[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-microsoft.html propriet...
From: |
rsiddharth |
Subject: |
www/proprietary malware-microsoft.html propriet... |
Date: |
Mon, 20 Nov 2017 17:47:30 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: rsiddharth <rsd> 17/11/20 17:47:30
Modified files:
proprietary : malware-microsoft.html
proprietary-surveillance.html
Log message:
[RT#1246601] Update Microsoft Windowns telemetry item.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.html?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.html?cvsroot=www&r1=1.160&r2=1.161
Patches:
Index: malware-microsoft.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.html,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- malware-microsoft.html 7 Nov 2017 09:07:55 -0000 1.64
+++ malware-microsoft.html 20 Nov 2017 22:47:28 -0000 1.65
@@ -275,10 +275,16 @@
user's computer and their use of the computer.</p>
<p>Furthermore, for users who installed the fourth stable build of
-Windows 10, called the “Creators Update,” Windows maximized the
+Windows 10, called the “Creators Update”, Windows maximized the
surveillance <a
href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law">
-by force setting the telemetry mode to “Full”</a>.</p></li>
+ by force setting the telemetry mode to “Full”</a>.</p>
+
+<p>The “Full” telemetry mode, allows Microsoft Windows
+ engineers to access, <a
href="https://docs.microsoft.com/en-us/windows/configuration/configure-windows-telemetry-in-your-organization#full-level">among
other things</a>, registry keys
+ <a href="https://technet.microsoft.com/en-us/library/cc939702.aspx">which
+ can contain sensitive information like administrator's login
+ password</a>.</p></li>
<li><p>Windows DRM
files <a
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users">can
@@ -478,7 +484,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/11/07 09:07:55 $
+$Date: 2017/11/20 22:47:28 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.html,v
retrieving revision 1.160
retrieving revision 1.161
diff -u -b -r1.160 -r1.161
--- proprietary-surveillance.html 19 Nov 2017 09:04:47 -0000 1.160
+++ proprietary-surveillance.html 20 Nov 2017 22:47:28 -0000 1.161
@@ -176,11 +176,16 @@
<li><p>Windows 10 telemetry program sends information to Microsoft about the
user's computer and their use of the computer.</p>
-<p>Furthermore, for users who installed the fourth stable build of
-Windows 10, called the “Creators Update,” Windows maximized the
-surveillance <a
-href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law">
-by force setting the telemetry mode to “Full”</a>.</p></li>
+ <p>Furthermore, for users who installed the fourth stable build of
+ Windows 10, called the “Creators Update”, Windows maximized
the
+ surveillance<a
href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law">
+ by force setting the telemetry mode to “Full”</a>.</p>
+
+ <p>The “Full” telemetry mode, allows Microsoft Windows
+ engineers to access, <a
href="https://docs.microsoft.com/en-us/windows/configuration/configure-windows-telemetry-in-your-organization#full-level">among
other things</a>, registry keys
+ <a href="https://technet.microsoft.com/en-us/library/cc939702.aspx">which
+ can contain sensitive information like administrator's login
+ password</a>.</p></li>
<li><p>Windows DRM
files <a
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users">can
@@ -1520,7 +1525,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/11/19 09:04:47 $
+$Date: 2017/11/20 22:47:28 $
<!-- timestamp end -->
</p>
</div>
- www/proprietary malware-microsoft.html propriet...,
rsiddharth <=