[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-webpages.html proprieta...
From: |
Therese Godefroy |
Subject: |
www/proprietary malware-webpages.html proprieta... |
Date: |
Tue, 4 Dec 2018 04:12:34 -0500 (EST) |
CVSROOT: /webcvs/www
Module name: www
Changes by: Therese Godefroy <th_g> 18/12/04 04:12:34
Modified files:
proprietary : malware-webpages.html
proprietary-surveillance.html proprietary.html
proprietary/workshop: mal.rec
Log message:
Customer service agents can see typed messages in real time (RT
#1340722)
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-webpages.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.html?cvsroot=www&r1=1.217&r2=1.218
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.html?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/mal.rec?cvsroot=www&r1=1.11&r2=1.12
Patches:
Index: malware-webpages.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-webpages.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- malware-webpages.html 25 Oct 2018 10:12:19 -0000 1.19
+++ malware-webpages.html 4 Dec 2018 09:12:33 -0000 1.20
@@ -49,6 +49,20 @@
<div class="column-limit" id="malware-webpages"></div>
<ul class="blurbs">
+ <li id="M201811270">
+ <p>Many web sites use JavaScript code <a
+
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
+ to snoop on information that users have typed into a
+ form but not sent</a>, in order to learn their identity. Some are <a
+
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
+ getting sued</a> for this.</p>
+
+ <p>The chat facilities of some customer services use the same sort of
+ malware to <a
+
href"https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119">
+ read what the user is typing before it is posted</a>.
+ </li>
+
<li id="M201807190">
<p>British Airways used <a
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security">nonfree
@@ -86,15 +100,6 @@
swipes usernames from browser-based password managers</a>.</p>
</li>
- <li id="M201712210">
- <p>Many web sites use JavaScript code <a
-
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
- to snoop on information that users have typed into a
- form but not sent</a>, in order to learn their identity. Some are <a
-
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
- getting sued</a> for this.</p>
- </li>
-
<li id="M201711150">
<p>Some websites send
JavaScript code to collect all the user's input, <a
@@ -254,7 +259,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/25 10:12:19 $
+$Date: 2018/12/04 09:12:33 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-surveillance.html,v
retrieving revision 1.217
retrieving revision 1.218
diff -u -b -r1.217 -r1.218
--- proprietary-surveillance.html 1 Dec 2018 18:05:47 -0000 1.217
+++ proprietary-surveillance.html 4 Dec 2018 09:12:33 -0000 1.218
@@ -1808,6 +1808,20 @@
</div>
<ul class="blurbs">
+ <li id="M201811270">
+ <p>Many web sites use JavaScript code <a
+
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
+ to snoop on information that users have typed into a
+ form but not sent</a>, in order to learn their identity. Some are <a
+
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
+ getting sued</a> for this.</p>
+
+ <p>The chat facilities of some customer services use the same sort of
+ malware to <a
+
href"https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119">
+ read what the user is typing before it is posted</a>.
+ </li>
+
<li id="M201807190">
<p>British Airways used <a
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security">nonfree
@@ -1821,15 +1835,6 @@
swipes usernames from browser-based password managers</a>.</p>
</li>
- <li id="M201712210">
- <p>Many web sites use JavaScript code <a
-
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
- to snoop on information that users have typed into a
- form but not sent</a>, in order to learn their identity. Some are <a
-
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
- getting sued</a> for this.</p>
- </li>
-
<li id="M201711150">
<p>Some websites send
JavaScript code to collect all the user's input, <a
@@ -1979,7 +1984,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/12/01 18:05:47 $
+$Date: 2018/12/04 09:12:33 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary.html,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- proprietary.html 13 Nov 2018 15:30:27 -0000 1.49
+++ proprietary.html 4 Dec 2018 09:12:33 -0000 1.50
@@ -141,6 +141,20 @@
<h3 id="latest">Latest additions</h3>
<ul class="blurbs">
+ <li id="M201811270">
+ <p>Many web sites use JavaScript code <a
+
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
+ to snoop on information that users have typed into a
+ form but not sent</a>, in order to learn their identity. Some are <a
+
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
+ getting sued</a> for this.</p>
+
+ <p>The chat facilities of some customer services use the same sort of
+ malware to <a
+
href"https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119">
+ read what the user is typing before it is posted</a>.
+ </li>
+
<li id="M201811100">
<p>Corel Paintshop Pro has a <a
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/">
@@ -204,25 +218,6 @@
the performance of older phones to force users to buy their newer
phones</a>.</p>
</li>
-
- <li id="M201810230">
- <p>GM <a
- href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
- tracked the choices of radio programs</a> in its
- “connected” cars, minute by minute.</p>
-
- <p>GM did not get users' consent, but it could have got that easily by
- sneaking it into the contract that users sign for some digital service
- or other. A requirement for consent is effectively no protection.</p>
-
- <p>The cars can also collect lots of other data: listening to you,
- watching you, following your movements, tracking passengers' cell
- phones. <em>All</em> such data collection should be forbidden.</p>
-
- <p>But if you really want to be safe, we must make sure the car's
- hardware cannot collect any of that data, or that the software
- is free so we know it won't collect any of that data.</p>
- </li>
</ul>
@@ -283,7 +278,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/11/13 15:30:27 $
+$Date: 2018/12/04 09:12:33 $
<!-- timestamp end -->
</p>
</div>
Index: workshop/mal.rec
===================================================================
RCS file: /webcvs/www/www/proprietary/workshop/mal.rec,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- workshop/mal.rec 1 Dec 2018 18:05:47 -0000 1.11
+++ workshop/mal.rec 4 Dec 2018 09:12:33 -0000 1.12
@@ -601,11 +601,14 @@
+ <p>For your safety, don't use any appliance with a connection to the
+ real internet.</p>
-Id: 201712210
+Added: 2018-12-04
+Id: 201811270
+RT: 1340722
Target: proprietary-surveillance.html SpywareInJavaScript
Target: malware-webpages.html malware-webpages
PubDate: 2017-06-20
PubDate: 2017-12-21
+PubDate: 2018-11-27
Keywords:
Blurb: <p>Many web sites use JavaScript code <a
+
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
@@ -613,6 +616,11 @@
+ form but not sent</a>, in order to learn their identity. Some are <a
+
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
+ getting sued</a> for this.</p>
++
++ <p>The chat facilities of some customer services use the same sort of
++ malware to <a
++
href"https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119">
++ read what the user is typing before it is posted</a>.
Id: 201712130
Target: potential-malware.html potential-malware
- www/proprietary malware-webpages.html proprieta...,
Therese Godefroy <=