[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/philosophy/proprietary malware-mobiles.html
From: |
Dora Scilipoti |
Subject: |
www/philosophy/proprietary malware-mobiles.html |
Date: |
Wed, 25 Jun 2014 06:47:12 +0000 |
CVSROOT: /web/www
Module name: www
Changes by: Dora Scilipoti <dora> 14/06/25 06:47:12
Modified files:
philosophy/proprietary: malware-mobiles.html
Log message:
Make recently added spyware in Android devices three separate points
(RT #925932). Remove spurious word 'were'. Wrap lines.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary/malware-mobiles.html?cvsroot=www&r1=1.3&r2=1.4
Patches:
Index: malware-mobiles.html
===================================================================
RCS file: /web/www/www/philosophy/proprietary/malware-mobiles.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- malware-mobiles.html 25 Jun 2014 03:12:56 -0000 1.3
+++ malware-mobiles.html 25 Jun 2014 06:47:11 -0000 1.4
@@ -6,7 +6,8 @@
<!--#include virtual="/server/banner.html" -->
<h2>Malware in Mobile Devices</h2>
-<a href="/philosophy/proprietary.html">Other examples of proprietary
malware</a>
+<a href="/philosophy/proprietary.html">Other examples of proprietary
+malware</a>
<p>
<em>Malware</em> means software designed to function in ways that
@@ -16,8 +17,8 @@
<p>
Malware and nonfree software are two different issues. The difference
between <a href="/philosophy/free-sw.html">free software</a> and
-nonfree software is in
-<a href="/philosophy/free-software-even-more-important.html">
+nonfree software is in <a
+href="/philosophy/free-software-even-more-important.html">
whether the users have control of the program or vice versa</a>. It's
not directly a question of what the program <em>does</em> when it
runs. However, in practice nonfree software is often malware, because
@@ -27,8 +28,7 @@
<p>Here are examples of malware in mobile devices. See also
the <a href="/philosophy/malware-apple.html">the Apple malware
-page</a> for malicious functionalities specific to the Apple
-iThings.</p>
+page</a> for malicious functionalities specific to the Apple iThings.</p>
<ul>
<li><p>Portable phones with GPS will send their GPS location on remote
@@ -36,15 +36,20 @@
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
(The US says it will eventually require all new portable phones to have
- GPS.)</p></li>
+ GPS.)</p>
+ </li>
- <li><p>Most mobile phones have a universal back door, which has been used to
- <a
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
- turn them malicious</a>.</p></li>
+ <li><p>Most mobile phones have a universal back door, which has been
+ used to <a
+
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
+ turn them malicious</a>.</p>
+ </li>
<li><p><a
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">
- Samsung Galaxy devices running proprietary Android versions come with a back
- door</a> that provides remote access to the data stored on the
device.</p></li>
+ Samsung Galaxy devices running proprietary Android versions come with a
+ back door</a> that provides remote access to the data stored on the
+ device.</p>
+ </li>
<li><p><a
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
The NSA can tap data in smart phones, including iPhones, Android, and
@@ -52,34 +57,40 @@
does not operate via the universal back door that we know nearly all
portable phones have. It may involve exploiting various bugs. There are
<a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
- lots of bugs in the phones' radio software</a>.</p></li>
+ lots of bugs in the phones' radio software</a>.</p>
+ </li>
<li><p>Spyware in Cisco TNP IP phones: <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a>.</p></li>
<li><p>Spyware in Android phones (and Windows? laptops): The Wall Street
- Journal (in an article blocked from us by a paywall) reports that
- <a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
- the FBI can remotely activate the GPS and microphone in Android phones and
- laptops</a>. (I suspect this means Windows laptops.) Here is <a
- href="http://cryptome.org/2013/08/fbi-hackers.htm">more info</a>.</p></li>
-
- <li><p>Spyware is present in some Android devices when they are sold.
- Some Motorola phones modify Android to were <a
href="http://www.beneaththewaves.net/
-Projects/Motorola_Is_Listening.html">send personal data to
Motorola.</a></p></li>
+ Journal (in an article blocked from us by a paywall) reports that <a
+
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
+ the FBI can remotely activate the GPS and microphone in Android phones
+ and laptops</a>. (I suspect this means Windows laptops.) Here is <a
+ href="http://cryptome.org/2013/08/fbi-hackers.htm">more info</a>.</p>
+ </li>
- <li><p>Some manufacturers add a <a
href="http://androidsecuritytest.com/features/logs-and-
-services/loggers/carrieriq/">hidden general surveillance package such as
Carrier IQ.</a></p></li>
+ <li><p>Some Motorola phones modify Android to <a
+ href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ send personal data to Motorola.</a></p>
+ </li>
- <li><p><a
href="/philosophy/proprietary/proprietary-back-doors.html#samsung">Samsung's
- back door</a> provides access to any file on the system.</p></li>
+ <li><p>Some manufacturers add a <a
+
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general surveillance package such as Carrier IQ.</a></p>
+ </li>
+
+ <li><p><a href="/philosophy/proprietary/proprietary-back-doors.html#samsung">
+ Samsung's back door</a> provides access to any file on the system.</p>
+ </li>
<li>
- <p>In
- Android, <a
href="https://www.computerworld.com/s/article/9213641/Google_throws_kill_switch_on_Android_phones?pageNumber=1">Google
- has a back door to remotely delete apps.</a> (It is in the nonfree
- program Google Play, which was formerly known as Android Market.)
+ <p>In Android, <a
+
href="https://www.computerworld.com/s/article/9213641/Google_throws_kill_switch_on_Android_phones?pageNumber=1">
+ Google has a back door to remotely delete apps.</a> (It is in the
+ nonfree program Google Play, which was formerly known as Android Market.)
</p>
<p>
@@ -95,12 +106,14 @@
<li><p><a
href="http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html">
Some Android phones are tyrants</a> (though someone found a way to crack
- the restriction). Fortunately, most Android devices are not tyrants.</p></li>
+ the restriction). Fortunately, most Android devices are not tyrants.</p>
+ </li>
<li><p><a href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/">
Mobile devices that come with Windows 8 are tyrants</a>. <a
href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown">
- Windows 8 on “mobile devices” is a jail.</a></p></li>
+ Windows 8 on “mobile devices” is a jail.</a></p>
+ </li>
</ul>
</div><!-- for id="content", starts in the include above -->
@@ -160,7 +173,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2014/06/25 03:12:56 $
+$Date: 2014/06/25 06:47:11 $
<!-- timestamp end -->
</p>
</div>