[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-google.html malware-mob...
From: |
Therese Godefroy |
Subject: |
www/proprietary malware-google.html malware-mob... |
Date: |
Mon, 15 Jul 2019 05:43:28 -0400 (EDT) |
CVSROOT: /webcvs/www
Module name: www
Changes by: Therese Godefroy <th_g> 19/07/15 05:43:28
Modified files:
proprietary : malware-google.html malware-mobiles.html
proprietary-insecurity.html
proprietary-surveillance.html proprietary.html
proprietary/workshop: mal.rec
Log message:
Android app surveillance (www-discuss 2019-07-14).
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-google.html?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.html?cvsroot=www&r1=1.102&r2=1.103
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.html?cvsroot=www&r1=1.105&r2=1.106
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.html?cvsroot=www&r1=1.286&r2=1.287
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.html?cvsroot=www&r1=1.146&r2=1.147
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/mal.rec?cvsroot=www&r1=1.121&r2=1.122
Patches:
Index: malware-google.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-google.html,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- malware-google.html 13 Jul 2019 16:34:12 -0000 1.56
+++ malware-google.html 15 Jul 2019 09:43:27 -0000 1.57
@@ -193,6 +193,16 @@
bugs.</p>
<ul class="blurbs">
+ <li id="M201907080">
+ <p>Many Android apps can track
+ users' movements even when the user says <a
+
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
+ not to allow them access to locations</a>.</p>
+
+ <p>This involves an apparently unintentional weakness in Android,
+ exploited intentionally by malicious apps.</p>
+ </li>
+
<li id="M201311120">
<p><a
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
@@ -521,7 +531,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/07/13 16:34:12 $
+$Date: 2019/07/15 09:43:27 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-mobiles.html,v
retrieving revision 1.102
retrieving revision 1.103
diff -u -b -r1.102 -r1.103
--- malware-mobiles.html 27 Jun 2019 07:06:34 -0000 1.102
+++ malware-mobiles.html 15 Jul 2019 09:43:27 -0000 1.103
@@ -392,6 +392,16 @@
<h3 id="surveillance">Mobile Surveillance</h3>
<ul class="blurbs">
+ <li id="M201907080">
+ <p>Many Android apps can track
+ users' movements even when the user says <a
+
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
+ not to allow them access to locations</a>.</p>
+
+ <p>This involves an apparently unintentional weakness in Android,
+ exploited intentionally by malicious apps.</p>
+ </li>
+
<li id="M201905280">
<p>In spite of Apple's supposed commitment to
privacy, iPhone apps contain trackers that are busy at night <a
@@ -1079,7 +1089,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/06/27 07:06:34 $
+$Date: 2019/07/15 09:43:27 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-insecurity.html,v
retrieving revision 1.105
retrieving revision 1.106
diff -u -b -r1.105 -r1.106
--- proprietary-insecurity.html 18 May 2019 08:20:17 -0000 1.105
+++ proprietary-insecurity.html 15 Jul 2019 09:43:27 -0000 1.106
@@ -53,6 +53,16 @@
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
+ <li id="M201907080">
+ <p>Many Android apps can track
+ users' movements even when the user says <a
+
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
+ not to allow them access to locations</a>.</p>
+
+ <p>This involves an apparently unintentional weakness in Android,
+ exploited intentionally by malicious apps.</p>
+ </li>
+
<li id="M201905150">
<p>Users caught in the jail of an iMonster are <a
href="https://boingboing.net/2019/05/15/brittle-security.html"> sitting
@@ -678,7 +688,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/05/18 08:20:17 $
+$Date: 2019/07/15 09:43:27 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-surveillance.html,v
retrieving revision 1.286
retrieving revision 1.287
diff -u -b -r1.286 -r1.287
--- proprietary-surveillance.html 13 Jul 2019 16:34:12 -0000 1.286
+++ proprietary-surveillance.html 15 Jul 2019 09:43:27 -0000 1.287
@@ -813,6 +813,16 @@
</div>
<ul class="blurbs">
+ <li id="M201907080">
+ <p>Many Android apps can track
+ users' movements even when the user says <a
+
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
+ not to allow them access to locations</a>.</p>
+
+ <p>This involves an apparently unintentional weakness in Android,
+ exploited intentionally by malicious apps.</p>
+ </li>
+
<li id="M201905300">
<p>The Femm “fertility” app is secretly a <a
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
@@ -2422,7 +2432,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/07/13 16:34:12 $
+$Date: 2019/07/15 09:43:27 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary.html,v
retrieving revision 1.146
retrieving revision 1.147
diff -u -b -r1.146 -r1.147
--- proprietary.html 15 Jul 2019 09:03:43 -0000 1.146
+++ proprietary.html 15 Jul 2019 09:43:27 -0000 1.147
@@ -147,6 +147,16 @@
<h3 id="latest">Latest additions</h3>
<ul class="blurbs">
+ <li id="M201907080">
+ <p>Many Android apps can track
+ users' movements even when the user says <a
+
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
+ not to allow them access to locations</a>.</p>
+
+ <p>This involves an apparently unintentional weakness in Android,
+ exploited intentionally by malicious apps.</p>
+ </li>
+
<li id="M201809210">
<p>Cash of Clans is a good example of a gratis mobile game that its
developers <a href="https://gamerant.com/clash-of-clans-addiction/">
@@ -210,16 +220,6 @@
is collected by the company, there is no telling what it will be
used for.</p>
</li>
-
- <li id="M201905300">
- <p>The Femm “fertility” app is secretly a <a
-
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
- tool for propaganda</a> by natalist Christians. It spreads distrust
- for contraception.</p>
-
- <p>It snoops on users, too, as you must expect from nonfree
- programs.</p>
- </li>
</ul>
@@ -280,7 +280,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/07/15 09:03:43 $
+$Date: 2019/07/15 09:43:27 $
<!-- timestamp end -->
</p>
</div>
Index: workshop/mal.rec
===================================================================
RCS file: /webcvs/www/www/proprietary/workshop/mal.rec,v
retrieving revision 1.121
retrieving revision 1.122
diff -u -b -r1.121 -r1.122
--- workshop/mal.rec 15 Jul 2019 09:03:43 -0000 1.121
+++ workshop/mal.rec 15 Jul 2019 09:43:27 -0000 1.122
@@ -26,6 +26,23 @@
# ADD NEW BLURB HERE
Added: 2019-07-15
+Id: 201907080
+RT: www-discuss 2019-07-14 (Android app surveillance)
+PubDate: 2019-07-08
+Target: proprietary-surveillance.html SpywareInMobileApps
+Target: malware-mobiles.html surveillance
+Target: proprietary-insecurity.html proprietary-insecurity
+Target: malware-google.html insecurity
+Keywords: android
+Blurb: <p>Many Android apps can track
++ users' movements even when the user says <a
++
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
++ not to allow them access to locations</a>.</p>
++
++ <p>This involves an apparently unintentional weakness in Android,
++ exploited intentionally by malicious apps.</p>
+
+Added: 2019-07-15
Id: 201809210
RT: www-discuss 2019-07-01 (Article)
PubDate: 2018-09-21
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary malware-google.html malware-mob...,
Therese Godefroy <=