www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary proprietary-insecurity.de.html ...


From: GNUN
Subject: www/proprietary proprietary-insecurity.de.html ...
Date: Wed, 08 Jul 2015 08:06:19 +0000

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     15/07/08 08:06:19

Modified files:
        proprietary    : proprietary-insecurity.de.html 
Added files:
        proprietary/po : proprietary-insecurity.de-diff.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.de.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de-diff.html?cvsroot=www&rev=1.1

Patches:
Index: proprietary-insecurity.de.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.de.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- proprietary-insecurity.de.html      15 Apr 2015 13:02:19 -0000      1.1
+++ proprietary-insecurity.de.html      8 Jul 2015 08:06:15 -0000       1.2
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" 
value="/proprietary/proprietary-insecurity.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/proprietary-insecurity.de.po">
+ http://www.gnu.org/proprietary/po/proprietary-insecurity.de.po</a>'
+ --><!--#set var="ORIGINAL_FILE" 
value="/proprietary/proprietary-insecurity.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/proprietary-insecurity.de-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2015-05-09" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/proprietary-insecurity.en.html" -->
 
 <!--#include virtual="/server/header.de.html" -->
 <!-- Parent-Version: 1.77 -->
@@ -8,6 +13,7 @@
 
 <!--#include virtual="/proprietary/po/proprietary-insecurity.translist" -->
 <!--#include virtual="/server/banner.de.html" -->
+<!--#include virtual="/server/outdated.de.html" -->
 <h2>Proprietäre Unsicherheit</h2>
 
 <a href="/philosophy/proprietary/">Weitere Beispiele für proprietäre
@@ -242,7 +248,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Aktualisierung:
 
-$Date: 2015/04/15 13:02:19 $
+$Date: 2015/07/08 08:06:15 $
 
 <!-- timestamp end -->
 </p>

Index: po/proprietary-insecurity.de-diff.html
===================================================================
RCS file: po/proprietary-insecurity.de-diff.html
diff -N po/proprietary-insecurity.de-diff.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/proprietary-insecurity.de-diff.html      8 Jul 2015 08:06:17 -0000       
1.1
@@ -0,0 +1,231 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/proprietary/proprietary-insecurity.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;!-- Parent-Version: 1.77 --&gt;
+&lt;title&gt;Proprietary Insecurity
+- GNU Project - Free Software Foundation&lt;/title&gt;
+ &lt;!--#include virtual="/proprietary/po/proprietary-insecurity.translist" 
--&gt;
+&lt;!--#include virtual="/server/banner.html" --&gt;
+&lt;h2&gt;Proprietary Insecurity&lt;/h2&gt;
+
+&lt;a href="/philosophy/proprietary.html"&gt;Other examples of proprietary 
malware&lt;/a&gt;
+
+&lt;p&gt;This page lists clearly established cases of insecurity in
+proprietary software that has grave consequences or is otherwise
+noteworthy.&lt;/p&gt;
+
+&lt;p&gt;It would be incorrect to compare proprietary software with a
+fictitious idea of free software as perfect.  Every nontrivial program
+has bugs, and any system, free or proprietary, may have security
+holes.  But proprietary software developers frequently disregard
+gaping holes, or even introduce them deliberately, and &lt;em&gt;the users
+are helpless to fix them&lt;/em&gt;.&lt;/p&gt;
+
+&lt;ul&gt;
+
+&lt;li&gt;
+&lt;p&gt;
+<span class="inserted"><ins><em>Hospira infusion pumps, which are used to 
administer drugs to
+a patient, were rated
+&ldquo;&lt;a
+href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/"&gt;least
+secure IP device I've ever seen&lt;/a&gt;&rdquo;
+by a security researcher.
+&lt;/p&gt;
+&lt;p&gt;
+Depending on what drug is being infused, the insecurity could
+open the door to murder.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;
+Due to bad security in a drug pump, crackers could use it to
+&lt;a 
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/"&gt;kill
 patients&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;</em></ins></span>
+&lt;a 
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
+The NSA can tap data in smart phones, including iPhones, Android, and
+BlackBerry&lt;/a&gt;.  While there is not much detail here, it seems that
+this does not operate via the universal back door that we know nearly
+all portable phones have.  It may involve exploiting various bugs.
+There
+are &lt;a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
+lots of bugs in the phones' radio software&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;&lt;a 
href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/"&gt;
+&ldquo;Smart homes&rdquo;&lt;/a&gt; turn out to be stupidly vulnerable to
+intrusion.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;The
+&lt;a 
href="http://arstechnica.com/security/2014/02/crypto-weaknesses-in-whatsapp-the-kind-of-stuff-the-nsa-would-love/"&gt;insecurity
 of WhatsApp&lt;/a&gt;
+makes eavesdropping a snap.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;&lt;a 
href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html"&gt;
+The FTC punished a company for making webcams with bad security so
+that it was easy for anyone to watch them&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;&lt;a 
href="http://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/"&gt;
+It is possible to take control of some car computers through malware
+in music files&lt;/a&gt;.
+Also &lt;a 
href="http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0"&gt;by
+radio&lt;/a&gt;.  Here is &lt;a href="http://www.autosec.org/faq.html"&gt;more
+information&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;&lt;a 
href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/"&gt;
+It is possible to kill people by taking control of medical implants by
+radio&lt;/a&gt;.  Here
+is &lt;a href="http://www.bbc.co.uk/news/technology-17631838"&gt;more
+information&lt;/a&gt;.  And &lt;a 
href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html"&gt;here&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Lots of &lt;a 
href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/"&gt;hospital 
equipment has lousy security&lt;/a&gt;, and it can be fatal.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;&lt;a 
href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/"&gt;
+Point-of-sale terminals running Windows were taken over and turned
+into a botnet for the purpose of collecting customers' credit card
+numbers&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;An app to prevent &ldquo;identity theft&rdquo; (access to personal 
data)
+by storing users' data on a special server
+&lt;a 
href="http://arstechnica.com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-concerns-that-app-isnt-safe/"&gt;was
+deactivated by its developer&lt;/a&gt; which had discovered a security flaw.
+&lt;/p&gt;
+
+&lt;p&gt;
+That developer seems to be conscientious about protecting personal
+data from third parties in general, but it can't protect that data
+from the state.  Quite the contrary: confiding your data to someone
+else's server, if not first encrypted by you with free software,
+undermines your rights.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;&lt;a href="http://www.bunniestudios.com/blog/?p=3554"&gt; Some flash
+memories have modifiable software&lt;/a&gt;, which makes them vulnerable to
+viruses.&lt;/p&gt;
+
+&lt;p&gt;We don't call this a &ldquo;back door&rdquo; because it is normal
+that you can install a new system in a computer given physical access
+to it.  However, memory sticks and cards should not be modifiable in
+this way.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;&lt;a href="http://spritesmods.com/?art=hddhack&amp;page=6"&gt; 
Replaceable
+nonfree software in disk drives can be written by a nonfree
+program.&lt;/a&gt;  This makes any system vulnerable to persistent attacks
+that normal forensics won't detect.&lt;/p&gt;
+&lt;/li&gt;
+
+<span class="inserted"><ins><em>&lt;li&gt;
+&lt;p&gt;&lt;a 
href="http://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html"&gt;
+Many smartphone apps use insecure authentication methods when storing
+your personal data on remote servers.&lt;/a&gt;
+This leaves personal information like email addresses, passwords, and health 
information vulnerable. Because many
+of these apps are proprietary it makes it hard to impossible to know which 
apps are at risk.&lt;/p&gt;
+&lt;/li&gt;</em></ins></span>
+
+&lt;/ul&gt;
+
+&lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
+&lt;!--#include virtual="/server/footer.html" --&gt;
+&lt;div id="footer"&gt;
+&lt;div class="unprintable"&gt;
+
+&lt;p&gt;Please send general FSF &amp; GNU inquiries to
+&lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.
+There are also &lt;a href="/contact/"&gt;other ways to contact&lt;/a&gt;
+the FSF.  Broken links and other corrections or suggestions can be sent
+to &lt;a 
href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to &lt;a href="mailto:address@hidden"&gt;
+        &lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;For information on coordinating and submitting translations of
+        our web pages, see &lt;a
+        href="/server/standards/README.translations.html"&gt;Translations
+        README&lt;/a&gt;. --&gt;
+Please see the &lt;a
+href="/server/standards/README.translations.html"&gt;Translations
+README&lt;/a&gt; for information on coordinating and submitting translations
+of this article.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND <span class="removed"><del><strong>3.0 
US.</strong></del></span> <span 
class="inserted"><ins><em>4.0.</em></ins></span>  Please do NOT change or 
remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. --&gt;
+
+&lt;p&gt;Copyright &copy; <span 
class="removed"><del><strong>2013</strong></del></span> <span 
class="inserted"><ins><em>2013, 2015</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
+
+&lt;p&gt;This page is licensed under a &lt;a rel="license"
+<span 
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/3.0/us/"&gt;Creative</strong></del></span>
+<span 
class="inserted"><ins><em>href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative</em></ins></span>
+Commons <span class="removed"><del><strong>Attribution-NoDerivs 3.0 United 
States</strong></del></span> <span 
class="inserted"><ins><em>Attribution-NoDerivatives 4.0 
International</em></ins></span> License&lt;/a&gt;.&lt;/p&gt;
+
+&lt;!--#include virtual="/server/bottom-notes.html" --&gt;
+
+&lt;p class="unprintable"&gt;Updated:
+&lt;!-- timestamp start --&gt;
+$Date: 2015/07/08 08:06:17 $
+&lt;!-- timestamp end --&gt;
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;
+&lt;/body&gt;
+&lt;/html&gt;
+</pre></body></html>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]