www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-appliances.de.html po/m...


From: GNUN
Subject: www/proprietary malware-appliances.de.html po/m...
Date: Wed, 25 Oct 2017 04:00:38 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     17/10/25 04:00:38

Modified files:
        proprietary    : malware-appliances.de.html 
Added files:
        proprietary/po : malware-appliances.de-diff.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.de.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de-diff.html?cvsroot=www&rev=1.1

Patches:
Index: malware-appliances.de.html
===================================================================
RCS file: /web/www/www/proprietary/malware-appliances.de.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- malware-appliances.de.html  20 Jul 2017 12:59:45 -0000      1.5
+++ malware-appliances.de.html  25 Oct 2017 08:00:37 -0000      1.6
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/malware-appliances.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/malware-appliances.de.po">
+ https://www.gnu.org/proprietary/po/malware-appliances.de.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/malware-appliances.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/malware-appliances.de-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2017-08-26" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/malware-appliances.en.html" -->
 
 <!--#include virtual="/server/header.de.html" -->
 <!-- Parent-Version: 1.79 -->
@@ -8,6 +13,7 @@
 
 <!--#include virtual="/proprietary/po/malware-appliances.translist" -->
 <!--#include virtual="/server/banner.de.html" -->
+<!--#include virtual="/server/outdated.de.html" -->
 <h2>Schadsoftware in Geräten</h2>
 
 <p><a href="/proprietary/">Weitere Beispiele proprietärer 
Schadsoftware</a></p>
@@ -781,7 +787,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Letzte Änderung:
 
-$Date: 2017/07/20 12:59:45 $
+$Date: 2017/10/25 08:00:37 $
 
 <!-- timestamp end -->
 </p>

Index: po/malware-appliances.de-diff.html
===================================================================
RCS file: po/malware-appliances.de-diff.html
diff -N po/malware-appliances.de-diff.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/malware-appliances.de-diff.html  25 Oct 2017 08:00:38 -0000      1.1
@@ -0,0 +1,683 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/proprietary/malware-appliances.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.79</strong></del></span> <span 
class="inserted"><ins><em>1.84</em></ins></span> --&gt;
+&lt;title&gt;Malware in Appliances
+- GNU Project - Free Software Foundation&lt;/title&gt;
+ &lt;!--#include virtual="/proprietary/po/malware-appliances.translist" --&gt;
+&lt;!--#include virtual="/server/banner.html" --&gt;
+&lt;h2&gt;Malware in Appliances&lt;/h2&gt;
+
+&lt;p&gt;&lt;a href="/proprietary/proprietary.html"&gt;Other examples of 
proprietary
+malware&lt;/a&gt;&lt;/p&gt;
+
+&lt;div class="highlight-para"&gt;
+&lt;p&gt;
+&lt;em&gt;Malware&lt;/em&gt; means software designed to function in ways that
+mistreat or harm the user.  (This does not include accidental errors.)
+&lt;/p&gt;
+
+&lt;p&gt;
+Malware and nonfree software are two different issues.  The difference
+between &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt; and
+nonfree software is in &lt;a
+href="/philosophy/free-software-even-more-important.html"&gt;
+whether the users have control of the program or vice versa&lt;/a&gt;.  It's
+not directly a question of what the program &lt;em&gt;does&lt;/em&gt; when it
+runs.  However, in practice nonfree software is often malware, because
+the developer's awareness that the users would be powerless to fix any
+malicious functionalities tempts the developer to impose some.
+&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;p&gt;Here are examples of malware in appliances.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    <span class="inserted"><ins><em>&lt;p&gt;Every &ldquo;home security&rdquo; 
camera, if its manufacturer can communicate with it,
+      is a surveillance device. &lt;a
+href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
+       Canary camera is an example&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The article describes wrongdoing by the manufacturer, based on 
the fact
+      that the device is tethered to a server.&lt;/p&gt;
+    &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More about 
proprietary tethering&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;But it also demonstrates that the device gives the company
+      surveillance capability.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;
+  &lt;p&gt;A &ldquo;smart&rdquo; intravenous pump designed for
+    hospitals is connected to the internet. Naturally &lt;a
+href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"&gt;
+    its security has been cracked&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;Note that this article misuses the term &lt;a
+href="/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;
+     referring to crackers.&lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;
+  &lt;p&gt;The bad security in many Internet of Stings devices
+    allows &lt;a 
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
+    to snoop on the people that use them&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;Don't be a sucker&mdash;reject all the stings.&lt;/p&gt;
+  &lt;p&gt;It is unfortunate that the article uses the
+  term &lt;a 
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;
+  &lt;p&gt;Tesla used a universal backdoor in its software to limit customers 
to
+  using just &lt;a 
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/"&gt;
+  part of the battery of some cars&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;While remotely allowing car &ldquo;owners&rdquo; to use the whole 
battery
+  capacity did not do them any harm, the same back door would permit
+  Tesla (perhaps under the command of some government) to remotely order
+  the car to use none of its battery. Or perhaps to drive its passenger
+  to a torture prison.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;</em></ins></span>
+  &lt;p&gt;Many models of Internet-connected cameras are tremendously insecure.
+  They have login accounts with hard-coded passwords, which can't be
+  changed, and &lt;a 
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;there
 is no way to
+  delete these accounts either&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;The proprietary code that runs pacemakers, insulin pumps, and other
+medical devices is &lt;a 
href="http://www.bbc.co.uk/news/technology-40042584"&gt;
+full of gross security faults&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;Users are suing Bose for &lt;a
+href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
+distributing a spyware app for its headphones&lt;/a&gt;.
+Specifically, the app would record the names of the audio files
+users listen to along with the headphone's unique serial number.
+&lt;/p&gt;
+
+&lt;p&gt;The suit accuses that this was done without the users' consent.
+If the fine print of the app said that users gave consent for this,
+would that make it acceptable? No way! It should be flat out
+&lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;
+illegal to design the app to snoop at all&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li id="anova"&gt;
+  &lt;p&gt;Anova sabotaged users' cooking devices with a downgrade that
+  tethered them to a remote server. &lt;a 
href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062"&gt;Unless
 users create an account on Anova's servers, their
+  cookers won't function.&lt;/a&gt;&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;When Miele's Internet of Stings hospital disinfectant dishwasher is
+&lt;a 
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;connected
 to the Internet,
+its security is crap&lt;/a&gt;.&lt;/p&gt;
+&lt;p&gt;For example, a cracker can gain access to the dishwasher's filesystem,
+ infect it with malware, and force the dishwasher to launch attacks on
+ other devices in the network. Since these dishwashers are used in hospitals,
+ such attacks could potentially put hundreds of lives at risk.&lt;/p&gt;
+
+&lt;/li&gt;
+&lt;li&gt;
+&lt;p&gt;If you buy a used &ldquo;smart&rdquo; car, house, TV, refrigerator,
+etc.,
+usually &lt;a 
href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html"&gt;the
+previous owners can still remotely control it&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;
+  &lt;p&gt;Vizio
+    &ldquo;smart&rdquo; &lt;a 
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+      report everything that is viewed on them, and not just broadcasts
+      and cable&lt;/a&gt;. Even if the image is coming from the user's own
+    computer, the TV reports what it is. The existence of a way to
+    disable the surveillance, even if it were not hidden as it was in
+    these TVs, does not legitimize the surveillance.&lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;
+&lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a
+href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+  on their users&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;The report was as of 2014, but we don't expect this has got
+better.&lt;/p&gt;
+
+&lt;p&gt;This shows that laws requiring products to get users' formal
+consent before collecting personal data are totally inadequate.  And
+what happens if a user declines consent?  Probably the TV will say,
+&ldquo;Without your consent to tracking, the TV will not
+work.&rdquo;&lt;/p&gt;
+
+&lt;p&gt;Proper laws would say that TVs are not allowed to report what the
+user watches &mdash; no exceptions!&lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;
+&lt;p&gt;Some LG
+TVs &lt;a href="http://openlgtv.org.ru/wiki/index.php/Achievements"&gt;are
+tyrants&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;&lt;a
+href="http://wiki.samygo.tv/index.php5/SamyGO_for_DUMMIES#What_are_Restricted_Firmwares.3F"&gt;
+Samsung &ldquo;Smart&rdquo; TVs have turned Linux into the base
+for a tyrant system&lt;/a&gt; so as to impose DRM.
+What enables Samsung to do this is that Linux is released under
+GNU GPL version 2, &lt;a href="/licenses/rms-why-gplv3.html"&gt;not version 
3&lt;/a&gt;,
+together with a weak interpretation of GPL version 2.
+&lt;/li&gt;
+&lt;li&gt;
+&lt;a
+href="http://jalopnik.com/america-figured-out-a-new-way-audi-cheated-on-emissions-1788630969"&gt;
+Audi's proprietary software used a simple method to cheat on emissions
+tests&lt;/a&gt;: to activate a special low-emission gearshifting mode until the
+first time the car made a turn.
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;A company that makes internet-controlled vibrators
+&lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is
+being sued for collecting lots of personal information about how
+people use it&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;The company's statement that it anonymizes the data may be true,
+but it doesn't really matter. If it sells the data to a data broker,
+the data broker can figure out who the user is.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Google/Alphabet &lt;a
+href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be"&gt;
+intentionally broke Revolv home automatic control products that depended on
+a server&lt;/a&gt; to function.  The lesson is, don't stand for that! Insist
+on self-contained computers that run free software!&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;ARRIS cable modem has a &lt;a
+href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"&gt;
+backdoor in the backdoor&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Caterpillar vehicles come with a &lt;a
+href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it"&gt;
+back-door to shutoff the engine&lt;/a&gt; remotely.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;HP &ldquo;storage appliances&rdquo; that use the proprietary
+&ldquo;Left Hand&rdquo; operating system have back doors that give HP
+&lt;a
+href="http://news.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/"&gt;
+remote login access&lt;/a&gt; to them.  HP claims that this does not give HP
+access to the customer's data, but if the back door allows
+installation of software changes, a change could be installed that
+would give access to the customer's data.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;&lt;a
+href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html"&gt;
+Some D-Link routers&lt;/a&gt; have a back door for changing settings in a
+dlink of an eye.&lt;/p&gt;
+
+&lt;p&gt;
+&lt;a href="https://github.com/elvanderb/TCP-32764"&gt;Many models of router
+have back doors&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;&lt;a href="http://sekurak.pl/tp-link-httptftp-backdoor/"&gt;
+The TP-Link router has a backdoor&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;&lt;a
+href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions"&gt;
+Volkswagen programmed its car engine computers to detect the
+Environmental Protection Agency's emission tests&lt;/a&gt;,
+and run dirty the rest of the time.&lt;/p&gt;
+
+&lt;p&gt;In real driving, the cars exceeded emissions standards by a factor
+of up to 35.&lt;/p&gt;
+
+&lt;p&gt;Using free software would not have stopped Volkswagen from
+programming it this way, but would have made it harder to conceal.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;The &lt;a 
href="http://michaelweinberg.org/post/137045828005/free-the-cube"&gt;
+&ldquo;Cube&rdquo; 3D printer was designed with DRM&lt;/a&gt;: it won't accept
+third-party printing materials.  It is the Keurig of printers.  Now it is
+being discontinued, which means that eventually authorized materials won't
+be available and the printers may become unusable.&lt;/p&gt;
+
+&lt;p&gt;With a &lt;a 
href="http://www.fsf.org/resources/hw/endorsement/aleph-objects"&gt;
+printer that gets the Respects Your Freedom&lt;/a&gt;, this problem would not
+even be a remote possibility.&lt;/p&gt;
+
+&lt;p&gt;How pitiful that the author of that article says that there was
+&ldquo;nothing wrong&rdquo; with designing the device to restrict users in
+the first place.  This is like putting a &ldquo;cheat me and mistreat me&rdquo;
+sign on your chest.  We should know better: we should condemn all companies
+that take advantage of people like him.  Indeed, it is the acceptance of
+their unjust practice that teaches people to be doormats.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Philips &ldquo;smart&rdquo; lightbulbs &lt;a
+href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml"&gt;
+have been designed not to interact with other companies' smart
+lightbulbs&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;If a product is &ldquo;smart&rdquo;, and you didn't build it, it is
+cleverly serving its manufacturer &lt;em&gt;against you&lt;/em&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;&lt;a
+href="http://web.archive.org/web/20131007102857/http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up"&gt;
+DVDs and Bluray disks have DRM&lt;/a&gt;.
+&lt;/p&gt;
+
+&lt;p&gt;That page uses spin terms that favor DRM,
+including &lt;a 
href="/philosophy/words-to-avoid.html#DigitalRightsManagement"&gt;
+digital &ldquo;rights&rdquo; management&lt;/a&gt;
+and &lt;a 
href="/philosophy/words-to-avoid.html#Protection"&gt;&ldquo;protect&rdquo;&lt;/a&gt;,
+and it claims that &ldquo;artists&rdquo; (rather than companies) are
+primarily responsible for putting digital restrictions management into
+these disks.  Nonetheless, it is a reference for the facts.
+&lt;/p&gt;
+
+&lt;p&gt;Every Bluray disk (with few, rare exceptions) has DRM&mdash;so
+don't use Bluray disks!&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;&lt;a 
href="https://www.eff.org/deeplinks/2013/11/drm-cars-will-drive-consumers-crazy"&gt;
+DRM in cars will drive consumers crazy&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li id="cameras-bugs"&gt;
+&lt;p&gt;Over 70 brands of network-connected surveillance cameras have &lt;a
+href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
+security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Samsung's &ldquo;Smart Home&rdquo; has a big security hole; &lt;a
+href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/"&gt;
+unauthorized people can remotely control it&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Samsung claims that this is an &ldquo;open&rdquo; platform so the
+problem is partly the fault of app developers. That is clearly true if
+the apps are proprietary software.&lt;/p&gt;
+
+&lt;p&gt;Anything whose name is &ldquo;Smart&rdquo; is most likely going to
+screw you.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;
+The Nissan Leaf has a built-in cell phone modem which allows
+effectively anyone to &lt;a
+href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;
+access its computers remotely and make changes in various
+settings&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;That's easy to do because the system has no authentication when
+accessed through the modem.  However, even if it asked for
+authentication, you couldn't be confident that Nissan has no
+access.  The software in the car is
+proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
+means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Even if no one connects to the car remotely, the cell phone modem
+enables the phone company to track the car's movements all the time;
+it is possible to physically remove the cell phone modem though.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;
+Malware found on &lt;a
+href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html"&gt;
+security cameras available through Amazon&lt;/a&gt;.
+&lt;/p&gt;
+
+&lt;p&gt;A camera that records locally on physical media, and has no network
+connection, does not threaten people with surveillance&mdash;neither
+by watching people through the camera, nor through malware in the
+camera.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt; &lt;a
+href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"&gt;
+FitBit fitness trackers have a Bluetooth vulnerability&lt;/a&gt; that allows
+attackers to send malware to the devices, which can subsequently
+spread to computers and other FitBit trackers that interact with
+them.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt; &ldquo;Self-encrypting&rdquo; disk drives do the encryption with
+proprietary firmware so you can't trust it.  Western Digital's &lt;a
+href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;
+&ldquo;My Passport&rdquo; drives have a back door&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Security researchers discovered a &lt;a
+href="http://www.theguardian.com/technology/2015/aug/12/hack-car-brakes-sms-text"&gt;
+vulnerability in diagnostic dongles used for vehicle tracking and
+insurance&lt;/a&gt; that let them take remote control of a car or
+lorry using an SMS.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Crackers were able to &lt;a
+href="http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/"&gt;
+take remote control of the Jeep&lt;/a&gt; &ldquo;connected 
car&rdquo;.&lt;/p&gt;
+
+&lt;p&gt;They could track the car, start or stop the engine, and
+activate or deactivate the brakes, and more.&lt;/p&gt;
+
+&lt;p&gt;I expect that Chrysler and the NSA can do this too.&lt;/p&gt;
+
+&lt;p&gt;If I ever own a car, and it contains a portable phone, I will
+deactivate that.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;
+Hospira infusion pumps, which are used to administer drugs to
+a patient, were rated &ldquo;&lt;a
+href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/"&gt;
+least secure IP device I've ever seen&lt;/a&gt;&rdquo; by a security
+researcher.&lt;/p&gt;
+
+&lt;p&gt;Depending on what drug is being infused, the insecurity could
+open the door to murder.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Due to bad security in a drug pump, crackers could use it to &lt;a
+href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/"&gt;
+kill patients&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;&lt;a
+href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/"&gt;
+&ldquo;Smart homes&rdquo;&lt;/a&gt; turn out to be stupidly vulnerable to
+intrusion.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;The &lt;a
+href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html"&gt;
+FTC punished a company for making webcams with bad security&lt;/a&gt; so
+that it was easy for anyone to watch them.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;It is possible to &lt;a
+href="http://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/"&gt;
+take control of some car computers through malware in music files&lt;/a&gt;.
+Also &lt;a
+href="http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0"&gt;by
+radio&lt;/a&gt;.  More information in &lt;a
+href="http://www.autosec.org/faq.html"&gt; Automotive Security And
+Privacy Center&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;It is possible to &lt;a
+href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/"&gt;
+kill people by taking control of medical implants by radio&lt;/a&gt;.  More
+information in &lt;a
+href="http://www.bbc.co.uk/news/technology-17631838"&gt;BBC News&lt;/a&gt; and
+&lt;a
+href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html"&gt;
+IOActive Labs Research blog&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Lots of &lt;a
+href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/"&gt;
+hospital equipment has lousy security&lt;/a&gt;, and it can be fatal.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;&lt;a
+href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/"&gt;
+Point-of-sale terminals running Windows were taken over&lt;/a&gt; and turned
+into a botnet for the purpose of collecting customers' credit card
+numbers.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li id="vizio-snoop"&gt;
+&lt;p&gt;Vizio
+&lt;a 
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
+used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what
+users watch&lt;/a&gt;.  The TVs did not do that when first sold.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;LG &lt;a
+href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
+disabled network features&lt;/a&gt; on &lt;em&gt;previously 
purchased&lt;/em&gt;
+&ldquo;smart&rdquo; TVs, unless the purchasers agreed to let LG
+begin to snoop on them and distribute their personal data.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;&lt;a
+href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;
+Barbie is going to spy&lt;/a&gt; on children and adults.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;&lt;a
+href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+Cisco TNP IP phones are spying devices&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;The &lt;a
+href="http://www.bbc.com/news/technology-34922712"&gt;Nest Cam
+&ldquo;smart&rdquo; camera is always watching&lt;/a&gt;, even when the
+&ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
+
+&lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it to 
outsmart
+you.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are &lt;a
+<span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;</strong></del></span>
+<span 
class="inserted"><ins><em>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;</em></ins></span>
+snooping devices&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Proprietary software in cars &lt;a
+href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;
+records information about drivers' movements&lt;/a&gt;, which is made
+available to car manufacturers, insurance companies, and others.&lt;/p&gt;
+
+&lt;p&gt;The case of toll-collection systems, mentioned in this article, is not
+really a matter of proprietary surveillance.  These systems are an
+intolerable invasion of privacy, and should be replaced with anonymous
+payment systems, but the invasion isn't done by malware.  The other
+cases mentioned are done by proprietary malware in the car.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Tesla cars allow the company to extract data remotely and determine
+the car's location at any time.  (See &lt;a
+href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+Section 2, paragraphs b and c.&lt;/a&gt;).  The company says it doesn't
+store this information, but if the state orders it to get the data and
+hand it over, the state can store it.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Vizio goes a step further than other TV manufacturers in spying on 
+their users: their &lt;a
+href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+&ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
+link them your IP address&lt;/a&gt; so that advertisers can track you 
+across devices.&lt;/p&gt;
+
+&lt;p&gt;It is possible to turn this off, but having it enabled by default
+is an injustice already.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households to the 600
+millions social media profiles the company already monitors.  Tivo
+customers are unaware they're being watched by advertisers.  By
+combining TV viewing information with online social media
+participation, Tivo can now &lt;a
+href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
+correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
+users to new combined surveillance by default.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Some web and TV advertisements play inaudible sounds to be picked
+up by proprietary malware running on other devices in range so as to
+determine that they are nearby.  Once your Internet devices are paired
+with your TV, advertisers can correlate ads with Web activity, and
+other &lt;a
+href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
+cross-device tracking&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize and &lt;a
+href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
+what people are watching&lt;/a&gt;, even if it isn't a TV channel.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;The Amazon &ldquo;smart&rdquo; TV is &lt;a
+href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
+snooping all the time&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;The Samsung &ldquo;smart&rdquo; TV &lt;a
+href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
+transmits users' voice on the internet to another company, Nuance&lt;/a&gt;.
+Nuance can save it and would then have to give it to the US or some
+other government.&lt;/p&gt;
+
+&lt;p&gt;Speech recognition is not to be trusted unless it is done by free
+software in your own computer.&lt;/p&gt;
+
+&lt;p&gt;In its privacy policy, Samsung explicitly confirms
+that &lt;a 
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
+data containing sensitive information will be transmitted to third
+parties&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;&lt;a
+href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+Spyware in LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what the user
+watches, and the switch to turn this off has no effect.  (The fact
+that the transmission reports a 404 error really means nothing; the
+server could save that data anyway.)&lt;/p&gt;
+
+&lt;p&gt;Even worse, it &lt;a
+href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;LG later said it had installed a patch to stop this, but any
+product could spy this way.&lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;
+&lt;p&gt;&lt;a
+href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
+Verizon cable TV snoops on what programs people watch&lt;/a&gt;, and even what
+they wanted to record.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;/ul&gt;
+
+&lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
+&lt;!--#include virtual="/server/footer.html" --&gt;
+&lt;div id="footer"&gt;
+&lt;div class="unprintable"&gt;
+
+&lt;p&gt;Please send general FSF &amp; GNU inquiries to
+&lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.
+There are also &lt;a href="/contact/"&gt;other ways to contact&lt;/a&gt;
+the FSF.  Broken links and other corrections or suggestions can be sent
+to &lt;a 
href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to &lt;a href="mailto:address@hidden"&gt;
+        &lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;For information on coordinating and submitting translations of
+        our web pages, see &lt;a
+        href="/server/standards/README.translations.html"&gt;Translations
+        README&lt;/a&gt;. --&gt;
+Please see the &lt;a
+href="/server/standards/README.translations.html"&gt;Translations
+README&lt;/a&gt; for information on coordinating and submitting translations
+of this article.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. --&gt;
+
+&lt;p&gt;Copyright &copy; 2016, 2017 Free Software Foundation, Inc.&lt;/p&gt;
+
+&lt;p&gt;This page is licensed under a &lt;a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
+Commons Attribution-NoDerivatives 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
+
+&lt;!--#include virtual="/server/bottom-notes.html" --&gt;
+
+&lt;p class="unprintable"&gt;Updated:
+&lt;!-- timestamp start --&gt;
+$Date: 2017/10/25 08:00:38 $
+&lt;!-- timestamp end --&gt;
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;
+&lt;/body&gt;
+&lt;/html&gt;
+</pre></body></html>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]