www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-apple.html proprietary-...


From: Therese Godefroy
Subject: www/proprietary malware-apple.html proprietary-...
Date: Thu, 31 Oct 2019 07:55:08 -0400 (EDT)

CVSROOT:        /webcvs/www
Module name:    www
Changes by:     Therese Godefroy <th_g> 19/10/31 07:55:07

Modified files:
        proprietary    : malware-apple.html 
                         proprietary-surveillance.html proprietary.html 
        proprietary/workshop: mal.rec 

Log message:
        Minor rewording.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.html?cvsroot=www&r1=1.117&r2=1.118
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.html?cvsroot=www&r1=1.305&r2=1.306
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.html?cvsroot=www&r1=1.188&r2=1.189
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/mal.rec?cvsroot=www&r1=1.174&r2=1.175

Patches:
Index: malware-apple.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-apple.html,v
retrieving revision 1.117
retrieving revision 1.118
diff -u -b -r1.117 -r1.118
--- malware-apple.html  31 Oct 2019 11:33:59 -0000      1.117
+++ malware-apple.html  31 Oct 2019 11:55:07 -0000      1.118
@@ -608,8 +608,8 @@
     <p>Safari occasionally <a
     
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/";>
     sends browsing data from Apple devices in China to the Tencent Safe
-    Browsing service</a>, to check URLs that a rough screening has detected
-    as possibly &ldquo;fraudulent.&rdquo; Since Tencent collaborates
+    Browsing service</a>, to check URLs that possibly correspond to
+    &ldquo;fraudulent&rdquo; websites. Since Tencent collaborates
     with the Chinese government, its Safe Browsing black list most certainly
     contains the websites of political opponents. By linking the requests
     originating from single IP addresses, the government can identify
@@ -901,7 +901,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/10/31 11:33:59 $
+$Date: 2019/10/31 11:55:07 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-surveillance.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-surveillance.html,v
retrieving revision 1.305
retrieving revision 1.306
diff -u -b -r1.305 -r1.306
--- proprietary-surveillance.html       31 Oct 2019 11:33:59 -0000      1.305
+++ proprietary-surveillance.html       31 Oct 2019 11:55:07 -0000      1.306
@@ -498,8 +498,8 @@
     <p>Safari occasionally <a
     
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/";>
     sends browsing data from Apple devices in China to the Tencent Safe
-    Browsing service</a>, to check URLs that a rough screening has detected
-    as possibly &ldquo;fraudulent.&rdquo; Since Tencent collaborates
+    Browsing service</a>, to check URLs that possibly correspond to
+    &ldquo;fraudulent&rdquo; websites. Since Tencent collaborates
     with the Chinese government, its Safe Browsing black list most certainly
     contains the websites of political opponents. By linking the requests
     originating from single IP addresses, the government can identify
@@ -2534,7 +2534,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/10/31 11:33:59 $
+$Date: 2019/10/31 11:55:07 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary.html,v
retrieving revision 1.188
retrieving revision 1.189
diff -u -b -r1.188 -r1.189
--- proprietary.html    31 Oct 2019 11:33:59 -0000      1.188
+++ proprietary.html    31 Oct 2019 11:55:07 -0000      1.189
@@ -153,8 +153,8 @@
     <p>Safari occasionally <a
     
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/";>
     sends browsing data from Apple devices in China to the Tencent Safe
-    Browsing service</a>, to check URLs that a rough screening has detected
-    as possibly &ldquo;fraudulent.&rdquo; Since Tencent collaborates
+    Browsing service</a>, to check URLs that possibly correspond to
+    &ldquo;fraudulent&rdquo; websites. Since Tencent collaborates
     with the Chinese government, its Safe Browsing black list most certainly
     contains the websites of political opponents. By linking the requests
     originating from single IP addresses, the government can identify
@@ -282,7 +282,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/10/31 11:33:59 $
+$Date: 2019/10/31 11:55:07 $
 <!-- timestamp end -->
 </p>
 </div>

Index: workshop/mal.rec
===================================================================
RCS file: /webcvs/www/www/proprietary/workshop/mal.rec,v
retrieving revision 1.174
retrieving revision 1.175
diff -u -b -r1.174 -r1.175
--- workshop/mal.rec    31 Oct 2019 11:33:59 -0000      1.174
+++ workshop/mal.rec    31 Oct 2019 11:55:07 -0000      1.175
@@ -35,8 +35,8 @@
 Blurb: <p>Safari occasionally <a
 +   
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/";>
 +   sends browsing data from Apple devices in China to the Tencent Safe
-+   Browsing service</a>, to check URLs that a rough screening has detected
-+   as possibly &ldquo;fraudulent.&rdquo; Since Tencent collaborates
++   Browsing service</a>, to check URLs that possibly correspond to
++   &ldquo;fraudulent&rdquo; websites. Since Tencent collaborates
 +   with the Chinese government, its Safe Browsing black list most certainly
 +   contains the websites of political opponents. By linking the requests
 +   originating from single IP addresses, the government can identify



reply via email to

[Prev in Thread] Current Thread [Next in Thread]