[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-apple.html proprietary-...
From: |
Therese Godefroy |
Subject: |
www/proprietary malware-apple.html proprietary-... |
Date: |
Sat, 19 Oct 2019 05:56:22 -0400 (EDT) |
CVSROOT: /webcvs/www
Module name: www
Changes by: Therese Godefroy <th_g> 19/10/19 05:56:22
Modified files:
proprietary : malware-apple.html proprietary-back-doors.html
proprietary-surveillance.html proprietary.html
proprietary/workshop: mal.rec
Log message:
Minor fix.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.html?cvsroot=www&r1=1.112&r2=1.113
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.html?cvsroot=www&r1=1.98&r2=1.99
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.html?cvsroot=www&r1=1.302&r2=1.303
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.html?cvsroot=www&r1=1.182&r2=1.183
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/mal.rec?cvsroot=www&r1=1.167&r2=1.168
Patches:
Index: malware-apple.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-apple.html,v
retrieving revision 1.112
retrieving revision 1.113
diff -u -b -r1.112 -r1.113
--- malware-apple.html 19 Oct 2019 09:52:26 -0000 1.112
+++ malware-apple.html 19 Oct 2019 09:56:22 -0000 1.113
@@ -588,17 +588,17 @@
access to the phone's microphone, photos, text messages, contacts, and
internet history</a>, and the Android version was found to contain a
back-door allowing developers to run any code they wish in the users'
- phone, as “superusers.”(1) Downloading and using this
+ phone, as “superusers.” Downloading and using this
app is mandatory at some workplaces.</p>
- <p>(1) The <a
+ <p>Note: The <a
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
- Washington Post version of the article</a> (partly obfuscated,
- but readable after copy-pasting in a text editor) includes a
- clarification saying that the tests were only performed on the
- Android version of the app, and that, according to Apple, “this
- kind of ‘superuser’ surveillance could not be conducted
- on Apple's operating system.”</p>
+ Washington Post version of the article</a> (partly obfuscated, but
+ readable after copy-pasting in a text editor) includes a clarification
+ saying that the tests were only performed on the Android version
+ of the app, and that, according to Apple, “this kind of
+ ‘superuser’ surveillance could not be conducted on
+ Apple's operating system.”</p>
</li>
<li id="M201905280">
@@ -866,7 +866,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/19 09:52:26 $
+$Date: 2019/10/19 09:56:22 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-back-doors.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-back-doors.html,v
retrieving revision 1.98
retrieving revision 1.99
diff -u -b -r1.98 -r1.99
--- proprietary-back-doors.html 19 Oct 2019 09:52:29 -0000 1.98
+++ proprietary-back-doors.html 19 Oct 2019 09:56:22 -0000 1.99
@@ -375,17 +375,17 @@
access to the phone's microphone, photos, text messages, contacts, and
internet history</a>, and the Android version was found to contain a
back-door allowing developers to run any code they wish in the users'
- phone, as “superusers.”(1) Downloading and using this
+ phone, as “superusers.” Downloading and using this
app is mandatory at some workplaces.</p>
- <p>(1) The <a
+ <p>Note: The <a
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
- Washington Post version of the article</a> (partly obfuscated,
- but readable after copy-pasting in a text editor) includes a
- clarification saying that the tests were only performed on the
- Android version of the app, and that, according to Apple, “this
- kind of ‘superuser’ surveillance could not be conducted
- on Apple's operating system.”</p>
+ Washington Post version of the article</a> (partly obfuscated, but
+ readable after copy-pasting in a text editor) includes a clarification
+ saying that the tests were only performed on the Android version
+ of the app, and that, according to Apple, “this kind of
+ ‘superuser’ surveillance could not be conducted on
+ Apple's operating system.”</p>
</li>
<li id="M201908220">
@@ -668,7 +668,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/19 09:52:29 $
+$Date: 2019/10/19 09:56:22 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-surveillance.html,v
retrieving revision 1.302
retrieving revision 1.303
diff -u -b -r1.302 -r1.303
--- proprietary-surveillance.html 19 Oct 2019 09:52:30 -0000 1.302
+++ proprietary-surveillance.html 19 Oct 2019 09:56:22 -0000 1.303
@@ -811,17 +811,17 @@
access to the phone's microphone, photos, text messages, contacts, and
internet history</a>, and the Android version was found to contain a
back-door allowing developers to run any code they wish in the users'
- phone, as “superusers.”(1) Downloading and using this
+ phone, as “superusers.” Downloading and using this
app is mandatory at some workplaces.</p>
- <p>(1) The <a
+ <p>Note: The <a
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
- Washington Post version of the article</a> (partly obfuscated,
- but readable after copy-pasting in a text editor) includes a
- clarification saying that the tests were only performed on the
- Android version of the app, and that, according to Apple, “this
- kind of ‘superuser’ surveillance could not be conducted
- on Apple's operating system.”</p>
+ Washington Post version of the article</a> (partly obfuscated, but
+ readable after copy-pasting in a text editor) includes a clarification
+ saying that the tests were only performed on the Android version
+ of the app, and that, according to Apple, “this kind of
+ ‘superuser’ surveillance could not be conducted on
+ Apple's operating system.”</p>
</li>
<li id="M201909091">
@@ -2522,7 +2522,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/19 09:52:30 $
+$Date: 2019/10/19 09:56:22 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary.html,v
retrieving revision 1.182
retrieving revision 1.183
diff -u -b -r1.182 -r1.183
--- proprietary.html 19 Oct 2019 09:52:30 -0000 1.182
+++ proprietary.html 19 Oct 2019 09:56:22 -0000 1.183
@@ -156,17 +156,17 @@
access to the phone's microphone, photos, text messages, contacts, and
internet history</a>, and the Android version was found to contain a
back-door allowing developers to run any code they wish in the users'
- phone, as “superusers.”(1) Downloading and using this
+ phone, as “superusers.” Downloading and using this
app is mandatory at some workplaces.</p>
- <p>(1) The <a
+ <p>Note: The <a
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
- Washington Post version of the article</a> (partly obfuscated,
- but readable after copy-pasting in a text editor) includes a
- clarification saying that the tests were only performed on the
- Android version of the app, and that, according to Apple, “this
- kind of ‘superuser’ surveillance could not be conducted
- on Apple's operating system.”</p>
+ Washington Post version of the article</a> (partly obfuscated, but
+ readable after copy-pasting in a text editor) includes a clarification
+ saying that the tests were only performed on the Android version
+ of the app, and that, according to Apple, “this kind of
+ ‘superuser’ surveillance could not be conducted on
+ Apple's operating system.”</p>
</li>
<li id="M201910070">
@@ -272,7 +272,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/19 09:52:30 $
+$Date: 2019/10/19 09:56:22 $
<!-- timestamp end -->
</p>
</div>
Index: workshop/mal.rec
===================================================================
RCS file: /webcvs/www/www/proprietary/workshop/mal.rec,v
retrieving revision 1.167
retrieving revision 1.168
diff -u -b -r1.167 -r1.168
--- workshop/mal.rec 19 Oct 2019 09:52:34 -0000 1.167
+++ workshop/mal.rec 19 Oct 2019 09:56:22 -0000 1.168
@@ -61,17 +61,17 @@
+ access to the phone's microphone, photos, text messages, contacts, and
+ internet history</a>, and the Android version was found to contain a
+ back-door allowing developers to run any code they wish in the users'
-+ phone, as “superusers.”(1) Downloading and using this
++ phone, as “superusers.” Downloading and using this
+ app is mandatory at some workplaces.</p>
+
-+ <p>(1) The <a
++ <p>Note: The <a
+
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
-+ Washington Post version of the article</a> (partly obfuscated,
-+ but readable after copy-pasting in a text editor) includes a
-+ clarification saying that the tests were only performed on the
-+ Android version of the app, and that, according to Apple, “this
-+ kind of ‘superuser’ surveillance could not be conducted
-+ on Apple's operating system.”</p>
++ Washington Post version of the article</a> (partly obfuscated, but
++ readable after copy-pasting in a text editor) includes a clarification
++ saying that the tests were only performed on the Android version
++ of the app, and that, according to Apple, “this kind of
++ ‘superuser’ surveillance could not be conducted on
++ Apple's operating system.”</p>
Added: 2019-10-16
Id: 201910070
- www/proprietary malware-apple.html proprietary-..., Therese Godefroy, 2019/10/05
- www/proprietary malware-apple.html proprietary-..., Therese Godefroy, 2019/10/07
- www/proprietary malware-apple.html proprietary-..., Therese Godefroy, 2019/10/15
- www/proprietary malware-apple.html proprietary-..., Therese Godefroy, 2019/10/16
- www/proprietary malware-apple.html proprietary-..., Therese Godefroy, 2019/10/19
- www/proprietary malware-apple.html proprietary-..., Therese Godefroy, 2019/10/19
- www/proprietary malware-apple.html proprietary-...,
Therese Godefroy <=
- www/proprietary malware-apple.html proprietary-..., Therese Godefroy, 2019/10/20
- www/proprietary malware-apple.html proprietary-..., Therese Godefroy, 2019/10/21
- www/proprietary malware-apple.html proprietary-..., Therese Godefroy, 2019/10/31
- www/proprietary malware-apple.html proprietary-..., Therese Godefroy, 2019/10/31
- www/proprietary malware-apple.html proprietary-..., Therese Godefroy, 2019/10/31