www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-mobiles.html proprietar...


From: Therese Godefroy
Subject: www/proprietary malware-mobiles.html proprietar...
Date: Fri, 4 Oct 2019 03:31:31 -0400 (EDT)

CVSROOT:        /webcvs/www
Module name:    www
Changes by:     Therese Godefroy <th_g> 19/10/04 03:31:30

Modified files:
        proprietary    : malware-mobiles.html 
                         proprietary-back-doors.html proprietary.html 
        proprietary/workshop: mal.rec 

Log message:
        Google Play app executed secret payloads (www-discuss 2019-10-03).

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.html?cvsroot=www&r1=1.110&r2=1.111
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.html?cvsroot=www&r1=1.95&r2=1.96
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.html?cvsroot=www&r1=1.173&r2=1.174
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/mal.rec?cvsroot=www&r1=1.157&r2=1.158

Patches:
Index: malware-mobiles.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-mobiles.html,v
retrieving revision 1.110
retrieving revision 1.111
diff -u -b -r1.110 -r1.111
--- malware-mobiles.html        3 Oct 2019 09:26:20 -0000       1.110
+++ malware-mobiles.html        4 Oct 2019 07:31:28 -0000       1.111
@@ -136,6 +136,19 @@
     them into full-time listening devices.</p>
   </li>
 
+  <li id="M201908270">
+    <p>A very popular app found in the
+    Google Play store contained a module that was designed to <a
+    
href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/";>secretly
+    install malware on the user's computer</a>. The app developers
+    regularly used it to make the computer download and execute any code
+    they wanted.</p>
+
+    <p>This is a concrete example of what users are exposed to when they
+    run nonfree apps. They can never be completely sure that a nonfree
+    app is safe.</p>
+  </li>
+
   <li id="M201609130">
     <p>Xiaomi phones come with <a
     
href="https://web.archive.org/web/20190424082647/http://blog.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered/";>
@@ -1139,7 +1152,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/10/03 09:26:20 $
+$Date: 2019/10/04 07:31:28 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-back-doors.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-back-doors.html,v
retrieving revision 1.95
retrieving revision 1.96
diff -u -b -r1.95 -r1.96
--- proprietary-back-doors.html 11 Sep 2019 08:01:46 -0000      1.95
+++ proprietary-back-doors.html 4 Oct 2019 07:31:28 -0000       1.96
@@ -219,6 +219,19 @@
 <h3 id='install-delete'>Installing, deleting or disabling programs</h3>
 
 <ul class="blurbs">
+  <li id="M201908270">
+    <p>A very popular app found in the
+    Google Play store contained a module that was designed to <a
+    
href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/";>secretly
+    install malware on the user's computer</a>. The app developers
+    regularly used it to make the computer download and execute any code
+    they wanted.</p>
+
+    <p>This is a concrete example of what users are exposed to when they
+    run nonfree apps. They can never be completely sure that a nonfree
+    app is safe.</p>
+  </li>
+
   <li id="M201907100">
     <p>Apple appears to say that <a
     href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/";>
@@ -617,7 +630,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/09/11 08:01:46 $
+$Date: 2019/10/04 07:31:28 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary.html,v
retrieving revision 1.173
retrieving revision 1.174
diff -u -b -r1.173 -r1.174
--- proprietary.html    3 Oct 2019 10:17:02 -0000       1.173
+++ proprietary.html    4 Oct 2019 07:31:28 -0000       1.174
@@ -149,6 +149,19 @@
 <h3 id="latest">Latest additions</h3>
 
 <ul class="blurbs">
+  <li id="M201908270">
+    <p>A very popular app found in the
+    Google Play store contained a module that was designed to <a
+    
href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/";>secretly
+    install malware on the user's computer</a>. The app developers
+    regularly used it to make the computer download and execute any code
+    they wanted.</p>
+
+    <p>This is a concrete example of what users are exposed to when they
+    run nonfree apps. They can never be completely sure that a nonfree
+    app is safe.</p>
+  </li>
+
   <li id="M201909091">
     <p>The Facebook app <a
     
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/";>
@@ -181,17 +194,6 @@
     <p>This means that proprietary software can potentially be a way to
     commit perjury with impunity.</p>
   </li>
-
-  <li id="M201908220">
-    <p>ChromeBooks are programmed for obsolescence:
-    ChromeOS has a universal back door that is used for updates and <a
-    
href="https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/";>
-    ceases to operate at a predefined date</a>. From then on, there
-    appears to be no support whatsoever for the computer.</p>
-
-    <p>In other words, when you stop getting screwed by the back door,
-    you start getting screwed by the obsolescence.</p>
-  </li>
 </ul>
 
 
@@ -252,7 +254,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/10/03 10:17:02 $
+$Date: 2019/10/04 07:31:28 $
 <!-- timestamp end -->
 </p>
 </div>

Index: workshop/mal.rec
===================================================================
RCS file: /webcvs/www/www/proprietary/workshop/mal.rec,v
retrieving revision 1.157
retrieving revision 1.158
diff -u -b -r1.157 -r1.158
--- workshop/mal.rec    3 Oct 2019 10:17:03 -0000       1.157
+++ workshop/mal.rec    4 Oct 2019 07:31:30 -0000       1.158
@@ -25,6 +25,24 @@
 ####    Please don't remove the blank line after this marker!    ####
 # ADD NEW BLURB HERE
 
+Added: 2019-10-04
+Id: 201908270
+RT: www-discuss 2019-10-03 (Google Play app ... executed secret payloads)
+PubDate: 2019-08-27
+Target: proprietary-back-doors.html install-delete
+Target: malware-mobiles.html back-doors
+Keywords: trojan dropper
+Blurb: <p>A very popular app found in the
++   Google Play store contained a module that was designed to <a
++   
href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/";>secretly
++   install malware on the user's computer</a>. The app developers
++   regularly used it to make the computer download and execute any code
++   they wanted.</p>
++
++   <p>This is a concrete example of what users are exposed to when they
++   run nonfree apps. They can never be completely sure that a nonfree
++   app is safe.</p>
+
 Added: 2019-10-03
 Id: 201708310
 RT: www-discuss 2019-10-02 (operating system tethers)



reply via email to

[Prev in Thread] Current Thread [Next in Thread]