www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary proprietary-back-doors.it.html ...


From: GNUN
Subject: www/proprietary proprietary-back-doors.it.html ...
Date: Wed, 1 Mar 2017 06:29:17 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     17/03/01 06:29:17

Modified files:
        proprietary    : proprietary-back-doors.it.html 
Added files:
        proprietary/po : proprietary-back-doors.it-diff.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.it.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it-diff.html?cvsroot=www&rev=1.1

Patches:
Index: proprietary-back-doors.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.it.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- proprietary-back-doors.it.html      27 Oct 2016 20:58:41 -0000      1.15
+++ proprietary-back-doors.it.html      1 Mar 2017 11:29:17 -0000       1.16
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" 
value="/proprietary/proprietary-back-doors.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/proprietary-back-doors.it.po">
+ https://www.gnu.org/proprietary/po/proprietary-back-doors.it.po</a>'
+ --><!--#set var="ORIGINAL_FILE" 
value="/proprietary/proprietary-back-doors.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/proprietary-back-doors.it-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2016-12-31" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/proprietary-back-doors.en.html" -->
 
 <!--#include virtual="/server/header.it.html" -->
 <!-- Parent-Version: 1.79 -->
@@ -8,6 +13,7 @@
 
 <!--#include virtual="/proprietary/po/proprietary-back-doors.translist" -->
 <!--#include virtual="/server/banner.it.html" -->
+<!--#include virtual="/server/outdated.it.html" -->
 <h2>Backdoor proprietarie</h2>
 
 <p><a href="/proprietary/proprietary.html">Altri esempi di malware
@@ -390,7 +396,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2016/10/27 20:58:41 $
+$Date: 2017/03/01 11:29:17 $
 
 <!-- timestamp end -->
 </p>

Index: po/proprietary-back-doors.it-diff.html
===================================================================
RCS file: po/proprietary-back-doors.it-diff.html
diff -N po/proprietary-back-doors.it-diff.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/proprietary-back-doors.it-diff.html      1 Mar 2017 11:29:17 -0000       
1.1
@@ -0,0 +1,403 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/proprietary/proprietary-back-doors.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;!-- Parent-Version: 1.79 --&gt;
+&lt;title&gt;Proprietary Back Doors - GNU Project - Free Software 
Foundation&lt;/title&gt;
+ &lt;!--#include virtual="/proprietary/po/proprietary-back-doors.translist" 
--&gt;
+&lt;!--#include virtual="/server/banner.html" --&gt;
+&lt;h2&gt;Proprietary Back Doors&lt;/h2&gt;
+
+&lt;p&gt;&lt;a href="/proprietary/proprietary.html"&gt;Other examples of 
proprietary malware&lt;/a&gt;&lt;/p&gt;
+
+&lt;p&gt;Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; &lt;a
+href="/philosophy/free-software-even-more-important.html"&gt;that is the
+basic injustice&lt;/a&gt;. The developers often exercise that power to the
+detriment of the users they ought to serve.&lt;/p&gt;
+
+&lt;p&gt;Here are examples of demonstrated back doors in proprietary 
software.&lt;/p&gt;
+
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+&lt;ul&gt;
+    <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;The Amazon Echo appears 
to have a universal back door, since
+      &lt;a 
href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates"&gt;
+      it installs &ldquo;updates&rdquo; automatically&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;We have found nothing explicitly documenting the lack of any way 
to
+      disable remote changes to the software, so we are not completely sure
+      there isn't one, but it seems pretty clear.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Chrome has a back door &lt;a 
href="https://consumerist.com/2017/01/18/why-is-google-blocking-this-ad-blocker-on-chrome/"&gt;for
+    remote erasure of add-ons&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;WhatsApp &lt;a 
href="https://www.theguardian.com/technology/2017/jan/13/whatsapp-backdoor-allows-snooping-on-encrypted-messages"&gt;has
+        a back door that the company can use to read the plaintext
+        of messages&lt;/a&gt;.&lt;/p&gt;
+    
+        &lt;p&gt;This should not come as a surprise. Nonfree software for
+          encryption is never trustworthy.&lt;/p&gt;
+  &lt;/li&gt;
+
+    &lt;li&gt;&lt;p&gt;A pregnancy test controller application not only
+        can &lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
+        on many sorts of data in the phone, and in server accounts, it can
+        alter them too&lt;/a&gt;.&lt;/p&gt;
+    &lt;/li&gt;</em></ins></span>
+
+    &lt;li&gt;
+        &lt;p&gt;Xiaomi phones come with &lt;a 
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered"&gt;a
+           universal back door in the application processor, for
+           Xiaomi's use&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;This is separate from &lt;a 
href="#universal-back-door-phone-modem"&gt;the
+           universal back door in the modem processor that the local
+           phone company can use&lt;/a&gt;.&lt;/p&gt;
+    &lt;/li&gt;
+
+    &lt;li&gt;&lt;p&gt;Capcom's Street Fighter V update &lt;a 
href="https://web.archive.org/web/20160930051146/http://www.theregister.co.uk/2016/09/23/capcom_street_fighter_v/"&gt;installed
+        a driver that can be used as a backdoor by any application
+        installed on a Windows computer&lt;/a&gt;.&lt;/p&gt;
+    &lt;/li&gt;
+
+    &lt;li&gt;&lt;p&gt;The Dropbox app for Macintosh &lt;a 
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/"&gt;takes
+        total control of the machine by repeatedly nagging the user
+        for an admini password&lt;/a&gt;.&lt;/p&gt;
+    &lt;/li&gt;
+  &lt;li id="universal-back-door-phone-modem"&gt;&lt;p&gt;The universal back 
door in portable phones &lt;a
+    
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;is
+    employed to listen through their microphones&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;More about &lt;a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;the
 nature of this problem&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+ 
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/"&gt;
+      Microsoft has already backdoored its disk 
encryption&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Modern gratis game cr&hellip;apps
+      &lt;a 
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
+      collect a wide range of data about their users and their users' 
+      friends and associates&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Even nastier, they do it through ad networks that merge the data
+      collected by various cr&hellip;apps and sites made by different 
+      companies.&lt;/p&gt;
+
+      &lt;p&gt;They use this data to manipulate people to buy things, and hunt 
+      for &ldquo;whales&rdquo; who can be led to spend a lot of money. They 
+      also use a back door to manipulate the game play for specific 
players.&lt;/p&gt;
+
+      &lt;p&gt;While the article describes gratis games, games that cost money 
+      can use the same tactics.&lt;/p&gt;    
+  &lt;/li&gt;
+  &lt;li&gt;
+    &lt;p&gt;Dell computers, shipped with Windows, had a bogus root
+      certificate that
+      &lt;a 
href="http://fossforce.com/2015/11/dell-comcast-intel-who-knows-who-else-are-out-to-get-you/"&gt;allowed
+      anyone (not just Dell) to remotely authorize any software to
+      run&lt;/a&gt; on the computer.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;
+    &lt;p&gt;Baidu's proprietary Android library, Moplus, has a back door
+      that &lt;a 
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;can
+      &ldquo;upload files&rdquo; as well as forcibly install
+      apps&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;It is used by 14,000 Android applications.&lt;/p&gt;
+  &lt;/li&gt;
+  
+&lt;li&gt;&lt;p&gt;ARRIS cable modem has a
+  &lt;a 
href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"&gt;
+  backdoor in the backdoor&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Caterpillar vehicles come with
+     &lt;a 
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it"&gt;a
 back-door to shutoff the engine&lt;/a&gt;
+     remotely.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;li&gt;&lt;p&gt;
+Mac OS X had an &lt;a 
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/"&gt;
+intentional local back door for 4 years&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;Users reported that &lt;a 
+    
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all"&gt;
+    Microsoft was forcing them to replace Windows 7 and 8 with all-spying 
+    Windows 10&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Microsoft was in fact &lt;a 
+    
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"&gt;
+    attacking computers that run Windows 7 and 8&lt;/a&gt;, switching on a 
flag 
+    that said whether to &ldquo;upgrade&rdquo; to Windows 10 when users 
+    had turned it off.&lt;/p&gt;
+
+    &lt;p&gt;Later on, Microsoft published instructions on &lt;a 
+    
href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/"&gt;
+    how to permanently reject the downgrade to Windows 10&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This seems to involve use of a back door in Windows 7 and 
8.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Most mobile phones have a universal back door, which has been used to
+&lt;a 
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
+turn them malicious&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;
+A Chinese version of Android has a universal back door&lt;/a&gt;. Nearly all
+models of mobile phones have a universal back door in the modem chip. So
+why did Coolpad bother to introduce another? Because this one is controlled
+by Coolpad.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Microsoft Windows has a universal back door through which
+&lt;a <span 
class="removed"><del><strong>href="http://www.informationweek.com/news/showArticle.jhtml?articleID=201806263"&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263"&gt;</em></ins></span>
+any change whatsoever can be imposed on the users&lt;/a&gt;.
+&lt;/p&gt;
+&lt;p&gt;More information on when
+&lt;a href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"&gt;
+this was used&lt;/a&gt;.
+&lt;/p&gt;
+&lt;p&gt;In Windows 10, the universal back door is no longer hidden; all
+&ldquo;upgrades&rdquo; will
+be &lt;a 
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/"&gt;forcibly
+and immediately imposed&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/li&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Windows 8's back doors are so gaping that</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;German 
government</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"&gt;veers
+away from Windows 8 computers with TPM 2.0 due to potential back
+door capabilities of</em></ins></span> the <span 
class="removed"><del><strong>German government has decided it can't be 
trusted&lt;/a&gt;.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>TPM 2.0 
chip&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;The iPhone has a back door
+&lt;a 
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;
+that allows Apple to remotely delete apps&lt;/a&gt; which Apple considers
+&ldquo;inappropriate&rdquo;.  Jobs said it's ok for Apple to have this power
+because of course we can trust Apple.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;The iPhone has a back door for
+&lt;a 
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
+remote wipe&lt;/a&gt;.  It's not always enabled, but users are led into 
enabling
+it without understanding.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Apple can, and regularly does,
+    &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+  remotely extract some data from iPhones for the state&lt;/a&gt;.
+  &lt;/p&gt;
+  &lt;p&gt;This may have improved with
+  &lt;a 
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
+  iOS 8 security improvements&lt;/a&gt;; but
+  &lt;a href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
+  not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+
+&lt;li&gt;
+&lt;p&gt;&lt;a 
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;
+Windows 8 also has a back door for remotely deleting apps&lt;/a&gt;.
+&lt;/p&gt;
+
+&lt;p&gt;
+You might well decide to let a security service that you trust
+remotely &lt;em&gt;deactivate&lt;/em&gt; programs that it considers malicious.
+But there is no excuse for &lt;em&gt;deleting&lt;/em&gt; the programs, and you
+should have the right to decide who (if anyone) to trust in this way.
+&lt;/p&gt;
+
+&lt;p&gt;
+As these pages show, if you do want to clean your computer of malware,
+the first software to delete is Windows or iOS.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;In Android,
+&lt;a 
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"&gt;
+Google has a back door to remotely delete apps.&lt;/a&gt;  (It is in a program
+called GTalkService).
+&lt;/p&gt;
+
+&lt;p&gt;
+Google can also
+&lt;a 
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"&gt;
+forcibly and remotely install apps&lt;/a&gt; through GTalkService (which
+seems, since that article, to have been merged into Google Play).
+This is not equivalent to a universal back door, but permits various
+dirty tricks.
+&lt;/p&gt;
+
+&lt;p&gt;
+Although Google's &lt;em&gt;exercise&lt;/em&gt; of this power has not been
+malicious so far, the point is that nobody should have such power,
+which could also be used maliciously.  You might well decide to let a
+security service remotely &lt;em&gt;deactivate&lt;/em&gt; programs that it
+considers malicious.  But there is no excuse for allowing it
+to &lt;em&gt;delete&lt;/em&gt; the programs, and you should have the right to
+decide who (if anyone) to trust in this way.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;&lt;a id="samsung"
+href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor"&gt;
+Samsung Galaxy devices running proprietary Android versions come with a back
+door&lt;/a&gt; that provides remote access to the files stored on the device.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;The Amazon <span 
class="removed"><del><strong>Kindle</strong></del></span> <span 
class="inserted"><ins><em>Kindle-Swindle</em></ins></span> has a back door that 
has been used to
+&lt;a 
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/"&gt;
+remotely erase books&lt;/a&gt;.  <span class="inserted"><ins><em>One of the 
books erased was 1984, by George Orwell.</em></ins></span>
+&lt;/p&gt;
+
+<span class="inserted"><ins><em>&lt;p&gt;Amazon responded to criticism by 
saying it would delete books only
+following orders from the state.  However, that policy didn't last.
+In 2012
+it &lt;a 
href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html"&gt;wiped
+a user's Kindle-Swindle and deleted her account&lt;/a&gt;, then offered her
+kafkaesque &ldquo;explanations.&rdquo;&lt;/p&gt;</em></ins></span>
+
+
+&lt;p&gt;The <span class="removed"><del><strong>Kindle</strong></del></span> 
<span class="inserted"><ins><em>Kindle-Swindle</em></ins></span> also has a
+&lt;a 
href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090"&gt;
+universal back door&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;HP &ldquo;storage appliances&rdquo; that use the proprietary
+&ldquo;Left Hand&rdquo; operating system have back doors that give
+HP &lt;a 
href="http://news.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/"&gt;
+remote login access&lt;/a&gt; to them.  HP claims that this does not give HP
+access to the customer's data, but if the back door allows installation of
+software changes, a change could be installed that would give access to the
+customer's data.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;&lt;a 
href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html"&gt;
+Some D-Link routers&lt;/a&gt; have a back door for changing settings in a dlink
+of an eye.
+&lt;/p&gt;
+
+&lt;p&gt;
+&lt;a href="https://github.com/elvanderb/TCP-32764"&gt;Many models of router
+have back doors&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;&lt;a href="http://sekurak.pl/tp-link-httptftp-backdoor/"&gt;
+The TP-Link router has a backdoor&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;&lt;a 
href="http://www.techienews.co.uk/973462/bitcoin-miners-bundled-pups-legitimate-applications-backed-eula/"&gt;
+Some applications come with MyFreeProxy, which is a universal back door
+that can download programs and run them.&lt;/a&gt;
+&lt;/p&gt;
+&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;p&gt;Here is a big problem whose details are still secret.&lt;/p&gt;
+
+&lt;ul&gt;
+&lt;li&gt;
+&lt;p&gt;&lt;a 
href="http://mashable.com/2013/09/11/fbi-microsoft-bitlocker-backdoor/"&gt;
+The FBI asks lots of companies to put back doors in proprietary programs.
+&lt;/a&gt; We don't know of specific cases where this was done, but every
+proprietary program for encryption is a possibility.&lt;/p&gt;
+&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;p&gt;Here is a suspicion that we can't prove, but is worth thinking
+about.&lt;/p&gt;
+
+&lt;ul&gt;
+&lt;li&gt;
+&lt;p&gt;&lt;a 
href="http://web.archive.org/web/20150206003913/http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI"&gt;
+Writable microcode for Intel and AMD microprocessors&lt;/a&gt; may be a vehicle
+for the NSA to invade computers, with the help of Microsoft, say respected
+security experts.
+&lt;/p&gt;
+&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;p&gt;The EFF has other examples of the &lt;a 
href="https://www.eff.org/deeplinks/2015/02/who-really-owns-your-drones"&gt;use 
of back doors&lt;/a&gt;.&lt;/p&gt;
+
+
+&lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
+&lt;!--#include virtual="/server/footer.html" --&gt;
+&lt;div id="footer"&gt;
+&lt;div class="unprintable"&gt;
+
+&lt;p&gt;Please send general FSF &amp; GNU inquiries to
+&lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.
+There are also &lt;a href="/contact/"&gt;other ways to contact&lt;/a&gt;
+the FSF.  Broken links and other corrections or suggestions can be sent
+to &lt;a 
href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to &lt;a href="mailto:address@hidden"&gt;
+        &lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;For information on coordinating and submitting translations of
+        our web pages, see &lt;a
+        href="/server/standards/README.translations.html"&gt;Translations
+        README&lt;/a&gt;. --&gt;
+Please see the &lt;a
+href="/server/standards/README.translations.html"&gt;Translations
+README&lt;/a&gt; for information on coordinating and submitting translations
+of this article.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;p&gt;Copyright &copy; <span 
class="removed"><del><strong>2014-2016</strong></del></span> <span 
class="inserted"><ins><em>2014-2017</em></ins></span> Free Software Foundation, 
Inc.&lt;/p&gt;
+
+&lt;p&gt;This page is licensed under a &lt;a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
+Commons Attribution-NoDerivatives 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
+
+&lt;!--#include virtual="/server/bottom-notes.html" --&gt;
+
+&lt;p class="unprintable"&gt;Updated:
+&lt;!-- timestamp start --&gt;
+$Date: 2017/03/01 11:29:17 $
+&lt;!-- timestamp end --&gt;
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;
+&lt;/body&gt;
+&lt;/html&gt;
+</pre></body></html>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]