[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-mobiles.html proprietar...
From: |
Therese Godefroy |
Subject: |
www/proprietary malware-mobiles.html proprietar... |
Date: |
Tue, 30 Oct 2018 11:15:32 -0400 (EDT) |
CVSROOT: /webcvs/www
Module name: www
Changes by: Therese Godefroy <th_g> 18/10/30 11:15:32
Modified files:
proprietary : malware-mobiles.html
proprietary-surveillance.html proprietary.html
proprietary/workshop: mal.rec
Log message:
Validation fix.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.html?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.html?cvsroot=www&r1=1.212&r2=1.213
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.html?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/mal.rec?cvsroot=www&r1=1.4&r2=1.5
Patches:
Index: malware-mobiles.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-mobiles.html,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- malware-mobiles.html 30 Oct 2018 13:58:06 -0000 1.64
+++ malware-mobiles.html 30 Oct 2018 15:15:30 -0000 1.65
@@ -330,7 +330,7 @@
<li id="M201810244">
<p>Some Android apps <a
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
- track the phones of users that have deleted them.</p>
+ track the phones of users that have deleted them</a>.</p>
</li>
<li id="M201806110">
@@ -851,7 +851,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/30 13:58:06 $
+$Date: 2018/10/30 15:15:30 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-surveillance.html,v
retrieving revision 1.212
retrieving revision 1.213
diff -u -b -r1.212 -r1.213
--- proprietary-surveillance.html 30 Oct 2018 13:58:06 -0000 1.212
+++ proprietary-surveillance.html 30 Oct 2018 15:15:30 -0000 1.213
@@ -735,7 +735,7 @@
<li id="M201810244">
<p>Some Android apps <a
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
- track the phones of users that have deleted them.</p>
+ track the phones of users that have deleted them</a>.</p>
</li>
<li id="M201808030">
@@ -1966,7 +1966,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/30 13:58:06 $
+$Date: 2018/10/30 15:15:30 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary.html,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- proprietary.html 30 Oct 2018 13:58:07 -0000 1.44
+++ proprietary.html 30 Oct 2018 15:15:31 -0000 1.45
@@ -144,7 +144,7 @@
<li id="M201810244">
<p>Some Android apps <a
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
- track the phones of users that have deleted them.</p>
+ track the phones of users that have deleted them</a>.</p>
</li>
<li id="M201810240">
@@ -187,38 +187,6 @@
included a “miner”</a>, i.e. an executable that hijacks
the CPU in users' computers to mine a cryptocurrency.</p>
</li>
-
- <li id="M201805080">
- <p>A cracker used an exploit in outdated software to <a
-
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito">
- inject a “miner” in web pages</a> served to visitors. This
- type of malware hijacks the computer's processor to mine a
- cryptocurrency. (Note that the article refers to the infected software
- as “content management system”. A better term would be
- “<a href="/philosophy/words-to-avoid.html#Content">website
- revision system</a>”.)</p>
-
- <p>Since the miner was a nonfree JavaScript program,
- visitors wouldn't have been affected if they had used <a
- href="/software/librejs/index.html">LibreJS</a>. Some
- browser extensions that <a
-
href="https://www.cnet.com/how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/">
- specifically block JavaScript miners</a> are also available.</p>
- </li>
-
- <li id="M201809260">
- <p>Honeywell's “smart” thermostats communicate
- only through the company's server. They have
- all the nasty characteristics of such devices: <a
-
href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9">
- surveillance, and danger of sabotage</a> (of a specific user, or of
- all users at once), as well as the risk of an outage (which is what
- just happened).</p>
-
- <p>In addition, setting the desired temperature requires running
- nonfree software. With an old-fashioned thermostat, you can do it
- using controls right on the thermostat.</p>
- </li>
</ul>
@@ -279,7 +247,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/30 13:58:07 $
+$Date: 2018/10/30 15:15:31 $
<!-- timestamp end -->
</p>
</div>
Index: workshop/mal.rec
===================================================================
RCS file: /webcvs/www/www/proprietary/workshop/mal.rec,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- workshop/mal.rec 30 Oct 2018 14:03:58 -0000 1.4
+++ workshop/mal.rec 30 Oct 2018 15:15:31 -0000 1.5
@@ -34,7 +34,7 @@
Keywords: android app
Blurb: <p>Some Android apps <a
+
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
-+ track the phones of users that have deleted them.</p>
++ track the phones of users that have deleted them</a>.</p>
Added: 2018-10-29
Id: 201810240