[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-mobiles.html proprietar...
From: |
Therese Godefroy |
Subject: |
www/proprietary malware-mobiles.html proprietar... |
Date: |
Tue, 9 Apr 2019 03:28:32 -0400 (EDT) |
CVSROOT: /webcvs/www
Module name: www
Changes by: Therese Godefroy <th_g> 19/04/09 03:28:32
Modified files:
proprietary : malware-mobiles.html
proprietary-surveillance.html proprietary.html
proprietary/workshop: mal.rec
Log message:
Spying by preinstalled apps (www-discuss 2019-04-08).
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.html?cvsroot=www&r1=1.92&r2=1.93
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.html?cvsroot=www&r1=1.258&r2=1.259
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.html?cvsroot=www&r1=1.107&r2=1.108
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/mal.rec?cvsroot=www&r1=1.70&r2=1.71
Patches:
Index: malware-mobiles.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-mobiles.html,v
retrieving revision 1.92
retrieving revision 1.93
diff -u -b -r1.92 -r1.93
--- malware-mobiles.html 2 Apr 2019 00:54:35 -0000 1.92
+++ malware-mobiles.html 9 Apr 2019 07:28:32 -0000 1.93
@@ -379,6 +379,16 @@
<h3 id="surveillance">Mobile Surveillance</h3>
<ul class="blurbs">
+ <li id="M201903251">
+ <p>Many Android phones come with a huge number of <a
+
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
+ preinstalled nonfree apps that have access to sensitive data without
+ users' knowledge</a>. These hidden apps may either call home with
+ the data, or pass it on to user-installed apps that have access to
+ the network but no direct access to the data. This results in massive
+ surveillance on which the user has absolutely no control.</p>
+ </li>
+
<li id="M201903201">
<p>A study of 24 “health” apps found that 19 of them <a
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
@@ -1010,7 +1020,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/02 00:54:35 $
+$Date: 2019/04/09 07:28:32 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-surveillance.html,v
retrieving revision 1.258
retrieving revision 1.259
diff -u -b -r1.258 -r1.259
--- proprietary-surveillance.html 5 Apr 2019 09:59:38 -0000 1.258
+++ proprietary-surveillance.html 9 Apr 2019 07:28:32 -0000 1.259
@@ -768,6 +768,16 @@
</div>
<ul class="blurbs">
+ <li id="M201903251">
+ <p>Many Android phones come with a huge number of <a
+
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
+ preinstalled nonfree apps that have access to sensitive data without
+ users' knowledge</a>. These hidden apps may either call home with
+ the data, or pass it on to user-installed apps that have access to
+ the network but no direct access to the data. This results in massive
+ surveillance on which the user has absolutely no control.</p>
+ </li>
+
<li id="M201903201">
<p>A study of 24 “health” apps found that 19 of them <a
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
@@ -2248,7 +2258,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/05 09:59:38 $
+$Date: 2019/04/09 07:28:32 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary.html,v
retrieving revision 1.107
retrieving revision 1.108
diff -u -b -r1.107 -r1.108
--- proprietary.html 5 Apr 2019 09:59:38 -0000 1.107
+++ proprietary.html 9 Apr 2019 07:28:32 -0000 1.108
@@ -146,6 +146,16 @@
<h3 id="latest">Latest additions</h3>
<ul class="blurbs">
+ <li id="M201903251">
+ <p>Many Android phones come with a huge number of <a
+
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
+ preinstalled nonfree apps that have access to sensitive data without
+ users' knowledge</a>. These hidden apps may either call home with
+ the data, or pass it on to user-installed apps that have access to
+ the network but no direct access to the data. This results in massive
+ surveillance on which the user has absolutely no control.</p>
+ </li>
+
<li id="M201903290">
<p>Tesla cars collect lots of personal data, and <a
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">
@@ -184,28 +194,6 @@
passengers, other than proprietary software which Volvo—or
various governments and criminals—could change at any time.</p>
</li>
-
- <li id="M201704131">
- <p>Low-priced Chromebooks for schools are <a
- href="https://www.eff.org/wp/school-issued-devices-and-student-privacy">
- collecting far more data on students than is necessary, and store
- it indefinitely</a>. Parents and students complain about the lack
- of transparency on the part of both the educational services and the
- schools, the difficulty of opting out of these services, and the lack
- of proper privacy policies, among other things.</p>
-
- <p>But complaining is not sufficient. Parents, students and teachers
- should realize that the software Google uses to spy on students is
- nonfree, so they can't verify what it really does. The only remedy is
- to persuade school officials to <a href="/education/edu-schools.html">
- exclusively use free software</a> for both education and school
- administration. If the school is run locally, parents and teachers
- can mandate their representatives at the School Board to refuse the
- budget unless the school initiates a switch to free software. If
- education is run nation-wide, they need to persuade legislators
- (e.g., through free software organizations, political parties,
- etc.) to migrate the public schools to free software.</p>
- </li>
</ul>
@@ -266,7 +254,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/05 09:59:38 $
+$Date: 2019/04/09 07:28:32 $
<!-- timestamp end -->
</p>
</div>
Index: workshop/mal.rec
===================================================================
RCS file: /webcvs/www/www/proprietary/workshop/mal.rec,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- workshop/mal.rec 5 Apr 2019 09:59:38 -0000 1.70
+++ workshop/mal.rec 9 Apr 2019 07:28:32 -0000 1.71
@@ -25,6 +25,21 @@
#### Please don't remove the blank line after this marker! ####
# ADD NEW BLURB HERE
+Added: 2019-04-09
+Id: 201903251
+RT: www-discuss 2019-04-08 (surveillance)
+PubDate: 2019-03-25
+Target: proprietary-surveillance.html SpywareInMobileApps
+Target: malware-mobiles.html surveillance
+Keywords:
+Blurb: <p>Many Android phones come with a huge number of <a
++
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
++ preinstalled nonfree apps that have access to sensitive data without
++ users' knowledge</a>. These hidden apps may either call home with
++ the data, or pass it on to user-installed apps that have access to
++ the network but no direct access to the data. This results in massive
++ surveillance on which the user has absolutely no control.</p>
+
Added: 2019-04-05
Id: 201903290
RT: 1374469
- www/proprietary malware-mobiles.html proprietar...,
Therese Godefroy <=