[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-games.html malware-webp...
From: |
Therese Godefroy |
Subject: |
www/proprietary malware-games.html malware-webp... |
Date: |
Sat, 13 Oct 2018 03:00:32 -0400 (EDT) |
CVSROOT: /webcvs/www
Module name: www
Changes by: Therese Godefroy <th_g> 18/10/13 03:00:32
Modified files:
proprietary : malware-games.html malware-webpages.html
proprietary-interference.html proprietary.html
Log message:
Add cryptocurrency mining items (RT #1324225).
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-games.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-webpages.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-interference.html?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.html?cvsroot=www&r1=1.35&r2=1.36
Patches:
Index: malware-games.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-games.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- malware-games.html 9 Oct 2018 12:36:26 -0000 1.19
+++ malware-games.html 13 Oct 2018 07:00:32 -0000 1.20
@@ -46,6 +46,13 @@
<ul class="blurbs">
<!-- INSERT games -->
+ <li id="M201807310">
+ <p>A nonfree video game, available through the nonfree Steam client, <a
+
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-">
+ included a “miner”</a>, i.e. an executable that hijacks
+ the CPU in users' computers to mine a cryptocurrency.</p>
+ </li>
+
<li id="M201806250">
<p>The game Metal Gear Rising for
MacOS was tethered to a server. The company <a
@@ -252,7 +259,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 12:36:26 $
+$Date: 2018/10/13 07:00:32 $
<!-- timestamp end -->
</p>
</div>
Index: malware-webpages.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-webpages.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- malware-webpages.html 9 Oct 2018 12:36:26 -0000 1.15
+++ malware-webpages.html 13 Oct 2018 07:00:32 -0000 1.16
@@ -63,6 +63,24 @@
on the reporters that use it</a>.</p>
</li>
+ <li id="M201805080">
+ <p>A cracker used an exploit in outdated software to <a
+
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito">
+ inject a “miner” in web pages</a> served to visitors. This
+ type of malware hijacks the computer's processor to mine a
+ cryptocurrency. (Note that the article refers to the infected software
+ as “content management system”. A better term would be
+ “<a href="/philosophy/words-to-avoid.html#Content)">website
+ revision system</a>”.)</p>
+
+ <p>Since the miner was a nonfree JavaScript program,
+ visitors wouldn't have been affected if they had used <a
+ href="/software/librejs/index.html">LibreJS</a>. Some
+ browser extensions that <a
+
href="https://www.cnet.com/how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/">
+ specifically block JavaScript miners</a> are also available.</p>
+ </li>
+
<li id="M201712300">
<p>Some JavaScript malware <a
href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research">
@@ -237,7 +255,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 12:36:26 $
+$Date: 2018/10/13 07:00:32 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-interference.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-interference.html,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- proprietary-interference.html 9 Oct 2018 12:36:26 -0000 1.36
+++ proprietary-interference.html 13 Oct 2018 07:00:32 -0000 1.37
@@ -43,6 +43,31 @@
harangues users if they try to install Firefox (or Chrome)</a>.</p>
</li>
+ <li id="M201807310">
+ <p>A nonfree video game, available through the nonfree Steam client, <a
+
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-">
+ included a “miner”</a>, i.e. an executable that hijacks
+ the CPU in users' computers to mine a cryptocurrency.</p>
+ </li>
+
+ <li id="M201805080">
+ <p>A cracker used an exploit in outdated software to <a
+
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito">
+ inject a “miner” in web pages</a> served to visitors. This
+ type of malware hijacks the computer's processor to mine a
+ cryptocurrency. (Note that the article refers to the infected software
+ as “content management system”. A better term would be
+ “<a href="/philosophy/words-to-avoid.html#Content)">website
+ revision system</a>”.)</p>
+
+ <p>Since the miner was a nonfree JavaScript program,
+ visitors wouldn't have been affected if they had used <a
+ href="/software/librejs/index.html">LibreJS</a>. Some
+ browser extensions that <a
+
href="https://www.cnet.com/how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/">
+ specifically block JavaScript miners</a> are also available.</p>
+ </li>
+
<li id="M201804180">
<p>Pearson's proprietary educational software <a
href="https://gizmodo.com/pearson-embedded-a-social-psychological-experiment-in-s-1825367784">
@@ -204,7 +229,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 12:36:26 $
+$Date: 2018/10/13 07:00:32 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary.html,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- proprietary.html 10 Oct 2018 09:36:24 -0000 1.35
+++ proprietary.html 13 Oct 2018 07:00:32 -0000 1.36
@@ -141,7 +141,32 @@
<h3 id="latest">Latest additions</h3>
<ul class="blurbs">
-<!-- INSERT latest -->
+<!-- INSERT proprietary -->
+ <li id="M201805080">
+ <p>A cracker used an exploit in outdated software to <a
+
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito">
+ inject a “miner” in web pages</a> served to visitors. This
+ type of malware hijacks the computer's processor to mine a
+ cryptocurrency. (Note that the article refers to the infected software
+ as “content management system”. A better term would be
+ “<a href="/philosophy/words-to-avoid.html#Content)">website
+ revision system</a>”.)</p>
+
+ <p>Since the miner was a nonfree JavaScript program,
+ visitors wouldn't have been affected if they had used <a
+ href="/software/librejs/index.html">LibreJS</a>. Some
+ browser extensions that <a
+
href="https://www.cnet.com/how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/">
+ specifically block JavaScript miners</a> are also available.</p>
+ </li>
+
+ <li id="M201807310">
+ <p>A nonfree video game, available through the nonfree Steam client, <a
+
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-">
+ included a “miner”</a>, i.e. an executable that hijacks
+ the CPU in users' computers to mine a cryptocurrency.</p>
+ </li>
+
<li id="M201809260">
<p>Honeywell's “smart” thermostats communicate
only through the company's server. They have
@@ -171,23 +196,6 @@
<p>The article suggests it might be a universal back door, but this
isn't clear.</p>
</li>
-
- <li id="M201809120">
- <p>One version of Windows 10 <a
-
href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/">
- harangues users if they try to install Firefox (or Chrome)</a>.</p>
- </li>
-
- <li id="M201712060">
- <p>Learn how <a
-
href="https://www.huffingtonpost.com/joseph-farrell/the-fascinating-psycholog_b_6076502.html">
- gratis-to-play-and-not-win-much games manipulate their useds
- psychologically</a>.</p>
-
- <p>These manipulative behaviors are malicious functionalities, and they
- are possible because the game is proprietary. If it were free, people
- could publish a non-manipulative version and play that instead.</p>
- </li>
</ul>
@@ -248,7 +256,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/10 09:36:24 $
+$Date: 2018/10/13 07:00:32 $
<!-- timestamp end -->
</p>
</div>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary malware-games.html malware-webp...,
Therese Godefroy <=