www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-mobiles.html proprietar...


From: Atul Murali
Subject: www/proprietary malware-mobiles.html proprietar...
Date: Tue, 4 Apr 2017 23:13:02 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     Atul Murali <atulm>     17/04/04 23:13:02

Modified files:
        proprietary    : malware-mobiles.html 
                         proprietary-surveillance.html 

Log message:
        [#1204666] Add Verizon spyware.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.html?cvsroot=www&r1=1.109&r2=1.110

Patches:
Index: malware-mobiles.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- malware-mobiles.html        18 Mar 2017 09:59:23 -0000      1.21
+++ malware-mobiles.html        5 Apr 2017 03:13:02 -0000       1.22
@@ -130,6 +130,19 @@
 
 <h3 id="surveillance">Mobile Surveillance</h3>
 <ul>
+<li>
+   <p>Verizon <a 
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones";>
+        announced an opt-in proprietary search app that it will</a>
+        pre-install on some of its phones. The app will give Verizon the same
+   information about the users' searches that Google normally gets when
+   they use its search engine.</p>
+
+   <p>Currently, the app is <a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware";
+    >being pre-installed on only 1 phone</a>, and the
+    user must explicitly opt-in before the app takes effect. However, the
+    app remains spyware -- an "optional" piece of spyware is still spyware.
+               </p>
+</li>
 <li><p>The Meitu photo-editing
 app <a 
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/";>sends
 user data to a Chinese company</a>.</p></li>
@@ -301,7 +314,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2017/03/18 09:59:23 $
+$Date: 2017/04/05 03:13:02 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-surveillance.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.html,v
retrieving revision 1.109
retrieving revision 1.110
diff -u -b -r1.109 -r1.110
--- proprietary-surveillance.html       27 Mar 2017 15:17:54 -0000      1.109
+++ proprietary-surveillance.html       5 Apr 2017 03:13:02 -0000       1.110
@@ -531,6 +531,19 @@
 </div>
 
 <ul>
+  <li>
+   <p>Verizon <a 
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones";>
+        announced an opt-in proprietary search app that it will</a>
+        pre-install on some of its phones. The app will give Verizon the same
+   information about the users' searches that Google normally gets when
+   they use its search engine.</p>
+
+   <p>Currently, the app is <a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware";
+    >being pre-installed on only 1 phone</a>, and the
+    user must explicitly opt-in before the app takes effect. However, the
+    app remains spyware -- an "optional" piece of spyware is still spyware.
+               </p>
+       </li>
 
   <li><p>The Meitu photo-editing
   app <a 
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/";>sends
@@ -1236,7 +1249,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2017/03/27 15:17:54 $
+$Date: 2017/04/05 03:13:02 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]