www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-apple.html proprietary-...


From: Therese Godefroy
Subject: www/proprietary malware-apple.html proprietary-...
Date: Sat, 19 Oct 2019 05:33:42 -0400 (EDT)

CVSROOT:        /webcvs/www
Module name:    www
Changes by:     Therese Godefroy <th_g> 19/10/19 05:33:42

Modified files:
        proprietary    : malware-apple.html proprietary-back-doors.html 
                         proprietary-surveillance.html proprietary.html 
        proprietary/workshop: mal.rec 

Log message:
        China's Study the Great Nation app (RT #1440570).

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.html?cvsroot=www&r1=1.110&r2=1.111
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.html?cvsroot=www&r1=1.96&r2=1.97
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.html?cvsroot=www&r1=1.300&r2=1.301
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.html?cvsroot=www&r1=1.180&r2=1.181
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/mal.rec?cvsroot=www&r1=1.165&r2=1.166

Patches:
Index: malware-apple.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-apple.html,v
retrieving revision 1.110
retrieving revision 1.111
diff -u -b -r1.110 -r1.111
--- malware-apple.html  16 Oct 2019 06:56:45 -0000      1.110
+++ malware-apple.html  19 Oct 2019 09:33:38 -0000      1.111
@@ -68,7 +68,7 @@
 </ul>
 </div>
 
-<h3 id="back-doors">Apple Back Doors</h3>
+<h3 id="back-doors">Back Doors</h3>
 
 <ul class="blurbs">
   <li id="M201907100">
@@ -113,14 +113,14 @@
 </ul>
 
 
-<h3 id="censorship">Apple Censorship</h3>
+<h3 id="censorship">Censorship</h3>
 
 <p>Apple mainly uses iOS, which is a typical jail, to impose censorship
 through the Apple Store. Please refer to the <a href="#jails">Apple Jails</a>
 section for more information.</p>
 
 
-<h3 id="drm">Apple DRM</h3>
+<h3 id="drm">DRM</h3>
 
 <ul class="blurbs">
   <li id="M201908150.1">
@@ -165,7 +165,7 @@
 </ul>
 
 
-<h3 id="incompatibility">Apple Incompatibility</h3>
+<h3 id="incompatibility">Incompatibility</h3>
 
 <p>In this section, we list characteristics of Apple programs that block or
 hinder users from switching to any alternative program&mdash;and, in
@@ -206,7 +206,7 @@
 </ul>
 
 
-<h3 id="insecurity">Apple Insecurity</h3>
+<h3 id="insecurity">Insecurity</h3>
 
 <p>These bugs are/were not intentional, so unlike the rest of the file
   they do not count as malware. We mention them to refute the
@@ -255,7 +255,7 @@
 </ul>
 
 
-<h3 id="interference">Apple Interference</h3>
+<h3 id="interference">Interference</h3>
 <p>Various proprietary programs often mess up the user's system. They
   are like sabotage, but they are not grave enough to qualify for the
   word &ldquo;sabotage&rdquo;. Nonetheless, they are nasty and
@@ -273,7 +273,7 @@
 </ul>
 
 
-<h3 id="jails">Apple Jails</h3>
+<h3 id="jails">Jails</h3>
 
 <p><a 
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&amp;oldid=835861046";>
 iOS, the operating system of the Apple iThings, is the prototype
@@ -435,7 +435,7 @@
 </ul>
 
 
-<h3 id="manipulation">Apple Manipulation</h3>
+<h3 id="manipulation">Manipulation</h3>
 
 <ul class="blurbs">
   <li id="M201308290">
@@ -451,7 +451,7 @@
 </ul>
 
 
-<h3 id="pressuring">Apple Pressuring</h3>
+<h3 id="pressuring">Pressuring</h3>
 
 <p>Proprietary companies can take advantage of their customers by imposing 
arbitrary limits to their use of the software.  This section reports examples 
of hard sell and other unjust commercial tactics by Apple.</p>
 
@@ -465,7 +465,7 @@
 </ul>
 
 
-<h3 id="sabotage">Apple Sabotage</h3>
+<h3 id="sabotage">Sabotage</h3>
 
 <p>These are situations in which Apple employs its power over users
 to directly intervene in ways that harm them or block their work.</p>
@@ -578,9 +578,28 @@
 </ul>
 
 
-<h3 id="surveillance">Apple Surveillance</h3>
+<h3 id="surveillance">Surveillance</h3>
 
 <ul class="blurbs">
+  <li id="M201910130">
+    <p>The Chinese Communist Party's &ldquo;Study
+    the Great Nation&rdquo; app requires users to grant it <a
+    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962";>
+    access to the phone's microphone, photos, text messages, contacts, and
+    internet history</a>, and the Android version was found to contain a
+    back-door allowing developers to run any code they wish in the users'
+    phone, as &ldquo;superusers.&rdquo;(1) Downloading and using this
+    app is mandatory at some workplaces.</p>
+
+    <p>(1) The <a
+     
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html";>
+    Washington Post version of the article</a> (partly obfuscated,
+    but readable after copy-pasting in a text editor) includes a
+    clarification saying that the tests were only performed on the
+    Android version of the app, and that, according to Apple,
+    &ldquo;superuser&rdquo; surveillance could not be conducted on iOS.</p>
+  </li>
+
   <li id="M201905280">
     <p>In spite of Apple's supposed commitment to
     privacy, iPhone apps contain trackers that are busy at night <a
@@ -770,7 +789,7 @@
 </ul>
 
 
-<h3 id="tyrants">Apple Tyrants</h3>
+<h3 id="tyrants">Tyrants</h3>
 
 <ul class="blurbs">
   <li id="M201412010">
@@ -846,7 +865,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/10/16 06:56:45 $
+$Date: 2019/10/19 09:33:38 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-back-doors.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-back-doors.html,v
retrieving revision 1.96
retrieving revision 1.97
diff -u -b -r1.96 -r1.97
--- proprietary-back-doors.html 4 Oct 2019 07:31:28 -0000       1.96
+++ proprietary-back-doors.html 19 Oct 2019 09:33:39 -0000      1.97
@@ -350,6 +350,42 @@
 <h3 id='universal'>Full control</h3>
 
 <ul class="blurbs">
+  <li id="M201910130.1">
+    <p>The Chinese Communist Party's <a
+    href="/proprietary/proprietary-surveillance.html#M201910130">
+    &ldquo;Study the Great Nation&rdquo; app</a> was found to contain <a
+    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962";>
+    a back-door allowing developers to run any code they wish</a> in the
+    users' phone, as &ldquo;superusers.&rdquo;.</p>
+
+    <p>Note: The <a
+    
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html";>
+    Washington Post version of the article</a> (partly obfuscated, but
+    readable after copy-pasting in a text editor) includes a clarification
+    saying that the tests were only performed on the Android version
+    of the app, and that, according to Apple, &ldquo;superuser&rdquo;
+    surveillance could not be conducted on iOS.</p>
+  </li>
+
+  <li id="M201910130">
+    <p>The Chinese Communist Party's &ldquo;Study
+    the Great Nation&rdquo; app requires users to grant it <a
+    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962";>
+    access to the phone's microphone, photos, text messages, contacts, and
+    internet history</a>, and the Android version was found to contain a
+    back-door allowing developers to run any code they wish in the users'
+    phone, as &ldquo;superusers.&rdquo;(1) Downloading and using this
+    app is mandatory at some workplaces.</p>
+
+    <p>(1) The <a
+     
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html";>
+    Washington Post version of the article</a> (partly obfuscated,
+    but readable after copy-pasting in a text editor) includes a
+    clarification saying that the tests were only performed on the
+    Android version of the app, and that, according to Apple,
+    &ldquo;superuser&rdquo; surveillance could not be conducted on iOS.</p>
+  </li>
+
   <li id="M201908220">
     <p>ChromeBooks are programmed for obsolescence:
     ChromeOS has a universal back door that is used for updates and <a
@@ -630,7 +666,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/10/04 07:31:28 $
+$Date: 2019/10/19 09:33:39 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-surveillance.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-surveillance.html,v
retrieving revision 1.300
retrieving revision 1.301
diff -u -b -r1.300 -r1.301
--- proprietary-surveillance.html       3 Oct 2019 09:26:20 -0000       1.300
+++ proprietary-surveillance.html       19 Oct 2019 09:33:40 -0000      1.301
@@ -804,6 +804,25 @@
 </div>
 
 <ul class="blurbs">
+  <li id="M201910130">
+    <p>The Chinese Communist Party's &ldquo;Study
+    the Great Nation&rdquo; app requires users to grant it <a
+    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962";>
+    access to the phone's microphone, photos, text messages, contacts, and
+    internet history</a>, and the Android version was found to contain a
+    back-door allowing developers to run any code they wish in the users'
+    phone, as &ldquo;superusers.&rdquo;(1) Downloading and using this
+    app is mandatory at some workplaces.</p>
+
+    <p>(1) The <a
+     
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html";>
+    Washington Post version of the article</a> (partly obfuscated,
+    but readable after copy-pasting in a text editor) includes a
+    clarification saying that the tests were only performed on the
+    Android version of the app, and that, according to Apple,
+    &ldquo;superuser&rdquo; surveillance could not be conducted on iOS.</p>
+  </li>
+
   <li id="M201909091">
     <p>The Facebook app <a
     
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/";>
@@ -2502,7 +2521,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/10/03 09:26:20 $
+$Date: 2019/10/19 09:33:40 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary.html,v
retrieving revision 1.180
retrieving revision 1.181
diff -u -b -r1.180 -r1.181
--- proprietary.html    16 Oct 2019 06:56:46 -0000      1.180
+++ proprietary.html    19 Oct 2019 09:33:41 -0000      1.181
@@ -64,8 +64,8 @@
 it is standard practice.  Modern proprietary software is typically
 a way to be had.</p>
 
-<p>As of April, 2019, the pages in this directory list around 400
-instances of malicious functionalities (with more than 450 references to
+<p>As of October, 2019, the pages in this directory list around 400
+instances of malicious functionalities (with more than 500 references to
 back them up), but there are surely thousands more we don't know about.</p>
 
 <table id="TOC">
@@ -149,6 +149,25 @@
 <h3 id="latest">Latest additions</h3>
 
 <ul class="blurbs">
+  <li id="M201910130">
+    <p>The Chinese Communist Party's &ldquo;Study
+    the Great Nation&rdquo; app requires users to grant it <a
+    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962";>
+    access to the phone's microphone, photos, text messages, contacts, and
+    internet history</a>, and the Android version was found to contain a
+    back-door allowing developers to run any code they wish in the users'
+    phone, as &ldquo;superusers.&rdquo;(1) Downloading and using this
+    app is mandatory at some workplaces.</p>
+
+    <p>(1) The <a
+     
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html";>
+    Washington Post version of the article</a> (partly obfuscated,
+    but readable after copy-pasting in a text editor) includes a
+    clarification saying that the tests were only performed on the
+    Android version of the app, and that, according to Apple,
+    &ldquo;superuser&rdquo; surveillance could not be conducted on iOS.</p>
+  </li>
+
   <li id="M201910070">
     <p>Apple <a
     
href="https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-hong-kong.html";>
@@ -192,14 +211,6 @@
     run nonfree apps. They can never be completely sure that a nonfree
     app is safe.</p>
   </li>
-
-  <li id="M201909091">
-    <p>The Facebook app <a
-    
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/";>
-    tracks users even when it is turned off</a>, after tricking them
-    into giving the app broad permissions in order to use one of its
-    functionalities.</p>
-  </li>
 </ul>
 
 
@@ -260,7 +271,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/10/16 06:56:46 $
+$Date: 2019/10/19 09:33:41 $
 <!-- timestamp end -->
 </p>
 </div>

Index: workshop/mal.rec
===================================================================
RCS file: /webcvs/www/www/proprietary/workshop/mal.rec,v
retrieving revision 1.165
retrieving revision 1.166
diff -u -b -r1.165 -r1.166
--- workshop/mal.rec    16 Oct 2019 06:56:48 -0000      1.165
+++ workshop/mal.rec    19 Oct 2019 09:33:41 -0000      1.166
@@ -25,6 +25,52 @@
 ####    Please don't remove the blank line after this marker!    ####
 # ADD NEW BLURB HERE
 
+Added: 2019-10-19
+Id: 201910130.1
+RT: 1440570
+PubDate: 2019-10-13
+Target: proprietary-back-doors.html universal
+Keywords:
+Blurb: <p>The Chinese Communist Party's <a
++   href="/proprietary/proprietary-surveillance.html#M201910130">
++   &ldquo;Study the Great Nation&rdquo; app</a> was found to contain <a
++   
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962";>
++   a back-door allowing developers to run any code they wish</a> in the
++   users' phone, as &ldquo;superusers.&rdquo;.</p>
++
++   <p>Note: The <a
++   
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html";>
++   Washington Post version of the article</a> (partly obfuscated, but
++   readable after copy-pasting in a text editor) includes a clarification
++   saying that the tests were only performed on the Android version
++   of the app, and that, according to Apple, &ldquo;superuser&rdquo;
++   surveillance could not be conducted on iOS.</p>
+
+Added: 2019-10-19
+Id: 201910130
+RT: 1440570
+PubDate: 2019-10-13
+Target: proprietary-surveillance.html SpywareInMobileApps
+Target: malware-apple.html surveillance
+Target: proprietary-back-doors.html universal
+Keywords:
+Blurb: <p>The Chinese Communist Party's &ldquo;Study
++   the Great Nation&rdquo; app requires users to grant it <a
++   
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962";>
++   access to the phone's microphone, photos, text messages, contacts, and
++   internet history</a>, and the Android version was found to contain a
++   back-door allowing developers to run any code they wish in the users'
++   phone, as &ldquo;superusers.&rdquo;(1) Downloading and using this
++   app is mandatory at some workplaces.</p>
++
++   <p>(1) The <a
++    
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html";>
++   Washington Post version of the article</a> (partly obfuscated,
++   but readable after copy-pasting in a text editor) includes a
++   clarification saying that the tests were only performed on the
++   Android version of the app, and that, according to Apple,
++   &ldquo;superuser&rdquo; surveillance could not be conducted on iOS.</p>
+
 Added: 2019-10-16
 Id: 201910070
 RT: www-discuss 2019-10-15 (censorship)



reply via email to

[Prev in Thread] Current Thread [Next in Thread]