[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/philosophy proprietary-insecurity.html
From: |
Richard M. Stallman |
Subject: |
www/philosophy proprietary-insecurity.html |
Date: |
Sun, 27 Oct 2013 13:42:57 +0000 |
CVSROOT: /web/www
Module name: www
Changes by: Richard M. Stallman <rms> 13/10/27 13:42:57
Modified files:
philosophy : proprietary-insecurity.html
Log message:
Mention killing via medical implants.
Mention taking control of car computers.
Minor cleanups.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary-insecurity.html?cvsroot=www&r1=1.8&r2=1.9
Patches:
Index: proprietary-insecurity.html
===================================================================
RCS file: /web/www/www/philosophy/proprietary-insecurity.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary-insecurity.html 9 Sep 2013 10:58:38 -0000 1.8
+++ proprietary-insecurity.html 27 Oct 2013 13:42:57 -0000 1.9
@@ -7,12 +7,14 @@
<h2>Proprietary Insecurity</h2>
<p>This page lists clearly established cases of proprietary software
-that is grievously insecure.</p>
+whose insecurity has enormous consequences.</p>
<p>It would be incorrect to compare proprietary software with a
fictitious idea of free software as perfect. Every program has bugs,
and any system, free or proprietary, may have security holes. But
-these flaws are very bad.</p>
+proprietary software developers frequently disregard gaping holes, or
+even introduce them deliberately, and these cases are particularly
+bad.</p>
<ul>
<li>
@@ -33,7 +35,28 @@
<li>
<p><a
href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html">
-The FTC punished a company for making webcams with bad security</a>.
+The FTC punished a company for making webcams with bad security so
+that it was easy for anyone to watch them</a>.
+</p>
+</li>
+</ul>
+
+<li>
+<p><a
href="http://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/">
+It is possible to take control of some car computers through malware
+in music files</a>.
+Also <a href="http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0">by
+radio</a>. Here is <a href="http://www.autosec.org/faq.html">more
+information</a.
+</p>
+</li>
+
+<li>
+<p><a
href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/">
+It is possible to kill people by taking control of medical implants by
+radio</a>. Here
+is <a href="http://www.bbc.co.uk/news/technology-17631838">more
+information</a.
</p>
</li>
</ul>
@@ -93,7 +116,7 @@
<p>Updated:
<!-- timestamp start -->
-$Date: 2013/09/09 10:58:38 $
+$Date: 2013/10/27 13:42:57 $
<!-- timestamp end -->
</p>
</div>
- www/philosophy proprietary-insecurity.html,
Richard M. Stallman <=
- www/philosophy proprietary-insecurity.html, Richard M. Stallman, 2013/10/27
- www/philosophy proprietary-insecurity.html, Richard M. Stallman, 2013/10/27
- www/philosophy proprietary-insecurity.html, Thérèse Godefroy, 2013/10/27
- www/philosophy proprietary-insecurity.html, Richard M. Stallman, 2013/10/27
- www/philosophy proprietary-insecurity.html, Jan Owoc, 2013/10/27