www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-games.html malware-webp...


From: Therese Godefroy
Subject: www/proprietary malware-games.html malware-webp...
Date: Sat, 13 Oct 2018 03:00:32 -0400 (EDT)

CVSROOT:        /webcvs/www
Module name:    www
Changes by:     Therese Godefroy <th_g> 18/10/13 03:00:32

Modified files:
        proprietary    : malware-games.html malware-webpages.html 
                         proprietary-interference.html proprietary.html 

Log message:
        Add cryptocurrency mining items (RT #1324225).

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-games.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-webpages.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-interference.html?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.html?cvsroot=www&r1=1.35&r2=1.36

Patches:
Index: malware-games.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-games.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- malware-games.html  9 Oct 2018 12:36:26 -0000       1.19
+++ malware-games.html  13 Oct 2018 07:00:32 -0000      1.20
@@ -46,6 +46,13 @@
 
 <ul class="blurbs">
 <!-- INSERT games -->
+  <li id="M201807310">
+    <p>A nonfree video game, available through the nonfree Steam client, <a
+    
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-";>
+    included a &ldquo;miner&rdquo;</a>, i.e. an executable that hijacks
+    the CPU in users' computers to mine a cryptocurrency.</p>
+  </li>
+
   <li id="M201806250">
     <p>The game Metal Gear Rising for
     MacOS was tethered to a server.  The company <a
@@ -252,7 +259,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 12:36:26 $
+$Date: 2018/10/13 07:00:32 $
 <!-- timestamp end -->
 </p>
 </div>

Index: malware-webpages.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-webpages.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- malware-webpages.html       9 Oct 2018 12:36:26 -0000       1.15
+++ malware-webpages.html       13 Oct 2018 07:00:32 -0000      1.16
@@ -63,6 +63,24 @@
     on the reporters that use it</a>.</p>
   </li>
 
+  <li id="M201805080">
+    <p>A cracker used an exploit in outdated software to <a
+    
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito";>
+    inject a &ldquo;miner&rdquo; in web pages</a> served to visitors. This
+    type of malware hijacks the computer's processor to mine a
+    cryptocurrency. (Note that the article refers to the infected software
+    as &ldquo;content management system&rdquo;. A better term would be
+    &ldquo;<a href="/philosophy/words-to-avoid.html#Content)">website
+    revision system</a>&rdquo;.)</p>
+
+    <p>Since the miner was a nonfree JavaScript program,
+    visitors wouldn't have been affected if they had used <a
+    href="/software/librejs/index.html">LibreJS</a>. Some
+    browser extensions that <a
+    
href="https://www.cnet.com/how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/";>
+    specifically block JavaScript miners</a> are also available.</p>
+  </li>
+
   <li id="M201712300">
     <p>Some JavaScript malware <a
     
href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research";>
@@ -237,7 +255,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 12:36:26 $
+$Date: 2018/10/13 07:00:32 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-interference.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-interference.html,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- proprietary-interference.html       9 Oct 2018 12:36:26 -0000       1.36
+++ proprietary-interference.html       13 Oct 2018 07:00:32 -0000      1.37
@@ -43,6 +43,31 @@
     harangues users if they try to install Firefox (or Chrome)</a>.</p>
   </li>
 
+  <li id="M201807310">
+    <p>A nonfree video game, available through the nonfree Steam client, <a
+    
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-";>
+    included a &ldquo;miner&rdquo;</a>, i.e. an executable that hijacks
+    the CPU in users' computers to mine a cryptocurrency.</p>
+  </li>
+
+  <li id="M201805080">
+    <p>A cracker used an exploit in outdated software to <a
+    
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito";>
+    inject a &ldquo;miner&rdquo; in web pages</a> served to visitors. This
+    type of malware hijacks the computer's processor to mine a
+    cryptocurrency. (Note that the article refers to the infected software
+    as &ldquo;content management system&rdquo;. A better term would be
+    &ldquo;<a href="/philosophy/words-to-avoid.html#Content)">website
+    revision system</a>&rdquo;.)</p>
+
+    <p>Since the miner was a nonfree JavaScript program,
+    visitors wouldn't have been affected if they had used <a
+    href="/software/librejs/index.html">LibreJS</a>. Some
+    browser extensions that <a
+    
href="https://www.cnet.com/how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/";>
+    specifically block JavaScript miners</a> are also available.</p>
+  </li>
+
   <li id="M201804180">
     <p>Pearson's proprietary educational software <a
     
href="https://gizmodo.com/pearson-embedded-a-social-psychological-experiment-in-s-1825367784";>
@@ -204,7 +229,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 12:36:26 $
+$Date: 2018/10/13 07:00:32 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary.html,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- proprietary.html    10 Oct 2018 09:36:24 -0000      1.35
+++ proprietary.html    13 Oct 2018 07:00:32 -0000      1.36
@@ -141,7 +141,32 @@
 <h3 id="latest">Latest additions</h3>
 
 <ul class="blurbs">
-<!-- INSERT latest -->
+<!-- INSERT proprietary -->
+  <li id="M201805080">
+    <p>A cracker used an exploit in outdated software to <a
+    
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito";>
+    inject a &ldquo;miner&rdquo; in web pages</a> served to visitors. This
+    type of malware hijacks the computer's processor to mine a
+    cryptocurrency. (Note that the article refers to the infected software
+    as &ldquo;content management system&rdquo;. A better term would be
+    &ldquo;<a href="/philosophy/words-to-avoid.html#Content)">website
+    revision system</a>&rdquo;.)</p>
+
+    <p>Since the miner was a nonfree JavaScript program,
+    visitors wouldn't have been affected if they had used <a
+    href="/software/librejs/index.html">LibreJS</a>. Some
+    browser extensions that <a
+    
href="https://www.cnet.com/how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/";>
+    specifically block JavaScript miners</a> are also available.</p>
+  </li>
+
+  <li id="M201807310">
+    <p>A nonfree video game, available through the nonfree Steam client, <a
+    
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-";>
+    included a &ldquo;miner&rdquo;</a>, i.e. an executable that hijacks
+    the CPU in users' computers to mine a cryptocurrency.</p>
+  </li>
+
   <li id="M201809260">
     <p>Honeywell's &ldquo;smart&rdquo; thermostats communicate
     only through the company's server. They have
@@ -171,23 +196,6 @@
     <p>The article suggests it might be a universal back door, but this
     isn't clear.</p>
   </li>
-
-  <li id="M201809120">
-    <p>One version of Windows 10 <a
-    
href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/";>
-    harangues users if they try to install Firefox (or Chrome)</a>.</p>
-  </li>
-
-  <li id="M201712060">
-    <p>Learn how <a
-    
href="https://www.huffingtonpost.com/joseph-farrell/the-fascinating-psycholog_b_6076502.html";>
-    gratis-to-play-and-not-win-much games manipulate their useds
-    psychologically</a>.</p>
-
-    <p>These manipulative behaviors are malicious functionalities, and they
-    are possible because the game is proprietary. If it were free, people
-    could publish a non-manipulative version and play that instead.</p>
-  </li>
 </ul>
 
 
@@ -248,7 +256,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/10 09:36:24 $
+$Date: 2018/10/13 07:00:32 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]