www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-mobiles.html proprietar...


From: Therese Godefroy
Subject: www/proprietary malware-mobiles.html proprietar...
Date: Sat, 3 Aug 2019 07:13:37 -0400 (EDT)

CVSROOT:        /webcvs/www
Module name:    www
Changes by:     Therese Godefroy <th_g> 19/08/03 07:13:37

Modified files:
        proprietary    : malware-mobiles.html 
                         proprietary-surveillance.html proprietary.html 
        proprietary/workshop: mal.rec 

Log message:
        Unscrupulous developers bypass user's settings (www-discuss 2019-08-02).

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.html?cvsroot=www&r1=1.103&r2=1.104
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.html?cvsroot=www&r1=1.290&r2=1.291
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.html?cvsroot=www&r1=1.154&r2=1.155
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/mal.rec?cvsroot=www&r1=1.131&r2=1.132

Patches:
Index: malware-mobiles.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-mobiles.html,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -b -r1.103 -r1.104
--- malware-mobiles.html        15 Jul 2019 09:43:27 -0000      1.103
+++ malware-mobiles.html        3 Aug 2019 11:13:37 -0000       1.104
@@ -392,6 +392,17 @@
 <h3 id="surveillance">Mobile Surveillance</h3>
 
 <ul class="blurbs">
+  <li id="M201907081">
+    <p>Many unscrupulous mobile-app developers keep finding ways to <a
+    
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/";>
+    bypass user's settings</a>, regulations, and privacy-enhancing features
+    of the operating system, in order to gather as much private data as
+    they possibly can.</p>
+
+    <p>Thus, we can't trust rules against spying.  What we can trust is
+    having control over the software we run.</p>
+  </li>
+
   <li id="M201907080">
     <p>Many Android apps can track
     users' movements even when the user says <a
@@ -1089,7 +1100,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/07/15 09:43:27 $
+$Date: 2019/08/03 11:13:37 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-surveillance.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-surveillance.html,v
retrieving revision 1.290
retrieving revision 1.291
diff -u -b -r1.290 -r1.291
--- proprietary-surveillance.html       30 Jul 2019 08:04:06 -0000      1.290
+++ proprietary-surveillance.html       3 Aug 2019 11:13:37 -0000       1.291
@@ -804,6 +804,17 @@
 </div>
 
 <ul class="blurbs">
+  <li id="M201907081">
+    <p>Many unscrupulous mobile-app developers keep finding ways to <a
+    
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/";>
+    bypass user's settings</a>, regulations, and privacy-enhancing features
+    of the operating system, in order to gather as much private data as
+    they possibly can.</p>
+
+    <p>Thus, we can't trust rules against spying.  What we can trust is
+    having control over the software we run.</p>
+  </li>
+
   <li id="M201907080">
     <p>Many Android apps can track
     users' movements even when the user says <a
@@ -2448,7 +2459,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/07/30 08:04:06 $
+$Date: 2019/08/03 11:13:37 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary.html,v
retrieving revision 1.154
retrieving revision 1.155
diff -u -b -r1.154 -r1.155
--- proprietary.html    21 Jul 2019 16:51:29 -0000      1.154
+++ proprietary.html    3 Aug 2019 11:13:37 -0000       1.155
@@ -147,6 +147,17 @@
 <h3 id="latest">Latest additions</h3>
 
 <ul class="blurbs">
+  <li id="M201907081">
+    <p>Many unscrupulous mobile-app developers keep finding ways to <a
+    
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/";>
+    bypass user's settings</a>, regulations, and privacy-enhancing features
+    of the operating system, in order to gather as much private data as
+    they possibly can.</p>
+
+    <p>Thus, we can't trust rules against spying.  What we can trust is
+    having control over the software we run.</p>
+  </li>
+
   <li id="M201907210">
     <p>Google &ldquo;Assistant&rdquo; records users' conversations <a
     
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/";>even
@@ -202,19 +213,6 @@
     <p>This involves an apparently unintentional weakness in Android,
     exploited intentionally by malicious apps.</p>
   </li>
-
-  <li id="M201809210">
-    <p>Cash of Clans is a good example of a gratis mobile game that its
-    developers <a href="https://gamerant.com/clash-of-clans-addiction/";>
-    made very addictive</a> for a large proportion of its users&mdash;and
-    turned into a cash machine for themselves&mdash;by using <a
-    href="/proprietary/proprietary-addictions.html#addictiveness">
-    psychological manipulation techniques</a>.</p>
-
-    <p>The article uses &ldquo;free&rdquo; to mean &ldquo;zero
-    price,&rdquo; which is a usage we should avoid. We recommend saying
-    &ldquo;gratis&rdquo; instead.</p>
-  </li>
 </ul>
 
 
@@ -275,7 +273,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/07/21 16:51:29 $
+$Date: 2019/08/03 11:13:37 $
 <!-- timestamp end -->
 </p>
 </div>

Index: workshop/mal.rec
===================================================================
RCS file: /webcvs/www/www/proprietary/workshop/mal.rec,v
retrieving revision 1.131
retrieving revision 1.132
diff -u -b -r1.131 -r1.132
--- workshop/mal.rec    30 Jul 2019 08:04:07 -0000      1.131
+++ workshop/mal.rec    3 Aug 2019 11:13:37 -0000       1.132
@@ -25,6 +25,22 @@
 ####    Please don't remove the blank line after this marker!    ####
 # ADD NEW BLURB HERE
 
+Added: 2019-08-03
+Id: 201907081
+RT: www-discuss 2019-08-02 (...harvest-your-data-even-after...)
+PubDate: 2019-07-08
+Target: proprietary-surveillance.html SpywareInMobileApps
+Target: malware-mobiles.html surveillance
+Keywords:
+Blurb: <p>Many unscrupulous mobile-app developers keep finding ways to <a
++   
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/";>
++   bypass user's settings</a>, regulations, and privacy-enhancing features
++   of the operating system, in order to gather as much private data as
++   they possibly can.</p>
++
++   <p>Thus, we can't trust rules against spying.  What we can trust is
++   having control over the software we run.</p>
+
 Added: 2019-07-21
 Id: 201907210
 RT: www-discuss 2019-07-20 (Google's home assistant listens even when it



reply via email to

[Prev in Thread] Current Thread [Next in Thread]