www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-webpages.html proprieta...


From: Therese Godefroy
Subject: www/proprietary malware-webpages.html proprieta...
Date: Tue, 4 Dec 2018 04:12:34 -0500 (EST)

CVSROOT:        /webcvs/www
Module name:    www
Changes by:     Therese Godefroy <th_g> 18/12/04 04:12:34

Modified files:
        proprietary    : malware-webpages.html 
                         proprietary-surveillance.html proprietary.html 
        proprietary/workshop: mal.rec 

Log message:
        Customer service agents can see typed messages in real time (RT 
#1340722)

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-webpages.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.html?cvsroot=www&r1=1.217&r2=1.218
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.html?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/mal.rec?cvsroot=www&r1=1.11&r2=1.12

Patches:
Index: malware-webpages.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-webpages.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- malware-webpages.html       25 Oct 2018 10:12:19 -0000      1.19
+++ malware-webpages.html       4 Dec 2018 09:12:33 -0000       1.20
@@ -49,6 +49,20 @@
 <div class="column-limit" id="malware-webpages"></div>
 
 <ul class="blurbs">
+  <li id="M201811270">
+    <p>Many web sites use JavaScript code <a
+    
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081";>
+    to snoop on information that users have typed into a
+    form but not sent</a>, in order to learn their identity. Some are <a
+    
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege";>
+    getting sued</a> for this.</p>
+
+    <p>The chat facilities of some customer services use the same sort of
+    malware to <a
+    
href"https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119";>
+    read what the user is typing before it is posted</a>.
+  </li>
+
   <li id="M201807190">
     <p>British Airways used <a
     
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security";>nonfree
@@ -86,15 +100,6 @@
     swipes usernames from browser-based password managers</a>.</p>
   </li>
 
-  <li id="M201712210">
-    <p>Many web sites use JavaScript code <a
-    
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081";>
-    to snoop on information that users have typed into a
-    form but not sent</a>, in order to learn their identity. Some are <a
-    
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege";>
-    getting sued</a> for this.</p>
-  </li>
-
   <li id="M201711150">
     <p>Some websites send
     JavaScript code to collect all the user's input, <a
@@ -254,7 +259,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/25 10:12:19 $
+$Date: 2018/12/04 09:12:33 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-surveillance.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-surveillance.html,v
retrieving revision 1.217
retrieving revision 1.218
diff -u -b -r1.217 -r1.218
--- proprietary-surveillance.html       1 Dec 2018 18:05:47 -0000       1.217
+++ proprietary-surveillance.html       4 Dec 2018 09:12:33 -0000       1.218
@@ -1808,6 +1808,20 @@
 </div>
 
 <ul class="blurbs">
+  <li id="M201811270">
+    <p>Many web sites use JavaScript code <a
+    
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081";>
+    to snoop on information that users have typed into a
+    form but not sent</a>, in order to learn their identity. Some are <a
+    
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege";>
+    getting sued</a> for this.</p>
+
+    <p>The chat facilities of some customer services use the same sort of
+    malware to <a
+    
href"https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119";>
+    read what the user is typing before it is posted</a>.
+  </li>
+
   <li id="M201807190">
     <p>British Airways used <a
     
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security";>nonfree
@@ -1821,15 +1835,6 @@
     swipes usernames from browser-based password managers</a>.</p>
   </li>
 
-  <li id="M201712210">
-    <p>Many web sites use JavaScript code <a
-    
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081";>
-    to snoop on information that users have typed into a
-    form but not sent</a>, in order to learn their identity. Some are <a
-    
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege";>
-    getting sued</a> for this.</p>
-  </li>
-
   <li id="M201711150">
     <p>Some websites send
     JavaScript code to collect all the user's input, <a
@@ -1979,7 +1984,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/12/01 18:05:47 $
+$Date: 2018/12/04 09:12:33 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary.html,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- proprietary.html    13 Nov 2018 15:30:27 -0000      1.49
+++ proprietary.html    4 Dec 2018 09:12:33 -0000       1.50
@@ -141,6 +141,20 @@
 <h3 id="latest">Latest additions</h3>
 
 <ul class="blurbs">
+  <li id="M201811270">
+    <p>Many web sites use JavaScript code <a
+    
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081";>
+    to snoop on information that users have typed into a
+    form but not sent</a>, in order to learn their identity. Some are <a
+    
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege";>
+    getting sued</a> for this.</p>
+
+    <p>The chat facilities of some customer services use the same sort of
+    malware to <a
+    
href"https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119";>
+    read what the user is typing before it is posted</a>.
+  </li>
+
   <li id="M201811100">
     <p>Corel Paintshop Pro has a <a
     
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/";>
@@ -204,25 +218,6 @@
     the performance of older phones to force users to buy their newer
     phones</a>.</p>
   </li>
-
-  <li id="M201810230">
-    <p>GM <a
-    href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html";>
-    tracked the choices of radio programs</a> in its
-    &ldquo;connected&rdquo; cars, minute by minute.</p>
-
-    <p>GM did not get users' consent, but it could have got that easily by
-    sneaking it into the contract that users sign for some digital service
-    or other. A requirement for consent is effectively no protection.</p>
-
-    <p>The cars can also collect lots of other data: listening to you,
-    watching you, following your movements, tracking passengers' cell
-    phones. <em>All</em> such data collection should be forbidden.</p>
-
-    <p>But if you really want to be safe, we must make sure the car's
-    hardware cannot collect any of that data, or that the software
-    is free so we know it won't collect any of that data.</p>
-  </li>
 </ul>
 
 
@@ -283,7 +278,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/11/13 15:30:27 $
+$Date: 2018/12/04 09:12:33 $
 <!-- timestamp end -->
 </p>
 </div>

Index: workshop/mal.rec
===================================================================
RCS file: /webcvs/www/www/proprietary/workshop/mal.rec,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- workshop/mal.rec    1 Dec 2018 18:05:47 -0000       1.11
+++ workshop/mal.rec    4 Dec 2018 09:12:33 -0000       1.12
@@ -601,11 +601,14 @@
 +   <p>For your safety, don't use any appliance with a connection to the
 +   real internet.</p>
 
-Id: 201712210
+Added: 2018-12-04
+Id: 201811270
+RT: 1340722
 Target: proprietary-surveillance.html SpywareInJavaScript
 Target: malware-webpages.html malware-webpages
 PubDate: 2017-06-20
 PubDate: 2017-12-21
+PubDate: 2018-11-27
 Keywords:
 Blurb: <p>Many web sites use JavaScript code <a
 +   
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081";>
@@ -613,6 +616,11 @@
 +   form but not sent</a>, in order to learn their identity. Some are <a
 +   
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege";>
 +   getting sued</a> for this.</p>
++
++   <p>The chat facilities of some customer services use the same sort of
++   malware to <a
++   
href"https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119";>
++   read what the user is typing before it is posted</a>.
 
 Id: 201712130
 Target: potential-malware.html potential-malware



reply via email to

[Prev in Thread] Current Thread [Next in Thread]