www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/philosophy/proprietary malware-mobiles.html


From: Dora Scilipoti
Subject: www/philosophy/proprietary malware-mobiles.html
Date: Wed, 25 Jun 2014 06:47:12 +0000

CVSROOT:        /web/www
Module name:    www
Changes by:     Dora Scilipoti <dora>   14/06/25 06:47:12

Modified files:
        philosophy/proprietary: malware-mobiles.html 

Log message:
        Make recently added spyware in Android devices three separate points 
(RT #925932). Remove spurious word 'were'. Wrap lines.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary/malware-mobiles.html?cvsroot=www&r1=1.3&r2=1.4

Patches:
Index: malware-mobiles.html
===================================================================
RCS file: /web/www/www/philosophy/proprietary/malware-mobiles.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- malware-mobiles.html        25 Jun 2014 03:12:56 -0000      1.3
+++ malware-mobiles.html        25 Jun 2014 06:47:11 -0000      1.4
@@ -6,7 +6,8 @@
 <!--#include virtual="/server/banner.html" -->
 <h2>Malware in Mobile Devices</h2>
 
-<a href="/philosophy/proprietary.html">Other examples of proprietary 
malware</a>
+<a href="/philosophy/proprietary.html">Other examples of proprietary 
+malware</a>
 
 <p>
 <em>Malware</em> means software designed to function in ways that
@@ -16,8 +17,8 @@
 <p>
 Malware and nonfree software are two different issues.  The difference
 between <a href="/philosophy/free-sw.html">free software</a> and
-nonfree software is in
-<a href="/philosophy/free-software-even-more-important.html">
+nonfree software is in <a 
+href="/philosophy/free-software-even-more-important.html">
 whether the users have control of the program or vice versa</a>.  It's
 not directly a question of what the program <em>does</em> when it
 runs.  However, in practice nonfree software is often malware, because
@@ -27,8 +28,7 @@
 
 <p>Here are examples of malware in mobile devices.  See also
 the <a href="/philosophy/malware-apple.html">the Apple malware
-page</a> for malicious functionalities specific to the Apple
-iThings.</p>
+page</a> for malicious functionalities specific to the Apple iThings.</p>
 
 <ul>
   <li><p>Portable phones with GPS will send their GPS location on remote
@@ -36,15 +36,20 @@
   
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers";>
   
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
 
   (The US says it will eventually require all new portable phones to have 
-  GPS.)</p></li>
+  GPS.)</p>
+  </li>
 
-  <li><p>Most mobile phones have a universal back door, which has been used to
-  <a 
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html";>
-  turn them malicious</a>.</p></li>
+  <li><p>Most mobile phones have a universal back door, which has been 
+  used to <a 
+  
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html";>
+  turn them malicious</a>.</p>
+  </li>
 
   <li><p><a 
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor";>
-  Samsung Galaxy devices running proprietary Android versions come with a back 
-  door</a> that provides remote access to the data stored on the 
device.</p></li>
+  Samsung Galaxy devices running proprietary Android versions come with a 
+  back door</a> that provides remote access to the data stored on the 
+  device.</p>
+  </li>
 
   <li><p><a 
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html";>
   The NSA can tap data in smart phones, including iPhones, Android, and
@@ -52,34 +57,40 @@
   does not operate via the universal back door that we know nearly all 
   portable phones have. It may involve exploiting various bugs. There are 
   <a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone";>
-  lots of bugs in the phones' radio software</a>.</p></li>
+  lots of bugs in the phones' radio software</a>.</p>
+  </li>
 
   <li><p>Spyware in Cisco TNP IP phones: <a 
   href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html";>
   
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a>.</p></li>
 
   <li><p>Spyware in Android phones (and Windows? laptops): The Wall Street
-  Journal (in an article blocked from us by a paywall) reports that
-  <a 
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj";>
-  the FBI can remotely activate the GPS and microphone in Android phones and
-  laptops</a>. (I suspect this means Windows laptops.) Here is <a 
-  href="http://cryptome.org/2013/08/fbi-hackers.htm";>more info</a>.</p></li>
-
-  <li><p>Spyware is present in some Android devices when they are sold. 
-  Some Motorola phones modify Android to were <a 
href="http://www.beneaththewaves.net/
-Projects/Motorola_Is_Listening.html">send personal data to 
Motorola.</a></p></li>
+  Journal (in an article blocked from us by a paywall) reports that <a 
+  
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj";>
+  the FBI can remotely activate the GPS and microphone in Android phones 
+  and laptops</a>. (I suspect this means Windows laptops.) Here is <a 
+  href="http://cryptome.org/2013/08/fbi-hackers.htm";>more info</a>.</p>
+  </li>
 
-  <li><p>Some manufacturers add a <a 
href="http://androidsecuritytest.com/features/logs-and-
-services/loggers/carrieriq/">hidden general surveillance package such as 
Carrier IQ.</a></p></li>
+  <li><p>Some Motorola phones modify Android to <a 
+  href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html";>
+  send personal data to Motorola.</a></p>
+  </li>
 
-  <li><p><a 
href="/philosophy/proprietary/proprietary-back-doors.html#samsung">Samsung's
-  back door</a> provides access to any file on the system.</p></li>
+  <li><p>Some manufacturers add a <a 
+  
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/";>
+  hidden general surveillance package such as Carrier IQ.</a></p>
+  </li>
+
+  <li><p><a href="/philosophy/proprietary/proprietary-back-doors.html#samsung">
+  Samsung's back door</a> provides access to any file on the system.</p>
+  </li>
 
   <li>
-  <p>In
-  Android, <a 
href="https://www.computerworld.com/s/article/9213641/Google_throws_kill_switch_on_Android_phones?pageNumber=1";>Google
-  has a back door to remotely delete apps.</a>  (It is in the nonfree
-  program Google Play, which was formerly known as Android Market.)
+  <p>In Android, <a 
+  
href="https://www.computerworld.com/s/article/9213641/Google_throws_kill_switch_on_Android_phones?pageNumber=1";>
+  Google has a back door to remotely delete apps.</a>  (It is in the 
+  nonfree program Google Play, which was formerly known as Android Market.)
   </p>
  
   <p>
@@ -95,12 +106,14 @@
 
   <li><p><a 
href="http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html";>
   Some Android phones are tyrants</a> (though someone found a way to crack 
-  the restriction). Fortunately, most Android devices are not tyrants.</p></li>
+  the restriction). Fortunately, most Android devices are not tyrants.</p>
+  </li>
 
   <li><p><a href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/";>
   Mobile devices that come with Windows 8 are tyrants</a>. <a 
   
href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown";>
-  Windows 8 on &ldquo;mobile devices&rdquo; is a jail.</a></p></li>
+  Windows 8 on &ldquo;mobile devices&rdquo; is a jail.</a></p>
+  </li>
 </ul>
 
 </div><!-- for id="content", starts in the include above -->
@@ -160,7 +173,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2014/06/25 03:12:56 $
+$Date: 2014/06/25 06:47:11 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]