www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-apple.html malware-kind...


From: Joerg Kohne
Subject: www/proprietary malware-apple.html malware-kind...
Date: Tue, 03 May 2016 17:51:13 +0000

CVSROOT:        /web/www
Module name:    www
Changes by:     Joerg Kohne <joeko>     16/05/03 17:51:13

Modified files:
        proprietary    : malware-apple.html malware-kindle-swindle.html 
                         malware-mobiles.html 
                         proprietary-back-doors.html 
                         proprietary-censorship.html 
                         proprietary-deception.html proprietary-drm.html 
                         proprietary-insecurity.html 
                         proprietary-jails.html 
                         proprietary-sabotage.html 
                         proprietary-surveillance.html 
                         proprietary-tyrants.html 

Log message:
        (linc-report) Fix link.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.html?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-kindle-swindle.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-censorship.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-deception.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-drm.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.html?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-jails.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.html?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-tyrants.html?cvsroot=www&r1=1.4&r2=1.5

Patches:
Index: malware-apple.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.html,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- malware-apple.html  22 Apr 2016 16:27:45 -0000      1.26
+++ malware-apple.html  3 May 2016 17:51:11 -0000       1.27
@@ -12,7 +12,7 @@
 <!--#include virtual="/server/banner.html" -->
 <h2>Apple's Operating Systems Are Malware</h2>
 
-<p><a href="/philosophy/proprietary/">Other examples of proprietary 
malware</a></p>
+<p><a href="/proprietary/proprietary.html">Other examples of proprietary 
malware</a></p>
 
 <div class="highlight-para">
 <p>
@@ -170,7 +170,7 @@
   <li><p><a 
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html";>
   An Apple firmware &ldquo;upgrade&rdquo; bricked iPhones that had been
   unlocked.</a>  The &ldquo;upgrade&rdquo; also deactivated applications
-  not approved by <a href="/philosophy/proprietary-jails.html">Apple
+  not approved by <a href="/proprietary/proprietary-jails.html">Apple
   censorship</a>.  All this was apparently intentional.</p>
   </li>
 
@@ -401,7 +401,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/04/22 16:27:45 $
+$Date: 2016/05/03 17:51:11 $
 <!-- timestamp end -->
 </p>
 </div>

Index: malware-kindle-swindle.html
===================================================================
RCS file: /web/www/www/proprietary/malware-kindle-swindle.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- malware-kindle-swindle.html 29 Jun 2015 08:08:35 -0000      1.4
+++ malware-kindle-swindle.html 3 May 2016 17:51:11 -0000       1.5
@@ -12,7 +12,7 @@
 <!--#include virtual="/server/banner.html" -->
 <h2>Malware in the Kindle Swindle</h2>
 
-<a href="/philosophy/proprietary.html">Other examples of proprietary 
malware</a>
+<a href="/proprietary/proprietary.html">Other examples of proprietary 
malware</a>
 
 <p>We refer to this product as the
 <a href="/philosophy/why-call-it-the-swindle.html">Amazon Swindle</a>
@@ -147,7 +147,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/06/29 08:08:35 $
+$Date: 2016/05/03 17:51:11 $
 <!-- timestamp end -->
 </p>
 </div>

Index: malware-mobiles.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- malware-mobiles.html        18 Mar 2016 05:24:01 -0000      1.12
+++ malware-mobiles.html        3 May 2016 17:51:11 -0000       1.13
@@ -12,7 +12,7 @@
 <!--#include virtual="/server/banner.html" -->
 <h2>Malware in Mobile Devices</h2>
 
-<p><a href="/philosophy/proprietary.html">Other examples of proprietary
+<p><a href="/proprietary/proprietary.html">Other examples of proprietary
 malware</a></p>
 
 <div class="highlight-para">
@@ -35,7 +35,7 @@
 </div>
 
 <p>Here are examples of malware in mobile devices.  See also
-the <a href="/philosophy/malware-apple.html">the Apple malware
+the <a href="/proprietary/malware-apple.html">the Apple malware
 page</a> for malicious functionalities specific to the Apple iThings.</p>
 
 <div class="toc">
@@ -62,9 +62,10 @@
 
 <h3 id="back-doors">Mobile Back Doors</h3>
 <ul>
-  <li><p>The universal back door in portable phones 
-      <a 
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html/";>
-      is employed to listen through their microphones</a>.</p></li>
+  <li><p>The universal back door in portable phones <a
+    
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html";>is
+    employed to listen through their microphones</a>.</p>
+  </li>
 
   <li><p>Most mobile phones have a universal back door, which has been
   used to <a
@@ -78,7 +79,7 @@
   device.</p>
   </li>
 
-  <li><p><a href="/philosophy/proprietary/proprietary-back-doors.html#samsung">
+  <li><p><a href="/proprietary/proprietary-back-doors.html#samsung">
   Samsung's back door</a> provides access to any file on the system.</p>
   </li>
 
@@ -89,13 +90,11 @@
   called GTalkService).
   </p>
 
-  <p>
-  Google can
-  also <a 
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/";>forcibly
-  and remotely install apps</a> through GTalkService (which seems, since
-  that article, to have been merged into Google Play).  This adds up to
-  a universal back door.
-  </p>
+<p>Google can also <a
+href="https://web.archive.org/web/20150520235257/https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/";
+title="at the Wayback Machine (archived May 20, 2015)">forcibly and remotely
+install apps</a> through GTalkService (which seems, since that article, to have
+been merged into Google Play).  This adds up to a universal back door. </p>
 
   <p>
   Although Google's <em>exercise</em> of this power has not been
@@ -208,10 +207,11 @@
 
 <h3 id="jails">Mobile Jails</h3>
 <ul>
-  <li><p><a href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/";>
-  Mobile devices that come with Windows 8 are tyrants</a>. <a
-  
href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown";>
-  Windows 8 on &ldquo;mobile devices&rdquo; is a jail.</a></p>
+  <li><p><a
+  href="https://fsf.org/campaigns/secure-boot-vs-restricted-boot/";>Mobile
+  devices that come with Windows 8 are tyrants</a>. <a
+  
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html";>Windows
+  8 on &ldquo;mobile devices&rdquo; is a jail.</a></p>
   </li>
 </ul>
 
@@ -279,7 +279,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/03/18 05:24:01 $
+$Date: 2016/05/03 17:51:11 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-back-doors.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- proprietary-back-doors.html 25 Jan 2016 12:54:47 -0000      1.24
+++ proprietary-back-doors.html 3 May 2016 17:51:11 -0000       1.25
@@ -5,15 +5,16 @@
 <!--#include virtual="/server/banner.html" -->
 <h2>Proprietary Back Doors</h2>
 
-<a href="/philosophy/proprietary.html">Other examples of proprietary 
malware</a>
+<a href="/proprietary/proprietary.html">Other examples of proprietary 
malware</a>
 
 <p>Here are examples of demonstrated back doors in proprietary software.</p>
 
 <!-- WEBMASTERS: make sure to place new items on top under each subsection -->
 <ul>  
-  <li><p>The universal back door in portable phones 
-      <a 
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html/";>
-      is employed to listen through their microphones</a>.</p></li>
+  <li><p>The universal back door in portable phones <a
+    
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html";>is
+    employed to listen through their microphones</a>.</p>
+  </li>
  
   <li><p><a 
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/";>
       Microsoft has already backdoored its disk encryption</a>.</p></li>
@@ -226,7 +227,7 @@
 </li>
 
 <li>
-<p><a 
href="http://www.itworld.com/data-protection/378427/backdoor-found-d-link-router-firmware-code";>
+<p><a 
href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html";>
 Some D-Link routers</a> have a back door for changing settings in a dlink
 of an eye.
 </p>
@@ -316,7 +317,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/01/25 12:54:47 $
+$Date: 2016/05/03 17:51:11 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-censorship.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-censorship.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- proprietary-censorship.html 30 Mar 2016 11:12:25 -0000      1.11
+++ proprietary-censorship.html 3 May 2016 17:51:11 -0000       1.12
@@ -7,7 +7,7 @@
 
 <p>Here are examples of proprietary systems that impose censorship on
 what their users can access. We have a <a
-href="/philosophy/proprietary/proprietary-jails.html">separate
+href="/proprietary/proprietary-jails.html">separate
 list of proprietary systems that censor installation</a> of
 application programs (we call them &ldquo;jails&rdquo;.)</p>
 
@@ -123,7 +123,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/03/30 11:12:25 $
+$Date: 2016/05/03 17:51:11 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-deception.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-deception.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary-deception.html  30 Nov 2015 16:13:00 -0000      1.8
+++ proprietary-deception.html  3 May 2016 17:51:11 -0000       1.9
@@ -6,7 +6,7 @@
 <!--#include virtual="/server/banner.html" -->
 <h2>Proprietary Deception</h2>
 
-<p><a href="/philosophy/proprietary.html">Other examples of proprietary 
malware</a></p>
+<p><a href="/proprietary/proprietary.html">Other examples of proprietary 
malware</a></p>
 
 <p>This document reports instances where proprietary software is
   dishonest or conceals deception or trickery.</p>
@@ -92,7 +92,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/11/30 16:13:00 $
+$Date: 2016/05/03 17:51:11 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-drm.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-drm.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- proprietary-drm.html        20 Jan 2016 21:55:12 -0000      1.3
+++ proprietary-drm.html        3 May 2016 17:51:11 -0000       1.4
@@ -6,7 +6,7 @@
 <!--#include virtual="/server/banner.html" -->
 <h2>Proprietary DRM</h2>
 
-<a href="/philosophy/proprietary.html">Other examples of proprietary 
malware</a>
+<a href="/proprietary/proprietary.html">Other examples of proprietary 
malware</a>
 
 <p>Here are examples of proprietary programs and systems that
 implement <em>digital restrictions management</em> (DRM):
@@ -192,7 +192,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/01/20 21:55:12 $
+$Date: 2016/05/03 17:51:11 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-insecurity.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.html,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- proprietary-insecurity.html 2 May 2016 18:34:49 -0000       1.29
+++ proprietary-insecurity.html 3 May 2016 17:51:11 -0000       1.30
@@ -6,7 +6,7 @@
 <!--#include virtual="/server/banner.html" -->
 <h2>Proprietary Insecurity</h2>
 
-<a href="/philosophy/proprietary.html">Other examples of proprietary 
malware</a>
+<a href="/proprietary/proprietary.html">Other examples of proprietary 
malware</a>
 
 <p>This page lists clearly established cases of insecurity in
 proprietary software that has grave consequences or is otherwise
@@ -309,7 +309,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/05/02 18:34:49 $
+$Date: 2016/05/03 17:51:11 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-jails.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-jails.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary-jails.html      6 Oct 2015 20:53:54 -0000       1.6
+++ proprietary-jails.html      3 May 2016 17:51:11 -0000       1.7
@@ -73,9 +73,8 @@
 </li>
 
 <li>
-<p><a 
href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown";>
-Windows 8 on &ldquo;mobile devices&rdquo; is a jail.</a>
-</p>
+<p><a
+href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html";>Windows
 8 on &ldquo;mobile devices&rdquo; is a jail.</a></p>
 </li>
 
 <li>
@@ -145,7 +144,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/10/06 20:53:54 $
+$Date: 2016/05/03 17:51:11 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-sabotage.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-sabotage.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- proprietary-sabotage.html   22 Apr 2016 16:27:45 -0000      1.25
+++ proprietary-sabotage.html   3 May 2016 17:51:11 -0000       1.26
@@ -6,7 +6,7 @@
 <!--#include virtual="/server/banner.html" -->
 <h2>Proprietary Sabotage</h2>
 
-<a href="/philosophy/proprietary.html">Other examples of proprietary 
malware</a>
+<a href="/proprietary/proprietary.html">Other examples of proprietary 
malware</a>
 
 <p>Here are examples of proprietary software that has something
 worse than a back door.</p>
@@ -138,7 +138,7 @@
 <a 
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html";>An
 Apple firmware &ldquo;upgrade&rdquo; bricked iPhones that had been
 unlocked.</a>  The &ldquo;upgrade&rdquo; also deactivated applications
-not approved by <a href="/philosophy/proprietary-jails.html">Apple
+not approved by <a href="/proprietary/proprietary-jails.html">Apple
 censorship</a>.  All this was apparently intentional.
 </p></li>
 
@@ -177,27 +177,21 @@
 begin to snoop on them and distribute their personal data.
 </p></li>
 
-<li><p>
-Oracle's nonfree Java plug-in for
-browsers <a 
href="http://www.zdnet.com/a-close-look-at-how-oracle-installs-deceptive-software-with-java-updates-7000010038/?s_cid=e539";>sneakily
-installs other annoying proprietary software</a>.</p>
-
-<p>That article disregards all other bad things about proprietary
-software.  For instance, it regards the inclusion of proprietary Flash
-Player (which has
-a <a 
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/";>surveillance
-feature</a> and DRM) in Chrome as a good thing.  Chrome is a
-proprietary browser with a universal back door.</p>
-
-<p>We don't agree with the article's views on those issues, but we
-present it as a factual reference.</p>
-
-<p>
-In
-2014, <a 
href="http://www.computerworld.com/s/article/9236273/Oracle_will_continue_to_bundle_crapware_with_Java";>Oracle
-insisted on continuing this practice.</a>
-</p></li>
+<li><p>Oracle's nonfree Java plug-in for browsers <a
+href="http://www.zdnet.com/article/a-close-look-at-how-oracle-installs-deceptive-software-with-java-updates/";>sneakily
 installs other annoying proprietary software</a>.</p>
 
+<p>That article disregards all other bad things about proprietary software.  
For
+instance, it regards the inclusion of proprietary Flash Player (which  has a <a
+href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/";>surveillance
 feature</a> and DRM) in Chrome as a good thing.  Chrome
+is a proprietary browser with a universal back door.</p>
+
+<p>We don't agree with the article's views on those issues, but we present it
+as a factual reference.</p>
+
+<p>In 2014, <a
+href="http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html";>Oracle
 insisted on continuing
+this practice.</a></p>
+</li>
 </ul>
 
 </div><!-- for id="content", starts in the include above -->
@@ -257,7 +251,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/04/22 16:27:45 $
+$Date: 2016/05/03 17:51:11 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-surveillance.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.html,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- proprietary-surveillance.html       2 May 2016 18:34:49 -0000       1.56
+++ proprietary-surveillance.html       3 May 2016 17:51:11 -0000       1.57
@@ -6,7 +6,7 @@
 <!--#include virtual="/server/banner.html" -->
 <h2>Proprietary Surveillance</h2>
 
-<p><a href="/philosophy/proprietary/proprietary.html">
+<p><a href="/proprietary/proprietary.html">
    Other examples of proprietary malware</a></p>
 
 <div class="toc">
@@ -72,11 +72,11 @@
 
 <p>For decades, the Free Software movement has been denouncing the
 abusive surveillance machine of
-<a href="/philosophy/proprietary/proprietary.html">proprietary software</a>
+<a href="/proprietary/proprietary.html">proprietary software</a>
 companies such as
-<a href="/philosophy/proprietary/malware-microsoft.html">Microsoft</a>
+<a href="/proprietary/malware-microsoft.html">Microsoft</a>
 and
-<a href="/philosophy/proprietary/malware-apple.html">Apple</a>.
+<a href="/proprietary/malware-apple.html">Apple</a>.
 
 In the recent years, this tendency to watch people has spread across
 industries, not only in the software business, but also in the
@@ -170,7 +170,7 @@
       voice input.</p>
   </li>
 
-  <li><p><a 
href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175";>
+  <li><p><a 
href="http://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html";>
       Windows 8.1 snoops on local searches.</a>.</p>
   </li>
 
@@ -181,7 +181,7 @@
 </ul>
 
 <p>Microsoft's snooping on users did not start with Windows 10.
-   There's a lot more <a href="/philosophy/proprietary/malware-microsoft.html">
+   There's a lot more <a href="/proprietary/malware-microsoft.html">
    Microsoft malware</a>.</p>
 
 
@@ -230,7 +230,7 @@
 </ul>
 
 <p>There's a lot more <a href="#SpywareIniThings">iThing spyware</a>, and
-<a href="/philosophy/proprietary/malware-apple.html">Apple malware</a>.</p>
+<a href="/proprietary/malware-apple.html">Apple malware</a>.</p>
 
 
 <div class="big-subsection">
@@ -273,7 +273,7 @@
       hidden general surveillance package such as Carrier IQ.</a></p>
   </li>
 
-  <li><p><a href="/philosophy/proprietary/proprietary-back-doors.html#samsung">
+  <li><p><a href="/proprietary/proprietary-back-doors.html#samsung">
       Samsung's back door</a> provides access to any file on the system.</p>
   </li>
 </ul>
@@ -837,12 +837,11 @@
       users that don't have Facebook accounts.</p>
   </li>
 
-  <li><p>Many web sites rat their visitors to advertising networks
-      that track users.  Of the top 1000 web sites,
-      <a 
href="https://www.law.berkeley.edu/index.htmlcenters/berkeley-center-for-law-technology/research/privacy-at-bclt/web-privacy-census/";>
-      93% fed
-      their visitors third-party cookies, allowing other sites to
-      track them</a>.</p>
+  <li><p>Many web sites rat their visitors to advertising networks that track
+      users.  Of the top 1000 web sites, <a
+      
href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/";>84%
+      (as of 5/17/2012) fed their visitors third-party cookies, allowing other
+      sites to track them</a>.</p>
   </li>
 
   <li><p>Many web sites report all their visitors to Google by using
@@ -868,12 +867,13 @@
 </div>
 
 <ul>
-  <li><p>Google Chrome makes it easy for an extension to
-      do <a 
href="http://labs.detectify.com/post/133528218381/chrome-extensions-aka-total-absence-of-privacy";>total
+  <li><p>Google Chrome makes it easy for an extension to do <a
+    
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/";>total
       snooping on the user's browsing</a>, and many of them do so.</p>
   </li>
 </ul>
 
+
 <div class="big-subsection">
   <h4 id="SpywareInFlash">Spyware in Flash</h4>
   <span class="anchor-reference-id">(<a 
href="#SpywareInFlash">#SpywareInFlash</a>)</span>
@@ -972,7 +972,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/05/02 18:34:49 $
+$Date: 2016/05/03 17:51:11 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-tyrants.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-tyrants.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary-tyrants.html    16 Oct 2015 18:25:57 -0000      1.4
+++ proprietary-tyrants.html    3 May 2016 17:51:11 -0000       1.5
@@ -6,7 +6,7 @@
 <!--#include virtual="/server/banner.html" -->
 <h2>Proprietary Tyrants</h2>
 
-<a href="/philosophy/proprietary.html">Other examples of proprietary 
malware</a>
+<a href="/proprietary/proprietary.html">Other examples of proprietary 
malware</a>
 
 <p>A <em>tyrant</em> device is one that refuses to allow users to
 install a different operating system or a modified operating
@@ -114,7 +114,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/10/16 18:25:57 $
+$Date: 2016/05/03 17:51:11 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]