www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-mobiles.html proprietar...


From: Therese Godefroy
Subject: www/proprietary malware-mobiles.html proprietar...
Date: Sat, 2 Feb 2019 08:24:15 -0500 (EST)

CVSROOT:        /webcvs/www
Module name:    www
Changes by:     Therese Godefroy <th_g> 19/02/02 08:24:15

Modified files:
        proprietary    : malware-mobiles.html proprietary-sabotage.html 
                         proprietary-surveillance.html proprietary.html 
        proprietary/workshop: mal.rec 

Log message:
        Validation fix; remove duplicates.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.html?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.html?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.html?cvsroot=www&r1=1.232&r2=1.233
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.html?cvsroot=www&r1=1.72&r2=1.73
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/mal.rec?cvsroot=www&r1=1.29&r2=1.30

Patches:
Index: malware-mobiles.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-mobiles.html,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- malware-mobiles.html        2 Feb 2019 13:13:29 -0000       1.76
+++ malware-mobiles.html        2 Feb 2019 13:24:14 -0000       1.77
@@ -367,7 +367,7 @@
   <li id="M201812290">
     <p>Around 40% of gratis Androids apps <a
     
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report";>
-    report on the user's actions to Facebook.</p>
+    report on the user's actions to Facebook</a>.</p>
 
     <p>Often they send the machine's &ldquo;advertising ID,&rdquo; so that
     Facebook can correlate the data it obtains from the same machine via
@@ -910,7 +910,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/02/02 13:13:29 $
+$Date: 2019/02/02 13:24:14 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-sabotage.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-sabotage.html,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- proprietary-sabotage.html   2 Feb 2019 13:13:29 -0000       1.75
+++ proprietary-sabotage.html   2 Feb 2019 13:24:14 -0000       1.76
@@ -39,7 +39,7 @@
   <li id="M201811020">
     <p>Foundry's graphics software <a
     
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/";>
-    reports information to identify who is running it. The result is
+    reports information to identify who is running it</a>. The result is
     often a legal threat demanding a lot of money.</p>
 
     <p>The fact that this is used for repression of forbidden sharing
@@ -550,7 +550,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/02/02 13:13:29 $
+$Date: 2019/02/02 13:24:14 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-surveillance.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-surveillance.html,v
retrieving revision 1.232
retrieving revision 1.233
diff -u -b -r1.232 -r1.233
--- proprietary-surveillance.html       2 Feb 2019 13:13:29 -0000       1.232
+++ proprietary-surveillance.html       2 Feb 2019 13:24:14 -0000       1.233
@@ -750,7 +750,7 @@
   <li id="M201811020">
     <p>Foundry's graphics software <a
     
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/";>
-    reports information to identify who is running it. The result is
+    reports information to identify who is running it</a>. The result is
     often a legal threat demanding a lot of money.</p>
 
     <p>The fact that this is used for repression of forbidden sharing
@@ -788,7 +788,7 @@
   <li id="M201812290">
     <p>Around 40% of gratis Androids apps <a
     
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report";>
-    report on the user's actions to Facebook.</p>
+    report on the user's actions to Facebook</a>.</p>
 
     <p>Often they send the machine's &ldquo;advertising ID,&rdquo; so that
     Facebook can correlate the data it obtains from the same machine via
@@ -2066,7 +2066,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/02/02 13:13:29 $
+$Date: 2019/02/02 13:24:14 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary.html,v
retrieving revision 1.72
retrieving revision 1.73
diff -u -b -r1.72 -r1.73
--- proprietary.html    2 Feb 2019 13:13:29 -0000       1.72
+++ proprietary.html    2 Feb 2019 13:24:15 -0000       1.73
@@ -147,7 +147,7 @@
   <li id="M201812290">
     <p>Around 40% of gratis Androids apps <a
     
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report";>
-    report on the user's actions to Facebook.</p>
+    report on the user's actions to Facebook</a>.</p>
 
     <p>Often they send the machine's &ldquo;advertising ID,&rdquo; so that
     Facebook can correlate the data it obtains from the same machine via
@@ -162,36 +162,7 @@
   <li id="M201811020">
     <p>Foundry's graphics software <a
     
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/";>
-    reports information to identify who is running it. The result is
-    often a legal threat demanding a lot of money.</p>
-
-    <p>The fact that this is used for repression of forbidden sharing
-    makes it even more vicious.</p>
-
-    <p>This illustrates that making unauthorized copies of nonfree software
-    is not a cure for the injustice of nonfree software. It may avoid
-    paying for the nasty thing, but cannot make it less nasty.</p>
-  </li>
-
-  <li id="M201812290">
-    <p>Around 40% of gratis Androids apps <a
-    
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report";>
-    report on the user's actions to Facebook.</p>
-
-    <p>Often they send the machine's &ldquo;advertising ID,&rdquo; so that
-    Facebook can correlate the data it obtains from the same machine via
-    various apps. Some of them send Facebook detailed information about
-    the user's activities in the app; others only say that the user is
-    using that app, but that alone is often quite informative.</p>
-
-    <p>This spying occurs regardless of whether the user has a Facebook
-    account.</p>
-  </li>
-
-  <li id="M201811020">
-    <p>Foundry's graphics software <a
-    
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/";>
-    reports information to identify who is running it. The result is
+    reports information to identify who is running it</a>. The result is
     often a legal threat demanding a lot of money.</p>
 
     <p>The fact that this is used for repression of forbidden sharing
@@ -276,7 +247,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/02/02 13:13:29 $
+$Date: 2019/02/02 13:24:15 $
 <!-- timestamp end -->
 </p>
 </div>

Index: workshop/mal.rec
===================================================================
RCS file: /webcvs/www/www/proprietary/workshop/mal.rec,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- workshop/mal.rec    2 Feb 2019 13:13:31 -0000       1.29
+++ workshop/mal.rec    2 Feb 2019 13:24:15 -0000       1.30
@@ -34,7 +34,7 @@
 Keywords: android facebook
 Blurb: <p>Around 40% of gratis Androids apps <a
 +   
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report";>
-+   report on the user's actions to Facebook.</p>
++   report on the user's actions to Facebook</a>.</p>
 +
 +   <p>Often they send the machine's &ldquo;advertising ID,&rdquo; so that
 +   Facebook can correlate the data it obtains from the same machine via
@@ -54,7 +54,7 @@
 Keywords: foundry
 Blurb: <p>Foundry's graphics software <a
 +   
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/";>
-+   reports information to identify who is running it. The result is
++   reports information to identify who is running it</a>. The result is
 +   often a legal threat demanding a lot of money.</p>
 +
 +   <p>The fact that this is used for repression of forbidden sharing



reply via email to

[Prev in Thread] Current Thread [Next in Thread]