[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-appliances.html
From: |
Andrea Luzzi |
Subject: |
www/proprietary malware-appliances.html |
Date: |
Fri, 13 Oct 2017 09:34:10 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: Andrea Luzzi <libremind> 17/10/13 09:34:10
Modified files:
proprietary : malware-appliances.html
Log message:
Add new item about home security camera surveillance RT #1245538.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.html?cvsroot=www&r1=1.35&r2=1.36
Patches:
Index: malware-appliances.html
===================================================================
RCS file: /web/www/www/proprietary/malware-appliances.html,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- malware-appliances.html 2 Oct 2017 07:15:15 -0000 1.35
+++ malware-appliances.html 13 Oct 2017 13:34:10 -0000 1.36
@@ -31,7 +31,19 @@
<p>Here are examples of malware in appliances.</p>
<ul>
-<li>
+ <li>
+ <p>Every “home security” camera, if its manufacturer can
communicate with it,
+ is a surveillance device. <a
+href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
+ Canary camera is an example</a>.</p>
+ <p>The article describes wrongdoing by the manufacturer, based on the fact
+ that the device is tethered to a server.</p>
+ <p><a href="/proprietary/proprietary-tethers.html">More about proprietary
tethering</a>.</p>
+ <p>But it also demonstrates that the device gives the company
+ surveillance capability.</p>
+ </li>
+
+ <li>
<p>A “smart” intravenous pump designed for
hospitals is connected to the internet. Naturally <a
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml">
@@ -648,7 +660,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/10/02 07:15:15 $
+$Date: 2017/10/13 13:34:10 $
<!-- timestamp end -->
</p>
</div>