www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-amazon.html


From: Therese Godefroy
Subject: www/proprietary malware-amazon.html
Date: Thu, 27 Sep 2018 07:59:45 -0400 (EDT)

CVSROOT:        /webcvs/www
Module name:    www
Changes by:     Therese Godefroy <th_g> 18/09/27 07:59:45

Modified files:
        proprietary    : malware-amazon.html 

Log message:
        Regenerate from recfile.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-amazon.html?cvsroot=www&r1=1.8&r2=1.9

Patches:
Index: malware-amazon.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-amazon.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- malware-amazon.html 20 Sep 2018 06:43:31 -0000      1.8
+++ malware-amazon.html 27 Sep 2018 11:59:44 -0000      1.9
@@ -1,5 +1,10 @@
 <!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.86 -->
+<!-- Parent-Version: 1.84 -->
+<!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ Generated from propr-blurbs.rec. Please do not edit this file manually !
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
 <title>Amazon's Software Is Malware
 - GNU Project - Free Software Foundation</title>
  <!--#include virtual="/proprietary/po/malware-amazon.translist" -->
@@ -47,7 +52,7 @@
   </ul>
 </div>
 
-<h3 id="swindle">Malware in the Kindle Swindle</h3>
+<h2 id="swindle">Malware in the Kindle Swindle</h2>
 
 <p>We refer to this product as the
 <a href="/philosophy/why-call-it-the-swindle.html">Amazon Swindle</a>
@@ -55,81 +60,101 @@
 management (DRM)</a>  and <a href="/philosophy/ebooks.html">
 other malicious functionalities</a>.</p>
 
-<h4 id="back-doors">Amazon Kindle Swindle Back Doors</h4>
-<ul>
-  <li>
-    <p>The Amazon Kindle-Swindle has a back door that has been used to
-      <a 
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/";>
-       remotely erase books</a>.  One of the books erased was 1984, by George 
Orwell.
-    </p>
-
-    <p>Amazon responded to criticism by saying it would delete books only
-      following orders from the state.  However, that policy didn't last.
-      In 2012
-      it <a 
href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html";>wiped
-       a user's Kindle-Swindle and deleted her account</a>, then offered her
-      kafkaesque &ldquo;explanations.&rdquo;</p>
-  </li>
-  
-  <li>
-    <p>The Kindle also has a
-      <a 
href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090";>
-       universal back door</a>.</p>
+<h3 id="back-doors">Amazon Kindle Swindle Back Doors</h3>
+
+<ul class="blurbs">
+  <li id="M201503210">
+    <p>Amazon <a
+    
href="https://www.techdirt.com/articles/20150321/13350230396/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices.shtml";>
+    downgraded the software in users' Swindles</a> so that those already
+    rooted would cease to function at all.</p>
+  </li>
     
-    <p>Amazon <a 
href="https://www.techdirt.com/articles/20150321/13350230396/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices.shtml";>
-       downgraded the software in users' Swindles</a>
-      so that those already rooted would cease to function at all.</p></li>
+  <li id="M201210221">
+    <p>The Amazon Kindle-Swindle has a back door that has been used to <a
+    
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/";>
+    remotely erase books</a>.  One of the books erased was
+    <cite>1984</cite>, by George Orwell.</p>
+
+    <p>Amazon responded to criticism by saying it
+    would delete books only following orders from the
+    state.  However, that policy didn't last.  In 2012 it <a
+    
href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html";>
+    wiped a user's Kindle-Swindle and deleted her account</a>, then
+    offered her kafkaesque &ldquo;explanations.&rdquo;</p>
+  </li>
+
+  <li id="M200700000">
+    <p>The Kindle also has a <a
+    
href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090";>
+    universal back door</a>.</p>
+  </li>
 </ul>
 
-<h4 id="surveillance">Amazon Kindle Swindle Surveillance</h4>
-<ul>
-  <li><p>The Electronic Frontier Foundation has examined and found <a
-  href="https://www.eff.org/pages/reader-privacy-chart-2012";>various kinds of
-       surveillance in the Swindle and other e-readers</a>.</p></li>
+
+<h3 id="surveillance">Amazon Kindle Swindle Surveillance</h3>
+
+<ul class="blurbs">
+  <li id="M201212031">
+    <p>The Electronic Frontier Foundation has examined and found <a
+    href="https://www.eff.org/pages/reader-privacy-chart-2012";>various
+    kinds of surveillance in the Swindle and other e-readers</a>.</p>
+  </li>
 </ul>
 
-<h4 id="drm">Amazon Kindle Swindle DRM</h4>
-<ul>
-  <li><p><a href="http://techin.oureverydaylife.com/kindle-drm-17841.html";>
+
+<h3 id="drm">Amazon Kindle Swindle DRM</h3>
+
+<ul class="blurbs">
+  <li id="M201304050">
+    <p><a href="http://techin.oureverydaylife.com/kindle-drm-17841.html";>
        The Amazon Kindle has DRM</a>. That article is flawed in that it
       fails to treat DRM as an ethical question; it takes for granted that
-      whatever Amazon might do to its users is legitimate. It refers to DRM
-      as digital &ldquo;rights&rdquo; management, which is the spin term
-      used to promote DRM. Nonetheless it serves as a reference for the
-      facts.</p></li>
+    whatever Amazon might do to its users is legitimate.  It refers to
+    DRM as digital &ldquo;rights&rdquo; management, which is the spin
+    term used to promote DRM.  Nonetheless it serves as a reference for
+    the facts.</p>
+  </li>
 </ul>
 
-<h3 id="echo">Malware in the Echo</h3>
 
-<h4 id="echo-back-doors">Amazon Echo Back Doors</h4>
-<ul>
-    <li><p>The Amazon Echo appears to have a universal back door, since
-      <a href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates";>
+<h2 id="echo">Malware in the Echo</h2>
+
+<h3>Amazon Echo Back Doors</h3>
+
+<ul class="blurbs">
+  <li id="M201606060">
+    <p>The Amazon Echo appears to have a universal back door, since <a
+    href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates";>
       it installs &ldquo;updates&rdquo; automatically</a>.</p>
-    <p>We have found nothing explicitly documenting the lack of any way to
-      disable remote changes to the software, so we are not completely sure
-      there isn't one, but it seems pretty clear.</p>
+
+    <p>We have found nothing explicitly documenting the lack of any way
+    to disable remote changes to the software, so we are not completely
+    sure there isn't one, but this seems pretty clear.</p>
   </li>
 </ul>
 
-<h4 id="echo-surveillance">Amazon Echo Surveillance</h4>
-<ul>
-  <li><p>Crackers found a way to break the security of an Amazon device,
-      and <a
-      href="https://boingboing.net/2018/08/12/alexa-bob-carol.html";>
+
+<h3>Amazon Echo Surveillance</h3>
+
+<ul class="blurbs">
+  <li id="M201808120">
+    <p>Crackers found a way to break the security of an Amazon device,
+    and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html";>
       turn it into a listening device</a> for them.</p>
+
     <p>It was very difficult for them to do this. The job would be much
-      easier for Amazon. And if some government such as China or the
-      US told Amazon to do this, or cease to sell the product in that
-      country, do you think Amazon would have the moral fiber to say
-      no?</p>
+    easier for Amazon. And if some government such as China or the US
+    told Amazon to do this, or cease to sell the product in that country,
+    do you think Amazon would have the moral fiber to say no?</p>
+
     <p>These crackers are probably hackers too, but please <a
-      href="https://stallman.org/articles/on-hacking.html";>
-      don't use &ldquo;hacking&rdquo; to mean &ldquo;breaking
-      security&rdquo;</a>.</p>
+    href="https://stallman.org/articles/on-hacking.html";> don't use
+    &ldquo;hacking&rdquo; to mean &ldquo;breaking security&rdquo;</a>.</p>
   </li>
 </ul>
 
+
 </div><!-- for id="content", starts in the include above -->
 <!--#include virtual="/server/footer.html" -->
 <div id="footer">
@@ -187,7 +212,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/09/20 06:43:31 $
+$Date: 2018/09/27 11:59:44 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]