[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/philosophy/proprietary malware-apple.fr.htm...
From: |
GNUN |
Subject: |
www/philosophy/proprietary malware-apple.fr.htm... |
Date: |
Sun, 17 Aug 2014 23:29:49 +0000 |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 14/08/17 23:29:49
Modified files:
philosophy/proprietary: malware-apple.fr.html
proprietary-back-doors.fr.html
proprietary-surveillance.fr.html
philosophy/proprietary/po: malware-apple.fr-en.html
proprietary-back-doors.fr-en.html
proprietary-surveillance.fr-en.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary/malware-apple.fr.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary/proprietary-back-doors.fr.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary/proprietary-surveillance.fr.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary/po/malware-apple.fr-en.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary/po/proprietary-back-doors.fr-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary/po/proprietary-surveillance.fr-en.html?cvsroot=www&r1=1.4&r2=1.5
Patches:
Index: malware-apple.fr.html
===================================================================
RCS file: /web/www/www/philosophy/proprietary/malware-apple.fr.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- malware-apple.fr.html 25 Jun 2014 21:57:00 -0000 1.2
+++ malware-apple.fr.html 17 Aug 2014 23:29:48 -0000 1.3
@@ -56,6 +56,15 @@
signature du code</a> que les iTrucs utilisent pour enfermer l'utilisateur.</p>
</li>
+
+ <li><p><a
+href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+Il semble que plusieurs « fonctionnalités » d'iOS ne puissent avoir
d'autre
+objet que la surveillance</a>. Plus de détails dans cette <a
+href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms.pdf">
+présentation technique</a>.</p>
+ </li>
+
<li><p><a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
L'i-Beacon</a><a id="TransNote1-rev" href="#TransNote1"><sup>a</sup></a>
@@ -87,9 +96,17 @@
<li><p>L'iPhone a une porte dérobée <a
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">
-qui permet à Apple d'effacer à distance les applications</a> qu'elle estime
-« inappropriées ». D'après ce que disait Jobs, il est acceptable qu'Apple
-possède ce pouvoir, car naturellement nous pouvons lui faire confiance.</p>
+qui permet à Apple de supprimer à distance les applications</a> qu'elle
+estime « inappropriées ». D'après ce que disait Jobs, il est acceptable
+qu'Apple possède ce pouvoir, car naturellement nous pouvons lui faire
+confiance.</p>
+ </li>
+
+ <li><p>L'iPhone a une porte dérobée pour <a
+href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
+l'effacement complet à distance</a>. Elle n'est pas activée en permanence,
+mais les utilisateurs sont amenés à l'activer sans comprendre ce que cela
+implique.</p>
</li>
<li><p><a
@@ -187,7 +204,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2014/06/25 21:57:00 $
+$Date: 2014/08/17 23:29:48 $
<!-- timestamp end -->
</p>
Index: proprietary-back-doors.fr.html
===================================================================
RCS file: /web/www/www/philosophy/proprietary/proprietary-back-doors.fr.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary-back-doors.fr.html 23 Jul 2014 17:01:57 -0000 1.5
+++ proprietary-back-doors.fr.html 17 Aug 2014 23:29:48 -0000 1.6
@@ -47,6 +47,15 @@
</li>
<li>
+<p>L'iPhone a une porte dérobée pour <a
+href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
+l'effacement complet à distance</a>. Elle n'est pas activée en permanence,
+mais les utilisateurs sont amenés à l'activer sans comprendre ce que cela
+implique.
+</p>
+</li>
+
+<li>
<p><a
href="https://www.computerworld.com/s/article/9222518/Microsoft_We_can_remotely_delete_Windows_8_apps">
De même, Windows 8 a une porte dérobée pour supprimer des applications Ã
@@ -245,7 +254,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2014/07/23 17:01:57 $
+$Date: 2014/08/17 23:29:48 $
<!-- timestamp end -->
</p>
Index: proprietary-surveillance.fr.html
===================================================================
RCS file: /web/www/www/philosophy/proprietary/proprietary-surveillance.fr.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary-surveillance.fr.html 14 Aug 2014 21:27:40 -0000 1.4
+++ proprietary-surveillance.fr.html 17 Aug 2014 23:29:49 -0000 1.5
@@ -58,6 +58,15 @@
Ou bien Apple aide la NSA à espionner toutes les données des iTrucs, ou bien
cette société est totalement incompétente.</a>
</p>
+
+<p>
+<a
+href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+Il semble que plusieurs « fonctionnalités » d'iOS ne puissent avoir
d'autre
+objet que la surveillance</a>. Plus de détails dans cette <a
+href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms.pdf">
+présentation technique</a>.
+</p>
</li>
<li> Angry Birds <a
@@ -339,7 +348,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2014/08/14 21:27:40 $
+$Date: 2014/08/17 23:29:49 $
<!-- timestamp end -->
</p>
Index: po/malware-apple.fr-en.html
===================================================================
RCS file: /web/www/www/philosophy/proprietary/po/malware-apple.fr-en.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- po/malware-apple.fr-en.html 25 Jun 2014 21:57:02 -0000 1.3
+++ po/malware-apple.fr-en.html 17 Aug 2014 23:29:49 -0000 1.4
@@ -48,6 +48,14 @@
code signing</a> that the iThings use to jail the user.</p>
</li>
+
+ <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features” of iOS seem to exist for no possible
+ purpose other than surveillance</a>. Here is the <a
+
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms.pdf">
+ Technical presentation</a>.</p>
+ </li>
+
<li><p>The <a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
iBeacon</a> lets stores determine exactly where the iThing is, and
@@ -82,6 +90,12 @@
power because of course we can trust Apple.</p>
</li>
+ <li><p>The iPhone has a back door for <a
+
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
+ remote wipe</a>. It's not always enabled, but users are led into
+ enabling it without understanding.</p>
+ </li>
+
<li><p><a
href="https://www.computerworld.com/s/article/9039479/Update_Apple_plays_hardball_Upgrade_bricks_unlocked_iPhones">
An Apple firmware “upgrade” bricked iPhones that had been
unlocked.</a> The “upgrade” also deactivated applications
@@ -155,7 +169,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2014/06/25 21:57:02 $
+$Date: 2014/08/17 23:29:49 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-back-doors.fr-en.html
===================================================================
RCS file:
/web/www/www/philosophy/proprietary/po/proprietary-back-doors.fr-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- po/proprietary-back-doors.fr-en.html 23 Jul 2014 17:01:57 -0000
1.6
+++ po/proprietary-back-doors.fr-en.html 17 Aug 2014 23:29:49 -0000
1.7
@@ -40,6 +40,14 @@
</li>
<li>
+<p>The iPhone has a back door
+for <a
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">remote
+wipe</a>. It's not always enabled, but users are led into enabling it
+without understanding.
+</p>
+</li>
+
+<li>
<p><a
href="https://www.computerworld.com/s/article/9222518/Microsoft_We_can_remotely_delete_Windows_8_apps">Windows
8 also has a back door for remotely deleting apps</a>.
</p>
@@ -204,7 +212,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2014/07/23 17:01:57 $
+$Date: 2014/08/17 23:29:49 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-surveillance.fr-en.html
===================================================================
RCS file:
/web/www/www/philosophy/proprietary/po/proprietary-surveillance.fr-en.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- po/proprietary-surveillance.fr-en.html 25 Jun 2014 21:57:02 -0000
1.4
+++ po/proprietary-surveillance.fr-en.html 17 Aug 2014 23:29:49 -0000
1.5
@@ -50,6 +50,14 @@
Either Apple helps the NSA snoop on all the data in an iThing, or it is
totally incompetent.</a>
</p>
+
+<p>
+<a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+Several “features” of iOS seem to exist for no possible purpose
+other than surveillance</a>. Here is the
+<a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms.pdf">
+Technical presentation</a>.
+</p>
</li>
<li> Angry Birds <a
@@ -285,7 +293,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2014/06/25 21:57:02 $
+$Date: 2014/08/17 23:29:49 $
<!-- timestamp end -->
</p>
</div>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/philosophy/proprietary malware-apple.fr.htm...,
GNUN <=