[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/server/staging/proprietary/rec google-stub....
From: |
Therese Godefroy |
Subject: |
www/server/staging/proprietary/rec google-stub.... |
Date: |
Fri, 28 Sep 2018 17:20:10 -0400 (EDT) |
CVSROOT: /webcvs/www
Module name: www
Changes by: Therese Godefroy <th_g> 18/09/28 17:20:10
Modified files:
server/staging/proprietary/rec: google-stub.html
propr-blurbs.rec
Log message:
Adjust keywords to avoid duplicates, minor fixes.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/google-stub.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/server/staging/proprietary/rec/propr-blurbs.rec?cvsroot=www&r1=1.15&r2=1.16
Patches:
Index: google-stub.html
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/rec/google-stub.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- google-stub.html 23 Sep 2018 21:03:09 -0000 1.5
+++ google-stub.html 28 Sep 2018 21:20:09 -0000 1.6
@@ -75,7 +75,7 @@
they do not count as malware. We mention them to refute the
supposition that prestigious proprietary software doesn't have grave
bugs.</p>
-<!-- INSERT insecurity.list -->
+<!-- INSERT google-insecurity.list -->
<h3 id="sabotage">Google Sabotage</h3>
@@ -86,7 +86,7 @@
<!-- INSERT sabotage.list -->
<h3 id="surveillance">Google Surveillance</h3>
-<!-- INSERT surveillance.list -->
+<!-- INSERT google-surveillance.list -->
<h3 id="tyrants">Google Tyrants</h3>
<!-- INSERT tyrants.list -->
@@ -148,7 +148,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/09/23 21:03:09 $
+$Date: 2018/09/28 21:20:09 $
<!-- timestamp end -->
</p>
</div>
Index: propr-blurbs.rec
===================================================================
RCS file: /webcvs/www/www/server/staging/proprietary/rec/propr-blurbs.rec,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- propr-blurbs.rec 27 Sep 2018 15:12:00 -0000 1.15
+++ propr-blurbs.rec 28 Sep 2018 21:20:09 -0000 1.16
@@ -11,7 +11,7 @@
SectionKeys: swindle-backdoor swindle-surveillance swindle-drm echo-backdoor
echo-surveillance
File: malware-google.html
-SectionKeys: backdoor censorship DRM insecurity sabotage surveillance tyrants
+SectionKeys: backdoor censorship DRM google-insecurity sabotage
google-surveillance tyrants
File: malware-microsoft.html
SectionKeys: backdoor DRM insecurity interference jails sabotage subscriptions
surveillance tyrants
@@ -29,7 +29,7 @@
SectionKeys: apple microsoft
File: proprietary-surveillance.html
-SectionKeys: windows macos bios phones ithings android e-readers apps skype
games stings tvsets cameras toys home wearables watches cars drones virtual
websites javascript flash chrome fixed-comm
+SectionKeys: windows macos bios phones ithings android e-readers apps skype
games stings tvsets cameras toys home wearables watches cars drones virtual
websites javascript flash chrome networks
%rec: Malware
%doc: Items in /proprietary/proprietary-*.html
@@ -53,9 +53,10 @@
# entered; e.g., "Added: 20180915". It is used to select latest additions
# for the main page of proprietary/.
-# It is a lot easier to work with the blurbs if they are unwrapped. In any
-# case, each line within a blurb should start with a + sign, including
-# blank lines.
+# Each line within a blurb should start with a + sign, including blank
+# lines.
+
+# ADD NEW BLURB HERE
Id: -201809240
Added: 20180925
@@ -115,7 +116,7 @@
Id: -201808030
PubDate: 2018-08-03
-Section: surveillance apps google mobiles
+Section: google-surveillance apps mobiles
Keyword: android
Blurb: <p>Some Google apps on Android <a
+
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
@@ -463,7 +464,7 @@
Id: -201711210
PubDate: 2017-11-21
-Section: google surveillance android
+Section: google-surveillance android
Keyword:
Blurb: <p>Android tracks location for Google <a
+
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
@@ -799,9 +800,24 @@
+ on you. Even if it is air-gapped, it could be saving up records
+ about you for later examination.</p>
+Id: -201706202
+PubDate: 2017-06-07
+Section: back-doors spy
+Keyword:
+Blurb: <p id="InternetCameraBackDoor">Many models of Internet-connected
++ cameras contain a glaring back door—they have login
++ accounts with hard-coded passwords, which can't be changed, and <a
++
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">
++ there is no way to delete these accounts either</a>.</p>
++
++ <p>Since these accounts with hard-coded passwords are impossible
++ to delete, this problem is not merely an insecurity; it amounts to
++ a back door that can be used by the manufacturer (and
++ government) to spy on users.</p>
+
Id: -201706201
PubDate: 2017-06-20
-Section: insecurity surveillance cameras
+Section: insecurity cameras
Keyword: appliances
Blurb: <p>Many models of Internet-connected cameras <a
+ href="/proprietary/proprietary-back-doors.html#InternetCameraBackDoor">
@@ -815,7 +831,7 @@
Id: -201706200
PubDate: 2017-06-20
Section: appliances
-Keyword: insecurity surveillance cameras
+Keyword: insecurity cameras
Blurb: <p>Many models of Internet-connected cameras
+ are tremendously insecure. They have login
+ accounts with hard-coded passwords, which can't be changed, and <a
@@ -838,21 +854,6 @@
+ S mode</a>. The major difference with Windows 10 S is that there is
+ an easy way to switch out of S mode.</p>
-Id: -201706070
-PubDate: 2017-06-07
-Section: back-doors spy
-Keyword:
-Blurb: <p id="InternetCameraBackDoor">Many models of Internet-connected
-+ cameras contain a glaring back door—they have login
-+ accounts with hard-coded passwords, which can't be changed, and <a
-+
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">
-+ there is no way to delete these accounts either</a>.</p>
-+
-+ <p>Since these accounts with hard-coded passwords are impossible
-+ to delete, this problem is not merely an insecurity; it amounts to
-+ a back door that can be used by the manufacturer (and
-+ government) to spy on users.</p>
-
Id: -201706060
PubDate: 2017-06-06
Section: apple sabotage
@@ -1191,8 +1192,8 @@
Id: -201702170
PubDate: 2017-02-17
-Section: insecurity mobiles cars
-Keyword: surveillance apps
+Section: insecurity cars
+Keyword: mobiles apps
Blurb: <p>The mobile apps for communicating <a
+
href="https://www.bleepingcomputer.com/news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/">with
+ a smart but foolish car have very bad security</a>.</p>
@@ -1243,7 +1244,7 @@
Id: -201701300
PubDate: 2017-01-30
-Section: google drm
+Section: drm google DRM
Keyword: chrome chromium
Blurb: <p>Chrome <a
+
href="http://boingboing.net/2017/01/30/google-quietly-makes-optiona.html">implements
@@ -1484,12 +1485,12 @@
+ <dt>VPN Services HotspotShield</dt>
+ <dd>Injects JavaScript code into the HTML pages returned to the
+ users. The stated purpose of the JS injection is to display ads. Uses
-+ roughly 5 tracking libraries. Also, it redirects the user's traffic
-+ through valueclick.com (an advertising website).</dd>
++ roughly five tracking libraries. Also, it redirects the user's
++ traffic through valueclick.com (an advertising website).</dd>
+
+ <dt>WiFi Protector VPN</dt>
+ <dd>Injects JavaScript code into HTML pages, and also uses roughly
-+ 5 tracking libraries. Developers of this app have confirmed that
++ five tracking libraries. Developers of this app have confirmed that
+ the non-premium version of the app does JavaScript injection for
+ tracking and display ads.</dd>
+ </dl>
@@ -1553,7 +1554,7 @@
Id: -201609210
PubDate: 2016-09-21
-Section: google surveillance apps
+Section: google-surveillance apps mobiles
Keyword:
Blurb: <p>Google's new voice messaging app <a
+
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
@@ -1836,7 +1837,7 @@
Id: -201606030
PubDate: 2016-06-03
-Section: surveillance fixed-comm
+Section: surveillance networks
Keyword: routing
Blurb: <p>Investigation Shows <a
+
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
@@ -2030,11 +2031,11 @@
Id: -201603080
PubDate: 2016-03-08
-Section: surveillance e-readers
+Section: surveillance e-readers webpages
Keyword: javascript
Blurb: <p>E-books can contain JavaScript code, and <a
-+
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
-+ this code snoops on readers</a>.</p>
++
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
++ sometimes this code snoops on readers</a>.</p>
Id: -201603020
PubDate: 2016-03-02
@@ -2200,8 +2201,8 @@
Id: -201512280
PubDate: 2015-12-28
-Section: back-doors spy microsoft backdoor
-Keyword: windows
+Section: surveillance windows back-doors spy microsoft backdoor
+Keyword:
Blurb: <p>Microsoft has <a
+
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/">
+ backdoored its disk encryption</a>.</p>
@@ -2452,7 +2453,7 @@
Id: -201510020
PubDate: 2015-10-02
-Section: apple interference
+Section: apple sabotage
Keyword: ithings
Blurb: <p>Apple forced millions of iThings to <a
+ href="https://discussions.apple.com/thread/7256669?tstart=0">download
@@ -2625,7 +2626,7 @@
Id: -201507280
PubDate: 2015-07-28
-Section: google surveillance chrome
+Section: google-surveillance chrome
Keyword:
Blurb: <p>Google Chrome makes it easy for an extension to do <a
+
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/">total
@@ -2718,7 +2719,7 @@
Id: -201506180
PubDate: 2015-06-18
-Section: google surveillance chrome
+Section: google-surveillance chrome
Keyword:
Blurb: <p>Google Chrome includes a module that <a
+
href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/">
@@ -3098,7 +3099,7 @@
Id: -201407170
PubDate: 2014-07-17
-Section: surveillance home appliances google
+Section: google-surveillance home appliances
Keyword: nest
Blurb: <p id="nest-thermometers">Nest thermometers send <a
+ href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a lot of
@@ -3159,24 +3160,6 @@
+
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
+ do lots of spying anyway</a>.</p>
-Id: -201311210
-PubDate: 2013-11-18
-PubDate: 2013-11-21
-Section: appliances
-Keyword: lg surveillance tvsets
-Blurb: <p>Spyware in LG “smart” TVs <a
-+
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
-+ reports what the user watches, and the switch to turn this off has
-+ no effect</a>. (The fact that the transmission reports a 404 error
-+ really means nothing; the server could save that data anyway.)</p>
-+
-+ <p>Even worse, it <a
-+
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
-+ snoops on other devices on the user's local network</a>.</p>
-+
-+ <p>LG later said it had installed a patch to stop this, but any
-+ product could spy this way.</p>
-
Id: -201405190
PubDate: 2014-05-19
Section: insecurity mobiles
@@ -3298,7 +3281,7 @@
Id: -201401190
PubDate: 2014-01-19
-Section: games interference apple
+Section: games sabotage apple
Keyword:
Blurb: <p>Some proprietary <a
+
href="http://www.theguardian.com/technology/2014/jan/19/apple-talking-cats-in-app-purchases">
@@ -3306,10 +3289,11 @@
Id: -201401151
PubDate: 2014-01-15
-Section: surveillance apps
-Keyword: baidu
-Blurb: <p>Baidu's <a href="#baidu-ime">spying <abbr title="Input Method
-+ Editor">IME</abbr></a> is also available for smartphones.</p>
+Section: surveillance apps mobiles
+Keyword: baidu simeji
+Blurb: <p>The Simeji keyboard is a smartphone version of Baidu's <a
++ href="/proprietary/#baidu-ime">spying <abbr
++ title="Input Method Editor">IME</abbr></a>.</p>
Id: -201401150
PubDate: 2014-01-15
@@ -3402,6 +3386,24 @@
+ Some applications come with MyFreeProxy, which is a universal back
+ door</a> that can download programs and run them.</p>
+Id: -201311210
+PubDate: 2013-11-18
+PubDate: 2013-11-21
+Section: appliances
+Keyword: lg surveillance tvsets
+Blurb: <p>Spyware in LG “smart” TVs <a
++
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
++ reports what the user watches, and the switch to turn this off has
++ no effect</a>. (The fact that the transmission reports a 404 error
++ really means nothing; the server could save that data anyway.)</p>
++
++ <p>Even worse, it <a
++
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
++ snoops on other devices on the user's local network</a>.</p>
++
++ <p>LG later said it had installed a patch to stop this, but any
++ product could spy this way.</p>
+
Id: -201311130
PubDate: 2013-11-13
Section: cars drm
@@ -3413,7 +3415,7 @@
Id: -201311120
PubDate: 2013-09-07
PubDate: 2013-11-12
-Section: insecurity surveillance mobiles phones
+Section: google-insecurity surveillance mobiles phones
Keyword: iphone android blackberry
Blurb: <p><a
+
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
@@ -3483,7 +3485,7 @@
Id: -201309050
PubDate: 2013-09-05
-Section: insecurity surveillance cameras appliances
+Section: insecurity appliances
Keyword:
Blurb: <p>The FTC punished a company for making webcams with <a
+
href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html">
@@ -3532,7 +3534,7 @@
Id: -201308040
PubDate: 2013-08-04
-Section: surveillance chrome google
+Section: google-surveillance chrome
Keyword:
Blurb: <p>Google Chrome <a
+ href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/">
@@ -3541,7 +3543,7 @@
Id: -201308010
PubDate: 2013-08-01
-Section: google surveillance android mobiles
+Section: google-surveillance android mobiles
Keyword:
Blurb: <p>Spyware in Android phones (and Windows? laptops): The Wall Street
+ Journal (in an article blocked from us by a paywall) reports that <a
@@ -3644,9 +3646,9 @@
Section: surveillance mobiles phones
Keyword: gps
Blurb: <p>Portable phones with GPS <a
-+
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">will
-+ send their GPS location on remote command</a>, and users cannot stop
-+ them. (The US says it will eventually require all new portable phones
++
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
++ will send their GPS location on remote command, and users cannot stop
++ them</a>. (The US says it will eventually require all new portable phones
+ to have GPS.)</p>
Id: -201306220
@@ -3693,7 +3695,7 @@
Id: -201304080
PubDate: 2013-04-08
-Section: google tyrants mobiles
+Section: tyrants mobiles
Keyword: android
Blurb: <p><a
+
href="http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html">
@@ -3718,9 +3720,9 @@
Section: surveillance cars
Keyword:
Blurb: <p id="records-drivers">Proprietary software in cars <a
-+
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
-+ information about drivers' movements</a>, which is made available to
-+ car manufacturers, insurance companies, and others.</p>
++
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">
++ records information about drivers' movements</a>, which is made
++ available to car manufacturers, insurance companies, and others.</p>
+
+ <p>The case of toll-collection systems, mentioned in this article,
+ is not really a matter of proprietary surveillance. These systems
@@ -3772,7 +3774,7 @@
Id: -201212290
PubDate: 2012-12-29
-Section: surveillance fixed-comm appliances
+Section: surveillance networks appliances
Keyword: cisco
Blurb: <p>The Cisco TNP IP phones are <a
+ href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
@@ -3900,7 +3902,7 @@
Id: -201208210
PubDate: 2012-08-21
-Section: google surveillance webpages websites
+Section: google-surveillance webpages websites
Keyword:
Blurb: <p>Many web sites report all their visitors
+ to Google by using the Google Analytics service, which <a
@@ -3928,7 +3930,7 @@
Id: -201202280
PubDate: 2012-02-28
-Section: back-doors universal google
+Section: back-doors universal google backdoor
Keyword: chromeos
Blurb: <p>ChromeOS has a universal back
+ door. At least, Google says it does—in <a
@@ -4118,8 +4120,8 @@
Id: -200809060
PubDate: 2008-09-06
-Section: surveillance chrome google
-Keyword: chrome keylogger
+Section: google-surveillance chrome
+Keyword: keylogger
Blurb: <p>Google Chrome contains a key logger that <a
+ href="http://www.favbrowser.com/google-chrome-spyware-confirmed/">
+ sends Google every URL typed in</a>, one key at a time.</p>