[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-mobiles.html proprietar...
From: |
Therese Godefroy |
Subject: |
www/proprietary malware-mobiles.html proprietar... |
Date: |
Sat, 3 Aug 2019 07:13:37 -0400 (EDT) |
CVSROOT: /webcvs/www
Module name: www
Changes by: Therese Godefroy <th_g> 19/08/03 07:13:37
Modified files:
proprietary : malware-mobiles.html
proprietary-surveillance.html proprietary.html
proprietary/workshop: mal.rec
Log message:
Unscrupulous developers bypass user's settings (www-discuss 2019-08-02).
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.html?cvsroot=www&r1=1.103&r2=1.104
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.html?cvsroot=www&r1=1.290&r2=1.291
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.html?cvsroot=www&r1=1.154&r2=1.155
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/mal.rec?cvsroot=www&r1=1.131&r2=1.132
Patches:
Index: malware-mobiles.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-mobiles.html,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -b -r1.103 -r1.104
--- malware-mobiles.html 15 Jul 2019 09:43:27 -0000 1.103
+++ malware-mobiles.html 3 Aug 2019 11:13:37 -0000 1.104
@@ -392,6 +392,17 @@
<h3 id="surveillance">Mobile Surveillance</h3>
<ul class="blurbs">
+ <li id="M201907081">
+ <p>Many unscrupulous mobile-app developers keep finding ways to <a
+
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
+ bypass user's settings</a>, regulations, and privacy-enhancing features
+ of the operating system, in order to gather as much private data as
+ they possibly can.</p>
+
+ <p>Thus, we can't trust rules against spying. What we can trust is
+ having control over the software we run.</p>
+ </li>
+
<li id="M201907080">
<p>Many Android apps can track
users' movements even when the user says <a
@@ -1089,7 +1100,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/07/15 09:43:27 $
+$Date: 2019/08/03 11:13:37 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-surveillance.html,v
retrieving revision 1.290
retrieving revision 1.291
diff -u -b -r1.290 -r1.291
--- proprietary-surveillance.html 30 Jul 2019 08:04:06 -0000 1.290
+++ proprietary-surveillance.html 3 Aug 2019 11:13:37 -0000 1.291
@@ -804,6 +804,17 @@
</div>
<ul class="blurbs">
+ <li id="M201907081">
+ <p>Many unscrupulous mobile-app developers keep finding ways to <a
+
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
+ bypass user's settings</a>, regulations, and privacy-enhancing features
+ of the operating system, in order to gather as much private data as
+ they possibly can.</p>
+
+ <p>Thus, we can't trust rules against spying. What we can trust is
+ having control over the software we run.</p>
+ </li>
+
<li id="M201907080">
<p>Many Android apps can track
users' movements even when the user says <a
@@ -2448,7 +2459,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/07/30 08:04:06 $
+$Date: 2019/08/03 11:13:37 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary.html,v
retrieving revision 1.154
retrieving revision 1.155
diff -u -b -r1.154 -r1.155
--- proprietary.html 21 Jul 2019 16:51:29 -0000 1.154
+++ proprietary.html 3 Aug 2019 11:13:37 -0000 1.155
@@ -147,6 +147,17 @@
<h3 id="latest">Latest additions</h3>
<ul class="blurbs">
+ <li id="M201907081">
+ <p>Many unscrupulous mobile-app developers keep finding ways to <a
+
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
+ bypass user's settings</a>, regulations, and privacy-enhancing features
+ of the operating system, in order to gather as much private data as
+ they possibly can.</p>
+
+ <p>Thus, we can't trust rules against spying. What we can trust is
+ having control over the software we run.</p>
+ </li>
+
<li id="M201907210">
<p>Google “Assistant” records users' conversations <a
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
@@ -202,19 +213,6 @@
<p>This involves an apparently unintentional weakness in Android,
exploited intentionally by malicious apps.</p>
</li>
-
- <li id="M201809210">
- <p>Cash of Clans is a good example of a gratis mobile game that its
- developers <a href="https://gamerant.com/clash-of-clans-addiction/">
- made very addictive</a> for a large proportion of its users—and
- turned into a cash machine for themselves—by using <a
- href="/proprietary/proprietary-addictions.html#addictiveness">
- psychological manipulation techniques</a>.</p>
-
- <p>The article uses “free” to mean “zero
- price,” which is a usage we should avoid. We recommend saying
- “gratis” instead.</p>
- </li>
</ul>
@@ -275,7 +273,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/07/21 16:51:29 $
+$Date: 2019/08/03 11:13:37 $
<!-- timestamp end -->
</p>
</div>
Index: workshop/mal.rec
===================================================================
RCS file: /webcvs/www/www/proprietary/workshop/mal.rec,v
retrieving revision 1.131
retrieving revision 1.132
diff -u -b -r1.131 -r1.132
--- workshop/mal.rec 30 Jul 2019 08:04:07 -0000 1.131
+++ workshop/mal.rec 3 Aug 2019 11:13:37 -0000 1.132
@@ -25,6 +25,22 @@
#### Please don't remove the blank line after this marker! ####
# ADD NEW BLURB HERE
+Added: 2019-08-03
+Id: 201907081
+RT: www-discuss 2019-08-02 (...harvest-your-data-even-after...)
+PubDate: 2019-07-08
+Target: proprietary-surveillance.html SpywareInMobileApps
+Target: malware-mobiles.html surveillance
+Keywords:
+Blurb: <p>Many unscrupulous mobile-app developers keep finding ways to <a
++
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
++ bypass user's settings</a>, regulations, and privacy-enhancing features
++ of the operating system, in order to gather as much private data as
++ they possibly can.</p>
++
++ <p>Thus, we can't trust rules against spying. What we can trust is
++ having control over the software we run.</p>
+
Added: 2019-07-21
Id: 201907210
RT: www-discuss 2019-07-20 (Google's home assistant listens even when it
- www/proprietary malware-mobiles.html proprietar...,
Therese Godefroy <=