[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-mobiles.html malware-we...
From: |
Félicien PILLOT |
Subject: |
www/proprietary malware-mobiles.html malware-we... |
Date: |
Sat, 29 Jul 2017 16:41:46 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: FĂ©licien PILLOT <felandral> 17/07/29 16:41:46
Modified files:
proprietary : malware-mobiles.html malware-webpages.html
Log message:
Revert to <dl> list, with a better <style>; fix typos.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.html?cvsroot=www&r1=1.46&r2=1.47
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-webpages.html?cvsroot=www&r1=1.2&r2=1.3
Patches:
Index: malware-mobiles.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.html,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- malware-mobiles.html 28 Jul 2017 20:20:18 -0000 1.46
+++ malware-mobiles.html 29 Jul 2017 20:41:46 -0000 1.47
@@ -2,7 +2,12 @@
<!-- Parent-Version: 1.83 -->
<title>Malware in Mobile Devices
- GNU Project - Free Software Foundation</title>
- <!--#include virtual="/proprietary/po/malware-mobiles.translist" -->
+<style type="text/css" media="print,screen"><!--
+li dl { margin-top: .3em; }
+li dl dt { margin: .3em 0 0 0; font-weight: normal; font-style: italic; }
+li dl dd { margin: 0 3%; }
+--></style>
+<!--#include virtual="/proprietary/po/malware-mobiles.translist" -->
<!--#include virtual="/server/banner.html" -->
<h2>Malware in Mobile Devices</h2>
@@ -78,7 +83,7 @@
<li>
<p>In Android, <a
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">
- Google has a back door to remotely delete apps.</a> (It is in a program
+ Google has a back door to remotely delete apps</a> (it is in a program
called GTalkService).
</p>
@@ -119,7 +124,7 @@
<p>Samsung
phones <a
href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/">have
a security hole that allows an SMS message to install
-ransomeware</a>.</p>
+ransomware</a>.</p>
</li>
<li>
@@ -166,39 +171,39 @@
the research paper that tracks and infringes the privacy of
users:</p>
- <ul>
- <li><em>SurfEasy</em><br />
- Includes tracking libraries such as NativeX and Appflood,
- meant to track users and show them targeted ads.</li>
+ <dl>
+ <dt>SurfEasy</dt>
+ <dd>Includes tracking libraries such as NativeX and Appflood,
+ meant to track users and show them targeted ads.</dd>
- <li><em>sFly Network Booster</em><br />
- Requests the <code>READ_SMS</code> and <code>SEND_SMS</code>
+ <dt>sFly Network Booster</dt>
+ <dd>Requests the <code>READ_SMS</code> and <code>SEND_SMS</code>
permissions upon installation, meaning it has full access to
- users' text messages.</li>
+ users' text messages.</dd>
- <li><em>DroidVPN and TigerVPN</em><br />
- Requests the <code>READ_LOGS</code> permission to read logs
+ <dt>DroidVPN and TigerVPN</dt>
+ <dd>Requests the <code>READ_LOGS</code> permission to read logs
for other apps and also core system logs. TigerVPN developers
- have confirmed this.</li>
+ have confirmed this.</dd>
- <li><em>HideMyAss</em><br />
- Sends traffic to LinkedIn. Also, it stores detailed logs
+ <dt>HideMyAss</dt>
+ <dd>Sends traffic to LinkedIn. Also, it stores detailed logs
and may turn them over to the UK government if
- requested.</li>
+ requested.</dd>
- <li><em>VPN Services HotspotShield</em><br />
- Injects JavaScript code into the HTML pages returned to the
+ <dt>VPN Services HotspotShield</dt>
+ <dd>Injects JavaScript code into the HTML pages returned to the
users. The stated purpose of the JS injection is to display
ads. Uses roughly 5 tracking libraries. Also, it redirects the
user's traffic through valueclick.com (an advertising
- website).</li>
+ website).</dd>
- <li><em>WiFi Protector VPN</em><br />
- Injects JavaScript code into HTML pages, and also uses
+ <dt>WiFi Protector VPN</dt>
+ <dd>Injects JavaScript code into HTML pages, and also uses
roughly 5 tracking libraries. Developers of this app have
confirmed that the non-premium version of the app does
- JavaScript injection for tracking and display ads.</li>
- </ul>
+ JavaScript injection for tracking and display ads.</dd>
+ </dl>
</li>
<li>
@@ -470,7 +475,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/07/28 20:20:18 $
+$Date: 2017/07/29 20:41:46 $
<!-- timestamp end -->
</p>
</div>
Index: malware-webpages.html
===================================================================
RCS file: /web/www/www/proprietary/malware-webpages.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- malware-webpages.html 28 Jul 2017 12:59:13 -0000 1.2
+++ malware-webpages.html 29 Jul 2017 20:41:46 -0000 1.3
@@ -2,7 +2,12 @@
<!-- Parent-Version: 1.83 -->
<title>Malware in Webpages
- GNU Project - Free Software Foundation</title>
- <!--#include virtual="/proprietary/po/malware-webpages.translist" -->
+<style type="text/css" media="print,screen"><!--
+li dl { margin-top: .3em; }
+li dl dt { margin: .3em 0; font-weight: normal; font-style: italic; }
+li dl dd { margin: 0 3%; }
+--></style>
+<!--#include virtual="/proprietary/po/malware-webpages.translist" -->
<!--#include virtual="/server/banner.html" -->
<h2>Malware in Webpages</h2>
@@ -37,8 +42,8 @@
<li>
<p>Many web sites
<a
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
- snoop on information that users have typed into a form but not sent
- </a>.</p>
+ snoop on information that users have typed into a form but not sent</a>.
+ </p>
</li>
<li>
<p>A
@@ -50,19 +55,19 @@
and abusive practices inflicted by VPN apps.”</p>
<p>Following is a non-exhaustive list of some proprietary VPN apps from the
research paper that tracks users and infringes their privacy:</p>
- <ul>
- <li><em>VPN Services HotspotShield</em><br />
- Injects JavaScript code into the HTML pages returned to the users. The
+ <dl>
+ <dt>VPN Services HotspotShield</dt>
+ <dd>Injects JavaScript code into the HTML pages returned to the users.
The
stated purpose of the JS injection is to display ads. Uses roughly five
tracking libraries. Also, it redirects the user's traffic through
- valueclick.com (an advertising website).</li>
- <li><em>WiFi Protector VPN</em><br />
- Injects JavaScript code into HTML pages, and also uses roughly five
+ valueclick.com (an advertising website).</dd>
+ <dt>WiFi Protector VPN</dt>
+ <dd>Injects JavaScript code into HTML pages, and also uses roughly five
tracking libraries. Developers of this app have confirmed that the
non-premium version of the app does JavaScript injection for tracking
- the user and displaying ads.</li>
+ the user and displaying ads.</dd>
</ul>
- </li>
+ </dl>
<li>
<p>E-books can contain JavaScript code, and
<a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
@@ -127,7 +132,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/07/28 12:59:13 $
+$Date: 2017/07/29 20:41:46 $
<!-- timestamp end -->
</p>
</div>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary malware-mobiles.html malware-we...,
Félicien PILLOT <=