www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-adobe.html malware-amaz...


From: Therese Godefroy
Subject: www/proprietary malware-adobe.html malware-amaz...
Date: Wed, 17 Oct 2018 05:36:16 -0400 (EDT)

CVSROOT:        /webcvs/www
Module name:    www
Changes by:     Therese Godefroy <th_g> 18/10/17 05:36:15

Modified files:
        proprietary    : malware-adobe.html malware-amazon.html 
                         malware-apple.html malware-appliances.html 
                         malware-cars.html malware-games.html 
                         malware-google.html malware-microsoft.html 
                         malware-mobiles.html malware-webpages.html 
                         potential-malware.html 
                         proprietary-back-doors.html 
                         proprietary-censorship.html 
                         proprietary-coverups.html 
                         proprietary-deception.html proprietary-drm.html 
                         proprietary-incompatibility.html 
                         proprietary-insecurity.html 
                         proprietary-interference.html 
                         proprietary-jails.html 
                         proprietary-sabotage.html 
                         proprietary-subscriptions.html 
                         proprietary-surveillance.html 
                         proprietary-tethers.html 
                         proprietary-tyrants.html proprietary.html 

Log message:
        Add id's to pages without sections, regenerate with new version of the 
script.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-adobe.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-amazon.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.html?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.html?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-cars.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-games.html?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-google.html?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.html?cvsroot=www&r1=1.81&r2=1.82
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.html?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-webpages.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/potential-malware.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.html?cvsroot=www&r1=1.71&r2=1.72
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-censorship.html?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-coverups.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-deception.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-drm.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-incompatibility.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.html?cvsroot=www&r1=1.92&r2=1.93
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-interference.html?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-jails.html?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.html?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-subscriptions.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.html?cvsroot=www&r1=1.204&r2=1.205
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-tethers.html?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-tyrants.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.html?cvsroot=www&r1=1.37&r2=1.38

Patches:
Index: malware-adobe.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-adobe.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- malware-adobe.html  9 Oct 2018 12:36:26 -0000       1.13
+++ malware-adobe.html  17 Oct 2018 09:36:15 -0000      1.14
@@ -40,10 +40,9 @@
 to present the specifics.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="malware-adobe"></div>
 
 <ul class="blurbs">
-<!-- INSERT adobe -->
   <li id="M201701110">
     <p>An upgrade package for Acrobat Reader <a
     
href="https://www.bleepingcomputer.com/news/software/adobe-acrobat-reader-dc-update-installs-chrome-browser-extension/";>silently
@@ -158,7 +157,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 12:36:26 $
+$Date: 2018/10/17 09:36:15 $
 <!-- timestamp end -->
 </p>
 </div>

Index: malware-amazon.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-amazon.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- malware-amazon.html 12 Oct 2018 07:52:30 -0000      1.16
+++ malware-amazon.html 17 Oct 2018 09:36:15 -0000      1.17
@@ -53,7 +53,6 @@
 <h4 id="back-doors">Back Doors</h4>
 
 <ul class="blurbs">
-<!-- INSERT swindle-back-door -->
   <li id="M201503210">
     <p>Amazon <a
     
href="https://www.techdirt.com/articles/20150321/13350230396/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices.shtml";>
@@ -86,7 +85,6 @@
 <h4 id="surveillance">Surveillance</h4>
 
 <ul class="blurbs">
-<!-- INSERT swindle-surv -->
   <li id="M201212031">
     <p>The Electronic Frontier Foundation has examined and found <a
     href="https://www.eff.org/pages/reader-privacy-chart-2012";>various
@@ -98,7 +96,6 @@
 <h4 id="drm">DRM</h4>
 
 <ul class="blurbs">
-<!-- INSERT swindle-dr -->
   <li id="M201704131">
     <p><a href="http://techin.oureverydaylife.com/kindle-drm-17841.html";>
     The Amazon Kindle has DRM</a>.  That article is flawed in that it
@@ -117,7 +114,6 @@
 <h4 id="echo-back-doors">Back Doors</h4>
 
 <ul class="blurbs">
-<!-- INSERT echo-back-door -->
   <li id="M201606060">
     <p>The Amazon Echo appears to have a universal back door, since <a
     href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates";>
@@ -133,7 +129,6 @@
 <h4 id="echo-surveillance">Surveillance</h4>
 
 <ul class="blurbs">
-<!-- INSERT echo-surv -->
   <li id="M201808120">
     <p>Crackers found a way to break the security of an Amazon device,
     and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html";>
@@ -155,7 +150,6 @@
 <h3 id="misc"> Malware in other products</h3>
 
 <ul class="blurbs">
-<!-- INSERT amazon-misc -->
   <li id="M201711200">
     <p>Amazon recently invited consumers to be suckers and <a
     
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo";>
@@ -228,7 +222,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/12 07:52:30 $
+$Date: 2018/10/17 09:36:15 $
 <!-- timestamp end -->
 </p>
 </div>

Index: malware-apple.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-apple.html,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- malware-apple.html  9 Oct 2018 12:36:26 -0000       1.79
+++ malware-apple.html  17 Oct 2018 09:36:15 -0000      1.80
@@ -68,7 +68,6 @@
 <h3 id="back-doors">Apple Back Doors</h3>
 
 <ul class="blurbs">
-<!-- INSERT apple-back-door -->
   <li id="M201607284">
     <p>The Dropbox app for Macintosh <a
     
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/";>
@@ -109,7 +108,6 @@
 <h3 id="deception">Apple Deception</h3>
 
 <ul class="blurbs">
-<!-- INSERT apple-decept -->
   <li id="M201308290">
     <p>&ldquo;Dark patterns&rdquo; are <a
     
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you";>user
@@ -126,7 +124,6 @@
 <h3 id="drm">Apple DRM</h3>
 
 <ul class="blurbs">
-<!-- INSERT apple-dr -->
   <li id="M201704071">
     <p>DRM makes the iPhone 7 nearly <a
     href="#iphone7-sabotage">unrepairable</a> by anyone else but Apple.</p>
@@ -171,7 +168,6 @@
 the software runs on.</p>
 
 <ul class="blurbs">
-<!-- INSERT apple-incompat -->
   <li id="M201803300">
     <p>In MacOS and iOS, the procedure for <a
     
href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac";>
@@ -213,7 +209,6 @@
   bugs.</p>
 
 <ul class="blurbs">
-<!-- INSERT apple-insec -->
   <li id="M201607220">
     <p>A vulnerability in Apple's Image I/O API allowed an attacker to <a
     
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple";>execute
@@ -271,7 +266,6 @@
 <h4>Examples of censorship by Apple jails</h4>
 
 <ul class="blurbs">
-<!-- INSERT apple-jail -->
   <li id="M201710130">
     <p>Apple is <a
     
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet";>
@@ -383,7 +377,6 @@
 <p>Proprietary companies can take advantage of their customers by imposing 
arbitrary limits to their use of the software.  This section reports examples 
of hard sell and other unjust commercial tactics by Apple.</p>
 
 <ul class="blurbs">
-<!-- INSERT apple-press -->
   <li id="M201510270">
     <p>Apple Siri <a
     
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions";>refuses
@@ -399,7 +392,6 @@
 to directly intervene in ways that harm them or block their work.</p>
 
 <ul class="blurbs">
-<!-- INSERT apple-sab -->
   <li id="M201805310">
     <p>Apple has <a
     
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia";>blocked
@@ -494,7 +486,6 @@
 <h3 id="surveillance">Apple Surveillance</h3>
 
 <ul class="blurbs">
-<!-- INSERT apple-surv -->
   <li id="M201809070">
     <p>Adware Doctor, an ad blocker for MacOS, <a
     
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history";>reports
@@ -676,7 +667,6 @@
 <h3 id="tyrants">Apple Tyrants</h3>
 
 <ul class="blurbs">
-<!-- INSERT apple-tyrant -->
   <li id="M201412010">
     <p>Apple arbitrarily <a
     href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/";>blocks
@@ -750,7 +740,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 12:36:26 $
+$Date: 2018/10/17 09:36:15 $
 <!-- timestamp end -->
 </p>
 </div>

Index: malware-appliances.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-appliances.html,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- malware-appliances.html     9 Oct 2018 12:36:26 -0000       1.53
+++ malware-appliances.html     17 Oct 2018 09:36:15 -0000      1.54
@@ -42,10 +42,9 @@
 to present the specifics.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="malware-appliances"></div>
 
 <ul class="blurbs">
-<!-- INSERT appliances -->
   <li id="M201809260">
     <p>Honeywell's &ldquo;smart&rdquo; thermostats communicate
     only through the company's server. They have
@@ -797,7 +796,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 12:36:26 $
+$Date: 2018/10/17 09:36:15 $
 <!-- timestamp end -->
 </p>
 </div>

Index: malware-cars.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-cars.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- malware-cars.html   9 Oct 2018 12:36:26 -0000       1.10
+++ malware-cars.html   17 Oct 2018 09:36:15 -0000      1.11
@@ -42,10 +42,9 @@
 to present the specifics.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="malware-cars"></div>
 
 <ul class="blurbs">
-<!-- INSERT cars -->
   <li id="M201711230">
     <p>AI-powered driving apps can <a
     
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move";>
@@ -261,7 +260,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 12:36:26 $
+$Date: 2018/10/17 09:36:15 $
 <!-- timestamp end -->
 </p>
 </div>

Index: malware-games.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-games.html,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- malware-games.html  13 Oct 2018 07:00:32 -0000      1.20
+++ malware-games.html  17 Oct 2018 09:36:15 -0000      1.21
@@ -42,10 +42,9 @@
 to present the specifics.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="malware-games"></div>
 
 <ul class="blurbs">
-<!-- INSERT games -->
   <li id="M201807310">
     <p>A nonfree video game, available through the nonfree Steam client, <a
     
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-";>
@@ -259,7 +258,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/13 07:00:32 $
+$Date: 2018/10/17 09:36:15 $
 <!-- timestamp end -->
 </p>
 </div>

Index: malware-google.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-google.html,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- malware-google.html 9 Oct 2018 12:36:26 -0000       1.37
+++ malware-google.html 17 Oct 2018 09:36:15 -0000      1.38
@@ -65,7 +65,6 @@
 <h3 id="back-doors">Google Back Doors</h3>
 
 <ul class="blurbs">
-<!-- INSERT google-back-door -->
   <li id="M201809140">
     <p>Android has a <a
     
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change";>
@@ -109,7 +108,6 @@
 <h3 id="censorship">Google Censorship</h3>
 
 <ul class="blurbs">
-<!-- INSERT google-censor -->
   <li id="M201703160">
     <p>Google <a
     
href="http://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts";>
@@ -151,7 +149,6 @@
 <h3 id="drm">Google DRM</h3>
 
 <ul class="blurbs">
-<!-- INSERT google-dr -->
   <li id="M201705150">
     <p>Google now allows Android
     apps to detect whether a device has been rooted, <a
@@ -193,7 +190,6 @@
   bugs.</p>
 
 <ul class="blurbs">
-<!-- INSERT google-insec -->
   <li id="M201311120">
     <p><a
     
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html";>
@@ -216,7 +212,6 @@
 actions that harm the users of specific Google software.</p>
 
 <ul class="blurbs">
-<!-- INSERT google-sab -->
   <li id="M201605150">
     <p>Revolv is an IoT device which managed &ldquo;smart home&rdquo;
     operations: switching the lights, operate motion sensors, regulating
@@ -254,7 +249,6 @@
 <h3 id="surveillance">Google Surveillance</h3>
 
 <ul class="blurbs">
-<!-- INSERT google-surv -->
   <li id="M201808030">
     <p>Some Google apps on Android <a
     
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile";>
@@ -373,7 +367,6 @@
 <h3 id="tyrants">Google Tyrants</h3>
 
 <ul class="blurbs">
-<!-- INSERT google-tyrant -->
   <li id="M201304080">
     <p>Motorola, then owned by Google, made <a
     
href="http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html";>
@@ -441,7 +434,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 12:36:26 $
+$Date: 2018/10/17 09:36:15 $
 <!-- timestamp end -->
 </p>
 </div>

Index: malware-microsoft.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-microsoft.html,v
retrieving revision 1.81
retrieving revision 1.82
diff -u -b -r1.81 -r1.82
--- malware-microsoft.html      10 Oct 2018 07:28:25 -0000      1.81
+++ malware-microsoft.html      17 Oct 2018 09:36:15 -0000      1.82
@@ -67,7 +67,6 @@
 <h3 id="back-doors">Microsoft Back Doors</h3>
 
 <ul class="blurbs">
-<!-- INSERT microsoft-back-door -->
   <li id="M201608172">
     <p id="windows-update">Microsoft
     Windows has a universal back door through which <a
@@ -126,7 +125,6 @@
 <h3 id="drm">Microsoft DRM</h3>
 
 <ul class="blurbs">
-<!-- INSERT microsoft-dr -->
   <li id="M200708131">
     <p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/";>DRM
     in Windows</a>, introduced to cater to <a
@@ -146,7 +144,6 @@
   bugs.</p>
 
 <ul class="blurbs">
-<!-- INSERT microsoft-insec -->
   <li id="M201705120">
     <p>Exploits of bugs in Windows, which were developed by the NSA
     and then leaked by the Shadowbrokers group, are now being used to <a
@@ -180,7 +177,6 @@
 section describes examples of Microsoft committing interference.</p>
 
 <ul class="blurbs">
-<!-- INSERT microsoft-interf -->
   <li id="M201809120">
     <p>One version of Windows 10 <a
     
href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/";>
@@ -261,7 +257,6 @@
 actions that harm the users of specific Microsoft software.</p>
 
 <ul class="blurbs">
-<!-- INSERT microsoft-sab -->
   <li id="M201704194">
     <p>Microsoft has made Windows 7
     and 8 cease to function on certain new computers, <a
@@ -353,7 +348,6 @@
 <h3 id="subscriptions">Microsoft Subscriptions</h3>
 
 <ul class="blurbs">
-<!-- INSERT microsoft-subscript -->
   <li id="M201507150">
     <p>Microsoft Office forces users <a
     
href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html";>to
@@ -365,7 +359,6 @@
 <h3 id="surveillance">Microsoft Surveillance</h3>
 
 <ul class="blurbs">
-<!-- INSERT microsoft-surv -->
   <li id="M201710134">
     <p>Windows 10 telemetry program sends information to Microsoft about
     the user's computer and their use of the computer.</p>
@@ -513,7 +506,6 @@
 <h3 id="jails">Microsoft Jails</h3>
 
 <ul class="blurbs">
-<!-- INSERT microsoft-jail -->
   <li id="M201706130">
     <p>Windows 10 S was a jail: <a
     
href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison";>
@@ -539,7 +531,6 @@
 <h3 id="tyrants">Microsoft Tyrants</h3>
 
 <ul class="blurbs">
-<!-- INSERT microsoft-tyrant -->
   <li id="M201607150">
     <p>Microsoft accidentally left a way for users
     to install GNU/Linux on Windows RT tablets, but now it has <a
@@ -617,7 +608,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/10 07:28:25 $
+$Date: 2018/10/17 09:36:15 $
 <!-- timestamp end -->
 </p>
 </div>

Index: malware-mobiles.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-mobiles.html,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- malware-mobiles.html        9 Oct 2018 12:36:26 -0000       1.60
+++ malware-mobiles.html        17 Oct 2018 09:36:15 -0000      1.61
@@ -57,40 +57,48 @@
 to present the specifics.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="phone-communications"></div>
 
 <ul class="blurbs">
-  <li><p>The phone network
-    <a href="https://ssd.eff.org/en/module/problem-mobile-phones";>
+  <li id="M201502100">
+    <p>The phone network <a
+    href="https://ssd.eff.org/en/module/problem-mobile-phones";>
       tracks the movements of each phone</a>.</p>
+
     <p>This is inherent in the design of the phone network: as long as
       the phone is in communication with the network, there is no way
       to stop the network from recording its location.  Many countries
       (including the US and the EU) require the network to store all
       these location data for months or years.</p>
   </li>
-  <li><p id="universal-back-door">Almost every phone's communication processor 
has
-      a universal back door which
-      is <a 
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html";>
-      often used to make a phone transmit all conversations it
- hears</a>.</p>
-    <p>The back
-      door <a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone";>
+
+  <li id="M201311121">
+    <p id="universal-back-door">
+    Almost every phone's communication processor has
+    a universal back door which is <a
+    
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html";>
+    often used to make a phone transmit all conversations it hears</a>.</p>
+
+    <p>The back door <a
+    
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone";>
       may take the form of bugs that have gone 20 years unfixed</a>.
       The choice to leave the security holes in place is morally
       equivalent to writing a back door.</p>
+
     <p>The back door is in the &ldquo;modem processor&rdquo;, whose
       job is to communicate with the radio network.  In most phones,
       the modem processor controls the microphone.  In most phones it
       has the power to rewrite the software for the main processor
       too.</p>
+
     <p>A few phone models are specially designed so that the modem
       processor does not control the microphone, and so that it can't
       change the software in the main processor.  They still have the
       back door, but at least it is unable to turn the phone unto a
       listening device.</p>
-    <p>The universal back door is apparently also used to make phones
-      <a 
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html";>
+
+    <p>The universal back door is apparently also used to make phones <a
+    
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html";>
       transmit even when they are turned off</a>.  This means their movements
       are tracked, and may also make the listening feature work.</p>
   </li>
@@ -127,7 +135,6 @@
 </ul>
 
 <ul class="blurbs">
-<!-- INSERT mobiles-back-door -->
   <li id="M201609130">
     <p>Xiaomi phones come with <a
     
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered";>
@@ -170,7 +177,6 @@
 <h3 id="drm">Mobile DRM</h3>
 
 <ul class="blurbs">
-<!-- INSERT mobiles-dr -->
   <li id="M201501030">
     <p id="netflix-app-geolocation-drm">The Netflix Android app <a
     
href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/";>
@@ -189,7 +195,6 @@
   bugs.</p>
 
 <ul class="blurbs">
-<!-- INSERT mobiles-insec -->
   <li id="M201807100">
     <p>Siri, Alexa, and all the other voice-control systems can be <a
     
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa";>
@@ -322,7 +327,6 @@
 <h3 id="surveillance">Mobile Surveillance</h3>
 
 <ul class="blurbs">
-<!-- INSERT mobiles-surv -->
   <li id="M201806110">
     <p>The Spanish football streaming app <a
     
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html";>tracks
@@ -765,7 +769,6 @@
 <h3 id="jails">Mobile Jails</h3>
 
 <ul class="blurbs">
-<!-- INSERT mobiles-jail -->
   <li id="M201210080">
     <p><a
     
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html";>
@@ -778,7 +781,6 @@
 <h3 id="tyrants">Mobile Tyrants</h3>
 
 <ul class="blurbs">
-<!-- INSERT mobiles-tyrant -->
   <li id="M201110110">
     <p><a href="https://fsf.org/campaigns/secure-boot-vs-restricted-boot/";>
     Mobile devices that come with Windows 8 are tyrants</a>.</p>
@@ -843,7 +845,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 12:36:26 $
+$Date: 2018/10/17 09:36:15 $
 <!-- timestamp end -->
 </p>
 </div>

Index: malware-webpages.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-webpages.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- malware-webpages.html       14 Oct 2018 11:40:59 -0000      1.17
+++ malware-webpages.html       17 Oct 2018 09:36:15 -0000      1.18
@@ -46,10 +46,9 @@
 to present the specifics.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="malware-webpages"></div>
 
 <ul class="blurbs">
-<!-- INSERT webpages -->
   <li id="M201807190">
     <p>British Airways used <a
     
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security";>nonfree
@@ -255,7 +254,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/14 11:40:59 $
+$Date: 2018/10/17 09:36:15 $
 <!-- timestamp end -->
 </p>
 </div>

Index: potential-malware.html
===================================================================
RCS file: /webcvs/www/www/proprietary/potential-malware.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- potential-malware.html      9 Oct 2018 12:36:26 -0000       1.9
+++ potential-malware.html      17 Oct 2018 09:36:15 -0000      1.10
@@ -19,10 +19,9 @@
   software might use in the future for malicious purposes.  We don't
   have any evidence that they are in use yet.</p>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="potential-malware"></div>
 
 <ul class="blurbs">
-<!-- INSERT potential -->
   <li id="M201712130">
     <p>Patent applications show that Google and Amazon are interested in <a
     
href="http://www.consumerwatchdog.org/privacy-technology/home-assistant-adopter-beware-google-amazon-digital-assistant-patents-reveal";>
@@ -105,7 +104,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 12:36:26 $
+$Date: 2018/10/17 09:36:15 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-back-doors.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-back-doors.html,v
retrieving revision 1.71
retrieving revision 1.72
diff -u -b -r1.71 -r1.72
--- proprietary-back-doors.html 9 Oct 2018 12:36:26 -0000       1.71
+++ proprietary-back-doors.html 17 Oct 2018 09:36:15 -0000      1.72
@@ -46,7 +46,6 @@
 <h3 id='spy'>Spying</h3>
 
 <ul class="blurbs">
-<!-- INSERT spy -->
   <li id="M201706202">
     <p id="InternetCameraBackDoor">Many models of Internet-connected
     cameras contain a glaring back door&mdash;they have login
@@ -95,7 +94,6 @@
 <h3 id='alter-data'>Altering user's data or settings</h3>
 
 <ul class="blurbs">
-<!-- INSERT alter-data -->
   <li id="M201809140">
     <p>Android has a <a
     
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change";>
@@ -203,7 +201,6 @@
 <h3 id='install-delete'>Installing or deleting programs</h3>
 
 <ul class="blurbs">
-<!-- INSERT install-delete -->
   <li id="M201804010">
     <p>Some &ldquo;Smart&rdquo; TVs automatically <a
     
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928";>
@@ -273,7 +270,6 @@
 <h3 id='universal'>Full control</h3>
 
 <ul class="blurbs">
-<!-- INSERT universal -->
   <li id="M201711244">
     <p>The Furby Connect has a <a
     
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect";>
@@ -393,7 +389,6 @@
 <h3 id='other'>Other or undefined</h3>
 
 <ul class="blurbs">
-<!-- INSERT other -->
   <li id="M201711204">
     <p>Intel's intentional &ldquo;management engine&rdquo; back door has <a
     
href="https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/";>
@@ -519,7 +514,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 12:36:26 $
+$Date: 2018/10/17 09:36:15 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-censorship.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-censorship.html,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- proprietary-censorship.html 12 Oct 2018 07:52:30 -0000      1.36
+++ proprietary-censorship.html 17 Oct 2018 09:36:15 -0000      1.37
@@ -47,7 +47,6 @@
 <h3 id="google">Google</h3>
 
 <ul class="blurbs">
-<!-- INSERT google -->
   <li id="M201703160">
     <p>Google <a
     
href="http://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts";>
@@ -89,7 +88,6 @@
 <h3 id="consoles">Game consoles</h3>
 
 <ul class="blurbs">
-<!-- INSERT consoles -->
   <li id="M201408290">
     <p>The <a
     
href="https://www.gamespot.com/articles/nintendos-new-3ds-charges-30-cents-to-remove-an-in/1100-6421996/";>
@@ -157,7 +155,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/12 07:52:30 $
+$Date: 2018/10/17 09:36:15 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-coverups.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-coverups.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- proprietary-coverups.html   9 Oct 2018 12:36:26 -0000       1.11
+++ proprietary-coverups.html   17 Oct 2018 09:36:15 -0000      1.12
@@ -33,10 +33,9 @@
 to present the specifics.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-coverups"></div>
 
 <ul class="blurbs">
-<!-- INSERT coverups -->
   <li id="M201612120">
     <p>Price Waterhouse Coopers tried
     to suppress knowledge of a security flaw by <a
@@ -104,7 +103,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 12:36:26 $
+$Date: 2018/10/17 09:36:15 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-deception.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-deception.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- proprietary-deception.html  9 Oct 2018 12:36:26 -0000       1.25
+++ proprietary-deception.html  17 Oct 2018 09:36:15 -0000      1.26
@@ -32,10 +32,9 @@
 to present the specifics.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-deception"></div>
 
 <ul class="blurbs">
-<!-- INSERT deception -->
   <li id="M201611060">
     <p><a
     
href="http://jalopnik.com/america-figured-out-a-new-way-audi-cheated-on-emissions-1788630969";>
@@ -147,7 +146,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 12:36:26 $
+$Date: 2018/10/17 09:36:15 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-drm.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-drm.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- proprietary-drm.html        9 Oct 2018 12:36:26 -0000       1.31
+++ proprietary-drm.html        17 Oct 2018 09:36:15 -0000      1.32
@@ -42,10 +42,9 @@
 to present the specifics.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-drm"></div>
 
 <ul class="blurbs">
-<!-- INSERT drm -->
   <li id="M201806250">
     <p>The game Metal Gear Rising for
     MacOS was tethered to a server.  The company <a
@@ -338,7 +337,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 12:36:26 $
+$Date: 2018/10/17 09:36:15 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-incompatibility.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-incompatibility.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- proprietary-incompatibility.html    9 Oct 2018 12:36:26 -0000       1.11
+++ proprietary-incompatibility.html    17 Oct 2018 09:36:15 -0000      1.12
@@ -38,10 +38,9 @@
 to present the specifics.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-incompatibility"></div>
 
 <ul class="blurbs">
-<!-- INSERT incompatibility -->
   <li id="M201803300">
     <p>In MacOS and iOS, the procedure for <a
     
href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac";>
@@ -132,7 +131,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 12:36:26 $
+$Date: 2018/10/17 09:36:15 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-insecurity.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-insecurity.html,v
retrieving revision 1.92
retrieving revision 1.93
diff -u -b -r1.92 -r1.93
--- proprietary-insecurity.html 9 Oct 2018 12:36:26 -0000       1.92
+++ proprietary-insecurity.html 17 Oct 2018 09:36:15 -0000      1.93
@@ -48,10 +48,9 @@
 to present the specifics.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-insecurity"></div>
 
 <ul class="blurbs">
-<!-- INSERT insecurity -->
   <li id="M201809240">
     <p>Researchers have discovered how to <a
     
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co";>
@@ -630,7 +629,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 12:36:26 $
+$Date: 2018/10/17 09:36:15 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-interference.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-interference.html,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- proprietary-interference.html       14 Oct 2018 11:40:59 -0000      1.38
+++ proprietary-interference.html       17 Oct 2018 09:36:15 -0000      1.39
@@ -33,10 +33,9 @@
 to present the specifics.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-interference"></div>
 
 <ul class="blurbs">
-<!-- INSERT interference -->
   <li id="M201809120">
     <p>One version of Windows 10 <a
     
href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/";>
@@ -229,7 +228,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/14 11:40:59 $
+$Date: 2018/10/17 09:36:15 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-jails.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-jails.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary-jails.html      9 Oct 2018 12:36:26 -0000       1.32
+++ proprietary-jails.html      17 Oct 2018 09:36:15 -0000      1.33
@@ -69,7 +69,6 @@
 <h4>Examples of censorship by Apple jails</h4>
 
 <ul class="blurbs">
-<!-- INSERT apple -->
   <li id="M201710130">
     <p>Apple is <a
     
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet";>
@@ -179,7 +178,6 @@
 <h3 id="microsoft">Microsoft jails</h3>
 
 <ul class="blurbs">
-<!-- INSERT microsoft -->
   <li id="M201706130">
     <p>Windows 10 S was a jail: <a
     
href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison";>
@@ -266,7 +264,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 12:36:26 $
+$Date: 2018/10/17 09:36:15 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-sabotage.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-sabotage.html,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- proprietary-sabotage.html   10 Oct 2018 07:28:25 -0000      1.63
+++ proprietary-sabotage.html   17 Oct 2018 09:36:15 -0000      1.64
@@ -31,10 +31,9 @@
 to present the specifics.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-sabotage"></div>
 
 <ul class="blurbs">
-<!-- INSERT sabotage -->
   <li id="M201807050">
     <p>The Jawbone fitness tracker was tethered to a proprietary phone
     app.  In 2017, the company shut down and made the app stop working. <a
@@ -520,7 +519,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/10 07:28:25 $
+$Date: 2018/10/17 09:36:15 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-subscriptions.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-subscriptions.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary-subscriptions.html      9 Oct 2018 12:36:26 -0000       1.16
+++ proprietary-subscriptions.html      17 Oct 2018 09:36:15 -0000      1.17
@@ -36,10 +36,9 @@
 to present the specifics.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-subscriptions"></div>
 
 <ul class="blurbs">
-<!-- INSERT subscriptions -->
   <li id="M201711010">
     <p>Sony has brought back its robotic pet Aibo, this time <a
     
href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet";>
@@ -142,7 +141,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 12:36:26 $
+$Date: 2018/10/17 09:36:15 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-surveillance.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-surveillance.html,v
retrieving revision 1.204
retrieving revision 1.205
diff -u -b -r1.204 -r1.205
--- proprietary-surveillance.html       7 Oct 2018 22:02:05 -0000       1.204
+++ proprietary-surveillance.html       17 Oct 2018 09:36:15 -0000      1.205
@@ -179,7 +179,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT windows -->
   <li id="M201712110">
     <p>HP's proprietary operating system <a
     href="http://www.bbc.com/news/technology-42309371";>includes a
@@ -345,7 +344,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT macos -->
   <li id="M201809070">
     <p>Adware Doctor, an ad blocker for MacOS, <a
     
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history";>reports
@@ -408,7 +406,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT bios -->
   <li id="M201509220">
     <p><a
     
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html";>
@@ -435,7 +432,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT phones -->
   <li id="M201601110">
     <p>The natural extension of monitoring
     people through &ldquo;their&rdquo; phones is <a
@@ -483,7 +479,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT ithings -->
   <li id="M201711250">
     <p>The DMCA and the EU Copyright Directive make it <a
     href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html";>
@@ -606,7 +601,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT android -->
   <li id="M201711210">
     <p>Android tracks location for Google <a
     
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml";>
@@ -700,7 +694,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT e-readers -->
   <li id="M201603080">
     <p>E-books can contain JavaScript code, and <a
     
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds";>
@@ -742,7 +735,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT apps -->
   <li id="M201808030">
     <p>Some Google apps on Android <a
     
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile";>
@@ -1145,7 +1137,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT skype -->
   <li id="M201307110">
     <p>Skype contains <a
     
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/";>spyware</a>.
@@ -1162,7 +1153,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT games -->
   <li id="M201806240">
     <p>Red Shell is a spyware that
     is found in many proprietary games. It <a
@@ -1244,7 +1234,6 @@
 <div style="clear: left;"></div>
 
 <ul class="blurbs">
-<!-- INSERT stings -->
   <li id="M201708280">
     <p>The bad security in many Internet of Stings devices allows <a
     
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml";>ISPs
@@ -1269,7 +1258,6 @@
 before Amazon &ldquo;smart&rdquo; TVs.</p>
 
 <ul class="blurbs">
-<!-- INSERT tvsets -->
   <li id="M201804010">
     <p>Some &ldquo;Smart&rdquo; TVs automatically <a
     
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928";>
@@ -1419,7 +1407,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT cameras -->
   <li id="M201603220">
     <p>Over 70 brands of network-connected surveillance cameras have <a
     
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html";>
@@ -1443,7 +1430,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT toys -->
   <li id="M201711244">
     <p>The Furby Connect has a <a
     
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect";>
@@ -1526,7 +1512,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT drones -->
   <li id="M201708040">
     <p>While you're using a DJI drone
     to snoop on other people, DJI is in many cases <a
@@ -1541,7 +1526,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT home -->
   <li id="M201808120">
     <p>Crackers found a way to break the security of an Amazon device,
     and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html";>
@@ -1595,7 +1579,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT wearables -->
   <li id="M201807260">
     <p>Tommy Hilfiger clothing <a
     
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers";>will
@@ -1610,7 +1593,6 @@
 <h5 id="SpywareOnSmartWatches">&ldquo;Smart&rdquo; Watches</h5>
 
 <ul class="blurbs">
-<!-- INSERT watches -->
   <li id="M201603020">
     <p>A very cheap &ldquo;smart watch&rdquo; comes with an Android app <a
     
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/";>
@@ -1635,7 +1617,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT cars -->
   <li id="M201711230">
     <p>AI-powered driving apps can <a
     
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move";>
@@ -1698,7 +1679,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT virtual -->
   <li id="M201612230">
     <p>VR equipment, measuring every slight motion,
     creates the potential for the most intimate
@@ -1728,7 +1708,6 @@
    but the surveillance is an abuse all the same.</p>
 
 <ul class="blurbs">
-<!-- INSERT websites -->
   <li id="M201805170">
     <p>The Storyful program <a
     
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch";>spies
@@ -1794,7 +1773,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT javascript -->
   <li id="M201807190">
     <p>British Airways used <a
     
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security";>nonfree
@@ -1835,7 +1813,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT flash -->
   <li id="M201310110">
     <p>Flash and JavaScript are used for <a
     
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/";>
@@ -1856,7 +1833,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT chrome -->
   <li id="M201507280">
     <p>Google Chrome makes it easy for an extension to do <a
     
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/";>total
@@ -1892,7 +1868,6 @@
 <div style="clear: left;"></div>
 
 <ul class="blurbs">
-<!-- INSERT networks -->
   <li id="M201606030">
     <p>Investigation Shows <a
     
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml";>GCHQ
@@ -1969,7 +1944,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/07 22:02:05 $
+$Date: 2018/10/17 09:36:15 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-tethers.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-tethers.html,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- proprietary-tethers.html    9 Oct 2018 12:36:26 -0000       1.28
+++ proprietary-tethers.html    17 Oct 2018 09:36:15 -0000      1.29
@@ -33,10 +33,9 @@
 to present the specifics.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-tethers"></div>
 
 <ul class="blurbs">
-<!-- INSERT tethers -->
   <li id="M201809260">
     <p>Honeywell's &ldquo;smart&rdquo; thermostats communicate
     only through the company's server. They have
@@ -219,7 +218,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 12:36:26 $
+$Date: 2018/10/17 09:36:15 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-tyrants.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-tyrants.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- proprietary-tyrants.html    9 Oct 2018 12:36:26 -0000       1.24
+++ proprietary-tyrants.html    17 Oct 2018 09:36:15 -0000      1.25
@@ -35,10 +35,9 @@
 to present the specifics.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-tyrants"></div>
 
 <ul class="blurbs">
-<!-- INSERT tyrants -->
   <li id="M201607150">
     <p>Microsoft accidentally left a way for users
     to install GNU/Linux on Windows RT tablets, but now it has <a
@@ -161,7 +160,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 12:36:26 $
+$Date: 2018/10/17 09:36:15 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary.html,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- proprietary.html    14 Oct 2018 11:40:59 -0000      1.37
+++ proprietary.html    17 Oct 2018 09:36:15 -0000      1.38
@@ -141,7 +141,6 @@
 <h3 id="latest">Latest additions</h3>
 
 <ul class="blurbs">
-<!-- INSERT proprietary -->
   <li id="M201805080">
     <p>A cracker used an exploit in outdated software to <a
     
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito";>
@@ -256,7 +255,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/14 11:40:59 $
+$Date: 2018/10/17 09:36:15 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]