www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary potential-malware.html propriet...


From: Therese Godefroy
Subject: www/proprietary potential-malware.html propriet...
Date: Mon, 11 Mar 2019 05:51:09 -0400 (EDT)

CVSROOT:        /webcvs/www
Module name:    www
Changes by:     Therese Godefroy <th_g> 19/03/11 05:51:09

Modified files:
        proprietary    : potential-malware.html proprietary.html 
        proprietary/workshop: mal.rec 

Log message:
        HDD acting as microphone (www-discuss 2019-03-10).

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/potential-malware.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.html?cvsroot=www&r1=1.95&r2=1.96
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/mal.rec?cvsroot=www&r1=1.57&r2=1.58

Patches:
Index: potential-malware.html
===================================================================
RCS file: /webcvs/www/www/proprietary/potential-malware.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- potential-malware.html      21 Feb 2019 13:39:45 -0000      1.15
+++ potential-malware.html      11 Mar 2019 09:51:09 -0000      1.16
@@ -24,6 +24,16 @@
 <div class="column-limit" id="potential-malware"></div>
 
 <ul class="blurbs">
+  <li id="M201903080">
+    <p>Malware installed into the processor in a hard drive could <a
+    
href="https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-listening-devices-researchers-find";>
+    use the disk itself as a microphone to detect speech</a>.</p>
+
+    <p>The article refers to the &ldquo;Linux operating system&rdquo; but
+    seems to mean <a href="/gnu/linux-and-gnu.html">GNU/Linux</a>. That
+    hack would not require changing Linux itself.</p>
+  </li>
+
   <li id="M201902200">
     <p>Some portable surveillance
     devices (&ldquo;phones&rdquo;) now have <a
@@ -114,7 +124,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/02/21 13:39:45 $
+$Date: 2019/03/11 09:51:09 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary.html,v
retrieving revision 1.95
retrieving revision 1.96
diff -u -b -r1.95 -r1.96
--- proprietary.html    10 Mar 2019 18:37:41 -0000      1.95
+++ proprietary.html    11 Mar 2019 09:51:09 -0000      1.96
@@ -146,6 +146,16 @@
 <h3 id="latest">Latest additions</h3>
 
 <ul class="blurbs">
+  <li id="M201903080">
+    <p>Malware installed into the processor in a hard drive could <a
+    
href="https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-listening-devices-researchers-find";>
+    use the disk itself as a microphone to detect speech</a>.</p>
+
+    <p>The article refers to the &ldquo;Linux operating system&rdquo; but
+    seems to mean <a href="/gnu/linux-and-gnu.html">GNU/Linux</a>. That
+    hack would not require changing Linux itself.</p>
+  </li>
+
   <li id="M201507290">
     <p>Game Of War: Fire Age is an iPhone game with <a
     
href="http://www.cracked.com/personal-experiences-1762-5-reasons-i-lost-249000-iphone-game.html";>
@@ -242,18 +252,6 @@
     preventing nonfree software developers from including malware in
     their programs.</p>
   </li>
-
-  <li id="M201902230">
-    <p>Facebook offered a convenient proprietary
-    library for building mobile apps, which also <a
-    href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html";>
-    sent personal data to Facebook</a>. Lots of companies built apps that
-    way and released them, apparently not realizing that all the personal
-    data they collected would go to Facebook as well.</p>
-
-    <p>It shows that no one can trust a nonfree program, not even the
-    developers of other nonfree programs.</p>
-  </li>
 </ul>
 
 
@@ -314,7 +312,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/03/10 18:37:41 $
+$Date: 2019/03/11 09:51:09 $
 <!-- timestamp end -->
 </p>
 </div>

Index: workshop/mal.rec
===================================================================
RCS file: /webcvs/www/www/proprietary/workshop/mal.rec,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- workshop/mal.rec    10 Mar 2019 18:37:42 -0000      1.57
+++ workshop/mal.rec    11 Mar 2019 09:51:09 -0000      1.58
@@ -25,6 +25,20 @@
 ####    Please don't remove the blank line after this marker!    ####
 # ADD NEW BLURB HERE
 
+Added: 2019-03-11
+Id: 201903080
+RT: www-discuss 2019-03-11 (potential malware.html)
+PubDate: 2019-03-08
+Target: potential-malware.html potential-malware
+Keywords:
+Blurb: <p>Malware installed into the processor in a hard drive could <a
++   
href="https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-listening-devices-researchers-find";>
++   use the disk itself as a microphone to detect speech</a>.</p>
++
++   <p>The article refers to the &ldquo;Linux operating system&rdquo; but
++   seems to mean <a href="/gnu/linux-and-gnu.html">GNU/Linux</a>. That
++   hack would not require changing Linux itself.</p>
+
 Added: 2019-03-10
 Id: 201507290
 RT: 1340442



reply via email to

[Prev in Thread] Current Thread [Next in Thread]