www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-mobiles.html proprietar...


From: Therese Godefroy
Subject: www/proprietary malware-mobiles.html proprietar...
Date: Fri, 10 May 2019 12:43:16 -0400 (EDT)

CVSROOT:        /webcvs/www
Module name:    www
Changes by:     Therese Godefroy <th_g> 19/05/10 12:43:16

Modified files:
        proprietary    : malware-mobiles.html 
                         proprietary-back-doors.html 
                         proprietary-surveillance.html proprietary.html 
        proprietary/workshop: mal.rec 

Log message:
        BlizzCon 2019 requires phone app (RT #1381759).

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.html?cvsroot=www&r1=1.96&r2=1.97
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.html?cvsroot=www&r1=1.88&r2=1.89
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.html?cvsroot=www&r1=1.271&r2=1.272
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.html?cvsroot=www&r1=1.132&r2=1.133
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/mal.rec?cvsroot=www&r1=1.97&r2=1.98

Patches:
Index: malware-mobiles.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-mobiles.html,v
retrieving revision 1.96
retrieving revision 1.97
diff -u -b -r1.96 -r1.97
--- malware-mobiles.html        26 Apr 2019 11:27:37 -0000      1.96
+++ malware-mobiles.html        10 May 2019 16:43:15 -0000      1.97
@@ -379,6 +379,18 @@
 <h3 id="surveillance">Mobile Surveillance</h3>
 
 <ul class="blurbs">
+  <li id="M201905060">
+    <p>BlizzCon 2019 imposed a <a
+    
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/";>
+    requirement to run a proprietary phone app</a> to be allowed into
+    the event.</p>
+
+    <p>This app is a spyware that can snoop on a lot of
+    sensitive data, including user's location and contact list, and has <a
+    
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/";>
+    near-complete control</a> over the phone.</p>
+  </li>
+
   <li id="M201904131">
     <p>Data collected by menstrual and pregnancy monitoring apps is often <a
     
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance";>
@@ -1037,7 +1049,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/04/26 11:27:37 $
+$Date: 2019/05/10 16:43:15 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-back-doors.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-back-doors.html,v
retrieving revision 1.88
retrieving revision 1.89
diff -u -b -r1.88 -r1.89
--- proprietary-back-doors.html 8 May 2019 12:25:08 -0000       1.88
+++ proprietary-back-doors.html 10 May 2019 16:43:15 -0000      1.89
@@ -100,6 +100,18 @@
 <h3 id='alter-data'>Altering user's data or settings</h3>
 
 <ul class="blurbs">
+  <li id="M201905060">
+    <p>BlizzCon 2019 imposed a <a
+    
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/";>
+    requirement to run a proprietary phone app</a> to be allowed into
+    the event.</p>
+
+    <p>This app is a spyware that can snoop on a lot of
+    sensitive data, including user's location and contact list, and has <a
+    
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/";>
+    near-complete control</a> over the phone.</p>
+  </li>
+
   <li id="M201809140">
     <p>Android has a <a
     
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change";>
@@ -583,7 +595,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/05/08 12:25:08 $
+$Date: 2019/05/10 16:43:15 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-surveillance.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-surveillance.html,v
retrieving revision 1.271
retrieving revision 1.272
diff -u -b -r1.271 -r1.272
--- proprietary-surveillance.html       8 May 2019 12:25:08 -0000       1.271
+++ proprietary-surveillance.html       10 May 2019 16:43:15 -0000      1.272
@@ -785,6 +785,18 @@
 </div>
 
 <ul class="blurbs">
+  <li id="M201905060">
+    <p>BlizzCon 2019 imposed a <a
+    
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/";>
+    requirement to run a proprietary phone app</a> to be allowed into
+    the event.</p>
+
+    <p>This app is a spyware that can snoop on a lot of
+    sensitive data, including user's location and contact list, and has <a
+    
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/";>
+    near-complete control</a> over the phone.</p>
+  </li>
+
   <li id="M201904131">
     <p>Data collected by menstrual and pregnancy monitoring apps is often <a
     
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance";>
@@ -2335,7 +2347,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/05/08 12:25:08 $
+$Date: 2019/05/10 16:43:15 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary.html,v
retrieving revision 1.132
retrieving revision 1.133
diff -u -b -r1.132 -r1.133
--- proprietary.html    8 May 2019 14:38:33 -0000       1.132
+++ proprietary.html    10 May 2019 16:43:15 -0000      1.133
@@ -147,6 +147,18 @@
 <h3 id="latest">Latest additions</h3>
 
 <ul class="blurbs">
+  <li id="M201905060">
+    <p>BlizzCon 2019 imposed a <a
+    
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/";>
+    requirement to run a proprietary phone app</a> to be allowed into
+    the event.</p>
+
+    <p>This app is a spyware that can snoop on a lot of
+    sensitive data, including user's location and contact list, and has <a
+    
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/";>
+    near-complete control</a> over the phone.</p>
+  </li>
+
   <li id="M201904260">
     <p>The Jibo robot toys were tethered to the manufacturer's server,
     and <a href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648";>
@@ -200,23 +212,6 @@
     Opera, Microsoft Edge and also in the upcoming Microsoft Edge that
     going to be based on Chromium.</p>
   </li>
-
-  <li id="M201904131">
-    <p>Data collected by menstrual and pregnancy monitoring apps is often <a
-    
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance";>
-    available to employers and insurance companies</a>. Even though the
-    data is &ldquo;anonymized and aggregated,&rdquo; it can easily be
-    traced back to the woman who uses the app.</p>
-
-    <p>This has harmful implications for women's rights to equal employment
-    and freedom to make their own pregnancy choices. Don't use
-    these apps, even if someone offers you a reward to do so. A
-    free-software app that does more or less the same thing without
-    spying on you is available from <a
-    href="https://search.f-droid.org/?q=menstr";>F-Droid</a>, and <a
-    
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast";>
-    a new one is being developed</a>.</p>
-  </li>
 </ul>
 
 
@@ -277,7 +272,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/05/08 14:38:33 $
+$Date: 2019/05/10 16:43:15 $
 <!-- timestamp end -->
 </p>
 </div>

Index: workshop/mal.rec
===================================================================
RCS file: /webcvs/www/www/proprietary/workshop/mal.rec,v
retrieving revision 1.97
retrieving revision 1.98
diff -u -b -r1.97 -r1.98
--- workshop/mal.rec    9 May 2019 15:54:02 -0000       1.97
+++ workshop/mal.rec    10 May 2019 16:43:16 -0000      1.98
@@ -25,6 +25,25 @@
 ####    Please don't remove the blank line after this marker!    ####
 # ADD NEW BLURB HERE
 
+Added: 2019-05-10
+Id: 201905060
+RT: 1381759
+PubDate: 2019-05-06
+PubDate: 2019-05-03
+Target: proprietary-surveillance.html SpywareInMobileApps
+Target: proprietary-back-doors.html alter-data
+Target: malware-mobiles.html surveillance
+Keywords: blizzard
+Blurb: <p>BlizzCon 2019 imposed a <a
++   
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/";>
++   requirement to run a proprietary phone app</a> to be allowed into
++   the event.</p>
++
++   <p>This app is a spyware that can snoop on a lot of
++   sensitive data, including user's location and contact list, and has <a
++   
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/";>
++   near-complete control</a> over the phone.</p>
+
 Added: 2019-05-08
 Id: 201904260
 RT: www-discuss 2019-05-07 (proprietary tether and manipulation)



reply via email to

[Prev in Thread] Current Thread [Next in Thread]