www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-appliances.html


From: Therese Godefroy
Subject: www/proprietary malware-appliances.html
Date: Wed, 26 Sep 2018 09:54:16 -0400 (EDT)

CVSROOT:        /webcvs/www
Module name:    www
Changes by:     Therese Godefroy <th_g> 18/09/26 09:54:16

Modified files:
        proprietary    : malware-appliances.html 

Log message:
        + secret audio messages (RT #1324736) & missing items;
        regenerate from recfile.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.html?cvsroot=www&r1=1.46&r2=1.47

Patches:
Index: malware-appliances.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-appliances.html,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- malware-appliances.html     25 Jul 2018 01:40:16 -0000      1.46
+++ malware-appliances.html     26 Sep 2018 13:54:16 -0000      1.47
@@ -1,5 +1,10 @@
 <!--#include virtual="/server/header.html" -->
 <!-- Parent-Version: 1.84 -->
+<!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ Generated from propr-blurbs.rec. Please do not edit this file manually !
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
 <title>Malware in Appliances
 - GNU Project - Free Software Foundation</title>
  <!--#include virtual="/proprietary/po/malware-appliances.translist" -->
@@ -35,468 +40,680 @@
 
 <p>Here are examples of malware in appliances.</p>
 
-<ul>
-  <li id="nest-thermometers">
-    <p>Nest thermometers
-      send <a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack";>a
-      lot of data about the user</a>.</p>
-  </li>
-
-  <li>
-    <p>A remote-control sex toy was found to make <a 
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei";>audio
 recordings
-        of the conversation between two users</a>.</p>
-  </li>
-
-  <li>
-    <p>Every &ldquo;home security&rdquo; camera, if its manufacturer can 
communicate with it,
-      is a surveillance device. <a
-href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change";>
+<ul class="blurbs">
+  <li id="M201809240">
+    <p>Researchers have discovered how to <a
+    
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co";>
+    hide voice commands in other audio</a>, so that people cannot hear
+    them, but Alexa and Siri can.</p>
+  </li>
+
+  <li id="M201807050">
+    <p>The Jawbone fitness tracker was tethered to a proprietary phone
+    app.  In 2017, the company shut down and made the app stop working. <a
+    
href="https://www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-kept-selling-after-app-closure-says-which";>All
+    the existing trackers stopped working forever</a>.</p>
+  
+    <p>The article focuses on a further nasty fillip, that sales of the
+    broken devices continued. But I think that is a secondary issue;
+    it made the nasty consequences extend to some additional people.
+    The fundamental wrong was to design the devices to depend on something
+    else that didn't respect users' freedom.</p>
+  </li>
+
+  <li id="M201804140">
+    <p>A medical insurance company <a
+    
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next";>
+    offers a gratis electronic toothbrush that snoops on its user by
+    sending usage data back over the Internet</a>.</p>
+  </li>
+
+  <li id="M201804010">
+    <p>Some &ldquo;Smart&rdquo; TVs automatically <a
+    
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928";>
+    load downgrades that install a surveillance app</a>.</p>
+  
+    <p>We link to the article for the facts it presents. It
+    is too bad that the article finishes by advocating the
+    moral weakness of surrendering to Netflix. The Netflix app <a
+    href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
+    malware too</a>.</p>
+  </li>
+
+  <li id="M201802120">
+    <p>Apple devices lock users in <a
+    
href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347";>
+    solely to Apple services</a> by being designed to be imcompatible
+    with all other options, ethical or unethical.</p>
+  </li>
+
+  <li id="M201712240">
+    <p>One of the dangers of the &ldquo;internet of stings&rdquo;
+    is that, if you lose your internet service, you also <a
+    
href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/";>
+    lose control of your house and appliances</a>.</p>
+  
+    <p>For your safety, don't use any appliance with a connection to the
+    real internet.</p>
+  </li>
+
+  <li id="M201711200">
+    <p>Amazon recently invited consumers to be suckers and <a
+    
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo";>
+    allow delivery staff to open their front doors</a>. Wouldn't you know
+    it, the system has a grave security flaw.</p>
+  </li>
+
+  <li id="M201711100">
+    <p>A remote-control sex toy was found to make <a
+    
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei";>audio
+    recordings of the conversation between two users</a>.</p>
+  </li>
+
+  <li id="M201711080">
+    <p>Logitech will sabotage
+    all Harmony Link household control devices by <a
+    
href="https://arstechnica.com/gadgets/2017/11/logitech-to-shut-down-service-and-support-for-harmony-link-devices-in-2018/";>
+    turning off the server through which the products' supposed owners
+    communicate with them</a>.</p>
+  
+    <p>The owners suspect this is to pressure them to buy a newer model. If
+    they are wise, they will learn, rather, to distrust any product that
+    requires users to talk with them through some specialized service.</p>
+  </li>
+
+  <li id="M201710040">
+    <p>Every &ldquo;home security&rdquo; camera, if its
+    manufacturer can communicate with it, is a surveillance device. <a
+    
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change";>
        Canary camera is an example</a>.</p>
-    <p>The article describes wrongdoing by the manufacturer, based on the fact
-      that the device is tethered to a server.</p>
-    <p><a href="/proprietary/proprietary-tethers.html">More about proprietary 
tethering</a>.</p>
+  
+    <p>The article describes wrongdoing by the manufacturer, based on
+    the fact that the device is tethered to a server.</p>
+  
+    <p><a href="/proprietary/proprietary-tethers.html">More about
+    proprietary tethering</a>.</p>
+  
     <p>But it also demonstrates that the device gives the company
       surveillance capability.</p>
-</li>
+  </li>
   
-<li>
-  <p>A &ldquo;smart&rdquo; intravenous pump designed for
-    hospitals is connected to the internet. Naturally <a
-href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml";>
+  <li id="M201709200">
+    <p>A &ldquo;smart&rdquo; intravenous pump
+    designed for hospitals is connected to the internet. Naturally <a
+    
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml";>
     its security has been cracked</a>.</p>
+  
   <p>Note that this article misuses the term <a
-href="/philosophy/words-to-avoid.html#Hacker">&ldquo;hackers&rdquo;</a>
+    href="/philosophy/words-to-avoid.html#Hacker">&ldquo;hackers&rdquo;</a>
      referring to crackers.</p>
-</li>
+  </li>
 
-<li>
-  <p>The bad security in many Internet of Stings devices
-    allows <a 
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml";>ISPs
+  <li id="M201708280">
+    <p>The bad security in many Internet of Stings devices allows <a
+    
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml";>ISPs
     to snoop on the people that use them</a>.</p>
+  
   <p>Don't be a sucker&mdash;reject all the stings.</p>
-  <p>It is unfortunate that the article uses the
-  term <a 
href="/philosophy/words-to-avoid.html#Monetize">&ldquo;monetize&rdquo;</a>.</p>
-</li>
-
-<li>
-  <p>Many models of Internet-connected cameras are tremendously insecure.
-  They have login accounts with hard-coded passwords, which can't be
-  changed, and <a 
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/";>there
 is no way to
-  delete these accounts either</a>.</p>
-</li>
-
-<li>
-<p>The proprietary code that runs pacemakers, insulin pumps, and other
-medical devices is <a href="http://www.bbc.co.uk/news/technology-40042584";>
-full of gross security faults</a>.</p>
-</li>
-
-<li><p>Users are suing Bose for <a
-href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/";>
-distributing a spyware app for its headphones</a>.
-Specifically, the app would record the names of the audio files
-users listen to along with the headphone's unique serial number.
-</p>
 
-<p>The suit accuses that this was done without the users' consent.
-If the fine print of the app said that users gave consent for this,
-would that make it acceptable? No way! It should be flat out
-<a href="/philosophy/surveillance-vs-democracy.html">
-illegal to design the app to snoop at all</a>.
-</p>
-</li>
+    <p>It is unfortunate that the article uses the term <a
+    
href="/philosophy/words-to-avoid.html#Monetize">&ldquo;monetize&rdquo;</a>.</p>
+  </li>
+
+  <li id="M201708230">
+    <p>Sonos <a
+    
href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/";>
+    told all its customers, &ldquo;Agree&rdquo;
+    to snooping or the product will stop working</a>.  <a
+    
href="https://consumerist.com/2017/08/23/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/#more-10287321";>Another
+    article</a> says they won't forcibly change the software, but
+    people won't be able to get any upgrades and eventually it will
+    stop working.</p>
+  </li>
+
+  <li id="M201708040">
+    <p>While you're using a DJI drone
+    to snoop on other people, DJI is in many cases <a
+    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity";>snooping
+    on you</a>.</p>
+  </li>
+
+  <li id="M201706200">
+    <p>Many models of Internet-connected cameras
+    are tremendously insecure.  They have login
+    accounts with hard-coded passwords, which can't be changed, and <a
+    
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/";>there
+    is no way to delete these accounts either</a>.</p>
+  </li>
+
+  <li id="M201705250">
+    <p>The proprietary code that runs pacemakers,
+    insulin pumps, and other medical devices is <a
+    href="http://www.bbc.co.uk/news/technology-40042584";> full of gross
+    security faults</a>.</p>
+  </li>
+
+  <li id="M201705180">
+    <p>Bird and rabbit pets were implemented for Second
+    Life by a company that tethered their food to a server.  <a
+    
href="https://www.rockpapershotgun.com/2017/05/19/second-life-ozimals-pet-rabbits-dying";>
+    It shut down the server and the pets more or less died</a>.</p>
+  </li>
+
+  <li id="M201704190">
+    <p>Users are suing Bose for <a
+    
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/";>
+    distributing a spyware app for its headphones</a>.  Specifically,
+    the app would record the names of the audio files users listen to
+    along with the headphone's unique serial number.</p>
+  
+    <p>The suit accuses that this was done without the users' consent.
+    If the fine print of the app said that users gave consent for this,
+    would that make it acceptable? No way! It should be flat out <a
+    href="/philosophy/surveillance-vs-democracy.html"> illegal to design
+    the app to snoop at all</a>.</p>
+  </li>
+
+  <li id="M201704120">
+    <p>Anova sabotaged users' cooking devices
+    with a downgrade that tethered them to a remote server. <a
+    
href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062";>Unless
+    users create an account on Anova's servers, their cookers won't
+    function</a>.</p>
+  </li>
+
+  <li id="M201703270">
+    <p>When Miele's Internet of
+    Stings hospital disinfectant dishwasher is <a
+    
href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit";>
+    connected to the Internet, its security is crap</a>.</p>
+  
+    <p>For example, a cracker can gain access to the dishwasher's
+    filesystem, infect it with malware, and force the dishwasher to launch
+    attacks on other devices in the network. Since these dishwashers are
+    used in hospitals, such attacks could potentially put hundreds of
+    lives at risk.</p>
+  </li>
+
+  <li id="M201703140">
+    <p>A computerized vibrator <a
+    
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack";>
+    was snooping on its users through the proprietary control app</a>.</p>
+  
+    <p>The app was reporting the temperature of the vibrator minute by
+    minute (thus, indirectly, whether it was surrounded by a person's
+    body), as well as the vibration frequency.</p>
+  
+    <p>Note the totally inadequate proposed response: a labeling
+    standard with which manufacturers would make statements about their
+    products, rather than free software which users could have checked
+    and changed.</p>
+  
+    <p>The company that made the vibrator <a
+    
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit";>
+    was sued for collecting lots of personal information about how people
+    used it</a>.</p>
+  
+    <p>The company's statement that it was anonymizing the data may be
+    true, but it doesn't really matter. If it had sold the data to a data
+    broker, the data broker would have been able to figure out who the
+    user was.</p>
+  
+    <p>Following this lawsuit, <a
+    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits";>
+    the company has been ordered to pay a total of C$4m</a> to its
+    customers.</p>
+  </li>
+
+  <li id="M201702280">
+    <p>&ldquo;CloudPets&rdquo; toys with microphones <a
+    
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults";>
+    leak childrens' conversations to the manufacturer</a>. Guess what? <a
+    
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings";>
+    Crackers found a way to access the data</a> collected by the
+    manufacturer's snooping.</p>
+  
+    <p>That the manufacturer and the FBI could listen to these
+    conversations was unacceptable by itself.</p>
+  </li>
+
+  <li id="M201702200">
+    <p>If you buy a used &ldquo;smart&rdquo;
+    car, house, TV, refrigerator, etc., usually <a
+    
href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html";>the
+    previous owners can still remotely control it</a>.</p>
+  </li>
+
+  <li id="M201702060">
+    <p>Vizio &ldquo;smart&rdquo; <a
+    
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen";>TVs
+    report everything that is viewed on them, and not just broadcasts and
+    cable</a>. Even if the image is coming from the user's own computer,
+    the TV reports what it is. The existence of a way to disable the
+    surveillance, even if it were not hidden as it was in these TVs,
+    does not legitimize the surveillance.</p>
+  </li>
+
+  <li id="M201612230">
+    <p>VR equipment, measuring every slight motion,
+    creates the potential for the most intimate
+    surveillance ever. All it takes to make this potential real <a
+    
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/";>is
+    software as malicious as many other programs listed in this
+    page</a>.</p>
+  
+    <p>You can bet Facebook will implement the maximum possible
+    surveillance on Oculus Rift devices. The moral is, never trust a VR
+    system with nonfree software in it.</p>
+  </li>
+
+  <li id="M201612200">
+    <p>The developer of Ham Radio Deluxe <a
+    
href="https://www.techdirt.com/articles/20161220/12411836320/company-bricks-users-software-after-he-posts-negative-review.shtml";>sabotaged
+    a customer's installation as punishment for posting a negative
+    review</a>.</p>
+  
+    <p>Most proprietary software companies don't use their power so
+    harshly, but it is an injustice that they all <em>have</em> such
+    power.</p>
+  </li>
+
+  <li id="M201612061">
+    <p>The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que can be <a
+    
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws";>remotely
+    controlled with a mobile phone</a>; physical access is not
+    necessary. This would enable crackers to listen in on a child's
+    conversations, and even speak into the toys themselves.</p>
+  
+    <p>This means a burglar could speak into the toys and ask the child
+    to unlock the front door while Mommy's not looking.</p>
+  </li>
+
+  <li id="M201608080">
+    <p>Ransomware <a
+    
href="https://www.pentestpartners.com/security-blog/thermostat-ransomware-a-lesson-in-iot-security/";>
+    has been developed for a thermostat that uses proprietary
+    software</a>.</p>
+  </li>
+
+  <li id="M201605020">
+    <p>Samsung's &ldquo;Smart Home&rdquo; has a big security hole; <a
+    
href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/";>
+    unauthorized people can remotely control it</a>.</p>
+  
+    <p>Samsung claims that this is an &ldquo;open&rdquo; platform so the
+    problem is partly the fault of app developers. That is clearly true
+    if the apps are proprietary software.</p>
+  
+    <p>Anything whose name is &ldquo;Smart&rdquo; is most likely going
+    to screw you.</p>
+  </li>
+
+  <li id="M201604110">
+    <p>Malware was found on <a
+    
href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html";>
+    security cameras available through Amazon</a>.</p>
+  
+    <p>A camera that records locally on physical media, and has no network
+    connection, does not threaten people with surveillance&mdash;neither
+    by watching people through the camera, nor through malware in the
+    camera.</p>
+  </li>
+
+  <li id="M201604050">
+    <p>Google/Alphabet <a
+    
href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be";>
+    intentionally broke Revolv home automatic control products that
+    depended on a server</a> to function, by shutting down the server.
+    The lesson is, reject all such products.  Insist on self-contained
+    computers that run free software!</p>
+  </li>
+
+  <li id="M201603220">
+    <p>Over 70 brands of network-connected surveillance cameras have <a
+    
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html";>
+    security bugs that allow anyone to watch through them</a>.</p>
+  </li>
+
+  <li id="M201601100">
+    <p>The <a
+    href="http://michaelweinberg.org/post/137045828005/free-the-cube";>
+    &ldquo;Cube&rdquo; 3D printer was designed with DRM</a>: it
+    won't accept third-party printing materials.  It is the Keurig of
+    printers.  Now it is being discontinued, which means that eventually
+    authorized materials won't be available and the printers may become
+    unusable.</p>
+  
+    <p>With a <a
+    href="http://www.fsf.org/resources/hw/endorsement/aleph-objects";>
+    printer that gets the Respects Your Freedom</a>, this problem would
+    not even be a remote possibility.</p>
+  
+    <p>How pitiful that the author of that article says that there was
+    &ldquo;nothing wrong&rdquo; with designing the device to restrict
+    users in the first place.  This is like putting a &ldquo;cheat me and
+    mistreat me&rdquo; sign on your chest.  We should know better: we
+    should condemn all companies that take advantage of people like him. 
+    Indeed, it is the acceptance of their unjust practice that teaches
+    people to be doormats.</p>
+  </li>
+
+  <li id="M201512140">
+    <p>Phillips &ldquo;smart&rdquo; lightbulbs had initially been
+    designed to interact with other companies' smart light bulbs, but <a
+    
href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml";>
+    later the company updated the firmware to disallow
+    interoperability</a>.</p>
 
-<li id="anova">
-  <p>Anova sabotaged users' cooking devices with a downgrade that
-  tethered them to a remote server. <a 
href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062";>Unless
 users create an account on Anova's servers, their
-  cookers won't function.</a></p>
-</li>
-
-<li>
-<p>When Miele's Internet of Stings hospital disinfectant dishwasher is <a
-href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit";>
-connected to the Internet, its security is crap</a>.</p>
-<p>For example, a cracker can gain access to the dishwasher's filesystem,
- infect it with malware, and force the dishwasher to launch attacks on
- other devices in the network. Since these dishwashers are used in hospitals,
- such attacks could potentially put hundreds of lives at risk.</p>
-
-</li>
-<li>
-<p>If you buy a used &ldquo;smart&rdquo; car, house, TV, refrigerator,
-etc.,
-usually <a 
href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html";>the
-previous owners can still remotely control it</a>.</p>
-</li>
-<li>
-  <p>Vizio
-    &ldquo;smart&rdquo; <a 
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen";>TVs
-      report everything that is viewed on them, and not just broadcasts
-      and cable</a>. Even if the image is coming from the user's own
-    computer, the TV reports what it is. The existence of a way to
-    disable the surveillance, even if it were not hidden as it was in
-    these TVs, does not legitimize the surveillance.</p>
-</li>
-<li>
-<p>More or less all &ldquo;smart&rdquo; TVs <a
-href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/";>spy
+    <p>If a product is &ldquo;smart&rdquo;, and you didn't build it,
+    it is cleverly serving its manufacturer <em>against you</em>.</p>
+  </li>
+
+  <li id="M201512074">
+    <p><a
+    
href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html";>
+    Some D-Link routers</a> have a back door for changing settings in a
+    dlink of an eye.</p>
+  
+    <p><a href="http://sekurak.pl/tp-link-httptftp-backdoor/";> The TP-Link
+    router has a back door</a>.</p>
+  
+    <p><a href="https://github.com/elvanderb/TCP-32764";>Many models of
+    routers have back doors</a>.</p>
+  </li>
+
+  <li id="M201511250">
+    <p>The Nest Cam &ldquo;smart&rdquo; camera is <a
+    href="http://www.bbc.com/news/technology-34922712";>always watching</a>,
+    even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;</p>
+  
+    <p>A &ldquo;smart&rdquo; device means the manufacturer is using it
+    to outsmart you.</p>
+  </li>
+
+  <li id="M201511198">
+    <p>ARRIS cable modem has a <a
+    
href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1";>
+    back door in the back door</a>.</p>
+  </li>
+
+  <li id="M201511130">
+    <p>Some web and TV advertisements play inaudible
+    sounds to be picked up by proprietary malware running
+    on other devices in range so as to determine that they
+    are nearby.  Once your Internet devices are paired with
+    your TV, advertisers can correlate ads with Web activity, and other <a
+    
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/";>
+    cross-device tracking</a>.</p>
+  </li>
+
+  <li id="M201511060">
+    <p>Vizio goes a step further than other TV
+    manufacturers in spying on their users: their <a
+    
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you";>
+    &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and
+    link them your IP address</a> so that advertisers can track you
+    across devices.</p>
+  
+    <p>It is possible to turn this off, but having it enabled by default
+    is an injustice already.</p>
+  </li>
+
+  <li id="M201511020">
+    <p>Tivo's alliance with Viacom adds 2.3 million households
+    to the 600 millions social media profiles the company
+    already monitors. Tivo customers are unaware they're
+    being watched by advertisers. By combining TV viewing
+    information with online social media participation, Tivo can now <a
+    href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102";>
+    correlate TV advertisement with online purchases</a>, exposing all
+    users to new combined surveillance by default.</p>
+  </li>
+
+  <li id="M201510210">
+    <p>FitBit fitness trackers have a <a
+    
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/";>
+    Bluetooth vulnerability</a> that allows attackers to send malware
+    to the devices, which can subsequently spread to computers and other
+    FitBit trackers that interact with them.</p>
+  </li>
+
+  <li id="M201510200">
+    <p>&ldquo;Self-encrypting&rdquo; disk drives
+    do the encryption with proprietary firmware so you
+    can't trust it.  Western Digital's &ldquo;My Passport&rdquo; drives <a
+    
href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption";>
+    have a back door</a>.</p>
+  </li>
+
+  <li id="M201507240">
+    <p>Vizio &ldquo;smart&rdquo; TVs recognize and <a
+    href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/";>track
+    what people are watching</a>, even if it isn't a TV channel.</p>
+  </li>
+
+  <li id="M201506080">
+    <p>Due to bad security in a drug pump, crackers could use it to <a
+    
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/";>
+    kill patients</a>.</p>
+  </li>
+
+  <li id="M201505290">
+    <p>Verizon cable TV <a
+    
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/";>
+    snoops on what programs people watch, and even what they wanted to
+    record</a>.</p>
+  </li>
+
+  <li id="M201505050">
+    <p>Hospira infusion pumps, which are used
+    to administer drugs to a patient, were rated &ldquo;<a
+    
href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/";>least
+    secure IP device I've ever seen</a>&rdquo; by a security
+    researcher.</p>
+  
+    <p>Depending on what drug is being infused, the insecurity could open
+    the door to murder.</p>
+  </li>
+
+  <li id="M201504300">
+    <p>Vizio <a
+    href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html";>
+    used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what
+    users watch</a>.  The TVs did not do that when first sold.</p>
+  </li>
+
+  <li id="M201502180">
+    <p>Barbie <a
+    
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673";>is
+    going to spy on children and adults</a>.</p>
+  </li>
+
+  <li id="M201502090">
+    <p>The Samsung &ldquo;Smart&rdquo; TV <a
+    
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm";>
+    transmits users' voice on the internet to another company, Nuance</a>.
+    Nuance can save it and would then have to give it to the US or some
+    other government.</p>
+  
+    <p>Speech recognition is not to be trusted unless it is done by free
+    software in your own computer.</p>
+  
+    <p>In its privacy policy, Samsung explicitly confirms that <a
+    
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs";>voice
+    data containing sensitive information will be transmitted to third
+    parties</a>.</p>
+  </li>
+
+  <li id="M201411090">
+    <p>The Amazon &ldquo;Smart&rdquo; TV is <a
+    
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance";>
+    snooping all the time</a>.</p>
+  </li>
+
+  <li id="M201409290">
+    <p>More or less all &ldquo;smart&rdquo; TVs <a
+    
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/";>spy
   on their users</a>.</p>
 
-<p>The report was as of 2014, but we don't expect this has got
-better.</p>
+    <p>The report was as of 2014, but we don't expect this has got
+    better.</p>
 
-<p>This shows that laws requiring products to get users' formal
-consent before collecting personal data are totally inadequate.  And
-what happens if a user declines consent?  Probably the TV will say,
-&ldquo;Without your consent to tracking, the TV will not
-work.&rdquo;</p>
-
-<p>Proper laws would say that TVs are not allowed to report what the
-user watches &mdash; no exceptions!</p>
-</li>
-<li>
-<p>Some LG
-TVs <a href="http://openlgtv.org.ru/wiki/index.php/Achievements";>are
-tyrants</a>.</p>
-</li>
-
-<li><a
-href="http://wiki.samygo.tv/index.php5/SamyGO_for_DUMMIES#What_are_Restricted_Firmwares.3F";>
-Samsung &ldquo;Smart&rdquo; TVs have turned Linux into the base
-for a tyrant system</a> so as to impose DRM.
-What enables Samsung to do this is that Linux is released under
-GNU GPL version 2, <a href="/licenses/rms-why-gplv3.html">not version 3</a>,
-together with a weak interpretation of GPL version 2.
-</li>
-
-<li>
-<p>A company that makes internet-controlled vibrators
-<a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit";>is
-being sued for collecting lots of personal information about how
-people use it</a>.</p>
-
-<p>The company's statement that it anonymizes the data may be true,
-but it doesn't really matter. If it sells the data to a data broker,
-the data broker can figure out who the user is.</p>
-</li>
-
-<li>
-<p>Google/Alphabet <a
-href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be";>
-intentionally broke Revolv home automatic control products that depended on
-a server</a> to function.  The lesson is, don't stand for that! Insist
-on self-contained computers that run free software!</p>
-</li>
-
-<li>
-<p>ARRIS cable modem has a <a
-href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1";>
-backdoor in the backdoor</a>.</p>
-</li>
-
-<li>
-<p>HP &ldquo;storage appliances&rdquo; that use the proprietary
-&ldquo;Left Hand&rdquo; operating system have back doors that give HP
-<a
-href="https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/";>
-remote login access</a> to them.  HP claims that this does not give HP
-access to the customer's data, but if the back door allows
-installation of software changes, a change could be installed that
-would give access to the customer's data.
-</p>
-</li>
+    <p>This shows that laws requiring products to get users' formal
+    consent before collecting personal data are totally inadequate.
+    And what happens if a user declines consent? Probably the TV will
+    say, &ldquo;Without your consent to tracking, the TV will not
+    work.&rdquo;</p>
 
-<li>
-<p><a
-href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html";>
-Some D-Link routers</a> have a back door for changing settings in a
-dlink of an eye.</p>
+    <p>Proper laws would say that TVs are not allowed to report what the
+    user watches&mdash;no exceptions!</p>
+  </li>
 
-<p>
-<a href="https://github.com/elvanderb/TCP-32764";>Many models of routers
-have back doors</a>.</p>
-</li>
-
-<li>
-<p><a href="http://sekurak.pl/tp-link-httptftp-backdoor/";>
-The TP-Link router has a backdoor</a>.</p>
-</li>
-
-<li>
-<p>The <a href="http://michaelweinberg.org/post/137045828005/free-the-cube";>
-&ldquo;Cube&rdquo; 3D printer was designed with DRM</a>: it won't accept
-third-party printing materials.  It is the Keurig of printers.  Now it is
-being discontinued, which means that eventually authorized materials won't
-be available and the printers may become unusable.</p>
-
-<p>With a <a href="http://www.fsf.org/resources/hw/endorsement/aleph-objects";>
-printer that gets the Respects Your Freedom</a>, this problem would not
-even be a remote possibility.</p>
-
-<p>How pitiful that the author of that article says that there was
-&ldquo;nothing wrong&rdquo; with designing the device to restrict users in
-the first place.  This is like putting a &ldquo;cheat me and mistreat me&rdquo;
-sign on your chest.  We should know better: we should condemn all companies
-that take advantage of people like him.  Indeed, it is the acceptance of
-their unjust practice that teaches people to be doormats.</p>
-</li>
-
-<li>
-<p>Philips &ldquo;smart&rdquo; lightbulbs <a
-href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml";>
-have been designed not to interact with other companies' smart
-lightbulbs</a>.</p>
-
-<p>If a product is &ldquo;smart&rdquo;, and you didn't build it, it is
-cleverly serving its manufacturer <em>against you</em>.</p>
-</li>
-
-<li>
-<p><a
-href="http://web.archive.org/web/20131007102857/http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up";>
-DVDs and Bluray disks have DRM</a>.
-</p>
+  <li id="M201407170">
+    <p id="nest-thermometers">Nest thermometers send <a
+    href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack";>a lot of
+    data about the user</a>.</p>
+  </li>
 
-<p>That page uses spin terms that favor DRM,
-including <a href="/philosophy/words-to-avoid.html#DigitalRightsManagement">
-digital &ldquo;rights&rdquo; management</a>
-and <a 
href="/philosophy/words-to-avoid.html#Protection">&ldquo;protect&rdquo;</a>,
-and it claims that &ldquo;artists&rdquo; (rather than companies) are
-primarily responsible for putting digital restrictions management into
-these disks.  Nonetheless, it is a reference for the facts.
-</p>
+  <li id="M201405201">
+    <p>LG <a
+    
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml";>
+    disabled network features</a> on <em>previously purchased</em>
+    &ldquo;smart&rdquo; TVs, unless the purchasers agreed to let LG begin
+    to snoop on them and distribute their personal data.</p>
+  </li>
 
-<p>Every Bluray disk (with few, rare exceptions) has DRM&mdash;so
-don't use Bluray disks!</p>
-</li>
-
-<li id="cameras-bugs">
-<p>Over 70 brands of network-connected surveillance cameras have <a
-href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html";>
-security bugs that allow anyone to watch through them</a>.</p>
-</li>
-
-<li>
-<p>Samsung's &ldquo;Smart Home&rdquo; has a big security hole; <a
-href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/";>
-unauthorized people can remotely control it</a>.</p>
-
-<p>Samsung claims that this is an &ldquo;open&rdquo; platform so the
-problem is partly the fault of app developers. That is clearly true if
-the apps are proprietary software.</p>
-
-<p>Anything whose name is &ldquo;Smart&rdquo; is most likely going to
-screw you.</p>
-</li>
+  <li id="M201404250">
+    <p>Lots of <a
+    href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/";>
+    hospital equipment has lousy security</a>, and it can be fatal.</p>
+  </li>
 
-<li>
-<p>
-Malware found on <a
-href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html";>
-security cameras available through Amazon</a>.
-</p>
+  <li id="M201312290">
+    <p><a href="http://www.bunniestudios.com/blog/?p=3554";> Some flash
+    memories have modifiable software</a>, which makes them vulnerable
+    to viruses.</p>
+  
+    <p>We don't call this a &ldquo;back door&rdquo; because it is normal
+    that you can install a new system in a computer, given physical access
+    to it.  However, memory sticks and cards should not be modifiable in
+    this way.</p>
+  </li>
 
-<p>A camera that records locally on physical media, and has no network
-connection, does not threaten people with surveillance&mdash;neither
-by watching people through the camera, nor through malware in the
-camera.</p>
-</li>
-
-<li>
-<p> <a
-href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/";>
-FitBit fitness trackers have a Bluetooth vulnerability</a> that allows
-attackers to send malware to the devices, which can subsequently
-spread to computers and other FitBit trackers that interact with
-them.</p>
-</li>
-
-<li>
-<p> &ldquo;Self-encrypting&rdquo; disk drives do the encryption with
-proprietary firmware so you can't trust it.  Western Digital's <a
-href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption";>
-&ldquo;My Passport&rdquo; drives have a back door</a>.</p>
-</li>
+  <li id="M201312040">
+    <p><a
+    
href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/";>
+    Point-of-sale terminals running Windows were taken over</a> and
+    turned into a botnet for the purpose of collecting customers' credit
+    card numbers.</p>
+  </li>
 
-<li>
-<p>
-Hospira infusion pumps, which are used to administer drugs to
-a patient, were rated &ldquo;<a
-href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/";>
-least secure IP device I've ever seen</a>&rdquo; by a security
-researcher.</p>
-
-<p>Depending on what drug is being infused, the insecurity could
-open the door to murder.</p>
-</li>
-
-<li>
-<p>Due to bad security in a drug pump, crackers could use it to <a
-href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/";>
-kill patients</a>.</p>
-</li>
-
-<li>
-<p><a
-href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/";>
-&ldquo;Smart homes&rdquo;</a> turn out to be stupidly vulnerable to
-intrusion.</p>
-</li>
-
-<li>
-<p>The <a
-href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html";>
-FTC punished a company for making webcams with bad security</a> so
-that it was easy for anyone to watch them.</p>
-</li>
-
-<li>
-<p>It is possible to <a
-href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/";>
-kill people by taking control of medical implants by radio</a>.  More
-information in <a
-href="http://www.bbc.co.uk/news/technology-17631838";>BBC News</a> and
-<a
-href="https://web.archive.org/web/20180203130244/http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html";>
-IOActive Labs Research blog</a>.</p>
-</li>
-
-<li>
-<p>Lots of <a
-href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/";>
-hospital equipment has lousy security</a>, and it can be fatal.</p>
-</li>
-
-<li>
-<p><a
-href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/";>
-Point-of-sale terminals running Windows were taken over</a> and turned
-into a botnet for the purpose of collecting customers' credit card
-numbers.</p>
-</li>
-
-<li id="vizio-snoop">
-<p>Vizio
-<a href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html";>
-used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what
-users watch</a>.  The TVs did not do that when first sold.</p>
-</li>
-
-<li>
-<p>LG <a
-href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml";>
-disabled network features</a> on <em>previously purchased</em>
-&ldquo;smart&rdquo; TVs, unless the purchasers agreed to let LG
-begin to snoop on them and distribute their personal data.</p>
-</li>
-
-<li>
-<p><a
-href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673";>
-Barbie is going to spy</a> on children and adults.</p>
-</li>
-
-<li>
-<p><a
-href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html";>
-Cisco TNP IP phones are spying devices</a>.</p>
-</li>
-
-<li>
-<p>The <a
-href="http://www.bbc.com/news/technology-34922712";>Nest Cam
-&ldquo;smart&rdquo; camera is always watching</a>, even when the
-&ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;</p>
-
-<p>A &ldquo;smart&rdquo; device means the manufacturer is using it to outsmart
-you.</p>
-</li>
-
-<li>
-<p>Vizio goes a step further than other TV manufacturers in spying on 
-their users: their <a
-href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you";>
-&ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
-link them your IP address</a> so that advertisers can track you 
-across devices.</p>
-
-<p>It is possible to turn this off, but having it enabled by default
-is an injustice already.</p>
-</li>
-
-<li>
-<p>Tivo's alliance with Viacom adds 2.3 million households to the 600
-millions social media profiles the company already monitors.  Tivo
-customers are unaware they're being watched by advertisers.  By
-combining TV viewing information with online social media
-participation, Tivo can now <a
-href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102";>
-correlate TV advertisement with online purchases</a>, exposing all
-users to new combined surveillance by default.</p>
-</li>
-
-<li>
-<p>Some web and TV advertisements play inaudible sounds to be picked
-up by proprietary malware running on other devices in range so as to
-determine that they are nearby.  Once your Internet devices are paired
-with your TV, advertisers can correlate ads with Web activity, and
-other <a
-href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/";>
-cross-device tracking</a>.</p>
-</li>
-
-<li>
-<p>Vizio &ldquo;smart&rdquo; TVs recognize and <a
-href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/";>track
-what people are watching</a>, even if it isn't a TV channel.</p>
-</li>
-
-<li>
-<p>The Amazon &ldquo;smart&rdquo; TV is <a
-href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance";>
-snooping all the time</a>.</p>
-</li>
-
-<li>
-<p>The Samsung &ldquo;smart&rdquo; TV <a
-href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm";>
-transmits users' voice on the internet to another company, Nuance</a>.
-Nuance can save it and would then have to give it to the US or some
-other government.</p>
-
-<p>Speech recognition is not to be trusted unless it is done by free
-software in your own computer.</p>
-
-<p>In its privacy policy, Samsung explicitly confirms
-that <a 
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs";>voice
-data containing sensitive information will be transmitted to third
-parties</a>.</p>
-</li>
-
-<li>
-<p><a
-href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html";>
-Spyware in LG &ldquo;smart&rdquo; TVs</a> reports what the user
-watches, and the switch to turn this off has no effect.  (The fact
-that the transmission reports a 404 error really means nothing; the
-server could save that data anyway.)</p>
-
-<p>Even worse, it <a
-href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/";>
-snoops on other devices on the user's local network</a>.</p>
-
-<p>LG later said it had installed a patch to stop this, but any
-product could spy this way.</p>
-</li>
-<li>
-<p><a
-href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/";>
-Verizon cable TV snoops on what programs people watch</a>, and even what
-they wanted to record.</p>
-</li>
+  <li id="M201311210">
+    <p>Spyware in LG &ldquo;smart&rdquo; TVs <a
+    
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html";>
+    reports what the user watches, and the switch to turn this off has
+    no effect</a>.  (The fact that the transmission reports a 404 error
+    really means nothing; the server could save that data anyway.)</p> 
+  
+    <p>Even worse, it <a
+    
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/";>
+    snoops on other devices on the user's local network</a>.</p>
+  
+    <p>LG later said it had installed a patch to stop this, but any
+    product could spy this way.</p>
+  </li>
+
+  <li id="M201310070">
+    <p id="bluray"><a
+    
href="http://web.archive.org/web/20131007102857/http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up";>
+    DVDs and Bluray disks have DRM</a>.</p>
+  
+    <p>That page uses spin terms that favor DRM, including <a
+    href="/philosophy/words-to-avoid.html#DigitalRightsManagement">
+    digital &ldquo;rights&rdquo; management</a> and <a
+    
href="/philosophy/words-to-avoid.html#Protection">&ldquo;protect&rdquo;</a>,
+    and it claims that &ldquo;artists&rdquo; (rather than companies)
+    are primarily responsible for putting digital restrictions management
+    into these disks.  Nonetheless, it is a reference for the facts.</p>
+  
+    <p>Every Bluray disk (with few, rare exceptions) has DRM&mdash;so
+    don't use Bluray disks!</p>
+  </li>
 
+  <li id="M201309050">
+    <p>The FTC punished a company for making webcams with <a
+    
href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html";>
+    bad security so that it was easy for anyone to watch through
+    them</a>.</p>
+  </li>
+
+  <li id="M201308060">
+    <p><a href="http://spritesmods.com/?art=hddhack&amp;page=6";>
+    Replaceable nonfree software in disk drives can be written by a
+    nonfree program</a>. This makes any system vulnerable to persistent
+    attacks that normal forensics won't detect.</p>
+  </li>
+
+  <li id="M201307270">
+    <p> It is possible to <a
+    
href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/";>
+    kill people by taking control of medical
+    implants by radio</a>.  More information in <a
+    href="http://www.bbc.co.uk/news/technology-17631838";>BBC
+    News</a> and <a
+    
href="https://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html";>
+    IOActive Labs Research blog</a>.</p>
+  </li>
+
+  <li id="M201307260">
+    <p><a
+    
href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/";>
+    &ldquo;Smart homes&rdquo;</a> turn out to be stupidly vulnerable to
+    intrusion.</p>
+  </li>
+
+  <li id="M201307114">
+    <p>HP &ldquo;storage appliances&rdquo; that
+    use the proprietary &ldquo;Left Hand&rdquo;
+    operating system have back doors that give HP <a
+    
href="https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/";>
+    remote login access</a> to them.  HP claims that this does not
+    give HP access to the customer's data, but if the back door allows
+    installation of software changes, a change could be installed that
+    would give access to the customer's data.</p>
+  </li>
+
+  <li id="M201212290">
+    <p>The Cisco TNP IP phones are <a
+    href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html";>
+    spying devices</a>.</p>
+  </li>
+
+  <li id="M201212180">
+    <p>Samsung &ldquo;Smart&rdquo; TVs have <a
+    
href="https://wiki.samygo.tv/index.php?title=SamyGO_for_DUMMIES#What_are_Restricted_Firmwares.3F";>
+    turned Linux into the base for a tyrant system</a> so as to impose
+    DRM.  What enables Samsung to do this is that Linux is released
+    under GNU GPL version 2, <a
+    href="/licenses/rms-why-gplv3.html">not version 3</a>, together with
+    a weak interpretation of GPL version 2.</p>
+  </li>
+
+  <li id="M201212170">
+    <p id="break-security-smarttv"><a
+    
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html";>
+    Crackers found a way to break security on a &ldquo;smart&rdquo; TV</a>
+    and use its camera to watch the people who are watching TV.</p>
+  </li>
+
+  <li id="M201210020">
+    <p>Some LG TVs <a
+    href="http://openlgtv.org.ru/wiki/index.php/Achievements";>are
+    tyrants</a>.</p>
+  </li>
 </ul>
 
+
 </div><!-- for id="content", starts in the include above -->
 <!--#include virtual="/server/footer.html" -->
 <div id="footer">
@@ -554,7 +771,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/07/25 01:40:16 $
+$Date: 2018/09/26 13:54:16 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]