[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-apple.html
From: |
Therese Godefroy |
Subject: |
www/proprietary malware-apple.html |
Date: |
Sun, 7 Oct 2018 15:20:43 -0400 (EDT) |
CVSROOT: /webcvs/www
Module name: www
Changes by: Therese Godefroy <th_g> 18/10/07 15:20:43
Modified files:
proprietary : malware-apple.html
Log message:
Move forced iOS download to sabotage (cf. windows 10); restyle intro.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.html?cvsroot=www&r1=1.77&r2=1.78
Patches:
Index: malware-apple.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-apple.html,v
retrieving revision 1.77
retrieving revision 1.78
diff -u -b -r1.77 -r1.78
--- malware-apple.html 5 Oct 2018 20:48:52 -0000 1.77
+++ malware-apple.html 7 Oct 2018 19:20:43 -0000 1.78
@@ -13,7 +13,7 @@
<p><a href="/proprietary/proprietary.html">Other examples of proprietary
malware</a></p>
-<div class="highlight-para">
+<div class="comment">
<p>
<em>Malware</em> means software designed to function in ways that
mistreat or harm the user. (This does not include accidental errors.)
@@ -32,14 +32,17 @@
because the developer's awareness that the users would be powerless to fix
any malicious functionalities tempts the developer to impose some.
</p>
+
+<div class="important" style="margin-bottom: 2em">
<p>If you know of an example that ought to be in this page but isn't
here, please write
to <a href="mailto:address@hidden"><address@hidden></a>
to inform us. Please include the URL of a trustworthy reference or two
to present the specifics.</p>
</div>
+</div>
-<div class="summary" style="margin-top: 2em">
+<div class="summary">
<h3>Type of malware</h3>
<ul>
<li><a href="#back-doors">Back doors</a></li>
@@ -65,7 +68,7 @@
<h3 id="back-doors">Apple Back Doors</h3>
<ul class="blurbs">
-<!-- INSERT backdoor -->
+<!-- INSERT apple-back-door -->
<li id="M201607284">
<p>The Dropbox app for Macintosh <a
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/">
@@ -73,6 +76,13 @@
entering an admin password</a>.</p>
</li>
+ <li id="M201504090">
+ <p>Mac OS X had an <a
+
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
+ intentional local back door for 4 years</a>, which could be exploited
+ by attackers to gain root privileges.</p>
+ </li>
+
<li id="M201011220">
<p>The iPhone has a back door for <a
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
@@ -99,7 +109,7 @@
<h3 id="deception">Apple Deception</h3>
<ul class="blurbs">
-<!-- INSERT deception -->
+<!-- INSERT apple-decept -->
<li id="M201308290">
<p>“Dark patterns” are <a
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you">user
@@ -116,7 +126,7 @@
<h3 id="drm">Apple DRM</h3>
<ul class="blurbs">
-<!-- INSERT DRM -->
+<!-- INSERT apple-dr -->
<li id="M201704071">
<p>DRM makes the iPhone 7 nearly <a
href="#iphone7-sabotage">unrepairable</a> by anyone else but Apple.</p>
@@ -161,7 +171,7 @@
the software runs on.</p>
<ul class="blurbs">
-<!-- INSERT incompatibility -->
+<!-- INSERT apple-incompat -->
<li id="M201803300">
<p>In MacOS and iOS, the procedure for <a
href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac">
@@ -217,6 +227,18 @@
a malicious web site to extract all the user's messaging
history</a>.</p>
</li>
+
+ <li id="M201311120">
+ <p><a
+
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
+ The NSA can tap data in smart phones, including iPhones,
+ Android, and BlackBerry</a>. While there is not much
+ detail here, it seems that this does not operate via
+ the universal back door that we know nearly all portable
+ phones have. It may involve exploiting various bugs. There are <a
+
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
+ lots of bugs in the phones' radio software</a>.</p>
+ </li>
</ul>
<!--
@@ -249,7 +271,7 @@
<h4>Examples of censorship by Apple jails</h4>
<ul class="blurbs">
-<!-- INSERT jails -->
+<!-- INSERT apple-jail -->
<li id="M201710130">
<p>Apple is <a
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet">
@@ -361,7 +383,7 @@
<p>Proprietary companies can take advantage of their customers by imposing
arbitrary limits to their use of the software. This section reports examples
of hard sell and other unjust commercial tactics by Apple.</p>
<ul class="blurbs">
-<!-- INSERT pressuring -->
+<!-- INSERT apple-press -->
<li id="M201510270">
<p>Apple Siri <a
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions">refuses
@@ -377,7 +399,7 @@
to directly intervene in ways that harm them or block their work.</p>
<ul class="blurbs">
-<!-- INSERT sabotage -->
+<!-- INSERT apple-sab -->
<li id="M201805310">
<p>Apple has <a
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia">blocked
@@ -451,13 +473,6 @@
of trouble.</p>
</li>
- <li id="M201504090">
- <p>Mac OS X had an <a
-
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
- intentional local back door for 4 years</a>, which could be exploited
- by attackers to gain root privileges.</p>
- </li>
-
<li id="M201412040">
<p>Apple <a
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs">
@@ -661,7 +676,7 @@
<h3 id="tyrants">Apple Tyrants</h3>
<ul class="blurbs">
-<!-- INSERT tyrants -->
+<!-- INSERT apple-tyrant -->
<li id="M201412010">
<p>Apple arbitrarily <a
href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/">blocks
@@ -735,7 +750,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/05 20:48:52 $
+$Date: 2018/10/07 19:20:43 $
<!-- timestamp end -->
</p>
</div>