[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary proprietary-back-doors.html pro...
From: |
Fabio Pesari |
Subject: |
www/proprietary proprietary-back-doors.html pro... |
Date: |
Mon, 19 Oct 2015 13:24:37 +0000 |
CVSROOT: /web/www
Module name: www
Changes by: Fabio Pesari <fabiop> 15/10/19 13:24:37
Modified files:
proprietary : proprietary-back-doors.html
proprietary-insecurity.html malware-apple.html
Log message:
Added backdoor entry [RT #1052337]
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.html?cvsroot=www&r1=1.14&r2=1.15
Patches:
Index: proprietary-back-doors.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- proprietary-back-doors.html 17 Oct 2015 09:15:58 -0000 1.9
+++ proprietary-back-doors.html 19 Oct 2015 13:24:36 -0000 1.10
@@ -11,6 +11,11 @@
<ul>
<li><p>
+Mac OS X had an <a
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
+intentional local back door for 4 years</a>.
+</p></li>
+
+<li><p>
Users report <a
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
Microsoft is forcing them to replace Windows 7 and 8 with
all-spying Windows 10</a>.</p>
@@ -254,7 +259,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2015/10/17 09:15:58 $
+$Date: 2015/10/19 13:24:36 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary-insecurity.html 6 Oct 2015 18:47:02 -0000 1.16
+++ proprietary-insecurity.html 19 Oct 2015 13:24:36 -0000 1.17
@@ -20,31 +20,40 @@
deliberately, and <em>the users are helpless to fix them</em>.</p>
<ul>
+<li>
+<p>
+Mac OS X had an
+<a
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
+intentional local back door for 4 years</a>, which could be
+exploited by attackers to gain root privileges.
+</p>
+</li>
<li>
<p>Security researchers discovered a
<a
href="http://www.theguardian.com/technology/2015/aug/12/hack-car-brakes-sms-text">
vulnerability in diagnostic dongles used for vehicle tracking and
insurance</a> that let them take remote control of a car or
-lorry using an SMS.</p>
+lorry using an SMS.
+</p>
</li>
- <li>
- <p>
- Crackers were able to
- <a
href="http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/">take
remote control of the Jeep</a>
- “connected car”.
- <br/>They could track the car, start or stop the engine, and
- activate or deactivate the brakes, and more.
- </p>
- <p>
- I expect that Chrysler and the NSA can do this too.
- </p>
- <p>
- If I ever own a car, and it contains a portable phone, I will
- deactivate that.
- </p>
- </li>
+<li>
+<p>
+Crackers were able to
+<a
href="http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/">take
remote control of the Jeep</a>
+“connected car”.
+<br/>They could track the car, start or stop the engine, and
+activate or deactivate the brakes, and more.
+</p>
+<p>
+I expect that Chrysler and the NSA can do this too.
+</p>
+<p>
+If I ever own a car, and it contains a portable phone, I will
+deactivate that.
+</p>
+</li>
<li>
<p>
@@ -233,7 +242,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2015/10/06 18:47:02 $
+$Date: 2015/10/19 13:24:36 $
<!-- timestamp end -->
</p>
</div>
Index: malware-apple.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- malware-apple.html 19 Oct 2015 13:14:03 -0000 1.14
+++ malware-apple.html 19 Oct 2015 13:24:36 -0000 1.15
@@ -61,18 +61,25 @@
<h3 id="back-doors">Apple Back Doors</h3>
<ul>
- <li><p>The iPhone has a back door <a
-
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">
- that allows Apple to remotely delete apps</a> which Apple considers
- “inappropriate”. Jobs said it's OK for Apple to have this
- power because of course we can trust Apple.</p>
- </li>
+<li><p>
+Mac OS X had an
+<a
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
+intentional local back door for 4 years</a>, which could be
+exploited by attackers to gain root privileges.
+</p></li>
- <li><p>The iPhone has a back door for <a
-
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
- remote wipe</a>. It's not always enabled, but users are led into
- enabling it without understanding.</p>
- </li>
+<li><p>The iPhone has a back door <a
+href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">
+that allows Apple to remotely delete apps</a> which Apple considers
+“inappropriate”. Jobs said it's OK for Apple to have this
+power because of course we can trust Apple.
+</p></li>
+
+<li><p>The iPhone has a back door for <a
+href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
+remote wipe</a>. It's not always enabled, but users are led into
+enabling it without understanding.
+</p></li>
</ul>
<h3 id="censorship">Apple Censorship</h3>
@@ -335,7 +342,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2015/10/19 13:14:03 $
+$Date: 2015/10/19 13:24:36 $
<!-- timestamp end -->
</p>
</div>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary proprietary-back-doors.html pro...,
Fabio Pesari <=