[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/server/staging/proprietary/rec propr-blurbs...
From: |
Therese Godefroy |
Subject: |
www/server/staging/proprietary/rec propr-blurbs... |
Date: |
Sun, 16 Sep 2018 06:16:45 -0400 (EDT) |
CVSROOT: /webcvs/www
Module name: www
Changes by: Therese Godefroy <th_g> 18/09/16 06:16:45
Modified files:
server/staging/proprietary/rec: propr-blurbs.rec
Log message:
Tag malware-cars and malware-google; various fixes.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/propr-blurbs.rec?cvsroot=www&r1=1.2&r2=1.3
Patches:
Index: propr-blurbs.rec
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/rec/propr-blurbs.rec,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- propr-blurbs.rec 15 Sep 2018 23:03:15 -0000 1.2
+++ propr-blurbs.rec 16 Sep 2018 10:16:45 -0000 1.3
@@ -21,7 +21,7 @@
Id: -201808120
PubDate: 2018-08-12
-Section: amazon insecurity echo-spy
+Section: amazon insecurity echo-surveillance
Keyword:
Blurb: <p>Crackers found a way to break the security of an Amazon device, and
<a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"> turn it into
a listening device</a> for them.</p>
+
@@ -31,8 +31,8 @@
Id: -201808030
PubDate: 2018-08-03
-Section:
-Keyword:
+Section: google surveillance
+Keyword: android
Blurb: <p>Some Google apps on Android <a
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
record the user's location even when users disable “location
tracking”</a>.</p>
+
+ <p>There are other ways to turn off the other kinds of location tracking,
but most users will be tricked by the misleading control.</p>
@@ -222,8 +222,8 @@
Id: -201711240
PubDate: 2017-11-24
-Section:
-Keyword:
+Section: google surveillance
+Keyword: android
Blurb: <p>Tracking software in popular Android apps is pervasive and sometimes
very clever. Some trackers can <a
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
follow a user's movements around a physical store by noticing WiFi
networks</a>.</p>
Id: -201711230
@@ -234,8 +234,8 @@
Id: -201711210
PubDate: 2017-11-21
-Section:
-Keyword:
+Section: google surveillance
+Keyword: android
Blurb: <p>Android tracks location for Google <a
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
even when “location services” are turned off, even when the phone
has no SIM card</a>.</p>
Id: -201711201
@@ -332,7 +332,7 @@
Id: -201709290
PubDate: 2017-09-29
-Section:
+Section: cars insecurity
Keyword:
Blurb: <p>Bad security in some cars makes it possible to <a
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937"> remotely
activate the airbags</a>.</p>
@@ -350,18 +350,26 @@
+
+ <p>Note that this article misuses the term <a
href="/philosophy/words-to-avoid.html#Hacker"> “hackers”</a>
referring to crackers.</p>
-Id: -201709090
+Id: -201709092
+PubDate: 2017-09-09
+Section: cars
+Keyword: tesla back-doors universal sabotage
+Blurb: <p>Tesla used a universal back door in its software to limit customers
to using just <a
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/">
part of the battery of some cars</a>.</p>
++
++ <p>While remotely allowing car “owners” to use the whole
battery capacity did not do them any harm, the same back door would permit
Tesla (perhaps under the command of some government) to remotely order the car
to use none of its battery. Or perhaps to drive its passenger to a torture
prison.</p>
+
+Id: -201709091
PubDate: 2017-09-09
-Section: back-doors universal cars
-Keyword: tesla vehicle
+Section: back-doors universal
+Keyword: tesla cars sabotage
Blurb: <p>Tesla cars have a <a
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/">
universal back door</a>.</p>
+
+ <p>While remotely allowing car “owners” to use the whole
battery capacity did not do them any harm, the same back door would permit
Tesla (perhaps under the command of some government) to remotely order the car
to use none of its battery. Or perhaps to drive its passenger to a torture
prison.</p>
Id: -201709090
PubDate: 2017-09-09
-Section:
-Keyword:
+Section: sabotage
+Keyword: tesla cars back-doors universal sabotage
Blurb: <p>Tesla used software to limit customers to using just <a
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/">
part of the battery of some cars</a>.</p>
Id: -201708280
@@ -449,7 +457,7 @@
Id: -201706070
PubDate: 2017-06-07
-Section: back-doors spy surveillance appliances road camera
+Section: back-doors surveillance appliances road camera
Keyword:
Blurb: <p id="InternetCameraBackDoor">Many models of Internet-connected
cameras contain a glaring back door—they have login accounts with
hard-coded passwords, which can't be changed, and <a
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">
there is no way to delete these accounts either</a>.</p>
+
@@ -505,8 +513,8 @@
Id: -201705150
PubDate: 2017-05-13
PubDate: 2017-05-15
-Section:
-Keyword:
+Section: google drm
+Keyword: android netflix
Blurb: <p>Google now allows Android apps to detect whether a device has been
rooted, <a
href="http://www.androidpolice.com/2017/05/13/netflix-confirms-blocking-rootedunlocked-devices-app-still-working-now/">
and refuse to install if so</a>. The Netflix app uses this ability to enforce
DRM by refusing to install on rooted Android devices.</p>
+
+ <p>UpPubDate: Google <em>intentionally</em> changed Android so that apps <a
href="https://torrentfreak.com/netflix-use-of-google-drm-means-rooted-android-devices-are-banned-170515/">
can detect rooted devices and refuse to run on them</a>. The Netflix app is
proprietary malware, and one shouldn't use it. However, that does not make what
Google has done any less wrong.</p>
@@ -603,7 +611,7 @@
Id: -201703160
PubDate: 2017-03-16
-Section:
+Section: google censorship
Keyword:
Blurb: <p>Google <a
href="http://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts">
offers censorship software</a>, ostensibly for parents to put into their
children's computers.</p>
@@ -680,8 +688,8 @@
Id: -201701300
PubDate: 2017-01-30
-Section:
-Keyword:
+Section: google drm
+Keyword: chrome chromium
Blurb: <p>Chrome <a
href="http://boingboing.net/2017/01/30/google-quietly-makes-optiona.html">
implements DRM</a>. So does Chromium, through nonfree software that is
effectively part of it.</p>
+
+ <p><a href="https://bugs.chromium.org/p/chromium/issues/detail?id=686430">
More information</a>.</p>
@@ -701,15 +709,15 @@
Id: -201701180
PubDate: 2015-05
PubDate: 2017-01-18
-Section:
-Keyword:
+Section: google censorship
+Keyword: chrome
Blurb: <p>On Windows and MacOS, Chrome <a
href="https://sites.google.com/a/chromium.org/dev/developers/extensions-deployment-faq">
disables extensions</a> that are not hosted in the Chrome Web Store.</p>
+
+ <p>For example, an extension was <a
href="https://consumerist.com/2017/01/18/why-is-google-blocking-this-ad-blocker-on-chrome/">
banned from the Chrome Web Store, and permanently disabled</a> on more than
40,000 computers.</p>
Id: -201701131
PubDate: 2017-01-13
-Section: back-doors spy surveillance mobile
+Section: back-doors surveillance mobile
Keyword: app whatsapp
Blurb: <p>WhatsApp <a
href="https://www.theguardian.com/technology/2017/jan/13/whatsapp-backdoor-allows-snooping-on-encrypted-messages">
has a back door that the company can use to read the plaintext of
messages</a>.</p>
+
@@ -857,8 +865,8 @@
Id: -201611060
PubDate: 2016-11-06
-Section:
-Keyword:
+Section: cars deception
+Keyword: audi
Blurb: <p><a
href="http://jalopnik.com/america-figured-out-a-new-way-audi-cheated-on-emissions-1788630969">
Audi's proprietary software used a simple method to cheat on emissions
tests</a>: to activate a special low-emission gearshifting mode until the first
time the car made a turn.</p>
Id: -201610230
@@ -882,8 +890,8 @@
Id: -201609210
PubDate: 2016-09-21
-Section:
-Keyword:
+Section: google surveillance
+Keyword: app
Blurb: <p>Google's new voice messaging app <a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">
logs all conversations</a>.</p>
Id: -201609200
@@ -978,7 +986,7 @@
Id: -201607160
PubDate: 2016-07-16
-Section:
+Section: cars surveillance
Keyword:
Blurb: <p>Computerized cars with nonfree software are <a
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
snooping devices</a>.</p>
@@ -1081,8 +1089,8 @@
Id: -201605150
PubDate: 2016-05-15
-Section:
-Keyword:
+Section: google sabotage
+Keyword: revolv
Blurb: <p>Revolv is an IoT device which managed “smart home”
operations: switching the lights, operate motion sensors, regulating
temperature, etc. On May 15th, 2016, Google said it would shut down the service
linked to the device, making it unusable.</p>
+
+ <p>Although you may own the device, its functioning depended on the server
that never belonged to you. So you never really had control of it. This unjust
design is called <a
href="/philosophy/network-services-arent-free-or-nonfree.html"> Service as a
Software Substitute (SaaSS)</a>. That is what gave the company the power to
convert it into a \$300 out-of-warranty brick, for your “dumb
home”.</p>
@@ -1176,16 +1184,26 @@
+
+ <p>The article says this is a back door, but that could be a
misunderstanding. However, it is certainly surveillance, at least.</p>
-Id: -201602240
+Id: -201602241
PubDate: 2016-02-24
-Section:
-Keyword:
+Section: surveillance
+Keyword: cars insecurity back-doors phone
Blurb: <p id="nissan-modem">The Nissan Leaf has a built-in cell phone modem
which allows effectively anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"> to
access its computers remotely and make changes in various settings</a>.</p>
+
+ <p>That's easy to do because the system has no authentication when accessed
through the modem. However, even if it asked for authentication, you couldn't
be confident that Nissan has no access. The software in the car is proprietary,
<a href="/philosophy/free-software-even-more-important.html"> which means it
demands blind faith from its users</a>.</p>
+
+ <p>Even if no one connects to the car remotely, the cell phone modem
enables the phone company to track the car's movements all the time; it is
possible to physically remove the cell phone modem though.</p>
+Id: -201602240
+PubDate: 2016-02-24
+Section: cars insecurity
+Keyword: back-doors phone surveillance
+Blurb: <p>The Nissan Leaf has a built-in cell phone modem which allows
effectively anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"> to
access its computers remotely and make changes in various settings</a>.</p>
++
++ <p>That's easy to do because the system has no authentication when accessed
through the modem. However, even if it asked for authentication, you couldn't
be confident that Nissan has no access. The software in the car is proprietary,
<a href="/philosophy/free-software-even-more-important.html"> which means it
demands blind faith from its users</a>.</p>
++
++ <p>Even if no one connects to the car remotely, the cell phone modem
enables the phone company to track the car's movements all the time; it is
possible to physically remove the cell phone modem though.</p>
+
Id: -201602050
PubDate: 2016-02-05
Section: apple sabotage ithing
@@ -1194,7 +1212,7 @@
Id: -201602030
PubDate: 2016-02-03
-Section:
+Section: google censorship
Keyword:
Blurb: <p><a
href="http://www.theguardian.com/media/2016/feb/03/google-pulls-ad-blocking-app-for-samsung-phones">
Google censored installation of Samsung's ad-blocker</a> on Android phones,
saying that blocking ads is “interference” with the sites that
advertise (and surveil users through ads).</p>
+
@@ -1277,8 +1295,8 @@
Id: -201512280
PubDate: 2015-12-28
-Section: back-doors spy surveillance system microsoft windows
-Keyword:
+Section: back-doors surveillance microsoft
+Keyword: windows
Blurb: <p><a
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/">
Microsoft has already backdoored its disk encryption</a>.</p>
Id: -201512140
@@ -1336,8 +1354,8 @@
Id: -201511241
PubDate: 2015-11-24
-Section:
-Keyword:
+Section: google sabotage
+Keyword: android back-doors
Blurb: <p>Google has long had <a
href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted">
a back door to remotely unlock an Android device</a>, unless its disk is
encrypted (possible since Android 5.0 Lollipop, but still not quite the
default).</p>
Id: -201511240
@@ -1382,8 +1400,8 @@
Id: -201511090
PubDate: 2015-11-09
-Section: back-doors install-delete google android
-Keyword: baidu system
+Section: back-doors install-delete
+Keyword: baidu android
Blurb: <p>Baidu's proprietary Android library, Moplus, has a back door that <a
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">
can “upload files” as well as forcibly install apps</a>.</p>
+
+ <p>It is used by 14,000 Android applications.</p>
@@ -1404,20 +1422,20 @@
Id: -201510301
PubDate: 2015-10-30
-Section:
-Keyword:
+Section: surveillance mobiles
+Keyword: android app
Blurb: <p>More than 73% of the most popular Android apps <a
href="https://techscience.org/a/2015103001/"> share personal, behavioral and
location information</a> of their users with third parties.</p>
Id: -201510300
PubDate: 2015-10-30
-Section:
-Keyword:
-Blurb: <p>Around 47% of the most popular iOS apps <a
href="https://techscience.org/a/2015103001/"> share personal, behavioral and
location information</a>{.not-a-duplicate} of their users with third
parties.</p>
+Section: surveillance mobiles
+Keyword: ios app
+Blurb: <p>Around 47% of the most popular iOS apps <a class="not-a-duplicate"
href="https://techscience.org/a/2015103001/"> share personal, behavioral and
location information</a> of their users with third parties.</p>
Id: -201510270
PubDate: 2015-10-27
Section: apple pressuring
-Keyword: siri device
+Keyword: siri
Blurb: <p>Apple Siri <a
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions">refuses
to give you information</a> about music charts if you're not an Apple Music
subscriber.</p>
Id: -201510220
@@ -1495,8 +1513,8 @@
Id: -201509210
PubDate: 2015-09-21
-Section:
-Keyword:
+Section: cars deception
+Keyword: volkswagen
Blurb: <p>Volkswagen programmed its car engine computers to detect the
Environmental Protection Agency's emission tests, and run dirty the rest of the
time.</p>
+
+ <p><a
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions">
https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions</a>.</p>
@@ -1548,7 +1566,7 @@
Id: -201508120
PubDate: 2015-08-12
-Section:
+Section: cars insecurity
Keyword:
Blurb: <p>Security researchers discovered a <a
href="http://www.theguardian.com/technology/2015/aug/12/hack-car-brakes-sms-text">
vulnerability in diagnostic dongles used for vehicle tracking and
insurance</a> that let them take remote control of a car or lorry using an
SMS.</p>
@@ -1560,8 +1578,8 @@
Id: -201507280
PubDate: 2015-07-28
-Section:
-Keyword:
+Section: google surveillance
+Keyword: chrome
Blurb: <p>Google Chrome makes it easy for an extension to do <a
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/">
total snooping on the user's browsing</a>, and many of them do so.</p>
Id: -201507240
@@ -1572,8 +1590,8 @@
Id: -201507210
PubDate: 2015-07-21
-Section:
-Keyword:
+Section: cars insecurity
+Keyword: jeep phone
Blurb: <p>Crackers were able to <a
href="http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/">
take remote control of the Jeep</a> “connected car”.+ They could
track the car, start or stop the engine, and activate or deactivate the brakes,
and more.</p>
+
+ <p>I expect that Chrysler and the NSA can do this too.</p>
@@ -1634,8 +1652,8 @@
Id: -201506180
PubDate: 2015-06-18
-Section:
-Keyword:
+Section: google surveillance
+Keyword: chrome
Blurb: <p>Google Chrome includes a module that <a
href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/">
activates microphones and transmits audio to its servers</a>.</p>
Id: -201506170
@@ -1733,16 +1751,22 @@
Keyword: intel amd
Blurb: <p>Here is a suspicion that we can't prove, but is worth thinking
about: <a
href="http://web.archive.org/web/20150206003913/http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI">
Writable microcode for Intel and AMD microprocessors</a> may be a vehicle for
the NSA to invade computers, with the help of Microsoft, say respected security
experts.</p>
-Id: -201501030
+Id: -201501031
PubDate: 2015-01-03
-Section:
-Keyword:
+Section: drm
+Keyword: google netflix
Blurb: <p>The Netflix Android app <a
href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/">
forces the use of Google DNS</a>. This is one of the methods that Netflix uses
to enforce the geolocation restrictions dictated by the movie studios.</p>
+Id: -201501030
+PubDate: 2015-01-03
+Section: google drm
+Keyword: netflix
+Blurb: <p id="netflix-app-geolocation-drm">The Netflix Android app <a
href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/">
forces the use of Google DNS</a>. This is one of the methods that Netflix uses
to enforce the geolocation restrictions dictated by the movie studios.</p>
+
Id: -201412180
PubDate: 2014-12-18
-Section: back-doors universal mobile google android
-Keyword: coolpad system
+Section: back-doors universal mobile
+Keyword: coolpad android
Blurb: <p><a
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
A Chinese version of Android has a universal back door</a>. Nearly all models
of mobile phones have a <a href="#universal-back-door"> universal back door in
the modem chip</a>. So why did Coolpad bother to introduce another? Because
this one is controlled by Coolpad.</p>
Id: -201412110
@@ -1819,7 +1843,7 @@
Id: -201410040
PubDate: 2014-10-04
Section: surveillance microsoft windows
-Keyword: system
+Keyword:
Blurb: <p>It only gets worse with time. <a
href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html">
Windows 10 requires users to give permission for total snooping</a>, including
their files, their commands, their text input, and their voice input.</p>
Id: -201409290
@@ -1838,8 +1862,8 @@
PubDate: 2014-05-08
PubDate: 2014-09-17
PubDate: 2014-09-22
-Section: back-doors spy surveillance apple
-Keyword: ios iphone system
+Section: back-doors surveillance apple
+Keyword: ios iphone
Blurb: <p>Apple can, and regularly does, <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
remotely extract some data from iPhones for the state</a>.</p>
+
+ <p>This may have improved with <a
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
iOS 8 security improvements</a>; but <a
href="https://firstlook.org/theintercept/2014/09/22/apple-data/"> not as much
as Apple claims</a>.</p>
@@ -1858,7 +1882,7 @@
Id: -201407170
PubDate: 2014-07-17
-Section: surveillance appliances
+Section: surveillance appliances google
Keyword: nest
Blurb: <p id="nest-thermometers">Nest thermometers send <a
href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a lot of data about
the user</a>.</p>
@@ -1929,9 +1953,9 @@
Id: -201403121
PubDate: 2014-03-12
-Section: back-doors alter-data mobile google android
-Keyword: samsung
-Blurb: <p><a
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">
Samsung Galaxy devices running proprietary Android versions come with a back
door</a>{#samsung} that provides remote access to the files stored on the
device.</p>
+Section: back-doors alter-data mobile
+Keyword: samsung android
+Blurb: <p id="samsung"><a
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">
Samsung Galaxy devices running proprietary Android versions come with a back
door</a> that provides remote access to the files stored on the device.</p>
Id: -201403120
PubDate: 2014-03-12
@@ -2035,7 +2059,7 @@
Id: -201311130
PubDate: 2013-11-13
-Section:
+Section: cars drm
Keyword:
Blurb: <p><a
href="https://www.eff.org/deeplinks/2013/11/drm-cars-will-drive-consumers-crazy">
DRM in Cars Will Drive Consumers Crazy</a>.</p>
@@ -2058,7 +2082,7 @@
Id: -201311120
PubDate: 2013-09-07
PubDate: 2013-11-12
-Section:
+Section: google insecurity
Keyword:
Blurb: <p><a
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
The NSA can tap data in smart phones, including iPhones, Android, and
BlackBerry</a>. While there is not much detail here, it seems that this does
not operate via the universal back door that we know nearly all portable phones
have. It may involve exploiting various bugs. There are <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
lots of bugs in the phones' radio software</a>.</p>
@@ -2136,8 +2160,8 @@
Id: -201308010
PubDate: 2013-08-01
-Section:
-Keyword:
+Section: google surveillance
+Keyword: android
Blurb: <p>Spyware in Android phones (and Windows? laptops): The Wall Street
Journal (in an article blocked from us by a paywall) reports that <a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
the FBI can remotely activate the GPS and microphone in Android phones and
laptops</a>. (I suspect this means Windows laptops.) Here is <a
href="http://cryptome.org/2013/08/fbi-hackers.htm"> more info</a>.</p>
Id: -201307280
@@ -2198,8 +2222,8 @@
Id: -201306140
PubDate: 2013-06-14
-Section:
-Keyword:
+Section: cars surveillance
+Keyword: tesla
Blurb: <p>Tesla cars allow the company to extract data remotely and determine
the car's location at any time. (See <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
Section 2, paragraphs b and c.</a>). The company says it doesn't store this
information, but if the state orders it to get the data and hand it over, the
state can store it.</p>
Id: -201306100
@@ -2224,8 +2248,8 @@
Id: -201304080
PubDate: 2013-04-08
-Section:
-Keyword:
+Section: google tyrants
+Keyword: android
Blurb: <p><a
href="http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html">
Some Android phones are tyrants</a> (though someone found a way to crack the
restriction). Fortunately, most Android devices are not tyrants.</p>
Id: -201304050
@@ -2234,10 +2258,18 @@
Keyword:
Blurb: <p><a href="http://techin.oureverydaylife.com/kindle-drm-17841.html">
The Amazon Kindle has DRM</a>. That article is flawed in that it fails to treat
DRM as an ethical question; it takes for granted that whatever Amazon might do
to its users is legitimate. It refers to DRM as digital “rights”
management, which is the spin term used to promote DRM. Nonetheless it serves
as a reference for the facts.</p>
+Id: -201303251
+PubDate: 2013-03-25
+Section: cars
+Keyword: surveillance
+Blurb: Proprietary software in cars <a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">
records information about drivers' movements</a>, which is made available to
car manufacturers, insurance companies, and others.</p>
++
++ <p>The case of toll-collection systems, mentioned in this article, is not
really a matter of proprietary surveillance. These systems are an intolerable
invasion of privacy, and should be replaced with anonymous payment systems, but
the invasion isn't done by malware. The other cases mentioned are done by
proprietary malware in the car.</p>
+
Id: -201303250
PubDate: 2013-03-25
-Section:
-Keyword:
+Section: surveillance
+Keyword: cars
Blurb: <p id="records-drivers">Proprietary software in cars <a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">
records information about drivers' movements</a>, which is made available to
car manufacturers, insurance companies, and others.</p>
+
+ <p>The case of toll-collection systems, mentioned in this article, is not
really a matter of proprietary surveillance. These systems are an intolerable
invasion of privacy, and should be replaced with anonymous payment systems, but
the invasion isn't done by malware. The other cases mentioned are done by
proprietary malware in the car.</p>
@@ -2255,7 +2287,7 @@
Id: -201301280
PubDate: 2013-01-22
PubDate: 2013-01-28
-Section:
+Section: cars insecurity
Keyword:
Blurb: <p>Oracle's nonfree Java plug-in for browsers <a
href="http://www.zdnet.com/article/a-close-look-at-how-oracle-installs-deceptive-software-with-java-updates/">
sneakily installs other annoying proprietary software</a>.</p>
+
@@ -2291,7 +2323,7 @@
Id: -201212030
PubDate: 2012-12-03
-Section: amazon swindle-spy
+Section: amazon swindle-surveillance
Keyword:
Blurb: <p>The Electronic Frontier Foundation has examined and found <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">various kinds of
surveillance in the Swindle and other e-readers</a>.</p>
@@ -2347,7 +2379,7 @@
Id: -201208210
PubDate: 2012-08-21
-Section:
+Section: google website surveillance
Keyword:
Blurb: <p>Many web sites report all their visitors to Google by using the
Google Analytics service, which <a
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
tells Google the IP address and the page that was visited.</a></p>
@@ -2410,15 +2442,15 @@
Id: -201103110
PubDate: 2011-03-11
PubDate: 2011-03-10
-Section:
+Section: cars insecurity
Keyword:
Blurb: <p><a
href="http://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/">
It is possible to take control of some car computers through malware in music
files</a>. Also <a
href="http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0"> by
radio</a>. Here is <a href="http://www.autosec.org/faq.html"> more
information</a>.</p>
Id: -201103070
PubDate: 2011-03-07
PubDate: 2010-06-25
-Section: back-doors install-delete google android
-Keyword: system
+Section: back-doors install-delete google
+Keyword: system android
Blurb: <p>In Android, <a
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">
Google has a back door to remotely delete apps.</a> (It was in a program
called GTalkService, which seems since then to have been merged into Google
Play.)</p>
+
+ <p>Google can also <a
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
forcibly and remotely install apps</a> through GTalkService. This is not
equivalent to a universal back door, but permits various dirty tricks.</p>
@@ -2427,8 +2459,8 @@
Id: -201102250
PubDate: 2011-02-25
-Section:
-Keyword:
+Section: google drm
+Keyword: android
Blurb: <p>Android <a
href="https://developer.android.com/reference/android/drm/package-summary.html">
contains facilities specifically to support DRM.</a></p>
Id: -201011220
@@ -2471,8 +2503,8 @@
Id: -200809060
PubDate: 2008-09-06
-Section:
-Keyword:
+Section: google surveillance
+Keyword: chrome keylogger
Blurb: <p>Google Chrome contains a key logger that <a
href="http://www.favbrowser.com/google-chrome-spyware-confirmed/"> sends Google
every URL typed in</a>, one key at a time.</p>
Id: -200808110
- www/server/staging/proprietary/rec propr-blurbs..., Therese Godefroy, 2018/09/15
- www/server/staging/proprietary/rec propr-blurbs...,
Therese Godefroy <=
- www/server/staging/proprietary/rec propr-blurbs..., Therese Godefroy, 2018/09/16
- www/server/staging/proprietary/rec propr-blurbs..., Therese Godefroy, 2018/09/17
- www/server/staging/proprietary/rec propr-blurbs..., Therese Godefroy, 2018/09/19
- www/server/staging/proprietary/rec propr-blurbs..., Therese Godefroy, 2018/09/23
- www/server/staging/proprietary/rec propr-blurbs..., Therese Godefroy, 2018/09/24
- www/server/staging/proprietary/rec propr-blurbs..., Therese Godefroy, 2018/09/26
- www/server/staging/proprietary/rec propr-blurbs..., Therese Godefroy, 2018/09/26
- www/server/staging/proprietary/rec propr-blurbs..., Therese Godefroy, 2018/09/26
- www/server/staging/proprietary/rec propr-blurbs..., Therese Godefroy, 2018/09/27
- www/server/staging/proprietary/rec propr-blurbs..., Therese Godefroy, 2018/09/30