[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/philosophy/proprietary proprietary-back-doo...
From: |
Dora Scilipoti |
Subject: |
www/philosophy/proprietary proprietary-back-doo... |
Date: |
Sat, 03 Jan 2015 18:49:19 +0000 |
CVSROOT: /web/www
Module name: www
Changes by: Dora Scilipoti <dora> 15/01/03 18:49:19
Modified files:
philosophy/proprietary: proprietary-back-doors.html
Log message:
Add the TP-Link router (RT #971354). Wrap lines.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary/proprietary-back-doors.html?cvsroot=www&r1=1.10&r2=1.11
Patches:
Index: proprietary-back-doors.html
===================================================================
RCS file: /web/www/www/philosophy/proprietary/proprietary-back-doors.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary-back-doors.html 27 Dec 2014 12:01:32 -0000 1.10
+++ proprietary-back-doors.html 3 Jan 2015 18:49:19 -0000 1.11
@@ -41,14 +41,13 @@
<li>
<p>Windows 8's back doors are so gaping that
<a
href="http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">
-the German government
-has decided it can't be trusted</a>.
+the German government has decided it can't be trusted</a>.
</p>
</li>
<li>
-<p>The iPhone has a back
-door <a
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">
+<p>The iPhone has a back door
+<a
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">
that allows Apple to remotely delete apps</a> which Apple considers
“inappropriate”. Jobs said it's ok for Apple to have this power
because of course we can trust Apple.
@@ -56,16 +55,16 @@
</li>
<li>
-<p>The iPhone has a back door
-for <a
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">remote
-wipe</a>. It's not always enabled, but users are led into enabling it
-without understanding.
+<p>The iPhone has a back door for
+<a
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
+remote wipe</a>. It's not always enabled, but users are led into enabling
+it without understanding.
</p>
</li>
<li>
-<p><a
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html">Windows
-8 also has a back door for remotely deleting apps</a>.
+<p><a
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html">
+Windows 8 also has a back door for remotely deleting apps</a>.
</p>
<p>
@@ -82,17 +81,17 @@
</li>
<li>
-<p>In
-Android, <a
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">Google
-has a back door to remotely delete apps.</a> (It is in a program
+<p>In Android,
+<a
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">
+Google has a back door to remotely delete apps.</a> (It is in a program
called GTalkService).
</p>
<p>
-Google can
-also <a
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">forcibly
-and remotely install apps</a> through GTalkService (which seems, since
-that article, to have been merged into Google Play). This adds up to
+Google can also
+<a
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
+forcibly and remotely install apps</a> through GTalkService (which seems,
+since that article, to have been merged into Google Play). This adds up to
a universal back door.
</p>
@@ -109,38 +108,39 @@
<li>
<p><a id="samsung"
-href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">Samsung
-Galaxy devices running proprietary Android versions come with a back
+href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">
+Samsung Galaxy devices running proprietary Android versions come with a back
door</a> that provides remote access to the files stored on the device.
</p>
</li>
<li>
-<p>The Amazon Kindle has a back door that has been used
-to <a
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">
+<p>The Amazon Kindle has a back door that has been used to
+<a
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">
remotely erase books</a>.
</p>
-<p>The Kindle also has
-a <a
href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090">universal
-back door</a>.
+<p>The Kindle also has a
+<a href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090">
+universal back door</a>.
</p>
</li>
<li>
<p>HP “storage appliances” that use the proprietary
“Left Hand” operating system have back doors that give
-HP <a
href="http://news.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/">remote
-login access</a> to them. HP claims that this does not give HP access
-to the customer's data, but if the back door allows installation of
-software changes, a change could be installed that would give access
-to the customer's data.
+HP <a
href="http://news.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/">
+remote login access</a> to them. HP claims that this does not give HP
+access to the customer's data, but if the back door allows installation of
+software changes, a change could be installed that would give access to the
+customer's data.
</p>
</li>
<li>
-<p><a
href="http://www.itworld.com/data-protection/378427/backdoor-found-d-link-router-firmware-code">Some
Dlink routers</a>
-have a back door for changing settings in a dlink of an eye.
+<p><a
href="http://www.itworld.com/data-protection/378427/backdoor-found-d-link-router-firmware-code">
+Some D-Link routers</a> have a back door for changing settings in a dlink
+of an eye.
</p>
<p>
@@ -149,8 +149,14 @@
</li>
<li>
-<p><a
href="http://www.techienews.co.uk/973462/bitcoin-miners-bundled-pups-legitimate-applications-backed-eula/">Some
applications come with MyFreeProxy,
-which is a universal back door that can download programs and run them.</a>
+<p><a href="http://sekurak.pl/tp-link-httptftp-backdoor/">
+The TP-Link router has a backdoor</a>.</p>
+</li>
+
+<li>
+<p><a
href="http://www.techienews.co.uk/973462/bitcoin-miners-bundled-pups-legitimate-applications-backed-eula/">
+Some applications come with MyFreeProxy, which is a universal back door
+that can download programs and run them.</a>
</p>
</li>
</ul>
@@ -171,16 +177,14 @@
<ul>
<li>
-<p><a
href="http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI">Writable
-microcode for Intel and AMD microprocessors</a> may be a vehicle for
-the NSA to invade computers, with the help of Microsoft, say respected
+<p><a
href="http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI">
+Writable microcode for Intel and AMD microprocessors</a> may be a vehicle
+for the NSA to invade computers, with the help of Microsoft, say respected
security experts.
</p>
</li>
</ul>
-
-
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
<div id="footer">
@@ -211,7 +215,7 @@
of this article.</p>
</div>
-<p>Copyright © 2013 Free Software Foundation, Inc.</p>
+<p>Copyright © 2014-2015 Free Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/3.0/us/">Creative
@@ -221,7 +225,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2014/12/27 12:01:32 $
+$Date: 2015/01/03 18:49:19 $
<!-- timestamp end -->
</p>
</div>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/philosophy/proprietary proprietary-back-doo...,
Dora Scilipoti <=