[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-mobiles.html proprietar...
From: |
Atul Murali |
Subject: |
www/proprietary malware-mobiles.html proprietar... |
Date: |
Tue, 4 Apr 2017 23:13:02 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: Atul Murali <atulm> 17/04/04 23:13:02
Modified files:
proprietary : malware-mobiles.html
proprietary-surveillance.html
Log message:
[#1204666] Add Verizon spyware.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.html?cvsroot=www&r1=1.109&r2=1.110
Patches:
Index: malware-mobiles.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- malware-mobiles.html 18 Mar 2017 09:59:23 -0000 1.21
+++ malware-mobiles.html 5 Apr 2017 03:13:02 -0000 1.22
@@ -130,6 +130,19 @@
<h3 id="surveillance">Mobile Surveillance</h3>
<ul>
+<li>
+ <p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ announced an opt-in proprietary search app that it will</a>
+ pre-install on some of its phones. The app will give Verizon the same
+ information about the users' searches that Google normally gets when
+ they use its search engine.</p>
+
+ <p>Currently, the app is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"
+ >being pre-installed on only 1 phone</a>, and the
+ user must explicitly opt-in before the app takes effect. However, the
+ app remains spyware -- an "optional" piece of spyware is still spyware.
+ </p>
+</li>
<li><p>The Meitu photo-editing
app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
user data to a Chinese company</a>.</p></li>
@@ -301,7 +314,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/03/18 09:59:23 $
+$Date: 2017/04/05 03:13:02 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.html,v
retrieving revision 1.109
retrieving revision 1.110
diff -u -b -r1.109 -r1.110
--- proprietary-surveillance.html 27 Mar 2017 15:17:54 -0000 1.109
+++ proprietary-surveillance.html 5 Apr 2017 03:13:02 -0000 1.110
@@ -531,6 +531,19 @@
</div>
<ul>
+ <li>
+ <p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ announced an opt-in proprietary search app that it will</a>
+ pre-install on some of its phones. The app will give Verizon the same
+ information about the users' searches that Google normally gets when
+ they use its search engine.</p>
+
+ <p>Currently, the app is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"
+ >being pre-installed on only 1 phone</a>, and the
+ user must explicitly opt-in before the app takes effect. However, the
+ app remains spyware -- an "optional" piece of spyware is still spyware.
+ </p>
+ </li>
<li><p>The Meitu photo-editing
app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
@@ -1236,7 +1249,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/03/27 15:17:54 $
+$Date: 2017/04/05 03:13:02 $
<!-- timestamp end -->
</p>
</div>
- www/proprietary malware-mobiles.html proprietar...,
Atul Murali <=