>Many Android devices <a
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/">
can be hijacked through their Wi-Fi chips</a> because of a bug in
Broadcom's non-free firmware.</p>
@@ -147,8 +194,7 @@
<p>Samsung
phones <a
href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/">have
a security hole that allows an SMS message to install
-<span
class="removed"><del><strong>ransomeware</a>.</p></strong></del></span>
-<span
class="inserted"><ins><em>ransomware</a>.</p></em></ins></span>
+ransomware</a>.</p>
</li>
<li>
@@ -165,14 +211,14 @@
BlackBerry</a>. While there is not much detail here, it seems that this
does not operate via the universal back door that we know nearly all
portable phones have. It may involve exploiting various bugs. There are
- <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
+ <a <span
class="removed"><del><strong>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"></strong></del></span>
<span
class="inserted"><ins><em>href="#universal-back-door"></em></ins></span>
lots of bugs in the phones' radio software</a>.</p>
</li>
</ul>
<h3 id="surveillance">Mobile Surveillance</h3>
<ul>
- <span class="inserted"><ins><em><li><p>The Sarahah app
+ <li><p>The Sarahah app
<a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
uploads all phone numbers and email addresses</a> in user's address
book to developer's server. Note that this article misuses the words
@@ -181,7 +227,7 @@
</li>
<li><p>Some portable phones <a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots of data to
China</a>.</p></li></em></ins></span>
+ sold with spyware sending lots of data to
China</a>.</p></li>
<li>
<p>Facebook's app listens all the time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop
@@ -499,7 +545,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2014, 2015, 2016, 2017 Free Software Foundation,
Inc.</p>
+<p>Copyright © 2014, 2015, 2016, <span
class="removed"><del><strong>2017</strong></del></span> <span
class="inserted"><ins><em>2017, 2018</em></ins></span> Free Software
Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -509,7 +555,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/09/26 11:00:50 $
+$Date: 2018/03/13 11:59:16 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-back-doors.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de-diff.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- proprietary/po/proprietary-back-doors.de-diff.html 14 Oct 2017 09:01:50
-0000 1.2
+++ proprietary/po/proprietary-back-doors.de-diff.html 13 Mar 2018 11:59:16
-0000 1.3
@@ -11,7 +11,7 @@
</style></head>
<body><pre>
<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: <span
class="removed"><del><strong>1.83</strong></del></span> <span
class="inserted"><ins><em>1.84</em></ins></span> -->
+<!-- Parent-Version: <span
class="removed"><del><strong>1.84</strong></del></span> <span
class="inserted"><ins><em>1.85</em></ins></span> -->
<title>Proprietary Back Doors - GNU Project - Free Software
Foundation</title>
<!--#include virtual="/proprietary/po/proprietary-back-doors.translist"
-->
<!--#include virtual="/server/banner.html" -->
@@ -26,12 +26,26 @@
basic injustice</a>. The developers often exercise that power to the
detriment of the users they ought to serve.</p>
-<p>Here are examples of demonstrated back doors in proprietary
software.</p>
+<p>Here are examples of demonstrated back doors in proprietary <span
class="removed"><del><strong>software.</p></strong></del></span> <span
class="inserted"><ins><em>software.
+They are sorted out according to what they are known to allow. Back doors
+that allow full control over the operating system are said to be
+“universal”.</p>
+
+<p class="c">
+ <a href="#spy">Spying</a> |
+ <a
href="#alter-data">Altering user's data/settings</a> |
+ <a href="#install-delete">Installing/deleting programs</a>
|
+ <a href="#universal">Full control</a> |
+ <a href="#other">Other/undefined</a>
+</p></em></ins></span>
<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+
+<span class="inserted"><ins><em><h3
id="spy">Spying</h3></em></ins></span>
+
<ul>
<li>
- <span class="inserted"><ins><em><p>Tesla cars have a <a
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/">universal
back door</a>.</p>
+ <span class="removed"><del><strong><p>Tesla cars have a <a
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/">universal
back door</a>.</p>
<p>While remotely allowing car “owners” to use the whole
battery
capacity did not do them any harm, the same back door would permit
@@ -40,22 +54,22 @@
to a torture prison.</p>
</li>
- <li></em></ins></span>
+ <li></strong></del></span>
<p id="InternetCameraBackDoor">Many models of Internet-connected
- cameras contain a glaring backdoor—they have login accounts
+ cameras contain a glaring <span
class="removed"><del><strong>backdoor—they</strong></del></span> <span
class="inserted"><ins><em>back door—they</em></ins></span> have login
accounts
with hard-coded passwords, which can't be changed, and <a
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">
- there is no way to delete these accounts either</a>.
- </p>
-
+ there is no way to delete these accounts <span
class="removed"><del><strong>either</a>.
+ </p></strong></del></span> <span
class="inserted"><ins><em>either</a>.</p></em></ins></span>
<p>Since these accounts with hard-coded passwords are impossible to
delete, this problem is not merely an insecurity; it amounts to a
- backdoor that can be used by the manufacturer (and government) to
+ <span class="removed"><del><strong>backdoor</strong></del></span>
+ <span class="inserted"><ins><em>back door</em></ins></span> that can be
used by the manufacturer (and government) to
spy on users.</p>
</li>
<li>
- <p>Vizio “smart”
+ <span class="removed"><del><strong><p>Vizio “smart”
TVs <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">have
a universal back door</a>.</p>
</li>
@@ -72,82 +86,150 @@
remote erasure of add-ons</a>.</p>
</li>
- <li>
- <p>WhatsApp <a
href="https://www.theguardian.com/technology/2017/jan/13/whatsapp-backdoor-allows-snooping-on-encrypted-messages">has
- a back door that the company can use to read the plaintext
+ <li></strong></del></span>
+ <p>WhatsApp <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/jan/13/whatsapp-backdoor-allows-snooping-on-encrypted-messages">has</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/jan/13/whatsapp-backdoor-allows-snooping-on-encrypted-messages">
+ has</em></ins></span> a back door that the company can use to read the
plaintext
of messages</a>.</p>
-
<p>This should not come as a surprise. Nonfree software for
encryption is never trustworthy.</p>
</li>
- <li><p>A pregnancy test controller application not only
- can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
- on many sorts of data in the phone, and in server accounts, it can
- alter them too</a>.</p>
+ <span
class="removed"><del><strong><li><p>A</strong></del></span>
+
+ <span class="inserted"><ins><em><li>
+ <p><a
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/">
+ Microsoft has already backdoored its disk encryption</a>.</p>
</li>
<li>
- <p>Xiaomi phones come with <a
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered">a
- universal back door in the application processor, for
- Xiaomi's use</a>.</p>
+ <p>Apple can, and regularly does, <a
+
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones for the
state</a>.</p>
+ <p>This may have improved with <a
+
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
+ iOS 8 security improvements</a>; but <a
+ href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
+ not as much as Apple claims</a>.</p>
+ </li>
+</ul>
- <p>This is separate from <a
href="#universal-back-door-phone-modem">the
- universal back door in the modem processor that the local
- phone company can use</a>.</p>
+<h3 id="alter-data">Altering user's data or settings</h3>
+
+<ul>
+ <li id="chrome-erase-addons">
+ <p>Chrome has a back door <a
+
href="https://consumerist.com/2017/01/18/why-is-google-blocking-this-ad-blocker-on-chrome/">
+ for remote erasure of add-ons</a>.</p>
</li>
- <li><p>Capcom's Street Fighter V update <a
href="https://web.archive.org/web/20160930051146/http://www.theregister.co.uk/2016/09/23/capcom_street_fighter_v/">installed
- a driver that can be used as a backdoor by any application
- installed on a Windows computer</a>.</p>
+ <li>
+ <p>A</em></ins></span> pregnancy test controller application not
only can <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
+ spy</em></ins></span> on many sorts of data in the phone, and in server
accounts, it
+ can alter them too</a>.</p>
</li>
- <li><p>The Dropbox app for Macintosh <a
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/">takes
- total control of the machine by repeatedly nagging the user
- for an admini password</a>.</p>
+ <li>
+ <span class="removed"><del><strong><p>Xiaomi phones come with
<a
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered">a
+ universal back door in the application
processor,</strong></del></span>
+ <span class="inserted"><ins><em><p>The Dropbox app</em></ins></span>
for
+ <span class="removed"><del><strong>Xiaomi's use</a>.</p>
+
+ <p>This is separate from</strong></del></span> <span
class="inserted"><ins><em>Macintosh</em></ins></span> <a <span
class="removed"><del><strong>href="#universal-back-door-phone-modem">the
+ universal back door in the modem processor
that</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/">
+ takes control of user interface items after luring</em></ins></span> the
<span class="removed"><del><strong>local
+ phone company can use</a>.</p></strong></del></span>
<span class="inserted"><ins><em>user into
+ entering an admin password</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li
id="universal-back-door-phone-modem"><p>The</strong></del></span>
+
+ <span class="removed"><del><strong><li><p>Capcom's Street
Fighter V update</strong></del></span>
+
<span class="inserted"><ins><em><li>
- <p>The</em></ins></span> universal back door in portable phones
- <a
- <span
class="removed"><del><strong>href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">is</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
- is</em></ins></span> employed to listen through their
microphones</a>.</p>
- <span class="inserted"><ins><em><p>Most mobile phones have this
universal back door, which has been
- used to
- <a
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
- turn them malicious</a>.</p></em></ins></span>
- <p>More about <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">the
nature of this problem</a>.</p>
+ <p>Users reported that</em></ins></span> <a <span
class="removed"><del><strong>href="https://web.archive.org/web/20160930051146/http://www.theregister.co.uk/2016/09/23/capcom_street_fighter_v/">installed
+ a driver</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
+ Microsoft was forcing them to replace Windows 7 and 8 with all-spying
+ Windows 10</a>.</p>
+ <p>Microsoft was in fact <a
+
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
+ attacking computers</em></ins></span> that <span
class="removed"><del><strong>can be used as a backdoor by any application
+ installed</strong></del></span> <span class="inserted"><ins><em>run
Windows 7 and 8</a>, switching</em></ins></span> on a <span
class="inserted"><ins><em>flag
+ that said whether to “upgrade” to</em></ins></span> Windows
<span class="removed"><del><strong>computer</a>.</p>
</li>
- <li><p><a
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/">
+ <li><p>The Dropbox app for Macintosh</strong></del></span>
<span class="inserted"><ins><em>10 when users
+ had turned it off.</p>
+ <p>Later on, Microsoft published instructions on</em></ins></span>
<a <span
class="removed"><del><strong>href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/">takes
+ total control of the machine by repeatedly
nagging</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/">
+ how to permanently reject</em></ins></span> the <span
class="removed"><del><strong>user
+ for an admini password</a>.</p>
+ </li>
+ <li>
+ <p>The universal</strong></del></span> <span
class="inserted"><ins><em>downgrade to Windows 10</a>.</p>
+ <p>This seems to involve use of a</em></ins></span> back door in
<span class="removed"><del><strong>portable phones</strong></del></span> <span
class="inserted"><ins><em>Windows 7 and 8.</p>
+ </li>
+
+ <li>
+ <p>Caterpillar vehicles come with</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
+ is employed to listen through their microphones</a>.</p>
+ <p>Most mobile phones have this universal</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">
+ a</em></ins></span> back <span class="removed"><del><strong>door, which
has been
+ used</strong></del></span> <span
class="inserted"><ins><em>door</em></ins></span> to
+ <span class="removed"><del><strong><a
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
+ turn them malicious</a>.</p>
+ <p>More about <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">the
nature of this problem</a>.</p></strong></del></span> <span
class="inserted"><ins><em>shutoff the engine</a>
remotely.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p><a
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/">
Microsoft has already backdoored its disk
encryption</a>.</p></li>
- <li><p>Modern gratis game cr…apps
+ <li><p>Modern</strong></del></span>
+
+ <span class="inserted"><ins><em><li>
+ <p>Modern</em></ins></span> gratis game cr…apps
<a
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
collect a wide range of data about their users and their users'
friends and associates</a>.</p>
-
<p>Even nastier, they do it through ad networks that merge the data
collected by various cr…apps and sites made by different
companies.</p>
-
<p>They use this data to manipulate people to buy things, and hunt
for “whales” who can be led to spend a lot of money. They
also use a back door to manipulate the game play for specific
players.</p>
-
<p>While the article describes gratis games, games that cost money
can use the same tactics.</p>
</li>
+
<li>
- <p>Dell computers, shipped with Windows, had a bogus root
- certificate that
- <a
href="http://fossforce.com/2015/11/dell-comcast-intel-who-knows-who-else-are-out-to-get-you/">allowed
- anyone (not just Dell) to remotely authorize any software to
- run</a> on the computer.</p>
+ <span class="removed"><del><strong><p>Dell computers,
shipped</strong></del></span>
+ <span class="inserted"><ins><em><p><a id="samsung"
+
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">
+ Samsung Galaxy devices running proprietary Android versions
come</em></ins></span> with <span class="removed"><del><strong>Windows,
had</strong></del></span>
+ a <span class="removed"><del><strong>bogus root
+ certificate</strong></del></span> <span class="inserted"><ins><em>back
door</a></em></ins></span> that
+ <span class="removed"><del><strong><a
href="http://fossforce.com/2015/11/dell-comcast-intel-who-knows-who-else-are-out-to-get-you/">allowed
+ anyone (not just Dell) to remotely authorize any
software</strong></del></span> <span class="inserted"><ins><em>provides remote
access</em></ins></span> to
+ <span class="removed"><del><strong>run</a></strong></del></span>
<span class="inserted"><ins><em>the files stored</em></ins></span> on
+ the <span
class="removed"><del><strong>computer.</p></strong></del></span> <span
class="inserted"><ins><em>device.</p></em></ins></span>
</li>
+
<li>
- <p>Baidu's proprietary Android library, Moplus, has a back door
- that <a
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">can
+ <span class="removed"><del><strong><p>Baidu's proprietary Android
library, Moplus,</strong></del></span>
+ <span class="inserted"><ins><em><p><a
href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html">
+ Some D-Link routers</a> have a back door for changing settings in a
+ dlink of an eye.</p>
+ <p><a href="http://sekurak.pl/tp-link-httptftp-backdoor/">
+ The TP-Link router has a back door</a>.</p>
+ <p><a href="https://github.com/elvanderb/TCP-32764">Many
models of routers
+ have back doors</a>.</p>
+ </li>
+
+ <li id="swindle-eraser">
+ <p>The Amazon Kindle-Swindle</em></ins></span> has a back door that
<span class="inserted"><ins><em>has been used to</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">can
“upload files” as well as forcibly install
apps</a>.</p>
<p>It is used by 14,000 Android applications.</p>
@@ -155,10 +237,15 @@
<li><p>ARRIS cable modem has a
<a
href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
- backdoor in the backdoor</a>.</p>
+ backdoor in</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">
+ remotely erase books</a>. One of</em></ins></span> the <span
class="removed"><del><strong>backdoor</a>.</p>
</li>
<li><p>Caterpillar vehicles come with
- <a
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">a
back-door to shutoff the engine</a>
+ <a
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">a
back-door</strong></del></span> <span class="inserted"><ins><em>books erased
was 1984, by George
+ Orwell.</p>
+ <p>Amazon responded</em></ins></span> to <span
class="removed"><del><strong>shutoff</strong></del></span> <span
class="inserted"><ins><em>criticism by saying it would delete books only
+ following orders from</em></ins></span> the <span
class="removed"><del><strong>engine</a>
remotely.</p>
</li>
<li><p>
@@ -166,44 +253,64 @@
intentional local back door for 4 years</a>.
</p></li>
-<li><p>Users reported that <a
-
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
- Microsoft was forcing them to replace Windows 7 and 8 with all-spying
+<li><p>Users reported</strong></del></span> <span
class="inserted"><ins><em>state. However,</em></ins></span> that <span
class="inserted"><ins><em>policy didn't last.
+ In 2012 it</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
+ Microsoft was forcing them to replace Windows 7</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html">
+ wiped a user's Kindle-Swindle</em></ins></span> and <span
class="removed"><del><strong>8 with all-spying
Windows 10</a>.</p>
- <p>Microsoft was in fact <a
+ <p>Microsoft was</strong></del></span> <span
class="inserted"><ins><em>deleted her account</a>, then
+ offered her kafkaesque “explanations.”</p>
+ <p>Do other ebook readers have back doors</em></ins></span> in <span
class="removed"><del><strong>fact <a
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
- attacking computers that run Windows 7 and 8</a>, switching on a
flag
+ attacking computers that run Windows 7</strong></del></span> <span
class="inserted"><ins><em>their nonfree software?
+ We don't know,</em></ins></span> and <span
class="removed"><del><strong>8</a>, switching on a flag
that said whether to “upgrade” to Windows 10 when users
had turned it off.</p>
<p>Later on, Microsoft published instructions on <a
href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/">
- how to permanently reject the downgrade to Windows 10</a>.</p>
+ how to permanently reject the downgrade</strong></del></span> <span
class="inserted"><ins><em>we have no way</em></ins></span> to <span
class="removed"><del><strong>Windows 10</a>.</p>
- <p>This seems to involve use of a back door in Windows 7 and
8.</p>
-</li>
+ <p>This seems</strong></del></span> <span
class="inserted"><ins><em>find out. There is no reason</em></ins></span>
+ to <span class="removed"><del><strong>involve use
of</strong></del></span> <span class="inserted"><ins><em>assume that they
don't.</p>
+ </li>
-<li>
-<span class="removed"><del><strong><p>Most mobile phones have a
universal back door, which has been used to
-<a
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
-turn them malicious</a>.
-</p>
-</li>
+ <li>
+ <p>The iPhone has</em></ins></span> a back door <span
class="removed"><del><strong>in Windows 7 and
8.</p></strong></del></span> <span class="inserted"><ins><em>for <a
+
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
+ remote wipe</a>. It's not always enabled, but users are led into
+ enabling it without understanding.</p></em></ins></span>
+ </li>
+<span class="inserted"><ins><em></ul>
-<li></strong></del></span>
-<p><a
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
-A Chinese version of Android has a universal back door</a>. Nearly all
-models of mobile phones have a universal back door in the modem chip. So
-why did Coolpad bother to introduce another? Because this one is controlled
-by Coolpad.
-</p>
-</li>
+<h3 id="install-delete">Installing or deleting programs</h3>
-<li>
-<p>Microsoft Windows has a universal back door through which
-<a
href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263">
-any change whatsoever can be imposed on the users</a>.
+<ul></em></ins></span>
+ <li>
+<span class="removed"><del><strong><p><a
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
+A Chinese version of</strong></del></span>
+ <span class="inserted"><ins><em><p>Baidu's
proprietary</em></ins></span> Android <span class="inserted"><ins><em>library,
Moplus,</em></ins></span> has a <span class="removed"><del><strong>universal
back door</a>. Nearly all
+models of mobile phones have a universal</strong></del></span> back door <span
class="removed"><del><strong>in the modem chip. So
+why did Coolpad bother to introduce another? Because this
one</strong></del></span> <span class="inserted"><ins><em>that <a
+
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">
+ can “upload files” as well as forcibly install
apps</a>.</p>
+ <p>It</em></ins></span> is <span
class="removed"><del><strong>controlled</strong></del></span> <span
class="inserted"><ins><em>used</em></ins></span> by <span
class="removed"><del><strong>Coolpad.
+</p></strong></del></span> <span class="inserted"><ins><em>14,000
Android applications.</p></em></ins></span>
+ </li>
+
+ <li>
+<span class="removed"><del><strong><p>Microsoft
Windows</strong></del></span>
+ <span class="inserted"><ins><em><p>In Android, <a
+
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">
+ Google</em></ins></span> has a <span
class="removed"><del><strong>universal</strong></del></span> back door <span
class="removed"><del><strong>through</strong></del></span> <span
class="inserted"><ins><em>to remotely delete apps.</a> (It was in a
+ program called GTalkService,</em></ins></span> which
+<span class="removed"><del><strong><a
href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263">
+any change whatsoever</strong></del></span> <span
class="inserted"><ins><em>seems since then to have been
+ merged into Google Play.)</p>
+ <p>Google</em></ins></span> can <span
class="removed"><del><strong>be imposed on the users</a>.
</p>
<p>More information on when
<a href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
@@ -211,27 +318,32 @@
</p>
<p>In Windows 10, the universal back door is no longer hidden; all
“upgrades” will
-be <a
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">forcibly
-and immediately imposed</a>.
+be</strong></del></span> <span
class="inserted"><ins><em>also</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">forcibly</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
+ forcibly</em></ins></span> and <span
class="removed"><del><strong>immediately imposed</a>.
</p>
</li>
<li><p>German government <a
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">veers
-away from Windows 8 computers with TPM 2.0 due to potential back
-door capabilities of the TPM 2.0 chip</a>.</p>
+away from Windows 8 computers with TPM 2.0 due</strong></del></span> <span
class="inserted"><ins><em>remotely install apps</a> through GTalkService.
+ This is not equivalent</em></ins></span> to <span
class="removed"><del><strong>potential</strong></del></span> <span
class="inserted"><ins><em>a universal</em></ins></span> back
+<span class="removed"><del><strong>door capabilities</strong></del></span>
<span class="inserted"><ins><em>door, but permits various
+ dirty tricks.</p>
+ <p>Although Google's <em>exercise</em></em></ins></span>
of <span class="removed"><del><strong>the TPM 2.0 chip</a>.</p>
</li>
<li>
-<p>The iPhone has a back door
-<a
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">
-that allows Apple to remotely delete apps</a> which Apple considers
-“inappropriate”. Jobs said it's ok for Apple to have this power
+<p>The iPhone</strong></del></span> <span class="inserted"><ins><em>this
power</em></ins></span> has <span class="removed"><del><strong>a back door
+<a
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"></strong></del></span>
<span class="inserted"><ins><em>not been
+ malicious so far, the point is</em></ins></span> that <span
class="removed"><del><strong>allows Apple to remotely delete
apps</a></strong></del></span> <span class="inserted"><ins><em>nobody
should have such power,</em></ins></span>
+ which <span class="removed"><del><strong>Apple considers
+“inappropriate”. Jobs said it's ok for
Apple</strong></del></span> <span class="inserted"><ins><em>could also be used
maliciously. You might well decide</em></ins></span> to <span
class="removed"><del><strong>have this power
because of course we can trust Apple.
</p>
</li>
<li>
-<p>The iPhone has a back door for
+<p>The iPhone has</strong></del></span> <span
class="inserted"><ins><em>let</em></ins></span> a <span
class="removed"><del><strong>back door for
<a
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
remote wipe</a>. It's not always enabled, but users are led into
enabling
it without understanding.
@@ -240,150 +352,319 @@
<li>
<p>Apple can, and regularly does,
- <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for the state</a>.
+ <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"></strong></del></span>
+ <span class="inserted"><ins><em>security service</em></ins></span>
remotely <span class="removed"><del><strong>extract some data from
iPhones</strong></del></span> <span
class="inserted"><ins><em><em>deactivate</em> programs that it
+ considers malicious. But there is no excuse</em></ins></span> for <span
class="inserted"><ins><em>allowing it
+ to <em>delete</em></em></ins></span> the <span
class="removed"><del><strong>state</a>.
</p>
- <p>This may have improved with
+ <p>This may</strong></del></span> <span
class="inserted"><ins><em>programs, and you should</em></ins></span> have <span
class="removed"><del><strong>improved with
<a
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
iOS 8 security improvements</a>; but
<a href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
- not as much as Apple claims</a>.</p>
+ not as much as Apple claims</a>.</p></strong></del></span> <span
class="inserted"><ins><em>the right to
+ decide who (if anyone) to trust in this way.</p></em></ins></span>
</li>
-
-<li>
-<p><a
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html">
-Windows 8 also has a back door for remotely deleting apps</a>.
+ <li>
+ <p><a
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html">
+ Windows 8 also has a back door for remotely deleting <span
class="removed"><del><strong>apps</a>.
</p>
<p>
-You might well decide to let a security service that you trust
-remotely <em>deactivate</em> programs that it considers malicious.
-But there is no excuse for <em>deleting</em> the programs, and you
-should have the right to decide who (if anyone) to trust in this way.
+You</strong></del></span> <span
class="inserted"><ins><em>apps</a>.</p>
+ <p>You</em></ins></span> might well decide to let a security service
that you trust
+ remotely <em>deactivate</em> programs that it considers
malicious.
+ But there is no excuse for <em>deleting</em> the programs,
and you
+ should have the right to decide <span
class="removed"><del><strong>who</strong></del></span> <span
class="inserted"><ins><em>whom</em></ins></span> (if anyone) to trust in this
<span class="removed"><del><strong>way.
</p>
<p>
As these pages show, if you do want to clean your computer of malware,
the first software to delete is Windows or iOS.
-</p>
-</li>
+</p></strong></del></span>
+ <span class="inserted"><ins><em>way.</p></em></ins></span>
+ </li>
-<li>
-<p>In Android,
+ <li>
+<span class="removed"><del><strong><p>In Android,
<a
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">
-Google has a back door to remotely delete apps.</a> (It is in a program
+Google</strong></del></span>
+ <span class="inserted"><ins><em><p>The iPhone</em></ins></span> has
a back door <span class="inserted"><ins><em><a
+
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">
+ that allows Apple</em></ins></span> to remotely delete <span
class="removed"><del><strong>apps.</a> (It is in</strong></del></span>
<span class="inserted"><ins><em>apps</a> which Apple considers
+ “inappropriate”. Jobs said it's OK for Apple to have this
+ power because of course we can trust Apple.</p>
+ </li>
+</ul>
+
+
+<h3 id="universal">Full control</h3>
+
+<ul>
+ <li>
+ <p>ChromeOS has</em></ins></span> a <span
class="removed"><del><strong>program
called GTalkService).
</p>
-<p>
-Google can also
-<a
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
-forcibly and remotely install apps</a> through GTalkService (which
-seems, since that article, to have been merged into Google Play).
-This is not equivalent to a universal back door, but permits various
+<p></strong></del></span> <span class="inserted"><ins><em>universal back
door. At least,</em></ins></span> Google <span class="removed"><del><strong>can
also</strong></del></span> <span class="inserted"><ins><em>says
+ it does—in</em></ins></span> <a <span
class="removed"><del><strong>href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
+forcibly</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.google.com/intl/en/chromebook/termsofservice.html">
+ section 4 of the EULA</a>.</p>
+ </li>
+
+ <li>
+ <p>The Furby Connect has a <a
+
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
+ universal back door</a>. If the product as shipped doesn't act as a
+ listening device, remote changes to the code could surely convert it
+ into one.</p>
+ </li>
+
+ <li>
+ <p>Sony has brought back its robotic pet Aibo, this time <a
+
href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet">
+ with a universal back door,</em></ins></span> and <span
class="removed"><del><strong>remotely install apps</a> through
GTalkService (which
+seems, since that article,</strong></del></span> <span
class="inserted"><ins><em>tethered</em></ins></span> to <span
class="inserted"><ins><em>a server that requires a
+ subscription</a>.</p>
+ </li>
+
+ <li>
+ <p>Tesla cars</em></ins></span> have <span
class="removed"><del><strong>been merged into Google Play).
+This is</strong></del></span> <span class="inserted"><ins><em>a <a
+
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/">
+ universal back door</a>.</p>
+ <p>While remotely allowing car “owners” to use the whole
+ battery capacity did</em></ins></span> not <span
class="removed"><del><strong>equivalent</strong></del></span> <span
class="inserted"><ins><em>do them any harm, the same back door would
+ permit Tesla (perhaps under the command of some government) to
+ remotely order the car to use none of its battery. Or perhaps to drive
+ its passenger</em></ins></span> to a <span
class="inserted"><ins><em>torture prison.</p>
+ </li>
+
+ <li>
+ <p>Vizio “smart” TVs <a
+
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">
+ have a universal back door</a>.</p>
+ </li>
+
+ <li>
+ <p>The Amazon Echo appears to have a</em></ins></span> universal
back door, <span class="removed"><del><strong>but permits various
dirty tricks.
</p>
<p>
-Although Google's <em>exercise</em> of this power has not been
-malicious so far, the point is that nobody should have such power,
-which could also be used maliciously. You might well decide to let a
+Although Google's <em>exercise</em></strong></del></span> <span
class="inserted"><ins><em>since <a
+ href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates">
+ it installs “updates” automatically</a>.</p>
+ <p>We have found nothing explicitly documenting the
lack</em></ins></span> of <span class="removed"><del><strong>this power has not
been
+malicious</strong></del></span> <span class="inserted"><ins><em>any way to
+ disable remote changes to the software,</em></ins></span> so <span
class="removed"><del><strong>far,</strong></del></span> <span
class="inserted"><ins><em>we are not completely sure
+ there isn't one, but it seems pretty clear.</p>
+ </li>
+
+ <li>
+ <p>Xiaomi phones come with <a
+
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered">
+ a universal back door in</em></ins></span> the <span
class="removed"><del><strong>point</strong></del></span> <span
class="inserted"><ins><em>application processor, for
+ Xiaomi's use</a>.</p>
+ <p>This</em></ins></span> is <span
class="inserted"><ins><em>separate from <a
href="#universal-back-door-phone-modem">the
+ universal back door in the modem processor</em></ins></span> that <span
class="removed"><del><strong>nobody should have such
power,</strong></del></span> <span class="inserted"><ins><em>the local
+ phone company can use</a>.</p>
+ </li>
+
+ <li>
+ <p>Microsoft Windows has a universal back door
through</em></ins></span> which <span class="removed"><del><strong>could
also</strong></del></span> <span class="inserted"><ins><em><a
+
href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263">
+ any change whatsoever can</em></ins></span> be <span
class="removed"><del><strong>used maliciously. You might well decide to let a
security service remotely <em>deactivate</em> programs that it
-considers malicious. But there is no excuse for allowing it
-to <em>delete</em> the programs, and you should have the right to
-decide who (if anyone) to trust in this way.
-</p>
-</li>
+considers malicious. But there</strong></del></span> <span
class="inserted"><ins><em>imposed on the users</a>.</p>
+ <p>More information on when <a
+ href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
+ this was used</a>.</p>
+ <p>In Windows 10, the universal back door</em></ins></span> is no
<span class="removed"><del><strong>excuse for allowing it
+to <em>delete</em> the programs,</strong></del></span> <span
class="inserted"><ins><em>longer hidden; all
+ “upgrades” will be <a
+
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">
+ forcibly</em></ins></span> and <span class="removed"><del><strong>you
should</strong></del></span> <span class="inserted"><ins><em>immediately
imposed</a>.</p>
+ </li>
-<li>
-<p><a id="samsung"
-href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">
-Samsung Galaxy devices running proprietary Android versions come with a back
-door</a> that provides remote access to the files stored on the device.
-</p>
-</li>
+ <li>
+ <p><a
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
+ A Chinese version of Android has a universal back door</a>. Nearly
+ all models of mobile phones</em></ins></span> have <span
class="inserted"><ins><em>a <a href="#universal-back-door">
+ universal back door in</em></ins></span> the <span
class="removed"><del><strong>right to
+decide who (if anyone)</strong></del></span> <span
class="inserted"><ins><em>modem chip</a>. So why did Coolpad
bother</em></ins></span>
+ to <span class="removed"><del><strong>trust in</strong></del></span>
<span class="inserted"><ins><em>introduce another? Because</em></ins></span>
this <span class="removed"><del><strong>way.
+</p></strong></del></span> <span class="inserted"><ins><em>one is
controlled by Coolpad.</p></em></ins></span>
+ </li>
-<li>
-<p>The Amazon Kindle-Swindle has a back door that has been used to
-<a
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">
-remotely erase books</a>. One of the books erased was 1984, by George
Orwell.
-</p>
+ <li>
+ <p><a <span class="removed"><del><strong>id="samsung"
+href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">
+Samsung Galaxy devices running proprietary Android
versions</strong></del></span> <span
class="inserted"><ins><em>href="http://www.techienews.co.uk/973462/bitcoin-miners-bundled-pups-legitimate-applications-backed-eula/">
+ Some applications</em></ins></span> come with <span
class="inserted"><ins><em>MyFreeProxy, which is</em></ins></span> a <span
class="inserted"><ins><em>universal</em></ins></span> back
+<span class="removed"><del><strong>door</a></strong></del></span> <span
class="inserted"><ins><em>door</em></ins></span>
+ that <span class="removed"><del><strong>provides remote access to the
files stored on the device.
+</p></strong></del></span> <span class="inserted"><ins><em>can download
programs and run them.</a></p></em></ins></span>
+ </li>
-<p>Amazon responded to criticism by saying it would delete books only
-following orders from the state. However, that policy didn't last.
-In 2012
-it <a
href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html">wiped
+ <li>
+<span class="removed"><del><strong><p>The Amazon
Kindle-Swindle</strong></del></span>
+ <span class="inserted"><ins><em><p id="universal-back-door">Almost
every phone's communication
+ processor</em></ins></span> has a <span
class="inserted"><ins><em>universal</em></ins></span> back door <span
class="removed"><del><strong>that has been</strong></del></span> <span
class="inserted"><ins><em>which is <a
+
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
+ often</em></ins></span> used to <span class="inserted"><ins><em>make a
phone transmit all conversations it hears</a>.</p>
+ <p>The back door</em></ins></span> <a <span
class="removed"><del><strong>href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">
+remotely erase books</a>. One</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
+ may take the form</em></ins></span> of <span
class="inserted"><ins><em>bugs that have gone 20 years unfixed</a>.
+ The choice to leave</em></ins></span> the <span
class="removed"><del><strong>books erased was 1984, by George Orwell.
+</p>
+
+<p>Amazon responded</strong></del></span> <span
class="inserted"><ins><em>security holes in place is morally
+ equivalent</em></ins></span> to <span
class="removed"><del><strong>criticism by saying it would delete books only
+following orders from</strong></del></span> <span
class="inserted"><ins><em>writing a back door.</p>
+ <p>The back door is in</em></ins></span> the <span
class="removed"><del><strong>state. However, that policy didn't
last.</strong></del></span> <span class="inserted"><ins><em>“modem
processor”, whose
+ job is to communicate with the radio network.</em></ins></span> In
<span class="removed"><del><strong>2012</strong></del></span> <span
class="inserted"><ins><em>most phones,
+ the modem processor controls the microphone. In most
phones</em></ins></span> it <span class="removed"><del><strong><a
href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html">wiped
a user's Kindle-Swindle and deleted her account</a>, then offered her
kafkaesque “explanations.”</p>
-<p>The Kindle-Swindle also has a
+<p>The Kindle-Swindle also</strong></del></span>
+ has <span class="removed"><del><strong>a
<a
href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090">
universal back door</a>.
</p>
</li>
<li>
-<p>HP “storage appliances” that use the proprietary
+<p>HP “storage appliances” that use</strong></del></span>
the <span class="removed"><del><strong>proprietary
“Left Hand” operating system have back doors that give
-HP <a <span
class="removed"><del><strong>href="http://news.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/"></strong></del></span>
<span
class="inserted"><ins><em>href="https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/"></em></ins></span>
-remote login access</a> to them. HP claims that this does not give HP
-access to the customer's data, but if the back door allows installation of
-software changes, a change could be installed that would give access to the
+HP <a
href="https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/">
+remote login access</a></strong></del></span> <span
class="inserted"><ins><em>power</em></ins></span> to <span
class="removed"><del><strong>them. HP claims</strong></del></span> <span
class="inserted"><ins><em>rewrite the software for the main processor
+ too.</p>
+ <p>A few phone models are specially designed so</em></ins></span>
that <span class="removed"><del><strong>this</strong></del></span> <span
class="inserted"><ins><em>the modem
+ processor</em></ins></span> does not <span
class="removed"><del><strong>give HP
+access</strong></del></span> <span class="inserted"><ins><em>control the
microphone, and so that it can't
+ change the software in the main processor. They still have the
+ back door, but at least it is unable</em></ins></span> to <span
class="inserted"><ins><em>turn the phone unto a
+ listening device.</p>
+ <p>The universal back door is apparently also used to make phones
<a
+
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
+ transmit even when they are turned off</a>. This means their
+ movements are tracked, and may also make</em></ins></span> the <span
class="removed"><del><strong>customer's data, but if</strong></del></span>
<span class="inserted"><ins><em>listening feature
+ work.</p>
+ </li>
+
+ <li>
+ <p>In addition to its <a href="#swindle-eraser">book
eraser</a>,</em></ins></span> the
+ <span class="inserted"><ins><em>Kindle-Swindle has a <a
+
href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090">
+ universal</em></ins></span> back <span class="removed"><del><strong>door
allows installation of
+software changes,</strong></del></span> <span
class="inserted"><ins><em>door</a>.</p>
+ </li>
+</ul>
+
+<h3 id="other">Other or undefined</h3>
+
+<ul>
+ <li>
+ <p>A Capcom's Street Fighter V update <a
+
href="https://www.theregister.co.uk/2016/09/23/capcom_street_fighter_v/">
+ installed</em></ins></span> a <span
class="removed"><del><strong>change</strong></del></span> <span
class="inserted"><ins><em>driver that</em></ins></span> could be <span
class="inserted"><ins><em>used as a back door by any
+ application</em></ins></span> installed <span
class="removed"><del><strong>that would give access</strong></del></span> <span
class="inserted"><ins><em>on a Windows computer</a>, but was <a
+
href="https://www.rockpapershotgun.com/2016/09/24/street-fighter-v-removes-new-anti-crack">
+ immediately rolled back</a> in response</em></ins></span> to <span
class="removed"><del><strong>the
customer's data.
-</p>
-</li>
+</p></strong></del></span> <span class="inserted"><ins><em>public
outcry.</p></em></ins></span>
+ </li>
-<li>
-<p><a
href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html">
-Some D-Link routers</a> have a back door for changing settings in a dlink
+ <li>
+<span class="removed"><del><strong><p><a
href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html">
+Some D-Link routers</a> have</strong></del></span>
+ <span class="inserted"><ins><em><p>ARRIS cable modem
has</em></ins></span> a <span class="inserted"><ins><em><a
+
href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"></em></ins></span>
+ back door <span class="removed"><del><strong>for changing
settings</strong></del></span> in <span class="removed"><del><strong>a dlink
of an eye.
</p>
<p>
<a href="https://github.com/elvanderb/TCP-32764">Many models of router
-have back doors</a>.</p>
-</li>
+have</strong></del></span> <span
class="inserted"><ins><em>the</em></ins></span> back <span
class="removed"><del><strong>doors</a>.</p></strong></del></span>
<span class="inserted"><ins><em>door</a>.</p></em></ins></span>
+ </li>
-<li>
-<p><a href="http://sekurak.pl/tp-link-httptftp-backdoor/">
-The TP-Link router has a backdoor</a>.</p>
-</li>
+ <li>
+<span class="removed"><del><strong><p><a
href="http://sekurak.pl/tp-link-httptftp-backdoor/">
+The TP-Link router has</strong></del></span>
+ <span class="inserted"><ins><em><p>Dell computers, shipped with
Windows, had</em></ins></span> a <span
class="removed"><del><strong>backdoor</a>.</p></strong></del></span>
<span class="inserted"><ins><em>bogus root certificate
+ that <a
+
href="http://fossforce.com/2015/11/dell-comcast-intel-who-knows-who-else-are-out-to-get-you/">
+ allowed anyone (not just Dell) to remotely authorize any software to
+ run</a> on the computer.</p></em></ins></span>
+ </li>
-<li>
-<p><a
href="http://www.techienews.co.uk/973462/bitcoin-miners-bundled-pups-legitimate-applications-backed-eula/">
-Some applications come with MyFreeProxy, which is a universal back door
-that can download programs and run them.</a>
-</p>
-</li>
-</ul>
+ <li>
+<span class="removed"><del><strong><p><a
href="http://www.techienews.co.uk/973462/bitcoin-miners-bundled-pups-legitimate-applications-backed-eula/">
+Some applications come with MyFreeProxy, which is a
universal</strong></del></span>
+ <span class="inserted"><ins><em><p>Mac OS X had an <a
+
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
+ intentional local</em></ins></span> back door
+<span class="removed"><del><strong>that can download programs and run
them.</a>
+</p></strong></del></span> <span class="inserted"><ins><em>for 4
years</a>.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong></ul></strong></del></span>
-<p>Here is a big problem whose details are still secret.</p>
+ <span class="inserted"><ins><em><li></em></ins></span>
+ <p>Here is a big problem whose details are still <span
class="removed"><del><strong>secret.</p>
<ul>
<li>
-<p><a
href="http://mashable.com/2013/09/11/fbi-microsoft-bitlocker-backdoor/">
-The FBI asks lots of companies to put back doors in proprietary programs.
-</a> We don't know of specific cases where this was done, but every
-proprietary program for encryption is a possibility.</p>
-</li>
-</ul>
+<p><a</strong></del></span> <span class="inserted"><ins><em>secret:
<a</em></ins></span>
+
href="http://mashable.com/2013/09/11/fbi-microsoft-bitlocker-backdoor/">
+ The FBI asks lots of companies to put back doors in proprietary <span
class="removed"><del><strong>programs.
+</a></strong></del></span>
+ <span class="inserted"><ins><em>programs</a>.</em></ins></span> We
don't know of specific cases where this was done,
+ but every proprietary program for encryption is a possibility.</p>
+ </li>
+<span class="removed"><del><strong></ul></strong></del></span>
-<p>Here is a suspicion that we can't prove, but is worth thinking
-about.</p>
+ <span class="inserted"><ins><em><li>
+ <p>German government <a
+
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">
+ veers away from Windows 8 computers with TPM 2.0 due to potential back
+ door capabilities of the TPM 2.0 chip</a>.</p>
+ </li>
+
+ <li></em></ins></span>
+ <p>Here is a suspicion that we can't prove, but is worth thinking
+<span class="removed"><del><strong>about.</p>
<ul>
<li>
-<p><a
href="http://web.archive.org/web/20150206003913/http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI">
-Writable microcode for Intel and AMD microprocessors</a> may be a vehicle
-for the NSA to invade computers, with the help of Microsoft, say respected
-security experts.
-</p>
-</li>
+<p><a</strong></del></span>
+ <span class="inserted"><ins><em>about: <a</em></ins></span>
+
href="http://web.archive.org/web/20150206003913/http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI">
+ Writable microcode for Intel and AMD microprocessors</a> may be a
+ vehicle for the NSA to invade computers, with the help of Microsoft,
+ say respected security <span class="removed"><del><strong>experts.
+</p></strong></del></span> <span
class="inserted"><ins><em>experts.</p>
+ </li>
+
+ <li>
+ <p>HP “storage appliances” that use the proprietary
+ “Left Hand” operating system have back doors that give HP
<a
+
href="https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/">
+ remote login access</a> to them. HP claims that this does not
give HP
+ access to the customer's data, but if the back door allows
+ installation of software changes, a change could be installed that
+ would give access to the customer's data.</p></em></ins></span>
+ </li>
</ul>
-<p>The EFF has other examples of the <a
href="https://www.eff.org/deeplinks/2015/02/who-really-owns-your-drones">use
of back doors</a>.</p>
+<p>The EFF has other examples of the <a <span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2015/02/who-really-owns-your-drones">use</strong></del></span>
+<span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2015/02/who-really-owns-your-drones">
+use</em></ins></span> of back doors</a>.</p>
</div><!-- for id="content", starts in the include above -->
@@ -416,7 +697,7 @@
of this article.</p>
</div>
-<p>Copyright © 2014-2017 Free Software Foundation, Inc.</p>
+<p>Copyright © <span
class="removed"><del><strong>2014-2017</strong></del></span> <span
class="inserted"><ins><em>2014-2018</em></ins></span> Free Software Foundation,
Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -426,7 +707,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/10/14 09:01:50 $
+$Date: 2018/03/13 11:59:16 $
<!-- timestamp end -->
</p>
</div>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www licenses/gpl-faq.fr.html licenses/po/gpl-fa...,
GNUN <=