[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-amazon.ru.html malware-...
From: |
GNUN |
Subject: |
www/proprietary malware-amazon.ru.html malware-... |
Date: |
Mon, 4 Mar 2019 04:29:53 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/03/04 04:29:53
Modified files:
proprietary : malware-amazon.ru.html
malware-appliances.ru.html
proprietary-insecurity.ru.html
proprietary.ru.html
proprietary/po : malware-amazon.ru-en.html malware-amazon.ru.po
malware-appliances.ru-en.html
malware-appliances.ru.po
proprietary-insecurity.ru-en.html
proprietary-insecurity.ru.po
proprietary.ru-en.html proprietary.ru.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-amazon.ru.html?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.ru.html?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.ru.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.ru.html?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.ru-en.html?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.ru.po?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.ru-en.html?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.ru.po?cvsroot=www&r1=1.148&r2=1.149
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru-en.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.209&r2=1.210
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru-en.html?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.170&r2=1.171
Patches:
Index: malware-amazon.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-amazon.ru.html,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- malware-amazon.ru.html 4 Feb 2019 07:31:21 -0000 1.20
+++ malware-amazon.ru.html 4 Mar 2019 09:29:52 -0000 1.21
@@ -161,6 +161,35 @@
<h3 id="misc"> ÐÑедоноÑнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð² пÑодÑкÑаÑ
</h3>
<ul class="blurbs">
+ <li id="M201902270">
+ <p>ÐамеÑа — двеÑной глазок Ring
(ÑейÑÐ°Ñ Amazon) Ð¼Ð¾Ð¶ÐµÑ ÑмоÑÑеÑÑ Ð²Ñе
+вÑемÑ. Ð Ð²Ð¾Ñ Ð¾ÐºÐ°Ð·ÑваеÑÑÑ, ÑÑо <a
+href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
ÑмоÑÑеÑÑ Ð²
+нее Ð¼Ð¾Ð¶ÐµÑ ÐºÑо Ñгодно, и даже подделÑваÑÑ
видеоизобÑажение</a>.</p>
+
+ <p>УÑзвимоÑÑÑ ÑÑеÑÑей ÑÑоÑонÑ,
пÑедположиÑелÑно, бÑла непÑеднамеÑенной, и
Ñ
+полагаÑ, в Amazon ÑÑо иÑпÑавÑÑ. Ðо Ñ Ð½Ðµ дÑмаÑ,
ÑÑо Amazon Ð¸Ð·Ð¼ÐµÐ½Ð¸Ñ ÑÑÑÑойÑÑво
+пÑогÑаммÑ, коÑоÑое <a
+href="/proprietary/proprietary-surveillance.html#M201901100">позволÑеÑ
+Amazon ÑмоÑÑеÑÑ ÑеÑез камеÑÑ</a>.</p>
+ </li>
+
+ <li id="M201901100">
+ <p>УÑÑÑойÑÑва “безопаÑноÑÑи” Amazon Ring
<a
+href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
+оÑÑÑлаÑÑ Ð²Ð¸Ð´ÐµÐ¾Ð·Ð°Ð¿Ð¸Ñи, коÑоÑÑе они
ÑобиÑаÑÑ, на ÑеÑвеÑÑ Amazon</a>, где они
+ÑоÑ
ÑанÑÑÑÑÑ Ð½Ð° длиÑелÑное вÑемÑ.</p>
+
+ <p>Ðо многиÑ
ÑлÑÑаÑÑ
видеозапиÑи
показÑваÑÑ Ð²ÑеÑ
, кÑо оказалÑÑ Ð²Ð±Ð»Ð¸Ð·Ð¸ или
+пÑоÑÑо пÑоÑ
Ð¾Ð´Ð¸Ñ Ð¼Ð¸Ð¼Ð¾ двеÑи полÑзоваÑелÑ.</p>
+
+ <p>ÐÑновное внимание ÑÑаÑÑÑ ÑделÑÐµÑ ÑомÑ,
как Ring позволÑл оÑделÑнÑм
+ÑабоÑникам Ñвободно заглÑдÑваÑÑ Ð²
видеозапиÑи. Ðак оказалоÑÑ, в Amazon
+пÑÑалиÑÑ Ð¿ÑедоÑвÑаÑиÑÑ ÑÑи вÑоÑиÑнÑе
злоÑпоÑÑеблениÑ, но пеÑвиÑное
+злоÑпоÑÑебление, ÑоÑÑоÑÑее в Ñом, ÑÑо Amazon
полÑÑÐ°ÐµÑ Ð²Ð¸Ð´ÐµÐ¾Ð·Ð°Ð¿Ð¸Ñи,—
+Amazon ÑÑиÑаеÑ, ÑÑо в ÑÑом обÑеÑÑво должно
ÑÑÑÑпиÑÑ.</p>
+ </li>
+
<li id="M201711200">
<p>ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Amazon недавно пÑиглаÑила
поÑÑебиÑелей бÑÑÑ Ð¿ÑоÑÑоÑилÑми и <a
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
@@ -253,7 +282,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2019/02/04 07:31:21 $
+$Date: 2019/03/04 09:29:52 $
<!-- timestamp end -->
</p>
Index: malware-appliances.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-appliances.ru.html,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- malware-appliances.ru.html 1 Mar 2019 05:29:24 -0000 1.59
+++ malware-appliances.ru.html 4 Mar 2019 09:29:52 -0000 1.60
@@ -53,6 +53,19 @@
<div class="column-limit" id="malware-appliances"></div>
<ul class="blurbs">
+ <li id="M201902270">
+ <p>ÐамеÑа — двеÑной глазок Ring
(ÑейÑÐ°Ñ Amazon) Ð¼Ð¾Ð¶ÐµÑ ÑмоÑÑеÑÑ Ð²Ñе
+вÑемÑ. Ð Ð²Ð¾Ñ Ð¾ÐºÐ°Ð·ÑваеÑÑÑ, ÑÑо <a
+href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
ÑмоÑÑеÑÑ Ð²
+нее Ð¼Ð¾Ð¶ÐµÑ ÐºÑо Ñгодно, и даже подделÑваÑÑ
видеоизобÑажение</a>.</p>
+
+ <p>УÑзвимоÑÑÑ ÑÑеÑÑей ÑÑоÑонÑ,
пÑедположиÑелÑно, бÑла непÑеднамеÑенной, и
Ñ
+полагаÑ, в Amazon ÑÑо иÑпÑавÑÑ. Ðо Ñ Ð½Ðµ дÑмаÑ,
ÑÑо Amazon Ð¸Ð·Ð¼ÐµÐ½Ð¸Ñ ÑÑÑÑойÑÑво
+пÑогÑаммÑ, коÑоÑое <a
+href="/proprietary/proprietary-surveillance.html#M201901100">позволÑеÑ
+Amazon ÑмоÑÑеÑÑ ÑеÑез камеÑÑ</a>.</p>
+ </li>
+
<li id="M201902080">
<p><a href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"> Ð
каÑÑÑиджаÑ
Hewlett-Packard Ñ “подпиÑкой на
ÑеÑнила” еÑÑÑ
@@ -902,7 +915,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2019/03/01 05:29:24 $
+$Date: 2019/03/04 09:29:52 $
<!-- timestamp end -->
</p>
Index: proprietary-insecurity.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.ru.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- proprietary-insecurity.ru.html 25 Feb 2019 10:00:29 -0000 1.70
+++ proprietary-insecurity.ru.html 4 Mar 2019 09:29:52 -0000 1.71
@@ -61,6 +61,19 @@
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
+ <li id="M201902270">
+ <p>ÐамеÑа — двеÑной глазок Ring
(ÑейÑÐ°Ñ Amazon) Ð¼Ð¾Ð¶ÐµÑ ÑмоÑÑеÑÑ Ð²Ñе
+вÑемÑ. Ð Ð²Ð¾Ñ Ð¾ÐºÐ°Ð·ÑваеÑÑÑ, ÑÑо <a
+href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
ÑмоÑÑеÑÑ Ð²
+нее Ð¼Ð¾Ð¶ÐµÑ ÐºÑо Ñгодно, и даже подделÑваÑÑ
видеоизобÑажение</a>.</p>
+
+ <p>УÑзвимоÑÑÑ ÑÑеÑÑей ÑÑоÑонÑ,
пÑедположиÑелÑно, бÑла непÑеднамеÑенной, и
Ñ
+полагаÑ, в Amazon ÑÑо иÑпÑавÑÑ. Ðо Ñ Ð½Ðµ дÑмаÑ,
ÑÑо Amazon Ð¸Ð·Ð¼ÐµÐ½Ð¸Ñ ÑÑÑÑойÑÑво
+пÑогÑаммÑ, коÑоÑое <a
+href="/proprietary/proprietary-surveillance.html#M201901100">позволÑеÑ
+Amazon ÑмоÑÑеÑÑ ÑеÑез камеÑÑ</a>.</p>
+ </li>
+
<li id="M201809240">
<p>ÐÑÑледоваÑели оÑкÑÑли ÑпоÑоб <a
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
@@ -659,7 +672,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2019/02/25 10:00:29 $
+$Date: 2019/03/04 09:29:52 $
<!-- timestamp end -->
</p>
Index: proprietary.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.ru.html,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- proprietary.ru.html 4 Mar 2019 08:31:54 -0000 1.69
+++ proprietary.ru.html 4 Mar 2019 09:29:52 -0000 1.70
@@ -161,6 +161,19 @@
<h3 id="latest">ÐоÑледние добавлениÑ</h3>
<ul class="blurbs">
+ <li id="M201902270">
+ <p>ÐамеÑа — двеÑной глазок Ring
(ÑейÑÐ°Ñ Amazon) Ð¼Ð¾Ð¶ÐµÑ ÑмоÑÑеÑÑ Ð²Ñе
+вÑемÑ. Ð Ð²Ð¾Ñ Ð¾ÐºÐ°Ð·ÑваеÑÑÑ, ÑÑо <a
+href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
ÑмоÑÑеÑÑ Ð²
+нее Ð¼Ð¾Ð¶ÐµÑ ÐºÑо Ñгодно, и даже подделÑваÑÑ
видеоизобÑажение</a>.</p>
+
+ <p>УÑзвимоÑÑÑ ÑÑеÑÑей ÑÑоÑонÑ,
пÑедположиÑелÑно, бÑла непÑеднамеÑенной, и
Ñ
+полагаÑ, в Amazon ÑÑо иÑпÑавÑÑ. Ðо Ñ Ð½Ðµ дÑмаÑ,
ÑÑо Amazon Ð¸Ð·Ð¼ÐµÐ½Ð¸Ñ ÑÑÑÑойÑÑво
+пÑогÑаммÑ, коÑоÑое <a
+href="/proprietary/proprietary-surveillance.html#M201901100">позволÑеÑ
+Amazon ÑмоÑÑеÑÑ ÑеÑез камеÑÑ</a>.</p>
+ </li>
+
<li id="M201902140">
<p>Ðаза даннÑÑ
AppCensus ÑодеÑÐ¶Ð¸Ñ Ð¸Ð½ÑоÑмаÑиÑ
о Ñом, как <a
href="https://www.appcensus.mobi"> пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Android
иÑполÑзÑÑÑ
@@ -223,30 +236,6 @@
<p>Ðднако изменение пÑогÑаммÑ-клиенÑа
могло Ð±Ñ Ð½ÐµÐ¹ÑÑализоваÑÑ Ð½ÐµÐºÐ¾ÑоÑÑе пÑиемÑ
вÑÑабоÑки завиÑимоÑÑи Ñак, ÑÑо
полÑзоваÑели ниÑего Ð±Ñ Ð½Ðµ ÑеÑÑли.</p>
</li>
-
- <li id="M201901070">
- <p>ТелевизоÑÑ Vizio <a
-href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
-ÑобиÑаÑÑ “вÑе, ÑÑо видиÑ
Ñелевизоє</a>, по Ñловам ÑÑководиÑелÑ
-компании, и ÑÑи даннÑе пÑодаÑÑ Ð½Ð° ÑÑоÑонÑ.
ÐÑо в обмен на “лÑÑÑее
-обÑлÑживание” (ÑÑо знаÑÐ¸Ñ Ð±Ð¾Ð»ÐµÐµ
навÑзÑивÑÑ ÑекламÑ?) и Ñлегка
-ÑниженнÑе ÑозниÑнÑе ÑенÑ.</p>
-
- <p>ÐоÑÐµÐ¼Ñ Ð¾Ð½ ÑÑиÑÐ°ÐµÑ ÑÑÑ ÑлежкÑ
пÑимелемой? ÐоÑÐ¾Ð¼Ñ ÑÑо в более новÑÑ
моделÑÑ
-она вÑклÑÑена, пока ее не вклÑÑаÑ
полÑзоваÑели. Ðо поÑколÑÐºÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Vizio
-не ÑвободнÑ, Ð¼Ñ Ð½Ðµ знаем, ÑÑо на деле пÑоиÑÑ
Ð¾Ð´Ð¸Ñ Ð·Ð° кÑлиÑами, и Ð½ÐµÑ Ð½Ð¸ÐºÐ°ÐºÐ¸Ñ
-гаÑанÑий, ÑÑо в бÑдÑÑиÑ
обновлениÑÑ
ÑÑи
наÑÑÑойки не изменÑÑÑÑ.</p>
-
- <p>ÐÑли Ñ Ð²Ð°Ñ Ñже еÑÑÑ Ð¸Ð½ÑеллекÑÑалÑнÑй
ÑÐµÐ»ÐµÐ²Ð¸Ð·Ð¾Ñ Vizio (или вообÑе лÑбой
-инÑеллекÑÑалÑнÑй ÑелевизоÑ), ÑамÑй
пÑоÑÑой ÑпоÑоб гаÑанÑиÑоваÑÑ, ÑÑо он за
-вами не ÑÐ»ÐµÐ´Ð¸Ñ — оÑклÑÑиÑÑ ÐµÐ³Ð¾ оÑ
ÐнÑеÑнеÑа и полÑзоваÑÑÑÑ
-анÑенной. Ð ÑожалениÑ, ÑÑо не вÑегда
возможно. ÐÑÑÐ³Ð°Ñ Ð²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾ÑÑÑ, еÑли вÑ
-ÑазбиÑаеÑеÑÑ Ð² ÑеÑ
нике,— доÑÑаÑÑ Ñебе
маÑÑÑÑÑизаÑÐ¾Ñ (им Ð¼Ð¾Ð¶ÐµÑ ÑÑаÑÑ
-ÑÑаÑÑй компÑÑÑеÑ, ÑабоÑаÑÑий полноÑÑÑÑ
под ÑпÑавлением ÑвободнÑÑ
пÑогÑамм),
-и наÑÑÑойÑÑ Ð±ÑандмаÑÑÑ, ÑÑÐ¾Ð±Ñ ÑÐ¾ÐµÐ´Ð¸Ð½ÐµÐ½Ð¸Ñ Ñ
ÑеÑвеÑами Vizio
-блокиÑовалиÑÑ. Ðли, в кÑайнем ÑлÑÑае, можно
замениÑÑ Ñвой ÑÐµÐ»ÐµÐ²Ð¸Ð·Ð¾Ñ Ð½Ð°
-дÑÑгÑÑ Ð¼Ð¾Ð´ÐµÐ»Ñ.</p>
- </li>
</ul>
@@ -328,7 +317,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2019/03/04 08:31:54 $
+$Date: 2019/03/04 09:29:52 $
<!-- timestamp end -->
</p>
Index: po/malware-amazon.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.ru-en.html,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- po/malware-amazon.ru-en.html 4 Feb 2019 07:31:22 -0000 1.20
+++ po/malware-amazon.ru-en.html 4 Mar 2019 09:29:52 -0000 1.21
@@ -152,6 +152,34 @@
<h3 id="misc"> Malware in other products</h3>
<ul class="blurbs">
+ <li id="M201902270">
+ <p>The Ring (now Amazon) doorbell camera is designed so that the
+ manufacturer (now Amazon) can watch all the time. Now it turns out
+ that <a href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
+ anyone else can also watch, and fake videos too</a>.</p>
+
+ <p>The third party vulnerability is presumably
+ unintentional and I suppose Amazon will fix it. I
+ do not expect Amazon to change the design that <a
+ href="/proprietary/proprietary-surveillance.html#M201901100">allows
+ Amazon to watch</a>.</p>
+ </li>
+
+ <li id="M201901100">
+ <p>Amazon Ring “security” devices <a
+
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
+ send the video they capture to Amazon servers</a>, which save it
+ long-term.</p>
+
+ <p>In many cases, the video shows everyone that comes near, or merely
+ passes by, the user's front door.</p>
+
+ <p>The article focuses on how Ring used to let individual employees look
+ at the videos freely. It appears Amazon has tried to prevent that
+ secondary abuse, but the primary abuse—that Amazon gets the
+ video—Amazon expects society to surrender to.</p>
+ </li>
+
<li id="M201711200">
<p>Amazon recently invited consumers to be suckers and <a
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
@@ -224,7 +252,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/04 07:31:22 $
+$Date: 2019/03/04 09:29:52 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-amazon.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.ru.po,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- po/malware-amazon.ru.po 4 Mar 2019 09:00:10 -0000 1.38
+++ po/malware-amazon.ru.po 4 Mar 2019 09:29:52 -0000 1.39
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2019-03-04 08:56+0000\n"
#. type: Content of: <title>
msgid "Amazon's Software Is Malware - GNU Project - Free Software Foundation"
@@ -251,6 +250,10 @@
"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
"watch, and fake videos too</a>."
msgstr ""
+"ÐамеÑа — двеÑной глазок Ring (ÑейÑаÑ
Amazon) Ð¼Ð¾Ð¶ÐµÑ ÑмоÑÑеÑÑ Ð²Ñе "
+"вÑемÑ. Ð Ð²Ð¾Ñ Ð¾ÐºÐ°Ð·ÑваеÑÑÑ, ÑÑо <a
href=\"https://dojo.bullguard.com/dojo-by-"
+"bullguard/blog/ring/\"> ÑмоÑÑеÑÑ Ð² нее Ð¼Ð¾Ð¶ÐµÑ ÐºÑо
Ñгодно, и даже подделÑваÑÑ "
+"видеоизобÑажение</a>."
#. type: Content of: <ul><li><p>
msgid ""
@@ -259,6 +262,10 @@
"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
"watch</a>."
msgstr ""
+"УÑзвимоÑÑÑ ÑÑеÑÑей ÑÑоÑонÑ,
пÑедположиÑелÑно, бÑла непÑеднамеÑенной, и
Ñ "
+"полагаÑ, в Amazon ÑÑо иÑпÑавÑÑ. Ðо Ñ Ð½Ðµ дÑмаÑ,
ÑÑо Amazon Ð¸Ð·Ð¼ÐµÐ½Ð¸Ñ ÑÑÑÑойÑÑво "
+"пÑогÑаммÑ, коÑоÑое <a
href=\"/proprietary/proprietary-surveillance."
+"html#M201901100\">позволÑÐµÑ Amazon ÑмоÑÑеÑÑ ÑеÑез
камеÑÑ</a>."
#. type: Content of: <ul><li><p>
msgid ""
Index: po/malware-appliances.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.ru-en.html,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- po/malware-appliances.ru-en.html 1 Mar 2019 05:29:26 -0000 1.60
+++ po/malware-appliances.ru-en.html 4 Mar 2019 09:29:52 -0000 1.61
@@ -47,6 +47,19 @@
<div class="column-limit" id="malware-appliances"></div>
<ul class="blurbs">
+ <li id="M201902270">
+ <p>The Ring (now Amazon) doorbell camera is designed so that the
+ manufacturer (now Amazon) can watch all the time. Now it turns out
+ that <a href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
+ anyone else can also watch, and fake videos too</a>.</p>
+
+ <p>The third party vulnerability is presumably
+ unintentional and I suppose Amazon will fix it. I
+ do not expect Amazon to change the design that <a
+ href="/proprietary/proprietary-surveillance.html#M201901100">allows
+ Amazon to watch</a>.</p>
+ </li>
+
<li id="M201902080">
<p>The HP <a
href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
@@ -872,7 +885,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/01 05:29:26 $
+$Date: 2019/03/04 09:29:52 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-appliances.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.ru.po,v
retrieving revision 1.148
retrieving revision 1.149
diff -u -b -r1.148 -r1.149
--- po/malware-appliances.ru.po 4 Mar 2019 09:00:10 -0000 1.148
+++ po/malware-appliances.ru.po 4 Mar 2019 09:29:52 -0000 1.149
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2019-03-04 08:56+0000\n"
#. type: Content of: <title>
msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -89,6 +88,10 @@
"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
"watch, and fake videos too</a>."
msgstr ""
+"ÐамеÑа — двеÑной глазок Ring (ÑейÑаÑ
Amazon) Ð¼Ð¾Ð¶ÐµÑ ÑмоÑÑеÑÑ Ð²Ñе "
+"вÑемÑ. Ð Ð²Ð¾Ñ Ð¾ÐºÐ°Ð·ÑваеÑÑÑ, ÑÑо <a
href=\"https://dojo.bullguard.com/dojo-by-"
+"bullguard/blog/ring/\"> ÑмоÑÑеÑÑ Ð² нее Ð¼Ð¾Ð¶ÐµÑ ÐºÑо
Ñгодно, и даже подделÑваÑÑ "
+"видеоизобÑажение</a>."
#. type: Content of: <ul><li><p>
msgid ""
@@ -97,6 +100,10 @@
"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
"watch</a>."
msgstr ""
+"УÑзвимоÑÑÑ ÑÑеÑÑей ÑÑоÑонÑ,
пÑедположиÑелÑно, бÑла непÑеднамеÑенной, и
Ñ "
+"полагаÑ, в Amazon ÑÑо иÑпÑавÑÑ. Ðо Ñ Ð½Ðµ дÑмаÑ,
ÑÑо Amazon Ð¸Ð·Ð¼ÐµÐ½Ð¸Ñ ÑÑÑÑойÑÑво "
+"пÑогÑаммÑ, коÑоÑое <a
href=\"/proprietary/proprietary-surveillance."
+"html#M201901100\">позволÑÐµÑ Amazon ÑмоÑÑеÑÑ ÑеÑез
камеÑÑ</a>."
#. type: Content of: <ul><li><p>
msgid ""
Index: po/proprietary-insecurity.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru-en.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- po/proprietary-insecurity.ru-en.html 4 Feb 2019 07:31:23 -0000
1.70
+++ po/proprietary-insecurity.ru-en.html 4 Mar 2019 09:29:52 -0000
1.71
@@ -53,6 +53,19 @@
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
+ <li id="M201902270">
+ <p>The Ring (now Amazon) doorbell camera is designed so that the
+ manufacturer (now Amazon) can watch all the time. Now it turns out
+ that <a href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
+ anyone else can also watch, and fake videos too</a>.</p>
+
+ <p>The third party vulnerability is presumably
+ unintentional and I suppose Amazon will fix it. I
+ do not expect Amazon to change the design that <a
+ href="/proprietary/proprietary-surveillance.html#M201901100">allows
+ Amazon to watch</a>.</p>
+ </li>
+
<li id="M201809240">
<p>Researchers have discovered how to <a
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
@@ -631,7 +644,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/04 07:31:23 $
+$Date: 2019/03/04 09:29:52 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.209
retrieving revision 1.210
diff -u -b -r1.209 -r1.210
--- po/proprietary-insecurity.ru.po 4 Mar 2019 09:00:10 -0000 1.209
+++ po/proprietary-insecurity.ru.po 4 Mar 2019 09:29:52 -0000 1.210
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2019-03-04 08:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -113,6 +112,10 @@
"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
"watch, and fake videos too</a>."
msgstr ""
+"ÐамеÑа — двеÑной глазок Ring (ÑейÑаÑ
Amazon) Ð¼Ð¾Ð¶ÐµÑ ÑмоÑÑеÑÑ Ð²Ñе "
+"вÑемÑ. Ð Ð²Ð¾Ñ Ð¾ÐºÐ°Ð·ÑваеÑÑÑ, ÑÑо <a
href=\"https://dojo.bullguard.com/dojo-by-"
+"bullguard/blog/ring/\"> ÑмоÑÑеÑÑ Ð² нее Ð¼Ð¾Ð¶ÐµÑ ÐºÑо
Ñгодно, и даже подделÑваÑÑ "
+"видеоизобÑажение</a>."
#. type: Content of: <ul><li><p>
msgid ""
@@ -121,6 +124,10 @@
"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
"watch</a>."
msgstr ""
+"УÑзвимоÑÑÑ ÑÑеÑÑей ÑÑоÑонÑ,
пÑедположиÑелÑно, бÑла непÑеднамеÑенной, и
Ñ "
+"полагаÑ, в Amazon ÑÑо иÑпÑавÑÑ. Ðо Ñ Ð½Ðµ дÑмаÑ,
ÑÑо Amazon Ð¸Ð·Ð¼ÐµÐ½Ð¸Ñ ÑÑÑÑойÑÑво "
+"пÑогÑаммÑ, коÑоÑое <a
href=\"/proprietary/proprietary-surveillance."
+"html#M201901100\">позволÑÐµÑ Amazon ÑмоÑÑеÑÑ ÑеÑез
камеÑÑ</a>."
#. type: Content of: <ul><li><p>
msgid ""
Index: po/proprietary.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru-en.html,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- po/proprietary.ru-en.html 4 Mar 2019 08:31:54 -0000 1.67
+++ po/proprietary.ru-en.html 4 Mar 2019 09:29:52 -0000 1.68
@@ -146,6 +146,19 @@
<h3 id="latest">Latest additions</h3>
<ul class="blurbs">
+ <li id="M201902270">
+ <p>The Ring (now Amazon) doorbell camera is designed so that the
+ manufacturer (now Amazon) can watch all the time. Now it turns out
+ that <a href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
+ anyone else can also watch, and fake videos too</a>.</p>
+
+ <p>The third party vulnerability is presumably
+ unintentional and I suppose Amazon will fix it. I
+ do not expect Amazon to change the design that <a
+ href="/proprietary/proprietary-surveillance.html#M201901100">allows
+ Amazon to watch</a>.</p>
+ </li>
+
<li id="M201902140">
<p>The AppCensus database gives information on <a
href="https://www.appcensus.mobi"> how Android apps use and
@@ -208,30 +221,6 @@
<p>However, modification of the client program could cover up some
addictive behaviors without losing the user anything.</p>
</li>
-
- <li id="M201901070">
- <p>Vizio TVs <a
-
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
- collect “whatever the TV sees,”</a> in the own words of the
company's
- CTO, and this data is sold to third parties. This is in return for
- “better service” (meaning more intrusive ads?) and slightly
- lower retail prices.</p>
-
- <p>What is supposed to make this spying acceptable, according to him,
- is that it is opt-in in newer models. But since the Vizio software is
- nonfree, we don't know what is actually happening behind the scenes,
- and there is no guarantee that all future updates will leave the
- settings unchanged.</p>
-
- <p>If you already own a Vizio smart TV (or any smart TV, for that
- matter), the easiest way to make sure it isn't spying on you is
- to disconnect it from the Internet, and use a terrestrial antenna
- instead. Unfortunately, this is not always possible. Another option,
- if you are technically oriented, is to get your own router (which can
- be an old computer running completely free software), and set up a
- firewall to block connections to Vizio's servers. Or, as a last resort,
- you can replace your TV with another model.</p>
- </li>
</ul>
@@ -292,7 +281,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/04 08:31:54 $
+$Date: 2019/03/04 09:29:52 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.170
retrieving revision 1.171
diff -u -b -r1.170 -r1.171
--- po/proprietary.ru.po 4 Mar 2019 09:00:10 -0000 1.170
+++ po/proprietary.ru.po 4 Mar 2019 09:29:52 -0000 1.171
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2019-03-04 08:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -304,6 +303,10 @@
"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
"watch, and fake videos too</a>."
msgstr ""
+"ÐамеÑа — двеÑной глазок Ring (ÑейÑаÑ
Amazon) Ð¼Ð¾Ð¶ÐµÑ ÑмоÑÑеÑÑ Ð²Ñе "
+"вÑемÑ. Ð Ð²Ð¾Ñ Ð¾ÐºÐ°Ð·ÑваеÑÑÑ, ÑÑо <a
href=\"https://dojo.bullguard.com/dojo-by-"
+"bullguard/blog/ring/\"> ÑмоÑÑеÑÑ Ð² нее Ð¼Ð¾Ð¶ÐµÑ ÐºÑо
Ñгодно, и даже подделÑваÑÑ "
+"видеоизобÑажение</a>."
#. type: Content of: <ul><li><p>
msgid ""
@@ -312,6 +315,10 @@
"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
"watch</a>."
msgstr ""
+"УÑзвимоÑÑÑ ÑÑеÑÑей ÑÑоÑонÑ,
пÑедположиÑелÑно, бÑла непÑеднамеÑенной, и
Ñ "
+"полагаÑ, в Amazon ÑÑо иÑпÑавÑÑ. Ðо Ñ Ð½Ðµ дÑмаÑ,
ÑÑо Amazon Ð¸Ð·Ð¼ÐµÐ½Ð¸Ñ ÑÑÑÑойÑÑво "
+"пÑогÑаммÑ, коÑоÑое <a
href=\"/proprietary/proprietary-surveillance."
+"html#M201901100\">позволÑÐµÑ Amazon ÑмоÑÑеÑÑ ÑеÑез
камеÑÑ</a>."
#. type: Content of: <ul><li><p>
msgid ""
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary malware-amazon.ru.html malware-...,
GNUN <=