www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/philosophy/proprietary malware-apple.fr.htm...


From: GNUN
Subject: www/philosophy/proprietary malware-apple.fr.htm...
Date: Sun, 17 Aug 2014 23:29:49 +0000

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     14/08/17 23:29:49

Modified files:
        philosophy/proprietary: malware-apple.fr.html 
                                proprietary-back-doors.fr.html 
                                proprietary-surveillance.fr.html 
        philosophy/proprietary/po: malware-apple.fr-en.html 
                                   proprietary-back-doors.fr-en.html 
                                   proprietary-surveillance.fr-en.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary/malware-apple.fr.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary/proprietary-back-doors.fr.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary/proprietary-surveillance.fr.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary/po/malware-apple.fr-en.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary/po/proprietary-back-doors.fr-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary/po/proprietary-surveillance.fr-en.html?cvsroot=www&r1=1.4&r2=1.5

Patches:
Index: malware-apple.fr.html
===================================================================
RCS file: /web/www/www/philosophy/proprietary/malware-apple.fr.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- malware-apple.fr.html       25 Jun 2014 21:57:00 -0000      1.2
+++ malware-apple.fr.html       17 Aug 2014 23:29:48 -0000      1.3
@@ -56,6 +56,15 @@
 signature du code</a> que les iTrucs utilisent pour enfermer l'utilisateur.</p>
    </li>
 
+
+   <li><p><a
+href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services";>
+Il semble que plusieurs « fonctionnalités » d'iOS ne puissent avoir 
d'autre
+objet que la surveillance</a>. Plus de détails dans cette <a
+href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms.pdf";>
+présentation technique</a>.</p>
+   </li>
+
    <li><p><a
 
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html";>
 L'i-Beacon</a><a id="TransNote1-rev" href="#TransNote1"><sup>a</sup></a>
@@ -87,9 +96,17 @@
    
    <li><p>L'iPhone a une porte dérobée <a
 
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html";>
-qui permet à Apple d'effacer à distance les applications</a> qu'elle estime
-« inappropriées ». D'après ce que disait Jobs, il est acceptable qu'Apple
-possède ce pouvoir, car naturellement nous pouvons lui faire confiance.</p>
+qui permet à Apple de supprimer à distance les applications</a> qu'elle
+estime « inappropriées ». D'après ce que disait Jobs, il est acceptable
+qu'Apple possède ce pouvoir, car naturellement nous pouvons lui faire
+confiance.</p>
+   </li>
+
+   <li><p>L'iPhone a une porte dérobée pour <a
+href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone";>
+l'effacement complet à distance</a>. Elle n'est pas activée en permanence,
+mais les utilisateurs sont amenés à l'activer sans comprendre ce que cela
+implique.</p>
    </li>
 
   <li><p><a
@@ -187,7 +204,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2014/06/25 21:57:00 $
+$Date: 2014/08/17 23:29:48 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-back-doors.fr.html
===================================================================
RCS file: /web/www/www/philosophy/proprietary/proprietary-back-doors.fr.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary-back-doors.fr.html      23 Jul 2014 17:01:57 -0000      1.5
+++ proprietary-back-doors.fr.html      17 Aug 2014 23:29:48 -0000      1.6
@@ -47,6 +47,15 @@
 </li>
 
 <li>
+<p>L'iPhone a une porte dérobée pour <a
+href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone";>
+l'effacement complet à distance</a>. Elle n'est pas activée en permanence,
+mais les utilisateurs sont amenés à l'activer sans comprendre ce que cela
+implique.
+</p>
+</li>
+
+<li>
 <p><a
 
href="https://www.computerworld.com/s/article/9222518/Microsoft_We_can_remotely_delete_Windows_8_apps";>
 De même, Windows 8 a une porte dérobée pour supprimer des applications à
@@ -245,7 +254,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2014/07/23 17:01:57 $
+$Date: 2014/08/17 23:29:48 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-surveillance.fr.html
===================================================================
RCS file: /web/www/www/philosophy/proprietary/proprietary-surveillance.fr.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary-surveillance.fr.html    14 Aug 2014 21:27:40 -0000      1.4
+++ proprietary-surveillance.fr.html    17 Aug 2014 23:29:49 -0000      1.5
@@ -58,6 +58,15 @@
 Ou bien Apple aide la NSA à espionner toutes les données des iTrucs, ou bien
 cette société est totalement incompétente.</a>
 </p>
+
+<p>
+<a
+href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services";>
+Il semble que plusieurs « fonctionnalités » d'iOS ne puissent avoir 
d'autre
+objet que la surveillance</a>. Plus de détails dans cette <a
+href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms.pdf";>
+présentation technique</a>.
+</p>
 </li>
 
 <li> Angry Birds <a
@@ -339,7 +348,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2014/08/14 21:27:40 $
+$Date: 2014/08/17 23:29:49 $
 
 <!-- timestamp end -->
 </p>

Index: po/malware-apple.fr-en.html
===================================================================
RCS file: /web/www/www/philosophy/proprietary/po/malware-apple.fr-en.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- po/malware-apple.fr-en.html 25 Jun 2014 21:57:02 -0000      1.3
+++ po/malware-apple.fr-en.html 17 Aug 2014 23:29:49 -0000      1.4
@@ -48,6 +48,14 @@
    code signing</a> that the iThings use to jail the user.</p>
    </li>
 
+
+   <li><p><a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services";>
+   Several &ldquo;features&rdquo; of iOS seem to exist for no possible 
+   purpose other than surveillance</a>.  Here is the <a 
+   
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms.pdf";>
+   Technical presentation</a>.</p>
+   </li>
+
    <li><p>The <a 
    
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html";>
    iBeacon</a> lets stores determine exactly where the iThing is, and 
@@ -82,6 +90,12 @@
    power because of course we can trust Apple.</p>
    </li>
 
+   <li><p>The iPhone has a back door for <a 
+   
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone";>
+   remote wipe</a>.  It's not always enabled, but users are led into 
+   enabling it without understanding.</p>
+   </li>
+
   <li><p><a 
href="https://www.computerworld.com/s/article/9039479/Update_Apple_plays_hardball_Upgrade_bricks_unlocked_iPhones";>
    An Apple firmware &ldquo;upgrade&rdquo; bricked iPhones that had been
    unlocked.</a>  The &ldquo;upgrade&rdquo; also deactivated applications
@@ -155,7 +169,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2014/06/25 21:57:02 $
+$Date: 2014/08/17 23:29:49 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-back-doors.fr-en.html
===================================================================
RCS file: 
/web/www/www/philosophy/proprietary/po/proprietary-back-doors.fr-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- po/proprietary-back-doors.fr-en.html        23 Jul 2014 17:01:57 -0000      
1.6
+++ po/proprietary-back-doors.fr-en.html        17 Aug 2014 23:29:49 -0000      
1.7
@@ -40,6 +40,14 @@
 </li>
 
 <li>
+<p>The iPhone has a back door
+for <a 
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone";>remote
+wipe</a>.  It's not always enabled, but users are led into enabling it
+without understanding.
+</p>
+</li>
+
+<li>
 <p><a 
href="https://www.computerworld.com/s/article/9222518/Microsoft_We_can_remotely_delete_Windows_8_apps";>Windows
 8 also has a back door for remotely deleting apps</a>.
 </p>
@@ -204,7 +212,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2014/07/23 17:01:57 $
+$Date: 2014/08/17 23:29:49 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-surveillance.fr-en.html
===================================================================
RCS file: 
/web/www/www/philosophy/proprietary/po/proprietary-surveillance.fr-en.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- po/proprietary-surveillance.fr-en.html      25 Jun 2014 21:57:02 -0000      
1.4
+++ po/proprietary-surveillance.fr-en.html      17 Aug 2014 23:29:49 -0000      
1.5
@@ -50,6 +50,14 @@
 Either Apple helps the NSA snoop on all the data in an iThing, or it is 
 totally incompetent.</a>
 </p>
+
+<p>
+<a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services";>
+Several &ldquo;features&rdquo; of iOS seem to exist for no possible purpose
+other than surveillance</a>.  Here is the
+<a 
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms.pdf";>
+Technical presentation</a>.
+</p>
 </li>
 
 <li> Angry Birds <a 
@@ -285,7 +293,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2014/06/25 21:57:02 $
+$Date: 2014/08/17 23:29:49 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]