www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/server/staging/proprietary/rec propr-blurbs...


From: Therese Godefroy
Subject: www/server/staging/proprietary/rec propr-blurbs...
Date: Sun, 16 Sep 2018 06:16:45 -0400 (EDT)

CVSROOT:        /webcvs/www
Module name:    www
Changes by:     Therese Godefroy <th_g> 18/09/16 06:16:45

Modified files:
        server/staging/proprietary/rec: propr-blurbs.rec 

Log message:
        Tag malware-cars and malware-google; various fixes.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/propr-blurbs.rec?cvsroot=www&r1=1.2&r2=1.3

Patches:
Index: propr-blurbs.rec
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/rec/propr-blurbs.rec,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- propr-blurbs.rec    15 Sep 2018 23:03:15 -0000      1.2
+++ propr-blurbs.rec    16 Sep 2018 10:16:45 -0000      1.3
@@ -21,7 +21,7 @@
 
 Id: -201808120
 PubDate: 2018-08-12
-Section: amazon insecurity echo-spy
+Section: amazon insecurity echo-surveillance
 Keyword:
 Blurb: <p>Crackers found a way to break the security of an Amazon device, and 
<a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html";> turn it into 
a listening device</a> for them.</p>
 + 
@@ -31,8 +31,8 @@
 
 Id: -201808030
 PubDate: 2018-08-03
-Section:
-Keyword:
+Section: google surveillance
+Keyword: android
 Blurb: <p>Some Google apps on Android <a 
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile";>
 record the user's location even when users disable &ldquo;location 
tracking&rdquo;</a>.</p>
 + 
 +  <p>There are other ways to turn off the other kinds of location tracking, 
but most users will be tricked by the misleading control.</p>
@@ -222,8 +222,8 @@
 
 Id: -201711240
 PubDate: 2017-11-24
-Section:
-Keyword:
+Section: google surveillance
+Keyword: android
 Blurb: <p>Tracking software in popular Android apps is pervasive and sometimes 
very clever. Some trackers can <a 
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/";>
 follow a user's movements around a physical store by noticing WiFi 
networks</a>.</p>
 
 Id: -201711230
@@ -234,8 +234,8 @@
 
 Id: -201711210
 PubDate: 2017-11-21
-Section:
-Keyword:
+Section: google surveillance
+Keyword: android
 Blurb: <p>Android tracks location for Google <a 
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml";>
 even when &ldquo;location services&rdquo; are turned off, even when the phone 
has no SIM card</a>.</p>
 
 Id: -201711201
@@ -332,7 +332,7 @@
 
 Id: -201709290
 PubDate: 2017-09-29
-Section:
+Section: cars insecurity
 Keyword:
 Blurb: <p>Bad security in some cars makes it possible to <a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937";> remotely 
activate the airbags</a>.</p>
 
@@ -350,18 +350,26 @@
 + 
 +  <p>Note that this article misuses the term <a 
href="/philosophy/words-to-avoid.html#Hacker"> &ldquo;hackers&rdquo;</a> 
referring to crackers.</p>
 
-Id: -201709090
+Id: -201709092
+PubDate: 2017-09-09
+Section: cars
+Keyword: tesla back-doors universal sabotage
+Blurb: <p>Tesla used a universal back door in its software to limit customers 
to using just <a 
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/";>
 part of the battery of some cars</a>.</p>
++
++  <p>While remotely allowing car &ldquo;owners&rdquo; to use the whole 
battery capacity did not do them any harm, the same back door would permit 
Tesla (perhaps under the command of some government) to remotely order the car 
to use none of its battery. Or perhaps to drive its passenger to a torture 
prison.</p>
+
+Id: -201709091
 PubDate: 2017-09-09
-Section: back-doors universal cars
-Keyword: tesla vehicle
+Section: back-doors universal
+Keyword: tesla cars sabotage
 Blurb: <p>Tesla cars have a <a 
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/";>
 universal back door</a>.</p>
 + 
 +  <p>While remotely allowing car &ldquo;owners&rdquo; to use the whole 
battery capacity did not do them any harm, the same back door would permit 
Tesla (perhaps under the command of some government) to remotely order the car 
to use none of its battery. Or perhaps to drive its passenger to a torture 
prison.</p>
 
 Id: -201709090
 PubDate: 2017-09-09
-Section:
-Keyword:
+Section: sabotage
+Keyword: tesla cars back-doors universal sabotage
 Blurb: <p>Tesla used software to limit customers to using just <a 
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/";>
 part of the battery of some cars</a>.</p>
 
 Id: -201708280
@@ -449,7 +457,7 @@
 
 Id: -201706070
 PubDate: 2017-06-07
-Section: back-doors spy surveillance appliances road camera
+Section: back-doors surveillance appliances road camera
 Keyword:
 Blurb: <p id="InternetCameraBackDoor">Many models of Internet-connected 
cameras contain a glaring back door&mdash;they have login accounts with 
hard-coded passwords, which can't be changed, and <a 
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/";>
 there is no way to delete these accounts either</a>.</p>
 + 
@@ -505,8 +513,8 @@
 Id: -201705150
 PubDate: 2017-05-13
 PubDate: 2017-05-15
-Section:
-Keyword:
+Section: google drm
+Keyword: android netflix
 Blurb: <p>Google now allows Android apps to detect whether a device has been 
rooted, <a 
href="http://www.androidpolice.com/2017/05/13/netflix-confirms-blocking-rootedunlocked-devices-app-still-working-now/";>
 and refuse to install if so</a>. The Netflix app uses this ability to enforce 
DRM by refusing to install on rooted Android devices.</p>
 + 
 +  <p>UpPubDate: Google <em>intentionally</em> changed Android so that apps <a 
href="https://torrentfreak.com/netflix-use-of-google-drm-means-rooted-android-devices-are-banned-170515/";>
 can detect rooted devices and refuse to run on them</a>. The Netflix app is 
proprietary malware, and one shouldn't use it. However, that does not make what 
Google has done any less wrong.</p>
@@ -603,7 +611,7 @@
 
 Id: -201703160
 PubDate: 2017-03-16
-Section:
+Section: google censorship
 Keyword:
 Blurb: <p>Google <a 
href="http://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts";>
 offers censorship software</a>, ostensibly for parents to put into their 
children's computers.</p>
 
@@ -680,8 +688,8 @@
 
 Id: -201701300
 PubDate: 2017-01-30
-Section:
-Keyword:
+Section: google drm
+Keyword: chrome chromium
 Blurb: <p>Chrome <a 
href="http://boingboing.net/2017/01/30/google-quietly-makes-optiona.html";> 
implements DRM</a>. So does Chromium, through nonfree software that is 
effectively part of it.</p>
 + 
 +  <p><a href="https://bugs.chromium.org/p/chromium/issues/detail?id=686430";> 
More information</a>.</p>
@@ -701,15 +709,15 @@
 Id: -201701180
 PubDate: 2015-05
 PubDate: 2017-01-18
-Section:
-Keyword:
+Section: google censorship
+Keyword: chrome
 Blurb: <p>On Windows and MacOS, Chrome <a 
href="https://sites.google.com/a/chromium.org/dev/developers/extensions-deployment-faq";>
 disables extensions</a> that are not hosted in the Chrome Web Store.</p>
 + 
 +  <p>For example, an extension was <a 
href="https://consumerist.com/2017/01/18/why-is-google-blocking-this-ad-blocker-on-chrome/";>
 banned from the Chrome Web Store, and permanently disabled</a> on more than 
40,000 computers.</p>
 
 Id: -201701131
 PubDate: 2017-01-13
-Section: back-doors spy surveillance mobile
+Section: back-doors surveillance mobile
 Keyword: app whatsapp
 Blurb: <p>WhatsApp <a 
href="https://www.theguardian.com/technology/2017/jan/13/whatsapp-backdoor-allows-snooping-on-encrypted-messages";>
 has a back door that the company can use to read the plaintext of 
messages</a>.</p>
 + 
@@ -857,8 +865,8 @@
 
 Id: -201611060
 PubDate: 2016-11-06
-Section:
-Keyword:
+Section: cars deception
+Keyword: audi
 Blurb: <p><a 
href="http://jalopnik.com/america-figured-out-a-new-way-audi-cheated-on-emissions-1788630969";>
 Audi's proprietary software used a simple method to cheat on emissions 
tests</a>: to activate a special low-emission gearshifting mode until the first 
time the car made a turn.</p>
 
 Id: -201610230
@@ -882,8 +890,8 @@
 
 Id: -201609210
 PubDate: 2016-09-21
-Section:
-Keyword:
+Section: google surveillance
+Keyword: app
 Blurb: <p>Google's new voice messaging app <a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google";>
 logs all conversations</a>.</p>
 
 Id: -201609200
@@ -978,7 +986,7 @@
 
 Id: -201607160
 PubDate: 2016-07-16
-Section:
+Section: cars surveillance
 Keyword:
 Blurb: <p>Computerized cars with nonfree software are <a 
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html";>
 snooping devices</a>.</p>
 
@@ -1081,8 +1089,8 @@
 
 Id: -201605150
 PubDate: 2016-05-15
-Section:
-Keyword:
+Section: google sabotage
+Keyword: revolv
 Blurb: <p>Revolv is an IoT device which managed &ldquo;smart home&rdquo; 
operations: switching the lights, operate motion sensors, regulating 
temperature, etc. On May 15th, 2016, Google said it would shut down the service 
linked to the device, making it unusable.</p>
 + 
 +  <p>Although you may own the device, its functioning depended on the server 
that never belonged to you. So you never really had control of it. This unjust 
design is called <a 
href="/philosophy/network-services-arent-free-or-nonfree.html"> Service as a 
Software Substitute (SaaSS)</a>. That is what gave the company the power to 
convert it into a \$300 out-of-warranty brick, for your &ldquo;dumb 
home&rdquo;.</p>
@@ -1176,16 +1184,26 @@
 + 
 +  <p>The article says this is a back door, but that could be a 
misunderstanding. However, it is certainly surveillance, at least.</p>
 
-Id: -201602240
+Id: -201602241
 PubDate: 2016-02-24
-Section:
-Keyword:
+Section: surveillance
+Keyword: cars insecurity back-doors phone
 Blurb: <p id="nissan-modem">The Nissan Leaf has a built-in cell phone modem 
which allows effectively anyone <a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/";> to 
access its computers remotely and make changes in various settings</a>.</p>
 + 
 +  <p>That's easy to do because the system has no authentication when accessed 
through the modem. However, even if it asked for authentication, you couldn't 
be confident that Nissan has no access. The software in the car is proprietary, 
<a href="/philosophy/free-software-even-more-important.html"> which means it 
demands blind faith from its users</a>.</p>
 + 
 +  <p>Even if no one connects to the car remotely, the cell phone modem 
enables the phone company to track the car's movements all the time; it is 
possible to physically remove the cell phone modem though.</p>
 
+Id: -201602240
+PubDate: 2016-02-24
+Section: cars insecurity
+Keyword: back-doors phone surveillance
+Blurb: <p>The Nissan Leaf has a built-in cell phone modem which allows 
effectively anyone <a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/";> to 
access its computers remotely and make changes in various settings</a>.</p>
++ 
++  <p>That's easy to do because the system has no authentication when accessed 
through the modem. However, even if it asked for authentication, you couldn't 
be confident that Nissan has no access. The software in the car is proprietary, 
<a href="/philosophy/free-software-even-more-important.html"> which means it 
demands blind faith from its users</a>.</p>
++ 
++  <p>Even if no one connects to the car remotely, the cell phone modem 
enables the phone company to track the car's movements all the time; it is 
possible to physically remove the cell phone modem though.</p>
+
 Id: -201602050
 PubDate: 2016-02-05
 Section: apple sabotage ithing
@@ -1194,7 +1212,7 @@
 
 Id: -201602030
 PubDate: 2016-02-03
-Section:
+Section: google censorship
 Keyword:
 Blurb: <p><a 
href="http://www.theguardian.com/media/2016/feb/03/google-pulls-ad-blocking-app-for-samsung-phones";>
 Google censored installation of Samsung's ad-blocker</a> on Android phones, 
saying that blocking ads is &ldquo;interference&rdquo; with the sites that 
advertise (and surveil users through ads).</p>
 + 
@@ -1277,8 +1295,8 @@
 
 Id: -201512280
 PubDate: 2015-12-28
-Section: back-doors spy surveillance system microsoft windows
-Keyword:
+Section: back-doors surveillance microsoft
+Keyword: windows
 Blurb: <p><a 
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/";>
 Microsoft has already backdoored its disk encryption</a>.</p>
 
 Id: -201512140
@@ -1336,8 +1354,8 @@
 
 Id: -201511241
 PubDate: 2015-11-24
-Section:
-Keyword:
+Section: google sabotage
+Keyword: android back-doors
 Blurb: <p>Google has long had <a 
href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted";>
 a back door to remotely unlock an Android device</a>, unless its disk is 
encrypted (possible since Android 5.0 Lollipop, but still not quite the 
default).</p>
 
 Id: -201511240
@@ -1382,8 +1400,8 @@
 
 Id: -201511090
 PubDate: 2015-11-09
-Section: back-doors install-delete google android
-Keyword: baidu system
+Section: back-doors install-delete
+Keyword: baidu android
 Blurb: <p>Baidu's proprietary Android library, Moplus, has a back door that <a 
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made";>
 can &ldquo;upload files&rdquo; as well as forcibly install apps</a>.</p>
 + 
 +  <p>It is used by 14,000 Android applications.</p>
@@ -1404,20 +1422,20 @@
 
 Id: -201510301
 PubDate: 2015-10-30
-Section:
-Keyword:
+Section: surveillance mobiles
+Keyword: android app
 Blurb: <p>More than 73% of the most popular Android apps <a 
href="https://techscience.org/a/2015103001/";> share personal, behavioral and 
location information</a> of their users with third parties.</p>
 
 Id: -201510300
 PubDate: 2015-10-30
-Section:
-Keyword:
-Blurb: <p>Around 47% of the most popular iOS apps <a 
href="https://techscience.org/a/2015103001/";> share personal, behavioral and 
location information</a>{.not-a-duplicate} of their users with third 
parties.</p>
+Section: surveillance mobiles
+Keyword: ios app
+Blurb: <p>Around 47% of the most popular iOS apps <a  class="not-a-duplicate" 
href="https://techscience.org/a/2015103001/";> share personal, behavioral and 
location information</a> of their users with third parties.</p>
 
 Id: -201510270
 PubDate: 2015-10-27
 Section: apple pressuring
-Keyword: siri device
+Keyword: siri
 Blurb: <p>Apple Siri <a 
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions";>refuses
 to give you information</a> about music charts if you're not an Apple Music 
subscriber.</p>
 
 Id: -201510220
@@ -1495,8 +1513,8 @@
 
 Id: -201509210
 PubDate: 2015-09-21
-Section:
-Keyword:
+Section: cars deception
+Keyword: volkswagen
 Blurb: <p>Volkswagen programmed its car engine computers to detect the 
Environmental Protection Agency's emission tests, and run dirty the rest of the 
time.</p>
 + 
 +  <p><a 
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions";> 
https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions</a>.</p>
@@ -1548,7 +1566,7 @@
 
 Id: -201508120
 PubDate: 2015-08-12
-Section:
+Section: cars insecurity
 Keyword:
 Blurb: <p>Security researchers discovered a <a 
href="http://www.theguardian.com/technology/2015/aug/12/hack-car-brakes-sms-text";>
 vulnerability in diagnostic dongles used for vehicle tracking and 
insurance</a> that let them take remote control of a car or lorry using an 
SMS.</p>
 
@@ -1560,8 +1578,8 @@
 
 Id: -201507280
 PubDate: 2015-07-28
-Section:
-Keyword:
+Section: google surveillance
+Keyword: chrome
 Blurb: <p>Google Chrome makes it easy for an extension to do <a 
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/";>
 total snooping on the user's browsing</a>, and many of them do so.</p>
 
 Id: -201507240
@@ -1572,8 +1590,8 @@
 
 Id: -201507210
 PubDate: 2015-07-21
-Section:
-Keyword:
+Section: cars insecurity
+Keyword: jeep phone
 Blurb: <p>Crackers were able to <a 
href="http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/";>
 take remote control of the Jeep</a> &ldquo;connected car&rdquo;.+ They could 
track the car, start or stop the engine, and activate or deactivate the brakes, 
and more.</p>
 + 
 +  <p>I expect that Chrysler and the NSA can do this too.</p>
@@ -1634,8 +1652,8 @@
 
 Id: -201506180
 PubDate: 2015-06-18
-Section:
-Keyword:
+Section: google surveillance
+Keyword: chrome
 Blurb: <p>Google Chrome includes a module that <a 
href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/";>
 activates microphones and transmits audio to its servers</a>.</p>
 
 Id: -201506170
@@ -1733,16 +1751,22 @@
 Keyword: intel amd
 Blurb: <p>Here is a suspicion that we can't prove, but is worth thinking 
about: <a 
href="http://web.archive.org/web/20150206003913/http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI";>
 Writable microcode for Intel and AMD microprocessors</a> may be a vehicle for 
the NSA to invade computers, with the help of Microsoft, say respected security 
experts.</p>
 
-Id: -201501030
+Id: -201501031
 PubDate: 2015-01-03
-Section:
-Keyword:
+Section: drm
+Keyword: google netflix
 Blurb: <p>The Netflix Android app <a 
href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/";>
 forces the use of Google DNS</a>. This is one of the methods that Netflix uses 
to enforce the geolocation restrictions dictated by the movie studios.</p>
 
+Id: -201501030
+PubDate: 2015-01-03
+Section: google drm
+Keyword: netflix
+Blurb: <p id="netflix-app-geolocation-drm">The Netflix Android app <a 
href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/";>
 forces the use of Google DNS</a>. This is one of the methods that Netflix uses 
to enforce the geolocation restrictions dictated by the movie studios.</p>
+
 Id: -201412180
 PubDate: 2014-12-18
-Section: back-doors universal mobile google android
-Keyword: coolpad system
+Section: back-doors universal mobile
+Keyword: coolpad android
 Blurb: <p><a 
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor";>
 A Chinese version of Android has a universal back door</a>. Nearly all models 
of mobile phones have a <a href="#universal-back-door"> universal back door in 
the modem chip</a>. So why did Coolpad bother to introduce another? Because 
this one is controlled by Coolpad.</p>
 
 Id: -201412110
@@ -1819,7 +1843,7 @@
 Id: -201410040
 PubDate: 2014-10-04
 Section: surveillance microsoft windows
-Keyword: system
+Keyword:
 Blurb: <p>It only gets worse with time. <a 
href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html";>
 Windows 10 requires users to give permission for total snooping</a>, including 
their files, their commands, their text input, and their voice input.</p>
 
 Id: -201409290
@@ -1838,8 +1862,8 @@
 PubDate: 2014-05-08
 PubDate: 2014-09-17
 PubDate: 2014-09-22
-Section: back-doors spy surveillance apple
-Keyword: ios iphone system
+Section: back-doors surveillance apple
+Keyword: ios iphone
 Blurb: <p>Apple can, and regularly does, <a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/";>
 remotely extract some data from iPhones for the state</a>.</p>
 + 
 +  <p>This may have improved with <a 
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html";>
 iOS 8 security improvements</a>; but <a 
href="https://firstlook.org/theintercept/2014/09/22/apple-data/";> not as much 
as Apple claims</a>.</p>
@@ -1858,7 +1882,7 @@
 
 Id: -201407170
 PubDate: 2014-07-17
-Section: surveillance appliances
+Section: surveillance appliances google
 Keyword: nest
 Blurb: <p id="nest-thermometers">Nest thermometers send <a 
href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack";>a lot of data about 
the user</a>.</p>
 
@@ -1929,9 +1953,9 @@
 
 Id: -201403121
 PubDate: 2014-03-12
-Section: back-doors alter-data mobile google android
-Keyword: samsung
-Blurb: <p><a 
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor";>
 Samsung Galaxy devices running proprietary Android versions come with a back 
door</a>{#samsung} that provides remote access to the files stored on the 
device.</p>
+Section: back-doors alter-data mobile
+Keyword: samsung android
+Blurb: <p id="samsung"><a 
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor";>
 Samsung Galaxy devices running proprietary Android versions come with a back 
door</a> that provides remote access to the files stored on the device.</p>
 
 Id: -201403120
 PubDate: 2014-03-12
@@ -2035,7 +2059,7 @@
 
 Id: -201311130
 PubDate: 2013-11-13
-Section:
+Section: cars drm
 Keyword:
 Blurb: <p><a 
href="https://www.eff.org/deeplinks/2013/11/drm-cars-will-drive-consumers-crazy";>
 DRM in Cars Will Drive Consumers Crazy</a>.</p>
 
@@ -2058,7 +2082,7 @@
 Id: -201311120
 PubDate: 2013-09-07
 PubDate: 2013-11-12
-Section:
+Section: google insecurity
 Keyword:
 Blurb: <p><a 
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html";>
 The NSA can tap data in smart phones, including iPhones, Android, and 
BlackBerry</a>. While there is not much detail here, it seems that this does 
not operate via the universal back door that we know nearly all portable phones 
have. It may involve exploiting various bugs. There are <a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone";>
 lots of bugs in the phones' radio software</a>.</p>
 
@@ -2136,8 +2160,8 @@
 
 Id: -201308010
 PubDate: 2013-08-01
-Section:
-Keyword:
+Section: google surveillance
+Keyword: android
 Blurb: <p>Spyware in Android phones (and Windows? laptops): The Wall Street 
Journal (in an article blocked from us by a paywall) reports that <a 
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj";>
 the FBI can remotely activate the GPS and microphone in Android phones and 
laptops</a>. (I suspect this means Windows laptops.) Here is <a 
href="http://cryptome.org/2013/08/fbi-hackers.htm";> more info</a>.</p>
 
 Id: -201307280
@@ -2198,8 +2222,8 @@
 
 Id: -201306140
 PubDate: 2013-06-14
-Section:
-Keyword:
+Section: cars surveillance
+Keyword: tesla
 Blurb: <p>Tesla cars allow the company to extract data remotely and determine 
the car's location at any time. (See <a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf";>
 Section 2, paragraphs b and c.</a>). The company says it doesn't store this 
information, but if the state orders it to get the data and hand it over, the 
state can store it.</p>
 
 Id: -201306100
@@ -2224,8 +2248,8 @@
 
 Id: -201304080
 PubDate: 2013-04-08
-Section:
-Keyword:
+Section: google tyrants
+Keyword: android
 Blurb: <p><a 
href="http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html";>
 Some Android phones are tyrants</a> (though someone found a way to crack the 
restriction). Fortunately, most Android devices are not tyrants.</p>
 
 Id: -201304050
@@ -2234,10 +2258,18 @@
 Keyword:
 Blurb: <p><a href="http://techin.oureverydaylife.com/kindle-drm-17841.html";> 
The Amazon Kindle has DRM</a>. That article is flawed in that it fails to treat 
DRM as an ethical question; it takes for granted that whatever Amazon might do 
to its users is legitimate. It refers to DRM as digital &ldquo;rights&rdquo; 
management, which is the spin term used to promote DRM. Nonetheless it serves 
as a reference for the facts.</p>
 
+Id: -201303251
+PubDate: 2013-03-25
+Section: cars
+Keyword: surveillance
+Blurb: Proprietary software in cars <a 
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/";>
 records information about drivers' movements</a>, which is made available to 
car manufacturers, insurance companies, and others.</p>
++ 
++  <p>The case of toll-collection systems, mentioned in this article, is not 
really a matter of proprietary surveillance. These systems are an intolerable 
invasion of privacy, and should be replaced with anonymous payment systems, but 
the invasion isn't done by malware. The other cases mentioned are done by 
proprietary malware in the car.</p>
+
 Id: -201303250
 PubDate: 2013-03-25
-Section:
-Keyword:
+Section: surveillance
+Keyword: cars
 Blurb: <p id="records-drivers">Proprietary software in cars <a 
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/";>
 records information about drivers' movements</a>, which is made available to 
car manufacturers, insurance companies, and others.</p>
 + 
 +  <p>The case of toll-collection systems, mentioned in this article, is not 
really a matter of proprietary surveillance. These systems are an intolerable 
invasion of privacy, and should be replaced with anonymous payment systems, but 
the invasion isn't done by malware. The other cases mentioned are done by 
proprietary malware in the car.</p>
@@ -2255,7 +2287,7 @@
 Id: -201301280
 PubDate: 2013-01-22
 PubDate: 2013-01-28
-Section:
+Section: cars insecurity
 Keyword:
 Blurb: <p>Oracle's nonfree Java plug-in for browsers <a 
href="http://www.zdnet.com/article/a-close-look-at-how-oracle-installs-deceptive-software-with-java-updates/";>
 sneakily installs other annoying proprietary software</a>.</p>
 + 
@@ -2291,7 +2323,7 @@
 
 Id: -201212030
 PubDate: 2012-12-03
-Section: amazon swindle-spy
+Section: amazon swindle-surveillance
 Keyword:
 Blurb: <p>The Electronic Frontier Foundation has examined and found <a 
href="https://www.eff.org/pages/reader-privacy-chart-2012";>various kinds of 
surveillance in the Swindle and other e-readers</a>.</p>
 
@@ -2347,7 +2379,7 @@
 
 Id: -201208210
 PubDate: 2012-08-21
-Section:
+Section: google website surveillance
 Keyword:
 Blurb: <p>Many web sites report all their visitors to Google by using the 
Google Analytics service, which <a 
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/";>
 tells Google the IP address and the page that was visited.</a></p>
 
@@ -2410,15 +2442,15 @@
 Id: -201103110
 PubDate: 2011-03-11
 PubDate: 2011-03-10
-Section:
+Section: cars insecurity
 Keyword:
 Blurb: <p><a 
href="http://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/";>
 It is possible to take control of some car computers through malware in music 
files</a>. Also <a 
href="http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0";> by 
radio</a>. Here is <a href="http://www.autosec.org/faq.html";> more 
information</a>.</p>
 
 Id: -201103070
 PubDate: 2011-03-07
 PubDate: 2010-06-25
-Section: back-doors install-delete google android
-Keyword: system
+Section: back-doors install-delete google
+Keyword: system android
 Blurb: <p>In Android, <a 
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html";>
 Google has a back door to remotely delete apps.</a> (It was in a program 
called GTalkService, which seems since then to have been merged into Google 
Play.)</p>
 + 
 +  <p>Google can also <a 
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/";>
 forcibly and remotely install apps</a> through GTalkService.  This is not 
equivalent to a universal back door, but permits various dirty tricks.</p>
@@ -2427,8 +2459,8 @@
 
 Id: -201102250
 PubDate: 2011-02-25
-Section:
-Keyword:
+Section: google drm
+Keyword: android
 Blurb: <p>Android <a 
href="https://developer.android.com/reference/android/drm/package-summary.html";>
 contains facilities specifically to support DRM.</a></p>
 
 Id: -201011220
@@ -2471,8 +2503,8 @@
 
 Id: -200809060
 PubDate: 2008-09-06
-Section:
-Keyword:
+Section: google surveillance
+Keyword: chrome keylogger
 Blurb: <p>Google Chrome contains a key logger that <a 
href="http://www.favbrowser.com/google-chrome-spyware-confirmed/";> sends Google 
every URL typed in</a>, one key at a time.</p>
 
 Id: -200808110



reply via email to

[Prev in Thread] Current Thread [Next in Thread]