www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-apple.html proprietary-...


From: Therese Godefroy
Subject: www/proprietary malware-apple.html proprietary-...
Date: Sat, 19 Oct 2019 05:56:22 -0400 (EDT)

CVSROOT:        /webcvs/www
Module name:    www
Changes by:     Therese Godefroy <th_g> 19/10/19 05:56:22

Modified files:
        proprietary    : malware-apple.html proprietary-back-doors.html 
                         proprietary-surveillance.html proprietary.html 
        proprietary/workshop: mal.rec 

Log message:
        Minor fix.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.html?cvsroot=www&r1=1.112&r2=1.113
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.html?cvsroot=www&r1=1.98&r2=1.99
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.html?cvsroot=www&r1=1.302&r2=1.303
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.html?cvsroot=www&r1=1.182&r2=1.183
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/mal.rec?cvsroot=www&r1=1.167&r2=1.168

Patches:
Index: malware-apple.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-apple.html,v
retrieving revision 1.112
retrieving revision 1.113
diff -u -b -r1.112 -r1.113
--- malware-apple.html  19 Oct 2019 09:52:26 -0000      1.112
+++ malware-apple.html  19 Oct 2019 09:56:22 -0000      1.113
@@ -588,17 +588,17 @@
     access to the phone's microphone, photos, text messages, contacts, and
     internet history</a>, and the Android version was found to contain a
     back-door allowing developers to run any code they wish in the users'
-    phone, as &ldquo;superusers.&rdquo;(1) Downloading and using this
+    phone, as &ldquo;superusers.&rdquo; Downloading and using this
     app is mandatory at some workplaces.</p>
 
-    <p>(1) The <a
+    <p>Note: The <a
      
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html";>
-    Washington Post version of the article</a> (partly obfuscated,
-    but readable after copy-pasting in a text editor) includes a
-    clarification saying that the tests were only performed on the
-    Android version of the app, and that, according to Apple, &ldquo;this
-    kind of &lsquo;superuser&rsquo; surveillance could not be conducted
-    on Apple's operating system.&rdquo;</p>
+    Washington Post version of the article</a> (partly obfuscated, but
+    readable after copy-pasting in a text editor) includes a clarification
+    saying that the tests were only performed on the Android version
+    of the app, and that, according to Apple, &ldquo;this kind of
+    &lsquo;superuser&rsquo; surveillance could not be conducted on
+    Apple's operating system.&rdquo;</p>
   </li>
 
   <li id="M201905280">
@@ -866,7 +866,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/10/19 09:52:26 $
+$Date: 2019/10/19 09:56:22 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-back-doors.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-back-doors.html,v
retrieving revision 1.98
retrieving revision 1.99
diff -u -b -r1.98 -r1.99
--- proprietary-back-doors.html 19 Oct 2019 09:52:29 -0000      1.98
+++ proprietary-back-doors.html 19 Oct 2019 09:56:22 -0000      1.99
@@ -375,17 +375,17 @@
     access to the phone's microphone, photos, text messages, contacts, and
     internet history</a>, and the Android version was found to contain a
     back-door allowing developers to run any code they wish in the users'
-    phone, as &ldquo;superusers.&rdquo;(1) Downloading and using this
+    phone, as &ldquo;superusers.&rdquo; Downloading and using this
     app is mandatory at some workplaces.</p>
 
-    <p>(1) The <a
+    <p>Note: The <a
      
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html";>
-    Washington Post version of the article</a> (partly obfuscated,
-    but readable after copy-pasting in a text editor) includes a
-    clarification saying that the tests were only performed on the
-    Android version of the app, and that, according to Apple, &ldquo;this
-    kind of &lsquo;superuser&rsquo; surveillance could not be conducted
-    on Apple's operating system.&rdquo;</p>
+    Washington Post version of the article</a> (partly obfuscated, but
+    readable after copy-pasting in a text editor) includes a clarification
+    saying that the tests were only performed on the Android version
+    of the app, and that, according to Apple, &ldquo;this kind of
+    &lsquo;superuser&rsquo; surveillance could not be conducted on
+    Apple's operating system.&rdquo;</p>
   </li>
 
   <li id="M201908220">
@@ -668,7 +668,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/10/19 09:52:29 $
+$Date: 2019/10/19 09:56:22 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-surveillance.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-surveillance.html,v
retrieving revision 1.302
retrieving revision 1.303
diff -u -b -r1.302 -r1.303
--- proprietary-surveillance.html       19 Oct 2019 09:52:30 -0000      1.302
+++ proprietary-surveillance.html       19 Oct 2019 09:56:22 -0000      1.303
@@ -811,17 +811,17 @@
     access to the phone's microphone, photos, text messages, contacts, and
     internet history</a>, and the Android version was found to contain a
     back-door allowing developers to run any code they wish in the users'
-    phone, as &ldquo;superusers.&rdquo;(1) Downloading and using this
+    phone, as &ldquo;superusers.&rdquo; Downloading and using this
     app is mandatory at some workplaces.</p>
 
-    <p>(1) The <a
+    <p>Note: The <a
      
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html";>
-    Washington Post version of the article</a> (partly obfuscated,
-    but readable after copy-pasting in a text editor) includes a
-    clarification saying that the tests were only performed on the
-    Android version of the app, and that, according to Apple, &ldquo;this
-    kind of &lsquo;superuser&rsquo; surveillance could not be conducted
-    on Apple's operating system.&rdquo;</p>
+    Washington Post version of the article</a> (partly obfuscated, but
+    readable after copy-pasting in a text editor) includes a clarification
+    saying that the tests were only performed on the Android version
+    of the app, and that, according to Apple, &ldquo;this kind of
+    &lsquo;superuser&rsquo; surveillance could not be conducted on
+    Apple's operating system.&rdquo;</p>
   </li>
 
   <li id="M201909091">
@@ -2522,7 +2522,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/10/19 09:52:30 $
+$Date: 2019/10/19 09:56:22 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary.html,v
retrieving revision 1.182
retrieving revision 1.183
diff -u -b -r1.182 -r1.183
--- proprietary.html    19 Oct 2019 09:52:30 -0000      1.182
+++ proprietary.html    19 Oct 2019 09:56:22 -0000      1.183
@@ -156,17 +156,17 @@
     access to the phone's microphone, photos, text messages, contacts, and
     internet history</a>, and the Android version was found to contain a
     back-door allowing developers to run any code they wish in the users'
-    phone, as &ldquo;superusers.&rdquo;(1) Downloading and using this
+    phone, as &ldquo;superusers.&rdquo; Downloading and using this
     app is mandatory at some workplaces.</p>
 
-    <p>(1) The <a
+    <p>Note: The <a
      
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html";>
-    Washington Post version of the article</a> (partly obfuscated,
-    but readable after copy-pasting in a text editor) includes a
-    clarification saying that the tests were only performed on the
-    Android version of the app, and that, according to Apple, &ldquo;this
-    kind of &lsquo;superuser&rsquo; surveillance could not be conducted
-    on Apple's operating system.&rdquo;</p>
+    Washington Post version of the article</a> (partly obfuscated, but
+    readable after copy-pasting in a text editor) includes a clarification
+    saying that the tests were only performed on the Android version
+    of the app, and that, according to Apple, &ldquo;this kind of
+    &lsquo;superuser&rsquo; surveillance could not be conducted on
+    Apple's operating system.&rdquo;</p>
   </li>
 
   <li id="M201910070">
@@ -272,7 +272,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/10/19 09:52:30 $
+$Date: 2019/10/19 09:56:22 $
 <!-- timestamp end -->
 </p>
 </div>

Index: workshop/mal.rec
===================================================================
RCS file: /webcvs/www/www/proprietary/workshop/mal.rec,v
retrieving revision 1.167
retrieving revision 1.168
diff -u -b -r1.167 -r1.168
--- workshop/mal.rec    19 Oct 2019 09:52:34 -0000      1.167
+++ workshop/mal.rec    19 Oct 2019 09:56:22 -0000      1.168
@@ -61,17 +61,17 @@
 +   access to the phone's microphone, photos, text messages, contacts, and
 +   internet history</a>, and the Android version was found to contain a
 +   back-door allowing developers to run any code they wish in the users'
-+   phone, as &ldquo;superusers.&rdquo;(1) Downloading and using this
++   phone, as &ldquo;superusers.&rdquo; Downloading and using this
 +   app is mandatory at some workplaces.</p>
 +
-+   <p>(1) The <a
++   <p>Note: The <a
 +    
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html";>
-+   Washington Post version of the article</a> (partly obfuscated,
-+   but readable after copy-pasting in a text editor) includes a
-+   clarification saying that the tests were only performed on the
-+   Android version of the app, and that, according to Apple, &ldquo;this
-+   kind of &lsquo;superuser&rsquo; surveillance could not be conducted
-+   on Apple's operating system.&rdquo;</p>
++   Washington Post version of the article</a> (partly obfuscated, but
++   readable after copy-pasting in a text editor) includes a clarification
++   saying that the tests were only performed on the Android version
++   of the app, and that, according to Apple, &ldquo;this kind of
++   &lsquo;superuser&rsquo; surveillance could not be conducted on
++   Apple's operating system.&rdquo;</p>
 
 Added: 2019-10-16
 Id: 201910070



reply via email to

[Prev in Thread] Current Thread [Next in Thread]