www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/philosophy proprietary-insecurity.html


From: Richard M. Stallman
Subject: www/philosophy proprietary-insecurity.html
Date: Sun, 27 Oct 2013 13:42:57 +0000

CVSROOT:        /web/www
Module name:    www
Changes by:     Richard M. Stallman <rms>       13/10/27 13:42:57

Modified files:
        philosophy     : proprietary-insecurity.html 

Log message:
        Mention killing via medical implants.
        Mention taking control of car computers.
        Minor cleanups.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary-insecurity.html?cvsroot=www&r1=1.8&r2=1.9

Patches:
Index: proprietary-insecurity.html
===================================================================
RCS file: /web/www/www/philosophy/proprietary-insecurity.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary-insecurity.html 9 Sep 2013 10:58:38 -0000       1.8
+++ proprietary-insecurity.html 27 Oct 2013 13:42:57 -0000      1.9
@@ -7,12 +7,14 @@
 <h2>Proprietary Insecurity</h2>
 
 <p>This page lists clearly established cases of proprietary software
-that is grievously insecure.</p>
+whose insecurity has enormous consequences.</p>
 
 <p>It would be incorrect to compare proprietary software with a
 fictitious idea of free software as perfect.  Every program has bugs,
 and any system, free or proprietary, may have security holes.  But
-these flaws are very bad.</p>
+proprietary software developers frequently disregard gaping holes, or
+even introduce them deliberately, and these cases are particularly
+bad.</p>
 
 <ul>
 <li>
@@ -33,7 +35,28 @@
 
 <li>
 <p><a 
href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html";>
-The FTC punished a company for making webcams with bad security</a>.
+The FTC punished a company for making webcams with bad security so
+that it was easy for anyone to watch them</a>.
+</p>
+</li>
+</ul>
+
+<li>
+<p><a 
href="http://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/";>
+It is possible to take control of some car computers through malware
+in music files</a>.
+Also <a href="http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0";>by
+radio</a>.  Here is <a href="http://www.autosec.org/faq.html";>more
+information</a.
+</p>
+</li>
+
+<li>
+<p><a 
href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/";>
+It is possible to kill people by taking control of medical implants by
+radio</a>.  Here
+is <a href="http://www.bbc.co.uk/news/technology-17631838";>more
+information</a.
 </p>
 </li>
 </ul>
@@ -93,7 +116,7 @@
 
 <p>Updated:
 <!-- timestamp start -->
-$Date: 2013/09/09 10:58:38 $
+$Date: 2013/10/27 13:42:57 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]