www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/server/staging/proprietary/rec google-stub....


From: Therese Godefroy
Subject: www/server/staging/proprietary/rec google-stub....
Date: Fri, 28 Sep 2018 17:20:10 -0400 (EDT)

CVSROOT:        /webcvs/www
Module name:    www
Changes by:     Therese Godefroy <th_g> 18/09/28 17:20:10

Modified files:
        server/staging/proprietary/rec: google-stub.html 
                                        propr-blurbs.rec 

Log message:
        Adjust keywords to avoid duplicates, minor fixes.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/google-stub.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/propr-blurbs.rec?cvsroot=www&r1=1.15&r2=1.16

Patches:
Index: google-stub.html
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/rec/google-stub.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- google-stub.html    23 Sep 2018 21:03:09 -0000      1.5
+++ google-stub.html    28 Sep 2018 21:20:09 -0000      1.6
@@ -75,7 +75,7 @@
   they do not count as malware. We mention them to refute the
   supposition that prestigious proprietary software doesn't have grave
   bugs.</p>
-<!-- INSERT insecurity.list -->
+<!-- INSERT google-insecurity.list -->
 
 <h3 id="sabotage">Google Sabotage</h3>
 
@@ -86,7 +86,7 @@
 <!-- INSERT sabotage.list -->
 
 <h3 id="surveillance">Google Surveillance</h3>
-<!-- INSERT surveillance.list -->
+<!-- INSERT google-surveillance.list -->
 
 <h3 id="tyrants">Google Tyrants</h3>
 <!-- INSERT tyrants.list -->
@@ -148,7 +148,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/09/23 21:03:09 $
+$Date: 2018/09/28 21:20:09 $
 <!-- timestamp end -->
 </p>
 </div>

Index: propr-blurbs.rec
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/rec/propr-blurbs.rec,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- propr-blurbs.rec    27 Sep 2018 15:12:00 -0000      1.15
+++ propr-blurbs.rec    28 Sep 2018 21:20:09 -0000      1.16
@@ -11,7 +11,7 @@
 SectionKeys: swindle-backdoor swindle-surveillance swindle-drm echo-backdoor 
echo-surveillance
 
 File: malware-google.html
-SectionKeys: backdoor censorship DRM insecurity sabotage surveillance tyrants
+SectionKeys: backdoor censorship DRM google-insecurity sabotage 
google-surveillance tyrants
 
 File: malware-microsoft.html
 SectionKeys: backdoor DRM insecurity interference jails sabotage subscriptions 
surveillance tyrants
@@ -29,7 +29,7 @@
 SectionKeys: apple microsoft
 
 File: proprietary-surveillance.html
-SectionKeys: windows macos bios phones ithings android e-readers apps skype 
games stings tvsets cameras toys home wearables watches cars drones virtual 
websites javascript flash chrome fixed-comm
+SectionKeys: windows macos bios phones ithings android e-readers apps skype 
games stings tvsets cameras toys home wearables watches cars drones virtual 
websites javascript flash chrome networks
 
 %rec: Malware
 %doc: Items in /proprietary/proprietary-*.html
@@ -53,9 +53,10 @@
 #  entered; e.g., "Added: 20180915". It is used to select latest additions
 #  for the main page of proprietary/.
 
-#  It is a lot easier to work with the blurbs if they are unwrapped. In any
-#  case, each line within a blurb should start with a + sign, including
-#  blank lines.
+#  Each line within a blurb should start with a + sign, including blank
+#  lines.
+
+# ADD NEW BLURB HERE
 
 Id: -201809240
 Added: 20180925
@@ -115,7 +116,7 @@
 
 Id: -201808030
 PubDate: 2018-08-03
-Section: surveillance apps google mobiles
+Section: google-surveillance apps mobiles
 Keyword: android
 Blurb: <p>Some Google apps on Android <a
 +   
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile";>
@@ -463,7 +464,7 @@
 
 Id: -201711210
 PubDate: 2017-11-21
-Section: google surveillance android
+Section: google-surveillance android
 Keyword:
 Blurb: <p>Android tracks location for Google <a
 +   
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml";>
@@ -799,9 +800,24 @@
 +   on you.  Even if it is air-gapped, it could be saving up records
 +   about you for later examination.</p>
 
+Id: -201706202
+PubDate: 2017-06-07
+Section: back-doors spy
+Keyword:
+Blurb: <p id="InternetCameraBackDoor">Many models of Internet-connected
++   cameras contain a glaring back door&mdash;they have login
++   accounts with hard-coded passwords, which can't be changed, and <a
++   
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/";>
++   there is no way to delete these accounts either</a>.</p>
++ 
++   <p>Since these accounts with hard-coded passwords are impossible
++   to delete, this problem is not merely an insecurity; it amounts to
++   a back door that can be used by the manufacturer (and
++   government) to spy on users.</p>
+
 Id: -201706201
 PubDate: 2017-06-20
-Section: insecurity surveillance cameras
+Section: insecurity cameras
 Keyword: appliances
 Blurb: <p>Many models of Internet-connected cameras <a
 +   href="/proprietary/proprietary-back-doors.html#InternetCameraBackDoor">
@@ -815,7 +831,7 @@
 Id: -201706200
 PubDate: 2017-06-20
 Section: appliances
-Keyword: insecurity surveillance cameras
+Keyword: insecurity cameras
 Blurb: <p>Many models of Internet-connected cameras
 +   are tremendously insecure.  They have login
 +   accounts with hard-coded passwords, which can't be changed, and <a
@@ -838,21 +854,6 @@
 +   S mode</a>. The major difference with Windows 10 S is that there is
 +   an easy way to switch out of S mode.</p>
 
-Id: -201706070
-PubDate: 2017-06-07
-Section: back-doors spy
-Keyword:
-Blurb: <p id="InternetCameraBackDoor">Many models of Internet-connected
-+   cameras contain a glaring back door&mdash;they have login
-+   accounts with hard-coded passwords, which can't be changed, and <a
-+   
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/";>
-+   there is no way to delete these accounts either</a>.</p>
-+ 
-+   <p>Since these accounts with hard-coded passwords are impossible
-+   to delete, this problem is not merely an insecurity; it amounts to
-+   a back door that can be used by the manufacturer (and
-+   government) to spy on users.</p>
-
 Id: -201706060
 PubDate: 2017-06-06
 Section: apple sabotage
@@ -1191,8 +1192,8 @@
 
 Id: -201702170
 PubDate: 2017-02-17
-Section: insecurity mobiles cars
-Keyword: surveillance apps
+Section: insecurity cars
+Keyword: mobiles apps
 Blurb: <p>The mobile apps for communicating <a
 +   
href="https://www.bleepingcomputer.com/news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/";>with
 +   a smart but foolish car have very bad security</a>.</p>
@@ -1243,7 +1244,7 @@
 
 Id: -201701300
 PubDate: 2017-01-30
-Section: google drm
+Section: drm google DRM
 Keyword: chrome chromium
 Blurb: <p>Chrome <a
 +   
href="http://boingboing.net/2017/01/30/google-quietly-makes-optiona.html";>implements
@@ -1484,12 +1485,12 @@
 +     <dt>VPN Services HotspotShield</dt>
 +     <dd>Injects JavaScript code into the HTML pages returned to the
 +     users. The stated purpose of the JS injection is to display ads. Uses
-+     roughly 5 tracking libraries. Also, it redirects the user's traffic
-+     through valueclick.com (an advertising website).</dd>
++     roughly five tracking libraries. Also, it redirects the user's
++     traffic through valueclick.com (an advertising website).</dd>
 + 
 +     <dt>WiFi Protector VPN</dt>
 +     <dd>Injects JavaScript code into HTML pages, and also uses roughly
-+     5 tracking libraries. Developers of this app have confirmed that
++     five tracking libraries. Developers of this app have confirmed that
 +     the non-premium version of the app does JavaScript injection for
 +     tracking and display ads.</dd>
 +   </dl>
@@ -1553,7 +1554,7 @@
 
 Id: -201609210
 PubDate: 2016-09-21
-Section: google surveillance apps
+Section: google-surveillance apps mobiles
 Keyword:
 Blurb: <p>Google's new voice messaging app <a
 +   
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google";>logs
@@ -1836,7 +1837,7 @@
 
 Id: -201606030
 PubDate: 2016-06-03
-Section: surveillance fixed-comm
+Section: surveillance networks
 Keyword: routing
 Blurb: <p>Investigation Shows <a
 +   
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml";>GCHQ
@@ -2030,11 +2031,11 @@
 
 Id: -201603080
 PubDate: 2016-03-08
-Section: surveillance e-readers
+Section: surveillance e-readers webpages
 Keyword: javascript
 Blurb: <p>E-books can contain JavaScript code, and <a
-+   
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds";>sometimes
-+   this code snoops on readers</a>.</p>
++   
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds";>
++   sometimes this code snoops on readers</a>.</p>
 
 Id: -201603020
 PubDate: 2016-03-02
@@ -2200,8 +2201,8 @@
 
 Id: -201512280
 PubDate: 2015-12-28
-Section: back-doors spy microsoft backdoor
-Keyword: windows
+Section: surveillance windows back-doors spy microsoft backdoor
+Keyword:
 Blurb: <p>Microsoft has <a
 +   
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/";>
 +   backdoored its disk encryption</a>.</p>
@@ -2452,7 +2453,7 @@
 
 Id: -201510020
 PubDate: 2015-10-02
-Section: apple interference
+Section: apple sabotage
 Keyword: ithings
 Blurb: <p>Apple forced millions of iThings to <a
 +   href="https://discussions.apple.com/thread/7256669?tstart=0";>download
@@ -2625,7 +2626,7 @@
 
 Id: -201507280
 PubDate: 2015-07-28
-Section: google surveillance chrome
+Section: google-surveillance chrome
 Keyword:
 Blurb: <p>Google Chrome makes it easy for an extension to do <a
 +   
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/";>total
@@ -2718,7 +2719,7 @@
 
 Id: -201506180
 PubDate: 2015-06-18
-Section: google surveillance chrome
+Section: google-surveillance chrome
 Keyword:
 Blurb: <p>Google Chrome includes a module that <a
 +   
href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/";>
@@ -3098,7 +3099,7 @@
 
 Id: -201407170
 PubDate: 2014-07-17
-Section: surveillance home appliances google
+Section: google-surveillance home appliances
 Keyword: nest
 Blurb: <p id="nest-thermometers">Nest thermometers send <a
 +   href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack";>a lot of
@@ -3159,24 +3160,6 @@
 +   
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml";>
 +   do lots of spying anyway</a>.</p>
 
-Id: -201311210
-PubDate: 2013-11-18
-PubDate: 2013-11-21
-Section: appliances 
-Keyword: lg surveillance tvsets
-Blurb: <p>Spyware in LG &ldquo;smart&rdquo; TVs <a
-+   
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html";>
-+   reports what the user watches, and the switch to turn this off has
-+   no effect</a>.  (The fact that the transmission reports a 404 error
-+   really means nothing; the server could save that data anyway.)</p> 
-+ 
-+   <p>Even worse, it <a
-+   
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/";>
-+   snoops on other devices on the user's local network</a>.</p>
-+ 
-+   <p>LG later said it had installed a patch to stop this, but any
-+   product could spy this way.</p>
-
 Id: -201405190
 PubDate: 2014-05-19
 Section: insecurity mobiles
@@ -3298,7 +3281,7 @@
 
 Id: -201401190
 PubDate: 2014-01-19
-Section: games interference apple
+Section: games sabotage apple
 Keyword:
 Blurb: <p>Some proprietary <a
 +   
href="http://www.theguardian.com/technology/2014/jan/19/apple-talking-cats-in-app-purchases";>
@@ -3306,10 +3289,11 @@
 
 Id: -201401151
 PubDate: 2014-01-15
-Section: surveillance apps
-Keyword: baidu
-Blurb: <p>Baidu's <a href="#baidu-ime">spying <abbr title="Input Method
-+   Editor">IME</abbr></a> is also available for smartphones.</p>
+Section: surveillance apps mobiles
+Keyword: baidu simeji
+Blurb: <p>The Simeji keyboard is a smartphone version of Baidu's <a
++   href="/proprietary/#baidu-ime">spying <abbr
++   title="Input Method Editor">IME</abbr></a>.</p>
 
 Id: -201401150
 PubDate: 2014-01-15
@@ -3402,6 +3386,24 @@
 +   Some applications come with MyFreeProxy, which is a universal back
 +   door</a> that can download programs and run them.</p>
 
+Id: -201311210
+PubDate: 2013-11-18
+PubDate: 2013-11-21
+Section: appliances 
+Keyword: lg surveillance tvsets
+Blurb: <p>Spyware in LG &ldquo;smart&rdquo; TVs <a
++   
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html";>
++   reports what the user watches, and the switch to turn this off has
++   no effect</a>.  (The fact that the transmission reports a 404 error
++   really means nothing; the server could save that data anyway.)</p> 
++ 
++   <p>Even worse, it <a
++   
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/";>
++   snoops on other devices on the user's local network</a>.</p>
++ 
++   <p>LG later said it had installed a patch to stop this, but any
++   product could spy this way.</p>
+
 Id: -201311130
 PubDate: 2013-11-13
 Section: cars drm
@@ -3413,7 +3415,7 @@
 Id: -201311120
 PubDate: 2013-09-07
 PubDate: 2013-11-12
-Section: insecurity surveillance mobiles phones
+Section: google-insecurity surveillance mobiles phones
 Keyword: iphone android blackberry
 Blurb: <p><a
 +   
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html";>
@@ -3483,7 +3485,7 @@
 
 Id: -201309050
 PubDate: 2013-09-05
-Section: insecurity surveillance cameras appliances
+Section: insecurity appliances
 Keyword:
 Blurb: <p>The FTC punished a company for making webcams with <a
 +   
href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html";>
@@ -3532,7 +3534,7 @@
 
 Id: -201308040
 PubDate: 2013-08-04
-Section: surveillance chrome google
+Section: google-surveillance chrome
 Keyword:
 Blurb: <p>Google Chrome <a
 +   href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/";>
@@ -3541,7 +3543,7 @@
 
 Id: -201308010
 PubDate: 2013-08-01
-Section: google surveillance android mobiles
+Section: google-surveillance android mobiles
 Keyword:
 Blurb: <p>Spyware in Android phones (and Windows? laptops): The Wall Street
 +   Journal (in an article blocked from us by a paywall) reports that <a
@@ -3644,9 +3646,9 @@
 Section: surveillance mobiles phones
 Keyword: gps
 Blurb: <p>Portable phones with GPS <a
-+   
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers";>will
-+   send their GPS location on remote command</a>, and users cannot stop
-+   them. (The US says it will eventually require all new portable phones
++   
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers";>
++   will send their GPS location on remote command, and users cannot stop
++   them</a>. (The US says it will eventually require all new portable phones
 +   to have GPS.)</p>
 
 Id: -201306220
@@ -3693,7 +3695,7 @@
 
 Id: -201304080
 PubDate: 2013-04-08
-Section: google tyrants mobiles
+Section: tyrants mobiles
 Keyword: android
 Blurb: <p><a
 +   
href="http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html";>
@@ -3718,9 +3720,9 @@
 Section: surveillance cars
 Keyword:
 Blurb: <p id="records-drivers">Proprietary software in cars <a
-+   
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/";>records
-+   information about drivers' movements</a>, which is made available to
-+   car manufacturers, insurance companies, and others.</p>
++   
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/";>
++   records information about drivers' movements</a>, which is made
++   available to car manufacturers, insurance companies, and others.</p>
 + 
 +   <p>The case of toll-collection systems, mentioned in this article,
 +   is not really a matter of proprietary surveillance. These systems
@@ -3772,7 +3774,7 @@
 
 Id: -201212290
 PubDate: 2012-12-29
-Section: surveillance fixed-comm appliances
+Section: surveillance networks appliances
 Keyword: cisco
 Blurb: <p>The Cisco TNP IP phones are <a
 +   href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html";>
@@ -3900,7 +3902,7 @@
 
 Id: -201208210
 PubDate: 2012-08-21
-Section: google surveillance webpages websites
+Section: google-surveillance webpages websites
 Keyword:
 Blurb: <p>Many web sites report all their visitors
 +   to Google by using the Google Analytics service, which <a
@@ -3928,7 +3930,7 @@
 
 Id: -201202280
 PubDate: 2012-02-28
-Section: back-doors universal google
+Section: back-doors universal google backdoor
 Keyword: chromeos
 Blurb: <p>ChromeOS has a universal back
 +   door. At least, Google says it does&mdash;in <a
@@ -4118,8 +4120,8 @@
 
 Id: -200809060
 PubDate: 2008-09-06
-Section: surveillance chrome google
-Keyword: chrome keylogger
+Section: google-surveillance chrome
+Keyword: keylogger
 Blurb: <p>Google Chrome contains a key logger that <a
 +   href="http://www.favbrowser.com/google-chrome-spyware-confirmed/";>
 +   sends Google every URL typed in</a>, one key at a time.</p>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]