www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary proprietary-back-doors.html pro...


From: Fabio Pesari
Subject: www/proprietary proprietary-back-doors.html pro...
Date: Mon, 19 Oct 2015 13:24:37 +0000

CVSROOT:        /web/www
Module name:    www
Changes by:     Fabio Pesari <fabiop>   15/10/19 13:24:37

Modified files:
        proprietary    : proprietary-back-doors.html 
                         proprietary-insecurity.html malware-apple.html 

Log message:
        Added backdoor entry [RT #1052337]

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.html?cvsroot=www&r1=1.14&r2=1.15

Patches:
Index: proprietary-back-doors.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- proprietary-back-doors.html 17 Oct 2015 09:15:58 -0000      1.9
+++ proprietary-back-doors.html 19 Oct 2015 13:24:36 -0000      1.10
@@ -11,6 +11,11 @@
 
 <ul>
 <li><p>
+Mac OS X had an <a 
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/";>
+intentional local back door for 4 years</a>.
+</p></li>
+
+<li><p>
 Users report <a 
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all";>
 Microsoft is forcing them to replace Windows 7 and 8 with
 all-spying Windows 10</a>.</p>
@@ -254,7 +259,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/10/17 09:15:58 $
+$Date: 2015/10/19 13:24:36 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-insecurity.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary-insecurity.html 6 Oct 2015 18:47:02 -0000       1.16
+++ proprietary-insecurity.html 19 Oct 2015 13:24:36 -0000      1.17
@@ -20,31 +20,40 @@
 deliberately, and <em>the users are helpless to fix them</em>.</p>
 
 <ul>
+<li>
+<p>
+Mac OS X had an
+<a 
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/";>
+intentional local back door for 4 years</a>, which could be
+exploited by attackers to gain root privileges.
+</p>
+</li>
 
 <li>
 <p>Security researchers discovered a
 <a 
href="http://www.theguardian.com/technology/2015/aug/12/hack-car-brakes-sms-text";>
 vulnerability in diagnostic dongles used for vehicle tracking and
 insurance</a> that let them take remote control of a car or
-lorry using an SMS.</p>
+lorry using an SMS.
+</p>
 </li>
 
-  <li>
-    <p>
-      Crackers were able to
-      <a 
href="http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/";>take
 remote control of the Jeep</a>
-      &ldquo;connected car&rdquo;.
-      <br/>They could track the car, start or stop the engine, and
-      activate or deactivate the brakes, and more.
-    </p>
-    <p>
-      I expect that Chrysler and the NSA can do this too.
-    </p>
-    <p>
-      If I ever own a car, and it contains a portable phone, I will
-      deactivate that.
-    </p>
-  </li>
+<li>
+<p>
+Crackers were able to
+<a 
href="http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/";>take
 remote control of the Jeep</a>
+&ldquo;connected car&rdquo;.
+<br/>They could track the car, start or stop the engine, and
+activate or deactivate the brakes, and more.
+</p>
+<p>
+I expect that Chrysler and the NSA can do this too.
+</p>
+<p>
+If I ever own a car, and it contains a portable phone, I will
+deactivate that.
+</p>
+</li>
   
 <li>
 <p>
@@ -233,7 +242,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/10/06 18:47:02 $
+$Date: 2015/10/19 13:24:36 $
 <!-- timestamp end -->
 </p>
 </div>

Index: malware-apple.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- malware-apple.html  19 Oct 2015 13:14:03 -0000      1.14
+++ malware-apple.html  19 Oct 2015 13:24:36 -0000      1.15
@@ -61,18 +61,25 @@
 
 <h3 id="back-doors">Apple Back Doors</h3>
 <ul>
-  <li><p>The iPhone has a back door <a
-  
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html";>
-  that allows Apple to remotely delete apps</a> which Apple considers
-  &ldquo;inappropriate&rdquo;. Jobs said it's OK for Apple to have this
-  power because of course we can trust Apple.</p>
-  </li>
+<li><p>
+Mac OS X had an
+<a 
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/";>
+intentional local back door for 4 years</a>, which could be
+exploited by attackers to gain root privileges.
+</p></li>
 
-  <li><p>The iPhone has a back door for <a
-  
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone";>
-  remote wipe</a>.  It's not always enabled, but users are led into
-  enabling it without understanding.</p>
-  </li>
+<li><p>The iPhone has a back door <a
+href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html";>
+that allows Apple to remotely delete apps</a> which Apple considers
+&ldquo;inappropriate&rdquo;. Jobs said it's OK for Apple to have this
+power because of course we can trust Apple.
+</p></li>
+
+<li><p>The iPhone has a back door for <a
+href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone";>
+remote wipe</a>.  It's not always enabled, but users are led into
+enabling it without understanding.
+</p></li>
 </ul>
 
 <h3 id="censorship">Apple Censorship</h3>
@@ -335,7 +342,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/10/19 13:14:03 $
+$Date: 2015/10/19 13:24:36 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]