[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary proprietary-insecurity.de.html ...
From: |
GNUN |
Subject: |
www/proprietary proprietary-insecurity.de.html ... |
Date: |
Wed, 08 Jul 2015 08:06:19 +0000 |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 15/07/08 08:06:19
Modified files:
proprietary : proprietary-insecurity.de.html
Added files:
proprietary/po : proprietary-insecurity.de-diff.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.de.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de-diff.html?cvsroot=www&rev=1.1
Patches:
Index: proprietary-insecurity.de.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.de.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- proprietary-insecurity.de.html 15 Apr 2015 13:02:19 -0000 1.1
+++ proprietary-insecurity.de.html 8 Jul 2015 08:06:15 -0000 1.2
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE"
value="/proprietary/proprietary-insecurity.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/proprietary-insecurity.de.po">
+ http://www.gnu.org/proprietary/po/proprietary-insecurity.de.po</a>'
+ --><!--#set var="ORIGINAL_FILE"
value="/proprietary/proprietary-insecurity.html"
+ --><!--#set var="DIFF_FILE"
value="/proprietary/po/proprietary-insecurity.de-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2015-05-09" --><!--#set
var="ENGLISH_PAGE" value="/proprietary/proprietary-insecurity.en.html" -->
<!--#include virtual="/server/header.de.html" -->
<!-- Parent-Version: 1.77 -->
@@ -8,6 +13,7 @@
<!--#include virtual="/proprietary/po/proprietary-insecurity.translist" -->
<!--#include virtual="/server/banner.de.html" -->
+<!--#include virtual="/server/outdated.de.html" -->
<h2>Proprietäre Unsicherheit</h2>
<a href="/philosophy/proprietary/">Weitere Beispiele für proprietäre
@@ -242,7 +248,7 @@
<p class="unprintable"><!-- timestamp start -->
Aktualisierung:
-$Date: 2015/04/15 13:02:19 $
+$Date: 2015/07/08 08:06:15 $
<!-- timestamp end -->
</p>
Index: po/proprietary-insecurity.de-diff.html
===================================================================
RCS file: po/proprietary-insecurity.de-diff.html
diff -N po/proprietary-insecurity.de-diff.html
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ po/proprietary-insecurity.de-diff.html 8 Jul 2015 08:06:17 -0000
1.1
@@ -0,0 +1,231 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/proprietary/proprietary-insecurity.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+<!--#include virtual="/server/header.html" -->
+<!-- Parent-Version: 1.77 -->
+<title>Proprietary Insecurity
+- GNU Project - Free Software Foundation</title>
+ <!--#include virtual="/proprietary/po/proprietary-insecurity.translist"
-->
+<!--#include virtual="/server/banner.html" -->
+<h2>Proprietary Insecurity</h2>
+
+<a href="/philosophy/proprietary.html">Other examples of proprietary
malware</a>
+
+<p>This page lists clearly established cases of insecurity in
+proprietary software that has grave consequences or is otherwise
+noteworthy.</p>
+
+<p>It would be incorrect to compare proprietary software with a
+fictitious idea of free software as perfect. Every nontrivial program
+has bugs, and any system, free or proprietary, may have security
+holes. But proprietary software developers frequently disregard
+gaping holes, or even introduce them deliberately, and <em>the users
+are helpless to fix them</em>.</p>
+
+<ul>
+
+<li>
+<p>
+<span class="inserted"><ins><em>Hospira infusion pumps, which are used to
administer drugs to
+a patient, were rated
+“<a
+href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/">least
+secure IP device I've ever seen</a>”
+by a security researcher.
+</p>
+<p>
+Depending on what drug is being infused, the insecurity could
+open the door to murder.
+</p>
+</li>
+
+<li>
+<p>
+Due to bad security in a drug pump, crackers could use it to
+<a
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/">kill
patients</a>.
+</p>
+</li>
+
+<li>
+<p></em></ins></span>
+<a
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
+The NSA can tap data in smart phones, including iPhones, Android, and
+BlackBerry</a>. While there is not much detail here, it seems that
+this does not operate via the universal back door that we know nearly
+all portable phones have. It may involve exploiting various bugs.
+There
+are <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
+lots of bugs in the phones' radio software</a>.
+</p>
+</li>
+
+<li>
+<p><a
href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/">
+“Smart homes”</a> turn out to be stupidly vulnerable to
+intrusion.</p>
+</li>
+
+<li>
+<p>The
+<a
href="http://arstechnica.com/security/2014/02/crypto-weaknesses-in-whatsapp-the-kind-of-stuff-the-nsa-would-love/">insecurity
of WhatsApp</a>
+makes eavesdropping a snap.</p>
+</li>
+
+<li>
+<p><a
href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html">
+The FTC punished a company for making webcams with bad security so
+that it was easy for anyone to watch them</a>.
+</p>
+</li>
+
+<li>
+<p><a
href="http://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/">
+It is possible to take control of some car computers through malware
+in music files</a>.
+Also <a
href="http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0">by
+radio</a>. Here is <a href="http://www.autosec.org/faq.html">more
+information</a>.
+</p>
+</li>
+
+<li>
+<p><a
href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/">
+It is possible to kill people by taking control of medical implants by
+radio</a>. Here
+is <a href="http://www.bbc.co.uk/news/technology-17631838">more
+information</a>. And <a
href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html">here</a>.
+</p>
+</li>
+
+<li>
+<p>Lots of <a
href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">hospital
equipment has lousy security</a>, and it can be fatal.
+</p>
+</li>
+
+<li>
+<p><a
href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/">
+Point-of-sale terminals running Windows were taken over and turned
+into a botnet for the purpose of collecting customers' credit card
+numbers</a>.
+</p>
+</li>
+
+<li>
+<p>An app to prevent “identity theft” (access to personal
data)
+by storing users' data on a special server
+<a
href="http://arstechnica.com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-concerns-that-app-isnt-safe/">was
+deactivated by its developer</a> which had discovered a security flaw.
+</p>
+
+<p>
+That developer seems to be conscientious about protecting personal
+data from third parties in general, but it can't protect that data
+from the state. Quite the contrary: confiding your data to someone
+else's server, if not first encrypted by you with free software,
+undermines your rights.
+</p>
+</li>
+
+<li>
+<p><a href="http://www.bunniestudios.com/blog/?p=3554"> Some flash
+memories have modifiable software</a>, which makes them vulnerable to
+viruses.</p>
+
+<p>We don't call this a “back door” because it is normal
+that you can install a new system in a computer given physical access
+to it. However, memory sticks and cards should not be modifiable in
+this way.</p>
+</li>
+
+<li>
+<p><a href="http://spritesmods.com/?art=hddhack&page=6">
Replaceable
+nonfree software in disk drives can be written by a nonfree
+program.</a> This makes any system vulnerable to persistent attacks
+that normal forensics won't detect.</p>
+</li>
+
+<span class="inserted"><ins><em><li>
+<p><a
href="http://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html">
+Many smartphone apps use insecure authentication methods when storing
+your personal data on remote servers.</a>
+This leaves personal information like email addresses, passwords, and health
information vulnerable. Because many
+of these apps are proprietary it makes it hard to impossible to know which
apps are at risk.</p>
+</li></em></ins></span>
+
+</ul>
+
+</div><!-- for id="content", starts in the include above -->
+<!--#include virtual="/server/footer.html" -->
+<div id="footer">
+<div class="unprintable">
+
+<p>Please send general FSF & GNU inquiries to
+<a href="mailto:address@hidden"><address@hidden></a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF. Broken links and other corrections or suggestions can be sent
+to <a
href="mailto:address@hidden"><address@hidden></a>.</p>
+
+<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
+ replace it with the translation of these two:
+
+ We work hard and do our best to provide accurate, good quality
+ translations. However, we are not exempt from imperfection.
+ Please send your comments and general suggestions in this regard
+ to <a href="mailto:address@hidden">
+ <address@hidden></a>.</p>
+
+ <p>For information on coordinating and submitting translations of
+ our web pages, see <a
+ href="/server/standards/README.translations.html">Translations
+ README</a>. -->
+Please see the <a
+href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and submitting translations
+of this article.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+ files generated as part of manuals) on the GNU web server should
+ be under CC BY-ND <span class="removed"><del><strong>3.0
US.</strong></del></span> <span
class="inserted"><ins><em>4.0.</em></ins></span> Please do NOT change or
remove this
+ without talking with the webmasters or licensing team first.
+ Please make sure the copyright date is consistent with the
+ document. For web pages, it is ok to list just the latest year the
+ document was modified, or published.
+
+ If you wish to list earlier years, that is ok too.
+ Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+ years, as long as each year in the range is in fact a copyrightable
+ year, i.e., a year in which the document was published (including
+ being publicly visible on the web or in a revision control system).
+
+ There is more detail about copyright years in the GNU Maintainers
+ Information document, www.gnu.org/prep/maintain. -->
+
+<p>Copyright © <span
class="removed"><del><strong>2013</strong></del></span> <span
class="inserted"><ins><em>2013, 2015</em></ins></span> Free Software
Foundation, Inc.</p>
+
+<p>This page is licensed under a <a rel="license"
+<span
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/3.0/us/">Creative</strong></del></span>
+<span
class="inserted"><ins><em>href="http://creativecommons.org/licenses/by-nd/4.0/">Creative</em></ins></span>
+Commons <span class="removed"><del><strong>Attribution-NoDerivs 3.0 United
States</strong></del></span> <span
class="inserted"><ins><em>Attribution-NoDerivatives 4.0
International</em></ins></span> License</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.html" -->
+
+<p class="unprintable">Updated:
+<!-- timestamp start -->
+$Date: 2015/07/08 08:06:17 $
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+</body>
+</html>
+</pre></body></html>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary proprietary-insecurity.de.html ...,
GNUN <=