www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary proprietary-insecurity.de.html ...


From: GNUN
Subject: www/proprietary proprietary-insecurity.de.html ...
Date: Tue, 6 Sep 2016 22:58:19 +0000 (UTC)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     16/09/06 22:58:19

Modified files:
        proprietary    : proprietary-insecurity.de.html 
        proprietary/po : proprietary-insecurity.de-diff.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.de.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de-diff.html?cvsroot=www&r1=1.1&r2=1.2

Patches:
Index: proprietary-insecurity.de.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.de.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary-insecurity.de.html      18 May 2016 16:01:17 -0000      1.10
+++ proprietary-insecurity.de.html      6 Sep 2016 22:58:18 -0000       1.11
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" 
value="/proprietary/proprietary-insecurity.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/proprietary-insecurity.de.po">
+ https://www.gnu.org/proprietary/po/proprietary-insecurity.de.po</a>'
+ --><!--#set var="ORIGINAL_FILE" 
value="/proprietary/proprietary-insecurity.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/proprietary-insecurity.de-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2016-07-08" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/proprietary-insecurity.en.html" -->
 
 <!--#include virtual="/server/header.de.html" -->
 <!-- Parent-Version: 1.79 -->
@@ -8,6 +13,7 @@
 
 <!--#include virtual="/proprietary/po/proprietary-insecurity.translist" -->
 <!--#include virtual="/server/banner.de.html" -->
+<!--#include virtual="/server/outdated.de.html" -->
 <h2>Proprietäre Unsicherheit</h2>
 
 <a href="/proprietary/">Weitere Beispiele proprietärer Schadsoftware</a>
@@ -433,7 +439,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Aktualisierung:
 
-$Date: 2016/05/18 16:01:17 $
+$Date: 2016/09/06 22:58:18 $
 
 <!-- timestamp end -->
 </p>

Index: po/proprietary-insecurity.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de-diff.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- po/proprietary-insecurity.de-diff.html      8 Jul 2015 08:06:17 -0000       
1.1
+++ po/proprietary-insecurity.de-diff.html      6 Sep 2016 22:58:19 -0000       
1.2
@@ -11,14 +11,14 @@
 </style></head>
 <body><pre>
 &lt;!--#include virtual="/server/header.html" --&gt;
-&lt;!-- Parent-Version: 1.77 --&gt;
+&lt;!-- Parent-Version: 1.79 --&gt;
 &lt;title&gt;Proprietary Insecurity
 - GNU Project - Free Software Foundation&lt;/title&gt;
  &lt;!--#include virtual="/proprietary/po/proprietary-insecurity.translist" 
--&gt;
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Insecurity&lt;/h2&gt;
 
-&lt;a href="/philosophy/proprietary.html"&gt;Other examples of proprietary 
malware&lt;/a&gt;
+&lt;a href="/proprietary/proprietary.html"&gt;Other examples of proprietary 
malware&lt;/a&gt;
 
 &lt;p&gt;This page lists clearly established cases of insecurity in
 proprietary software that has grave consequences or is otherwise
@@ -27,15 +27,180 @@
 &lt;p&gt;It would be incorrect to compare proprietary software with a
 fictitious idea of free software as perfect.  Every nontrivial program
 has bugs, and any system, free or proprietary, may have security
-holes.  But proprietary software developers frequently disregard
-gaping holes, or even introduce them deliberately, and &lt;em&gt;the users
-are helpless to fix them&lt;/em&gt;.&lt;/p&gt;
+holes.  That in itself is not culpable.  But proprietary software
+developers frequently disregard gaping holes, or even introduce them
+deliberately, and &lt;em&gt;the users are helpless to fix 
them&lt;/em&gt;.&lt;/p&gt;
 
 &lt;ul&gt;
+&lt;li&gt;
+<span class="inserted"><ins><em>&lt;p&gt;Due to weak security, &lt;a 
href="http://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844"&gt;it
+is easy to open the doors of 100 million cars built by 
Volkswagen&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Ransomware &lt;a 
href="https://www.pentestpartners.com/blog/thermostat-ransomware-a-lesson-in-iot-security/"&gt;has
+been developed for a thermostat that uses proprietary 
software&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;A &lt;a 
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/"&gt;flaw
 in
+Internet Explorer and Edge&lt;/a&gt; allows an attacker to retrieve
+Microsoft account credentials, if the user is tricked into visiting a
+malicious link.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;&lt;a 
href="https://techcrunch.com/2016/07/29/research-shows-deleted-whatsapp-messages-arent-actually-deleted/"&gt;&ldquo;Deleted&rdquo;
+WhatsApp messages are not entirely deleted&lt;/a&gt;. They can be recovered
+in various ways.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;A vulnerability in Apple's Image I/O API allowed an attacker to
+&lt;a 
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
+  malacious code from any application which uses this API to render a
+  certain kind of image file&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;
+&lt;p&gt;A bug in a proprietary ASN.1 library, used in cell phone towers as
+well as cell phones and
+routers, &lt;a 
href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover"&gt;allows
+taking control of those systems&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Antivirus programs have so many errors
+  that &lt;a 
href="https://theconversation.com/as-more-vulnerabilities-are-discovered-is-it-time-to-uninstall-antivirus-software-61374"&gt;they
+  may make security worse&lt;/a&gt;.&lt;/p&gt;
+&lt;p&gt;GNU/Linux does not need antivirus software.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;</em></ins></span>
+&lt;p&gt;Over 70 brands of network-connected surveillance
+cameras &lt;a 
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;have
+security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;
+Samsung's &ldquo;Smart Home&rdquo; has a big security
+hole; &lt;a 
href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/"&gt;unauthorized
+people can remotely control it&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Samsung claims that this is an &ldquo;open&rdquo; platform so the
+problem is partly the fault of app developers. That is clearly true if
+the apps are proprietary software.&lt;/p&gt;
+
+&lt;p&gt;Anything whose name is &ldquo;Smart&rdquo; is most likely going to
+screw you.&lt;/p&gt;
+&lt;/li&gt;
 
 &lt;li&gt;
 &lt;p&gt;
-<span class="inserted"><ins><em>Hospira infusion pumps, which are used to 
administer drugs to
+The Nissan Leaf has a built-in cell phone modem which allows
+effectively
+anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+access its computers remotely and make changes in various
+settings&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;That's easy to do because the system has no authentication when
+accessed through the modem.  However, even if it asked for
+authentication, you couldn't be confident that Nissan has no
+access.  The software in the car is
+proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
+means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Even if no one connects to the car remotely, the cell phone modem
+enables the phone company to track the car's movements all the time;
+it is possible to physically remove the cell phone modem though.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;
+Malware found
+on &lt;a 
href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html"&gt;security
+cameras available through Amazon&lt;/a&gt;.
+&lt;/p&gt;
+
+&lt;p&gt;A camera that records locally on physical media, and has no network
+  connection, does not threaten people with surveillance&mdash;neither by
+  watching people through the camera, nor through malware in the camera.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;A bug in the iThings Messages
+app &lt;a 
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed
+a malicious web site to extract all the user's messaging history&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Many proprietary payment apps &lt;a
+href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data"&gt;
+transmit personal data in an insecure way&lt;/a&gt;.
+However, the worse aspect of these apps is that
+&lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;payment is not 
anonymous&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;
+FitBit fitness trackers &lt;a 
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"&gt;
+have a Bluetooth vulnerability&lt;/a&gt; that allows
+attackers to send malware to the devices, which can subsequently spread
+to computers and other FitBit trackers that interact with them.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;
+&ldquo;Self-encrypting&rdquo; disk drives do the encryption with proprietary
+firmware so you can't trust it. Western Digital's &ldquo;My Passport&rdquo;
+drives
+&lt;a 
href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;have
 a back door&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;
+Mac OS X had an
+&lt;a 
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/"&gt;
+intentional local back door for 4 years&lt;/a&gt;, which could be
+exploited by attackers to gain root privileges.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Security researchers discovered a
+&lt;a 
href="http://www.theguardian.com/technology/2015/aug/12/hack-car-brakes-sms-text"&gt;
+vulnerability in diagnostic dongles used for vehicle tracking and
+insurance&lt;/a&gt; that let them take remote control of a car or
+lorry using an SMS.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;
+Crackers were able to
+&lt;a 
href="http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/"&gt;take
 remote control of the Jeep&lt;/a&gt;
+&ldquo;connected car&rdquo;.
+&lt;br/&gt;They could track the car, start or stop the engine, and
+activate or deactivate the brakes, and more.
+&lt;/p&gt;
+&lt;p&gt;
+I expect that Chrysler and the NSA can do this too.
+&lt;/p&gt;
+&lt;p&gt;
+If I ever own a car, and it contains a portable phone, I will
+deactivate that.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;
+Hospira infusion pumps, which are used to administer drugs to
 a patient, were rated
 &ldquo;&lt;a
 
href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/"&gt;least
@@ -56,7 +221,7 @@
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;</em></ins></span>
+&lt;p&gt;
 &lt;a 
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
 The NSA can tap data in smart phones, including iPhones, Android, and
 BlackBerry&lt;/a&gt;.  While there is not much detail here, it seems that
@@ -153,13 +318,13 @@
 that normal forensics won't detect.&lt;/p&gt;
 &lt;/li&gt;
 
-<span class="inserted"><ins><em>&lt;li&gt;
+&lt;li&gt;
 &lt;p&gt;&lt;a 
href="http://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html"&gt;
 Many smartphone apps use insecure authentication methods when storing
 your personal data on remote servers.&lt;/a&gt;
 This leaves personal information like email addresses, passwords, and health 
information vulnerable. Because many
 of these apps are proprietary it makes it hard to impossible to know which 
apps are at risk.&lt;/p&gt;
-&lt;/li&gt;</em></ins></span>
+&lt;/li&gt;
 
 &lt;/ul&gt;
 
@@ -195,7 +360,7 @@
 
 &lt;!-- Regarding copyright, in general, standalone pages (as opposed to
      files generated as part of manuals) on the GNU web server should
-     be under CC BY-ND <span class="removed"><del><strong>3.0 
US.</strong></del></span> <span 
class="inserted"><ins><em>4.0.</em></ins></span>  Please do NOT change or 
remove this
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
      without talking with the webmasters or licensing team first.
      Please make sure the copyright date is consistent with the
      document.  For web pages, it is ok to list just the latest year the
@@ -210,18 +375,17 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; <span 
class="removed"><del><strong>2013</strong></del></span> <span 
class="inserted"><ins><em>2013, 2015</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2013, 2015, 2016 Free Software Foundation, 
Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
-<span 
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/3.0/us/"&gt;Creative</strong></del></span>
-<span 
class="inserted"><ins><em>href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative</em></ins></span>
-Commons <span class="removed"><del><strong>Attribution-NoDerivs 3.0 United 
States</strong></del></span> <span 
class="inserted"><ins><em>Attribution-NoDerivatives 4.0 
International</em></ins></span> License&lt;/a&gt;.&lt;/p&gt;
+href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
+Commons Attribution-NoDerivatives 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
 
 &lt;!--#include virtual="/server/bottom-notes.html" --&gt;
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2015/07/08 08:06:17 $
+$Date: 2016/09/06 22:58:19 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;



reply via email to

[Prev in Thread] Current Thread [Next in Thread]