www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary proprietary-back-doors.de.html ...


From: GNUN
Subject: www/proprietary proprietary-back-doors.de.html ...
Date: Tue, 26 Sep 2017 16:29:39 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     17/09/26 16:29:39

Modified files:
        proprietary    : proprietary-back-doors.de.html 
                         proprietary-back-doors.it.html 
        proprietary/po : proprietary-back-doors.it-diff.html 
Added files:
        proprietary/po : proprietary-back-doors.de-diff.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.de.html?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.it.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it-diff.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de-diff.html?cvsroot=www&rev=1.1

Patches:
Index: proprietary-back-doors.de.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.de.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- proprietary-back-doors.de.html      20 Jul 2017 12:59:45 -0000      1.22
+++ proprietary-back-doors.de.html      26 Sep 2017 20:29:39 -0000      1.23
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" 
value="/proprietary/proprietary-back-doors.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/proprietary-back-doors.de.po">
+ https://www.gnu.org/proprietary/po/proprietary-back-doors.de.po</a>'
+ --><!--#set var="ORIGINAL_FILE" 
value="/proprietary/proprietary-back-doors.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/proprietary-back-doors.de-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2017-07-28" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/proprietary-back-doors.en.html" -->
 
 <!--#include virtual="/server/header.de.html" -->
 <!-- Parent-Version: 1.83 -->
@@ -8,6 +13,7 @@
 
 <!--#include virtual="/proprietary/po/proprietary-back-doors.translist" -->
 <!--#include virtual="/server/banner.de.html" -->
+<!--#include virtual="/server/outdated.de.html" -->
 <h2>Proprietäre Hintertüren</h2>
 
 <p><a href="/proprietary/">Weitere Beispiele proprietärer 
Schadsoftware</a></p>
@@ -548,7 +554,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Letzte Änderung:
 
-$Date: 2017/07/20 12:59:45 $
+$Date: 2017/09/26 20:29:39 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-back-doors.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.it.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- proprietary-back-doors.it.html      6 Jul 2017 20:59:54 -0000       1.19
+++ proprietary-back-doors.it.html      26 Sep 2017 20:29:39 -0000      1.20
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" 
value="/proprietary/proprietary-back-doors.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/proprietary-back-doors.it.po">
+ https://www.gnu.org/proprietary/po/proprietary-back-doors.it.po</a>'
+ --><!--#set var="ORIGINAL_FILE" 
value="/proprietary/proprietary-back-doors.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/proprietary-back-doors.it-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2017-07-28" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/proprietary-back-doors.en.html" -->
 
 <!--#include virtual="/server/header.it.html" -->
 <!-- Parent-Version: 1.83 -->
@@ -8,6 +13,7 @@
 
 <!--#include virtual="/proprietary/po/proprietary-back-doors.translist" -->
 <!--#include virtual="/server/banner.it.html" -->
+<!--#include virtual="/server/outdated.it.html" -->
 <h2>Backdoor proprietarie</h2>
 
 <p><a href="/proprietary/proprietary.html">Altri esempi di malware
@@ -445,7 +451,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2017/07/06 20:59:54 $
+$Date: 2017/09/26 20:29:39 $
 
 <!-- timestamp end -->
 </p>

Index: po/proprietary-back-doors.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it-diff.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- po/proprietary-back-doors.it-diff.html      26 Mar 2017 19:00:34 -0000      
1.4
+++ po/proprietary-back-doors.it-diff.html      26 Sep 2017 20:29:39 -0000      
1.5
@@ -11,7 +11,7 @@
 </style></head>
 <body><pre>
 &lt;!--#include virtual="/server/header.html" --&gt;
-&lt;!-- Parent-Version: 1.79 --&gt;
+&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.83</strong></del></span> <span 
class="inserted"><ins><em>1.84</em></ins></span> --&gt;
 &lt;title&gt;Proprietary Back Doors - GNU Project - Free Software 
Foundation&lt;/title&gt;
  &lt;!--#include virtual="/proprietary/po/proprietary-back-doors.translist" 
--&gt;
 &lt;!--#include virtual="/server/banner.html" --&gt;
@@ -31,7 +31,31 @@
 &lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
 &lt;ul&gt;
   &lt;li&gt;
-    <span class="inserted"><ins><em>&lt;p&gt;Vizio &ldquo;smart&rdquo;
+    <span class="inserted"><ins><em>&lt;p&gt;Tesla cars have a &lt;a 
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/"&gt;universal
 back door&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;While remotely allowing car &ldquo;owners&rdquo; to use the whole 
battery
+    capacity did not do them any harm, the same back door would permit
+    Tesla (perhaps under the command of some government) to remotely order
+    the car to use none of its battery. Or perhaps to drive its passenger
+    to a torture prison.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;</em></ins></span>
+    &lt;p id="InternetCameraBackDoor"&gt;Many models of Internet-connected
+    cameras contain a glaring backdoor&mdash;they have login accounts
+    with hard-coded passwords, which can't be changed, and &lt;a
+    
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;
+    there is no way to delete these accounts either&lt;/a&gt;.
+    &lt;/p&gt;
+
+    &lt;p&gt;Since these accounts with hard-coded passwords are impossible to
+    delete, this problem is not merely an insecurity; it amounts to a
+    backdoor that can be used by the manufacturer (and government) to
+    spy on users.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;Vizio &ldquo;smart&rdquo;
     TVs &lt;a 
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;have
     a universal back door&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -44,7 +68,7 @@
       there isn't one, but it seems pretty clear.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Chrome has a back door &lt;a 
href="https://consumerist.com/2017/01/18/why-is-google-blocking-this-ad-blocker-on-chrome/"&gt;for
+  &lt;li id="chrome-erase-addons"&gt;&lt;p&gt;Chrome has a back door &lt;a 
href="https://consumerist.com/2017/01/18/why-is-google-blocking-this-ad-blocker-on-chrome/"&gt;for
     remote erasure of add-ons&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -63,7 +87,7 @@
         alter them too&lt;/a&gt;.&lt;/p&gt;
     &lt;/li&gt;
 
-    &lt;li&gt;</em></ins></span>
+    &lt;li&gt;
         &lt;p&gt;Xiaomi phones come with &lt;a 
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered"&gt;a
            universal back door in the application processor, for
            Xiaomi's use&lt;/a&gt;.&lt;/p&gt;
@@ -82,9 +106,16 @@
         total control of the machine by repeatedly nagging the user
         for an admini password&lt;/a&gt;.&lt;/p&gt;
     &lt;/li&gt;
-  &lt;li id="universal-back-door-phone-modem"&gt;&lt;p&gt;The universal back 
door in portable phones &lt;a
-    
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;is
-    employed to listen through their microphones&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li 
id="universal-back-door-phone-modem"&gt;&lt;p&gt;The</strong></del></span>
+  <span class="inserted"><ins><em>&lt;li&gt;
+    &lt;p&gt;The</em></ins></span> universal back door in portable phones
+      &lt;a
+    <span 
class="removed"><del><strong>href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;is</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;
+        is</em></ins></span> employed to listen through their 
microphones&lt;/a&gt;.&lt;/p&gt;
+    <span class="inserted"><ins><em>&lt;p&gt;Most mobile phones have this 
universal back door, which has been
+      used to
+      &lt;a 
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
+       turn them malicious&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
     &lt;p&gt;More about &lt;a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;the
 nature of this problem&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
  
@@ -154,13 +185,13 @@
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;Most mobile phones have a universal back door, which has been used to
+<span class="removed"><del><strong>&lt;p&gt;Most mobile phones have a 
universal back door, which has been used to
 &lt;a 
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
 turn them malicious&lt;/a&gt;.
 &lt;/p&gt;
 &lt;/li&gt;
 
-&lt;li&gt;
+&lt;li&gt;</strong></del></span>
 &lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;
 A Chinese version of Android has a universal back door&lt;/a&gt;. Nearly all
 models of mobile phones have a universal back door in the modem chip. So
@@ -171,7 +202,7 @@
 
 &lt;li&gt;
 &lt;p&gt;Microsoft Windows has a universal back door through which
-&lt;a <span 
class="removed"><del><strong>href="http://www.informationweek.com/news/showArticle.jhtml?articleID=201806263"&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263"&gt;</em></ins></span>
+&lt;a 
href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263"&gt;
 any change whatsoever can be imposed on the users&lt;/a&gt;.
 &lt;/p&gt;
 &lt;p&gt;More information on when
@@ -185,13 +216,9 @@
 &lt;/p&gt;
 &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Windows 8's back doors are so gaping that</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;German 
government</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"&gt;veers
+&lt;li&gt;&lt;p&gt;German government &lt;a 
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"&gt;veers
 away from Windows 8 computers with TPM 2.0 due to potential back
-door capabilities of</em></ins></span> the <span 
class="removed"><del><strong>German government has decided it can't be 
trusted&lt;/a&gt;.
-&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>TPM 2.0 
chip&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+door capabilities of the TPM 2.0 chip&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
@@ -278,20 +305,20 @@
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;The Amazon <span 
class="removed"><del><strong>Kindle</strong></del></span> <span 
class="inserted"><ins><em>Kindle-Swindle</em></ins></span> has a back door that 
has been used to
+&lt;p&gt;The Amazon Kindle-Swindle has a back door that has been used to
 &lt;a 
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/"&gt;
-remotely erase books&lt;/a&gt;.  <span class="inserted"><ins><em>One of the 
books erased was 1984, by George Orwell.</em></ins></span>
+remotely erase books&lt;/a&gt;.  One of the books erased was 1984, by George 
Orwell.
 &lt;/p&gt;
 
-<span class="inserted"><ins><em>&lt;p&gt;Amazon responded to criticism by 
saying it would delete books only
+&lt;p&gt;Amazon responded to criticism by saying it would delete books only
 following orders from the state.  However, that policy didn't last.
 In 2012
 it &lt;a 
href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html"&gt;wiped
 a user's Kindle-Swindle and deleted her account&lt;/a&gt;, then offered her
-kafkaesque &ldquo;explanations.&rdquo;&lt;/p&gt;</em></ins></span>
+kafkaesque &ldquo;explanations.&rdquo;&lt;/p&gt;
 
 
-&lt;p&gt;The <span class="removed"><del><strong>Kindle</strong></del></span> 
<span class="inserted"><ins><em>Kindle-Swindle</em></ins></span> also has a
+&lt;p&gt;The Kindle-Swindle also has a
 &lt;a 
href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090"&gt;
 universal back door&lt;/a&gt;.
 &lt;/p&gt;
@@ -389,7 +416,7 @@
 of this article.&lt;/p&gt;
 &lt;/div&gt;
 
-&lt;p&gt;Copyright &copy; <span 
class="removed"><del><strong>2014-2016</strong></del></span> <span 
class="inserted"><ins><em>2014-2017</em></ins></span> Free Software Foundation, 
Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2014-2017 Free Software Foundation, Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
@@ -399,7 +426,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2017/03/26 19:00:34 $
+$Date: 2017/09/26 20:29:39 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-back-doors.de-diff.html
===================================================================
RCS file: po/proprietary-back-doors.de-diff.html
diff -N po/proprietary-back-doors.de-diff.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/proprietary-back-doors.de-diff.html      26 Sep 2017 20:29:39 -0000      
1.1
@@ -0,0 +1,436 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/proprietary/proprietary-back-doors.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.83</strong></del></span> <span 
class="inserted"><ins><em>1.84</em></ins></span> --&gt;
+&lt;title&gt;Proprietary Back Doors - GNU Project - Free Software 
Foundation&lt;/title&gt;
+ &lt;!--#include virtual="/proprietary/po/proprietary-back-doors.translist" 
--&gt;
+&lt;!--#include virtual="/server/banner.html" --&gt;
+&lt;h2&gt;Proprietary Back Doors&lt;/h2&gt;
+
+&lt;p&gt;&lt;a href="/proprietary/proprietary.html"&gt;Other examples of 
proprietary malware&lt;/a&gt;&lt;/p&gt;
+
+&lt;p&gt;Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; &lt;a
+href="/philosophy/free-software-even-more-important.html"&gt;that is the
+basic injustice&lt;/a&gt;. The developers often exercise that power to the
+detriment of the users they ought to serve.&lt;/p&gt;
+
+&lt;p&gt;Here are examples of demonstrated back doors in proprietary 
software.&lt;/p&gt;
+
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+&lt;ul&gt;
+  &lt;li&gt;
+    <span class="inserted"><ins><em>&lt;p&gt;Tesla cars have a &lt;a 
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/"&gt;universal
 back door&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;While remotely allowing car &ldquo;owners&rdquo; to use the whole 
battery
+    capacity did not do them any harm, the same back door would permit
+    Tesla (perhaps under the command of some government) to remotely order
+    the car to use none of its battery. Or perhaps to drive its passenger
+    to a torture prison.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;</em></ins></span>
+    &lt;p id="InternetCameraBackDoor"&gt;Many models of Internet-connected
+    cameras contain a glaring backdoor&mdash;they have login accounts
+    with hard-coded passwords, which can't be changed, and &lt;a
+    
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;
+    there is no way to delete these accounts either&lt;/a&gt;.
+    &lt;/p&gt;
+
+    &lt;p&gt;Since these accounts with hard-coded passwords are impossible to
+    delete, this problem is not merely an insecurity; it amounts to a
+    backdoor that can be used by the manufacturer (and government) to
+    spy on users.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;Vizio &ldquo;smart&rdquo;
+    TVs &lt;a 
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;have
+    a universal back door&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+    &lt;li&gt;&lt;p&gt;The Amazon Echo appears to have a universal back door, 
since
+      &lt;a 
href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates"&gt;
+      it installs &ldquo;updates&rdquo; automatically&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;We have found nothing explicitly documenting the lack of any way 
to
+      disable remote changes to the software, so we are not completely sure
+      there isn't one, but it seems pretty clear.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="chrome-erase-addons"&gt;&lt;p&gt;Chrome has a back door &lt;a 
href="https://consumerist.com/2017/01/18/why-is-google-blocking-this-ad-blocker-on-chrome/"&gt;for
+    remote erasure of add-ons&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;WhatsApp &lt;a 
href="https://www.theguardian.com/technology/2017/jan/13/whatsapp-backdoor-allows-snooping-on-encrypted-messages"&gt;has
+        a back door that the company can use to read the plaintext
+        of messages&lt;/a&gt;.&lt;/p&gt;
+    
+        &lt;p&gt;This should not come as a surprise. Nonfree software for
+          encryption is never trustworthy.&lt;/p&gt;
+  &lt;/li&gt;
+
+    &lt;li&gt;&lt;p&gt;A pregnancy test controller application not only
+        can &lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
+        on many sorts of data in the phone, and in server accounts, it can
+        alter them too&lt;/a&gt;.&lt;/p&gt;
+    &lt;/li&gt;
+
+    &lt;li&gt;
+        &lt;p&gt;Xiaomi phones come with &lt;a 
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered"&gt;a
+           universal back door in the application processor, for
+           Xiaomi's use&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;This is separate from &lt;a 
href="#universal-back-door-phone-modem"&gt;the
+           universal back door in the modem processor that the local
+           phone company can use&lt;/a&gt;.&lt;/p&gt;
+    &lt;/li&gt;
+
+    &lt;li&gt;&lt;p&gt;Capcom's Street Fighter V update &lt;a 
href="https://web.archive.org/web/20160930051146/http://www.theregister.co.uk/2016/09/23/capcom_street_fighter_v/"&gt;installed
+        a driver that can be used as a backdoor by any application
+        installed on a Windows computer&lt;/a&gt;.&lt;/p&gt;
+    &lt;/li&gt;
+
+    &lt;li&gt;&lt;p&gt;The Dropbox app for Macintosh &lt;a 
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/"&gt;takes
+        total control of the machine by repeatedly nagging the user
+        for an admini password&lt;/a&gt;.&lt;/p&gt;
+    &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li 
id="universal-back-door-phone-modem"&gt;&lt;p&gt;The</strong></del></span>
+  <span class="inserted"><ins><em>&lt;li&gt;
+    &lt;p&gt;The</em></ins></span> universal back door in portable phones
+      &lt;a
+    <span 
class="removed"><del><strong>href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;is</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;
+        is</em></ins></span> employed to listen through their 
microphones&lt;/a&gt;.&lt;/p&gt;
+    <span class="inserted"><ins><em>&lt;p&gt;Most mobile phones have this 
universal back door, which has been
+      used to
+      &lt;a 
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
+       turn them malicious&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;More about &lt;a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;the
 nature of this problem&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/"&gt;
+      Microsoft has already backdoored its disk 
encryption&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Modern gratis game cr&hellip;apps
+      &lt;a 
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
+      collect a wide range of data about their users and their users' 
+      friends and associates&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Even nastier, they do it through ad networks that merge the data
+      collected by various cr&hellip;apps and sites made by different 
+      companies.&lt;/p&gt;
+
+      &lt;p&gt;They use this data to manipulate people to buy things, and hunt 
+      for &ldquo;whales&rdquo; who can be led to spend a lot of money. They 
+      also use a back door to manipulate the game play for specific 
players.&lt;/p&gt;
+
+      &lt;p&gt;While the article describes gratis games, games that cost money 
+      can use the same tactics.&lt;/p&gt;    
+  &lt;/li&gt;
+  &lt;li&gt;
+    &lt;p&gt;Dell computers, shipped with Windows, had a bogus root
+      certificate that
+      &lt;a 
href="http://fossforce.com/2015/11/dell-comcast-intel-who-knows-who-else-are-out-to-get-you/"&gt;allowed
+      anyone (not just Dell) to remotely authorize any software to
+      run&lt;/a&gt; on the computer.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;
+    &lt;p&gt;Baidu's proprietary Android library, Moplus, has a back door
+      that &lt;a 
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;can
+      &ldquo;upload files&rdquo; as well as forcibly install
+      apps&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;It is used by 14,000 Android applications.&lt;/p&gt;
+  &lt;/li&gt;
+  
+&lt;li&gt;&lt;p&gt;ARRIS cable modem has a
+  &lt;a 
href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"&gt;
+  backdoor in the backdoor&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Caterpillar vehicles come with
+     &lt;a 
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it"&gt;a
 back-door to shutoff the engine&lt;/a&gt;
+     remotely.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;li&gt;&lt;p&gt;
+Mac OS X had an &lt;a 
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/"&gt;
+intentional local back door for 4 years&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;Users reported that &lt;a 
+    
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all"&gt;
+    Microsoft was forcing them to replace Windows 7 and 8 with all-spying 
+    Windows 10&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Microsoft was in fact &lt;a 
+    
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"&gt;
+    attacking computers that run Windows 7 and 8&lt;/a&gt;, switching on a 
flag 
+    that said whether to &ldquo;upgrade&rdquo; to Windows 10 when users 
+    had turned it off.&lt;/p&gt;
+
+    &lt;p&gt;Later on, Microsoft published instructions on &lt;a 
+    
href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/"&gt;
+    how to permanently reject the downgrade to Windows 10&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This seems to involve use of a back door in Windows 7 and 
8.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+<span class="removed"><del><strong>&lt;p&gt;Most mobile phones have a 
universal back door, which has been used to
+&lt;a 
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
+turn them malicious&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;</strong></del></span>
+&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;
+A Chinese version of Android has a universal back door&lt;/a&gt;. Nearly all
+models of mobile phones have a universal back door in the modem chip. So
+why did Coolpad bother to introduce another? Because this one is controlled
+by Coolpad.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Microsoft Windows has a universal back door through which
+&lt;a 
href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263"&gt;
+any change whatsoever can be imposed on the users&lt;/a&gt;.
+&lt;/p&gt;
+&lt;p&gt;More information on when
+&lt;a href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"&gt;
+this was used&lt;/a&gt;.
+&lt;/p&gt;
+&lt;p&gt;In Windows 10, the universal back door is no longer hidden; all
+&ldquo;upgrades&rdquo; will
+be &lt;a 
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/"&gt;forcibly
+and immediately imposed&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;German government &lt;a 
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"&gt;veers
+away from Windows 8 computers with TPM 2.0 due to potential back
+door capabilities of the TPM 2.0 chip&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;The iPhone has a back door
+&lt;a 
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;
+that allows Apple to remotely delete apps&lt;/a&gt; which Apple considers
+&ldquo;inappropriate&rdquo;.  Jobs said it's ok for Apple to have this power
+because of course we can trust Apple.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;The iPhone has a back door for
+&lt;a 
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
+remote wipe&lt;/a&gt;.  It's not always enabled, but users are led into 
enabling
+it without understanding.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Apple can, and regularly does,
+    &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+  remotely extract some data from iPhones for the state&lt;/a&gt;.
+  &lt;/p&gt;
+  &lt;p&gt;This may have improved with
+  &lt;a 
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
+  iOS 8 security improvements&lt;/a&gt;; but
+  &lt;a href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
+  not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+
+&lt;li&gt;
+&lt;p&gt;&lt;a 
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;
+Windows 8 also has a back door for remotely deleting apps&lt;/a&gt;.
+&lt;/p&gt;
+
+&lt;p&gt;
+You might well decide to let a security service that you trust
+remotely &lt;em&gt;deactivate&lt;/em&gt; programs that it considers malicious.
+But there is no excuse for &lt;em&gt;deleting&lt;/em&gt; the programs, and you
+should have the right to decide who (if anyone) to trust in this way.
+&lt;/p&gt;
+
+&lt;p&gt;
+As these pages show, if you do want to clean your computer of malware,
+the first software to delete is Windows or iOS.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;In Android,
+&lt;a 
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"&gt;
+Google has a back door to remotely delete apps.&lt;/a&gt;  (It is in a program
+called GTalkService).
+&lt;/p&gt;
+
+&lt;p&gt;
+Google can also
+&lt;a 
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"&gt;
+forcibly and remotely install apps&lt;/a&gt; through GTalkService (which
+seems, since that article, to have been merged into Google Play).
+This is not equivalent to a universal back door, but permits various
+dirty tricks.
+&lt;/p&gt;
+
+&lt;p&gt;
+Although Google's &lt;em&gt;exercise&lt;/em&gt; of this power has not been
+malicious so far, the point is that nobody should have such power,
+which could also be used maliciously.  You might well decide to let a
+security service remotely &lt;em&gt;deactivate&lt;/em&gt; programs that it
+considers malicious.  But there is no excuse for allowing it
+to &lt;em&gt;delete&lt;/em&gt; the programs, and you should have the right to
+decide who (if anyone) to trust in this way.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;&lt;a id="samsung"
+href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor"&gt;
+Samsung Galaxy devices running proprietary Android versions come with a back
+door&lt;/a&gt; that provides remote access to the files stored on the device.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;The Amazon Kindle-Swindle has a back door that has been used to
+&lt;a 
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/"&gt;
+remotely erase books&lt;/a&gt;.  One of the books erased was 1984, by George 
Orwell.
+&lt;/p&gt;
+
+&lt;p&gt;Amazon responded to criticism by saying it would delete books only
+following orders from the state.  However, that policy didn't last.
+In 2012
+it &lt;a 
href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html"&gt;wiped
+a user's Kindle-Swindle and deleted her account&lt;/a&gt;, then offered her
+kafkaesque &ldquo;explanations.&rdquo;&lt;/p&gt;
+
+
+&lt;p&gt;The Kindle-Swindle also has a
+&lt;a 
href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090"&gt;
+universal back door&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;HP &ldquo;storage appliances&rdquo; that use the proprietary
+&ldquo;Left Hand&rdquo; operating system have back doors that give
+HP &lt;a 
href="http://news.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/"&gt;
+remote login access&lt;/a&gt; to them.  HP claims that this does not give HP
+access to the customer's data, but if the back door allows installation of
+software changes, a change could be installed that would give access to the
+customer's data.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;&lt;a 
href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html"&gt;
+Some D-Link routers&lt;/a&gt; have a back door for changing settings in a dlink
+of an eye.
+&lt;/p&gt;
+
+&lt;p&gt;
+&lt;a href="https://github.com/elvanderb/TCP-32764"&gt;Many models of router
+have back doors&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;&lt;a href="http://sekurak.pl/tp-link-httptftp-backdoor/"&gt;
+The TP-Link router has a backdoor&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;&lt;a 
href="http://www.techienews.co.uk/973462/bitcoin-miners-bundled-pups-legitimate-applications-backed-eula/"&gt;
+Some applications come with MyFreeProxy, which is a universal back door
+that can download programs and run them.&lt;/a&gt;
+&lt;/p&gt;
+&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;p&gt;Here is a big problem whose details are still secret.&lt;/p&gt;
+
+&lt;ul&gt;
+&lt;li&gt;
+&lt;p&gt;&lt;a 
href="http://mashable.com/2013/09/11/fbi-microsoft-bitlocker-backdoor/"&gt;
+The FBI asks lots of companies to put back doors in proprietary programs.
+&lt;/a&gt; We don't know of specific cases where this was done, but every
+proprietary program for encryption is a possibility.&lt;/p&gt;
+&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;p&gt;Here is a suspicion that we can't prove, but is worth thinking
+about.&lt;/p&gt;
+
+&lt;ul&gt;
+&lt;li&gt;
+&lt;p&gt;&lt;a 
href="http://web.archive.org/web/20150206003913/http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI"&gt;
+Writable microcode for Intel and AMD microprocessors&lt;/a&gt; may be a vehicle
+for the NSA to invade computers, with the help of Microsoft, say respected
+security experts.
+&lt;/p&gt;
+&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;p&gt;The EFF has other examples of the &lt;a 
href="https://www.eff.org/deeplinks/2015/02/who-really-owns-your-drones"&gt;use 
of back doors&lt;/a&gt;.&lt;/p&gt;
+
+
+&lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
+&lt;!--#include virtual="/server/footer.html" --&gt;
+&lt;div id="footer"&gt;
+&lt;div class="unprintable"&gt;
+
+&lt;p&gt;Please send general FSF &amp; GNU inquiries to
+&lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.
+There are also &lt;a href="/contact/"&gt;other ways to contact&lt;/a&gt;
+the FSF.  Broken links and other corrections or suggestions can be sent
+to &lt;a 
href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to &lt;a href="mailto:address@hidden"&gt;
+        &lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;For information on coordinating and submitting translations of
+        our web pages, see &lt;a
+        href="/server/standards/README.translations.html"&gt;Translations
+        README&lt;/a&gt;. --&gt;
+Please see the &lt;a
+href="/server/standards/README.translations.html"&gt;Translations
+README&lt;/a&gt; for information on coordinating and submitting translations
+of this article.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;p&gt;Copyright &copy; 2014-2017 Free Software Foundation, Inc.&lt;/p&gt;
+
+&lt;p&gt;This page is licensed under a &lt;a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
+Commons Attribution-NoDerivatives 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
+
+&lt;!--#include virtual="/server/bottom-notes.html" --&gt;
+
+&lt;p class="unprintable"&gt;Updated:
+&lt;!-- timestamp start --&gt;
+$Date: 2017/09/26 20:29:39 $
+&lt;!-- timestamp end --&gt;
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;
+&lt;/body&gt;
+&lt;/html&gt;
+</pre></body></html>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]