www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-mobiles.it.html po/malw...


From: GNUN
Subject: www/proprietary malware-mobiles.it.html po/malw...
Date: Mon, 13 Feb 2017 22:59:34 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     17/02/13 22:59:34

Modified files:
        proprietary    : malware-mobiles.it.html 
Added files:
        proprietary/po : malware-mobiles.it-diff.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.it.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&rev=1.1

Patches:
Index: malware-mobiles.it.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.it.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- malware-mobiles.it.html     18 Nov 2016 07:33:05 -0000      1.10
+++ malware-mobiles.it.html     14 Feb 2017 03:59:34 -0000      1.11
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/malware-mobiles.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/malware-mobiles.it.po">
+ https://www.gnu.org/proprietary/po/malware-mobiles.it.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/malware-mobiles.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/malware-mobiles.it-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2016-12-16" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/malware-mobiles.en.html" -->
 
 <!--#include virtual="/server/header.it.html" -->
 <!-- Parent-Version: 1.79 -->
@@ -16,6 +21,7 @@
 </style>
 
 <!--#include virtual="/server/banner.it.html" -->
+<!--#include virtual="/server/outdated.it.html" -->
 <h2>Malware nei dispositivi mobili</h2>
 
 <p><a href="/proprietary/proprietary.html">Altri esempi di malware
@@ -336,7 +342,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2016/11/18 07:33:05 $
+$Date: 2017/02/14 03:59:34 $
 
 <!-- timestamp end -->
 </p>

Index: po/malware-mobiles.it-diff.html
===================================================================
RCS file: po/malware-mobiles.it-diff.html
diff -N po/malware-mobiles.it-diff.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/malware-mobiles.it-diff.html     14 Feb 2017 03:59:34 -0000      1.1
@@ -0,0 +1,325 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/proprietary/malware-mobiles.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;!-- Parent-Version: 1.79 --&gt;
+&lt;title&gt;Malware in Mobile Devices
+- GNU Project - Free Software Foundation&lt;/title&gt;
+ &lt;!--#include virtual="/proprietary/po/malware-mobiles.translist" --&gt;
+&lt;style type="text/css" media="print,screen"&gt;
+&lt;!--
+#content div.toc li { list-style: none; margin-bottom: 1em; }
+#content div.toc { margin-top: 1em; }
+--&gt;
+&lt;/style&gt;
+&lt;!--#include virtual="/server/banner.html" --&gt;
+&lt;h2&gt;Malware in Mobile Devices&lt;/h2&gt;
+
+&lt;p&gt;&lt;a href="/proprietary/proprietary.html"&gt;Other examples of 
proprietary
+malware&lt;/a&gt;&lt;/p&gt;
+
+&lt;div class="highlight-para"&gt;
+&lt;p&gt;
+&lt;em&gt;Malware&lt;/em&gt; means software designed to function in ways that
+mistreat or harm the user.  (This does not include accidental errors.)
+&lt;/p&gt;
+
+&lt;p&gt;
+Malware and nonfree software are two different issues.  The difference
+between &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt; and
+nonfree software is in &lt;a
+href="/philosophy/free-software-even-more-important.html"&gt;
+whether the users have control of the program or vice versa&lt;/a&gt;.  It's
+not directly a question of what the program &lt;em&gt;does&lt;/em&gt; when it
+runs.  However, in practice nonfree software is often malware, because
+the developer's awareness that the users would be powerless to fix any
+malicious functionalities tempts the developer to impose some.
+&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;p&gt;Here are examples of malware in mobile devices.  See also
+the &lt;a href="/proprietary/malware-apple.html"&gt;the Apple malware
+page&lt;/a&gt; for malicious functionalities specific to the Apple 
iThings.&lt;/p&gt;
+
+&lt;div class="toc"&gt;
+&lt;div class="malfunctions"&gt;
+&lt;ul&gt;
+&lt;li&gt;&lt;strong&gt;Type&nbsp;of malware&lt;/strong&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a href="#back-doors"&gt;Back doors&lt;/a&gt;&lt;/li&gt;
+&lt;!--&lt;li&gt;&lt;a 
href="#censorship"&gt;Censorship&lt;/a&gt;&lt;/li&gt;--&gt;
+&lt;li&gt;&lt;a href="#insecurity"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;
+&lt;!--&lt;li&gt;&lt;a href="#sabotage"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;--&gt;
+&lt;!--&lt;li&gt;&lt;a 
href="#interference"&gt;Interference&lt;/a&gt;&lt;/li&gt;--&gt;
+&lt;li&gt;&lt;a href="#surveillance"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
+<span class="removed"><del><strong>&lt;!--&lt;li&gt;&lt;a</strong></del></span>
+<span class="inserted"><ins><em>&lt;li&gt;&lt;a</em></ins></span> 
href="#drm"&gt;Digital restrictions
+    management&lt;/a&gt; or &ldquo;DRM&rdquo; means functionalities designed
+    to restrict what users can do with the data in their <span 
class="removed"><del><strong>computers.&lt;/li&gt;--&gt;</strong></del></span> 
<span class="inserted"><ins><em>computers.&lt;/li&gt;</em></ins></span>
+&lt;li&gt;&lt;a href="#jails"&gt;Jails&lt;/a&gt;&mdash;systems
+    that impose censorship on application programs.&lt;/li&gt;
+&lt;li&gt;&lt;a href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems
+    that reject any operating system not &ldquo;authorized&rdquo; by the
+    manufacturer.&lt;/li&gt;
+&lt;/ul&gt;
+&lt;/div&gt;
+&lt;/div&gt;
+
+&lt;h3 id="back-doors"&gt;Mobile Back Doors&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;The universal back door in portable phones &lt;a
+    
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;is
+    employed to listen through their microphones&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Most mobile phones have a universal back door, which has 
been
+  used to &lt;a
+  
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
+  turn them malicious&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor"&gt;
+  Samsung Galaxy devices running proprietary Android versions come with a
+  back door&lt;/a&gt; that provides remote access to the data stored on the
+  device.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
+  Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+  &lt;p&gt;In Android, &lt;a
+  
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"&gt;
+  Google has a back door to remotely delete apps.&lt;/a&gt;  (It is in a 
program
+  called GTalkService).
+  &lt;/p&gt;
+
+&lt;p&gt;Google can also &lt;a
+href="https://web.archive.org/web/20150520235257/https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/";
+title="at the Wayback Machine (archived May 20, 2015)"&gt;forcibly and remotely
+install apps&lt;/a&gt; through GTalkService (which seems, since that article, 
to have
+been merged into Google Play).  This adds up to a universal back door. 
&lt;/p&gt;
+
+  &lt;p&gt;
+  Although Google's &lt;em&gt;exercise&lt;/em&gt; of this power has not been
+  malicious so far, the point is that nobody should have such power,
+  which could also be used maliciously.  You might well decide to let a
+  security service remotely &lt;em&gt;deactivate&lt;/em&gt; programs that it
+  considers malicious.  But there is no excuse for allowing it
+  to &lt;em&gt;delete&lt;/em&gt; the programs, and you should have the right to
+  decide who (if anyone) to trust in this way.
+  &lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="insecurity"&gt;Mobile Insecurity&lt;/h3&gt;
+&lt;ul&gt;
+&lt;li&gt;
+&lt;p&gt;Many proprietary payment apps &lt;a
+href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data"&gt;
+transmit personal data in an insecure way&lt;/a&gt;.
+However, the worse aspect of these apps is that
+&lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;payment is not 
anonymous&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
+  The NSA can tap data in smart phones, including iPhones, Android, and
+  BlackBerry&lt;/a&gt;. While there is not much detail here, it seems that this
+  does not operate via the universal back door that we know nearly all
+  portable phones have. It may involve exploiting various bugs. There are
+  &lt;a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
+  lots of bugs in the phones' radio software&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
+&lt;ul&gt;
+<span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;The Meitu photo-editing
+app &lt;a 
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+user data to a Chinese 
company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;</em></ins></span>
+
+&lt;li&gt;
+&lt;p&gt;A half-blind security critique of a tracking app: it found that &lt;a
+href="http://www.consumerreports.org/mobile-security-software/glow-pregnancy-app-exposed-women-to-privacy-threats/"&gt;
+blatant flaws allowed anyone to snoop on a user's personal data&lt;/a&gt;.
+The critique fails entirely to express concern that the app sends the
+personal data to a server, where the &lt;em&gt;developer&lt;/em&gt; gets it 
all.
+This &ldquo;service&rdquo; is for suckers!&lt;/p&gt;
+
+&lt;p&gt;The server surely has a &ldquo;privacy policy,&rdquo; and surely it
+is worthless since nearly all of them are.&lt;/p&gt;
+&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apps that include 
+  &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+  Symphony surveillance software snoop on what radio and TV programs are 
+  playing nearby&lt;/a&gt;.  Also on what users post on various sites such as 
+  Facebook, Google+ and Twitter.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;More than 73% and 47% of mobile applications, both from 
Android and iOS
+  respectively &lt;a href="http://jots.pub/a/2015103001/index.php"&gt;share 
personal,
+  behavioral and location information&lt;/a&gt; of their users with third 
parties.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&ldquo;Cryptic communication,&rdquo; unrelated to the 
app's functionality,
+  was &lt;a 
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+  found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;The article should not have described these apps as
+  &ldquo;free&rdquo;&mdash;they are not free software.  The clear way to say
+  &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
+
+  &lt;p&gt;The article takes for granted that the usual analytics tools are
+  legitimate, but is that valid?  Software developers have no right to
+  analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools that 
snoop are
+  just as wrong as any other snooping.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Many proprietary apps for mobile devices report which 
other
+  apps the user has
+  installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+  is doing this in a way that at least is visible and
+  optional&lt;/a&gt;. Not as bad as what the others do.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Portable phones with GPS will send their GPS location on 
remote
+  command and users cannot stop them: &lt;a
+  
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+  
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
+  (The US says it will eventually require all new portable phones to have
+  GPS.)&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones: &lt;a
+  
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+  
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in Android phones (and Windows? laptops): The 
Wall Street
+  Journal (in an article blocked from us by a paywall) reports that &lt;a
+  
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
+  the FBI can remotely activate the GPS and microphone in Android phones
+  and laptops&lt;/a&gt;. (I suspect this means Windows laptops.) Here is &lt;a
+  href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Some Motorola phones modify Android to &lt;a
+  href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+  send personal data to Motorola.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Some manufacturers add a &lt;a
+  
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+  hidden general surveillance package such as Carrier IQ.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Widely used &lt;a
+  
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+  QR-code scanner apps snoop on the user&lt;/a&gt;. This is in addition to
+  the snooping done by the phone company, and perhaps by the OS in the
+  phone.&lt;/p&gt;
+
+  &lt;p&gt;Don't be distracted by the question of whether the app developers 
get
+  users to say &ldquo;I agree&rdquo;. That is no excuse for malware.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 <span class="inserted"><ins><em>id="drm"&gt;Mobile DRM&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Android &lt;a 
href="https://developer.android.com/reference/android/drm/package-summary.html"&gt;contains
+        facilities specifically to support DRM&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3</em></ins></span> id="jails"&gt;Mobile Jails&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a
+  href="https://fsf.org/campaigns/secure-boot-vs-restricted-boot/"&gt;Mobile
+  devices that come with Windows 8 are tyrants&lt;/a&gt;. &lt;a
+  
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html"&gt;Windows
+  8 on &ldquo;mobile devices&rdquo; is a jail.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="tyrants"&gt;Mobile Tyrants&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html"&gt;
+  Some Android phones are tyrants&lt;/a&gt; (though someone found a way to 
crack
+  the restriction). Fortunately, most Android devices are not 
tyrants.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+&lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
+&lt;!--#include virtual="/server/footer.html" --&gt;
+&lt;div id="footer"&gt;
+&lt;div class="unprintable"&gt;
+
+&lt;p&gt;Please send general FSF &amp; GNU inquiries to
+&lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.
+There are also &lt;a href="/contact/"&gt;other ways to contact&lt;/a&gt;
+the FSF.  Broken links and other corrections or suggestions can be sent
+to &lt;a 
href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to &lt;a href="mailto:address@hidden"&gt;
+        &lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;For information on coordinating and submitting translations of
+        our web pages, see &lt;a
+        href="/server/standards/README.translations.html"&gt;Translations
+        README&lt;/a&gt;. --&gt;
+Please see the &lt;a
+href="/server/standards/README.translations.html"&gt;Translations
+README&lt;/a&gt; for information on coordinating and submitting translations
+of this article.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. --&gt;
+
+&lt;p&gt;Copyright &copy; 2014, 2015, <span 
class="removed"><del><strong>2016</strong></del></span> <span 
class="inserted"><ins><em>2016, 2017</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
+
+&lt;p&gt;This page is licensed under a &lt;a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
+Commons Attribution-NoDerivatives 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
+
+&lt;!--#include virtual="/server/bottom-notes.html" --&gt;
+
+&lt;p class="unprintable"&gt;Updated:
+&lt;!-- timestamp start --&gt;
+$Date: 2017/02/14 03:59:34 $
+&lt;!-- timestamp end --&gt;
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;
+&lt;/body&gt;
+&lt;/html&gt;
+</pre></body></html>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]