[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary potential-malware.html propriet...
From: |
Therese Godefroy |
Subject: |
www/proprietary potential-malware.html propriet... |
Date: |
Mon, 11 Mar 2019 05:51:09 -0400 (EDT) |
CVSROOT: /webcvs/www
Module name: www
Changes by: Therese Godefroy <th_g> 19/03/11 05:51:09
Modified files:
proprietary : potential-malware.html proprietary.html
proprietary/workshop: mal.rec
Log message:
HDD acting as microphone (www-discuss 2019-03-10).
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/potential-malware.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.html?cvsroot=www&r1=1.95&r2=1.96
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/mal.rec?cvsroot=www&r1=1.57&r2=1.58
Patches:
Index: potential-malware.html
===================================================================
RCS file: /webcvs/www/www/proprietary/potential-malware.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- potential-malware.html 21 Feb 2019 13:39:45 -0000 1.15
+++ potential-malware.html 11 Mar 2019 09:51:09 -0000 1.16
@@ -24,6 +24,16 @@
<div class="column-limit" id="potential-malware"></div>
<ul class="blurbs">
+ <li id="M201903080">
+ <p>Malware installed into the processor in a hard drive could <a
+
href="https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-listening-devices-researchers-find">
+ use the disk itself as a microphone to detect speech</a>.</p>
+
+ <p>The article refers to the “Linux operating system” but
+ seems to mean <a href="/gnu/linux-and-gnu.html">GNU/Linux</a>. That
+ hack would not require changing Linux itself.</p>
+ </li>
+
<li id="M201902200">
<p>Some portable surveillance
devices (“phones”) now have <a
@@ -114,7 +124,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/21 13:39:45 $
+$Date: 2019/03/11 09:51:09 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary.html,v
retrieving revision 1.95
retrieving revision 1.96
diff -u -b -r1.95 -r1.96
--- proprietary.html 10 Mar 2019 18:37:41 -0000 1.95
+++ proprietary.html 11 Mar 2019 09:51:09 -0000 1.96
@@ -146,6 +146,16 @@
<h3 id="latest">Latest additions</h3>
<ul class="blurbs">
+ <li id="M201903080">
+ <p>Malware installed into the processor in a hard drive could <a
+
href="https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-listening-devices-researchers-find">
+ use the disk itself as a microphone to detect speech</a>.</p>
+
+ <p>The article refers to the “Linux operating system” but
+ seems to mean <a href="/gnu/linux-and-gnu.html">GNU/Linux</a>. That
+ hack would not require changing Linux itself.</p>
+ </li>
+
<li id="M201507290">
<p>Game Of War: Fire Age is an iPhone game with <a
href="http://www.cracked.com/personal-experiences-1762-5-reasons-i-lost-249000-iphone-game.html">
@@ -242,18 +252,6 @@
preventing nonfree software developers from including malware in
their programs.</p>
</li>
-
- <li id="M201902230">
- <p>Facebook offered a convenient proprietary
- library for building mobile apps, which also <a
- href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
- sent personal data to Facebook</a>. Lots of companies built apps that
- way and released them, apparently not realizing that all the personal
- data they collected would go to Facebook as well.</p>
-
- <p>It shows that no one can trust a nonfree program, not even the
- developers of other nonfree programs.</p>
- </li>
</ul>
@@ -314,7 +312,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/10 18:37:41 $
+$Date: 2019/03/11 09:51:09 $
<!-- timestamp end -->
</p>
</div>
Index: workshop/mal.rec
===================================================================
RCS file: /webcvs/www/www/proprietary/workshop/mal.rec,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- workshop/mal.rec 10 Mar 2019 18:37:42 -0000 1.57
+++ workshop/mal.rec 11 Mar 2019 09:51:09 -0000 1.58
@@ -25,6 +25,20 @@
#### Please don't remove the blank line after this marker! ####
# ADD NEW BLURB HERE
+Added: 2019-03-11
+Id: 201903080
+RT: www-discuss 2019-03-11 (potential malware.html)
+PubDate: 2019-03-08
+Target: potential-malware.html potential-malware
+Keywords:
+Blurb: <p>Malware installed into the processor in a hard drive could <a
++
href="https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-listening-devices-researchers-find">
++ use the disk itself as a microphone to detect speech</a>.</p>
++
++ <p>The article refers to the “Linux operating system” but
++ seems to mean <a href="/gnu/linux-and-gnu.html">GNU/Linux</a>. That
++ hack would not require changing Linux itself.</p>
+
Added: 2019-03-10
Id: 201507290
RT: 1340442
- www/proprietary potential-malware.html propriet...,
Therese Godefroy <=