www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-mobiles.html malware-we...


From: Félicien PILLOT
Subject: www/proprietary malware-mobiles.html malware-we...
Date: Sat, 29 Jul 2017 16:41:46 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     FĂ©licien PILLOT <felandral>     17/07/29 16:41:46

Modified files:
        proprietary    : malware-mobiles.html malware-webpages.html 

Log message:
        Revert to <dl> list, with a better <style>; fix typos.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.html?cvsroot=www&r1=1.46&r2=1.47
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-webpages.html?cvsroot=www&r1=1.2&r2=1.3

Patches:
Index: malware-mobiles.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.html,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- malware-mobiles.html        28 Jul 2017 20:20:18 -0000      1.46
+++ malware-mobiles.html        29 Jul 2017 20:41:46 -0000      1.47
@@ -2,7 +2,12 @@
 <!-- Parent-Version: 1.83 -->
 <title>Malware in Mobile Devices
 - GNU Project - Free Software Foundation</title>
- <!--#include virtual="/proprietary/po/malware-mobiles.translist" -->
+<style type="text/css" media="print,screen"><!--
+li dl { margin-top: .3em; }
+li dl dt { margin: .3em 0 0 0; font-weight: normal; font-style: italic; }
+li dl dd { margin: 0 3%; }
+--></style>
+<!--#include virtual="/proprietary/po/malware-mobiles.translist" -->
 <!--#include virtual="/server/banner.html" -->
 <h2>Malware in Mobile Devices</h2>
 
@@ -78,7 +83,7 @@
   <li>
   <p>In Android, <a
   
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html";>
-  Google has a back door to remotely delete apps.</a>  (It is in a program
+  Google has a back door to remotely delete apps</a> (it is in a program
   called GTalkService).
   </p>
 
@@ -119,7 +124,7 @@
 <p>Samsung
 phones <a 
href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/";>have
 a security hole that allows an SMS message to install
-ransomeware</a>.</p>
+ransomware</a>.</p>
 </li>
 
 <li>
@@ -166,39 +171,39 @@
     the research paper that tracks and infringes the privacy of
     users:</p>
 
-  <ul>
-    <li><em>SurfEasy</em><br />
-      Includes tracking libraries such as NativeX and Appflood,
-      meant to track users and show them targeted ads.</li>
+  <dl>
+    <dt>SurfEasy</dt>
+      <dd>Includes tracking libraries such as NativeX and Appflood,
+      meant to track users and show them targeted ads.</dd>
 
-    <li><em>sFly Network Booster</em><br />
-      Requests the <code>READ_SMS</code> and <code>SEND_SMS</code>
+    <dt>sFly Network Booster</dt>
+      <dd>Requests the <code>READ_SMS</code> and <code>SEND_SMS</code>
       permissions upon installation, meaning it has full access to
-      users' text messages.</li>
+      users' text messages.</dd>
 
-    <li><em>DroidVPN and TigerVPN</em><br />
-      Requests the <code>READ_LOGS</code> permission to read logs
+    <dt>DroidVPN and TigerVPN</dt>
+      <dd>Requests the <code>READ_LOGS</code> permission to read logs
       for other apps and also core system logs. TigerVPN developers
-      have confirmed this.</li>
+      have confirmed this.</dd>
 
-    <li><em>HideMyAss</em><br />
-      Sends traffic to LinkedIn. Also, it stores detailed logs
+    <dt>HideMyAss</dt>
+      <dd>Sends traffic to LinkedIn. Also, it stores detailed logs
       and may turn them over to the UK government if
-      requested.</li>
+      requested.</dd>
 
-    <li><em>VPN Services HotspotShield</em><br />
-      Injects JavaScript code into the HTML pages returned to the
+    <dt>VPN Services HotspotShield</dt>
+      <dd>Injects JavaScript code into the HTML pages returned to the
       users. The stated purpose of the JS injection is to display
       ads. Uses roughly 5 tracking libraries. Also, it redirects the
       user's traffic through valueclick.com (an advertising
-      website).</li>
+      website).</dd>
 
-    <li><em>WiFi Protector VPN</em><br />
-      Injects JavaScript code into HTML pages, and also uses
+    <dt>WiFi Protector VPN</dt>
+      <dd>Injects JavaScript code into HTML pages, and also uses
       roughly 5 tracking libraries. Developers of this app have
       confirmed that the non-premium version of the app does
-      JavaScript injection for tracking and display ads.</li>
-  </ul>
+      JavaScript injection for tracking and display ads.</dd>
+  </dl>
 </li>
 
 <li>
@@ -470,7 +475,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2017/07/28 20:20:18 $
+$Date: 2017/07/29 20:41:46 $
 <!-- timestamp end -->
 </p>
 </div>

Index: malware-webpages.html
===================================================================
RCS file: /web/www/www/proprietary/malware-webpages.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- malware-webpages.html       28 Jul 2017 12:59:13 -0000      1.2
+++ malware-webpages.html       29 Jul 2017 20:41:46 -0000      1.3
@@ -2,7 +2,12 @@
 <!-- Parent-Version: 1.83 -->
 <title>Malware in Webpages
 - GNU Project - Free Software Foundation</title>
- <!--#include virtual="/proprietary/po/malware-webpages.translist" -->
+<style type="text/css" media="print,screen"><!--
+li dl { margin-top: .3em; }
+li dl dt { margin: .3em 0; font-weight: normal; font-style: italic; }
+li dl dd { margin: 0 3%; }
+--></style>
+<!--#include virtual="/proprietary/po/malware-webpages.translist" -->
 <!--#include virtual="/server/banner.html" -->
 <h2>Malware in Webpages</h2>
 
@@ -37,8 +42,8 @@
   <li>
     <p>Many web sites
       <a 
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081";>
-      snoop on information that users have typed into a form but not sent
-      </a>.</p>
+      snoop on information that users have typed into a form but not sent</a>.
+    </p>
   </li>
   <li>
     <p>A
@@ -50,19 +55,19 @@
       and abusive practices inflicted by VPN apps.&rdquo;</p>
     <p>Following is a non-exhaustive list of some proprietary VPN apps from the
       research paper that tracks users and infringes their privacy:</p>
-    <ul>
-      <li><em>VPN Services HotspotShield</em><br />
-      Injects JavaScript code into the HTML pages returned to the users. The
+    <dl>
+      <dt>VPN Services HotspotShield</dt>
+      <dd>Injects JavaScript code into the HTML pages returned to the users. 
The
       stated purpose of the JS injection is to display ads. Uses roughly five
       tracking libraries. Also, it redirects the user's traffic through
-      valueclick.com (an advertising website).</li>
-      <li><em>WiFi Protector VPN</em><br />
-      Injects JavaScript code into HTML pages, and also uses roughly five
+      valueclick.com (an advertising website).</dd>
+      <dt>WiFi Protector VPN</dt>
+      <dd>Injects JavaScript code into HTML pages, and also uses roughly five
       tracking libraries. Developers of this app have confirmed that the
       non-premium version of the app does JavaScript injection for tracking
-      the user and displaying ads.</li>
+      the user and displaying ads.</dd>
     </ul>
-  </li>
+  </dl>
   <li>
     <p>E-books can contain JavaScript code, and
       <a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds";>
@@ -127,7 +132,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2017/07/28 12:59:13 $
+$Date: 2017/07/29 20:41:46 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]