[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-appliances.html proprie...
From: |
Therese Godefroy |
Subject: |
www/proprietary malware-appliances.html proprie... |
Date: |
Mon, 22 Jun 2020 03:08:10 -0400 (EDT) |
CVSROOT: /webcvs/www
Module name: www
Changes by: Therese Godefroy <th_g> 20/06/22 03:08:09
Modified files:
proprietary : malware-appliances.html
proprietary-insecurity.html proprietary.html
proprietary/workshop: mal.rec
Log message:
Ripple20 bug (www-discuss 2020-06-21).
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.html?cvsroot=www&r1=1.91&r2=1.92
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.html?cvsroot=www&r1=1.118&r2=1.119
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.html?cvsroot=www&r1=1.212&r2=1.213
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/mal.rec?cvsroot=www&r1=1.203&r2=1.204
Patches:
Index: malware-appliances.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-appliances.html,v
retrieving revision 1.91
retrieving revision 1.92
diff -u -b -r1.91 -r1.92
--- malware-appliances.html 13 Jun 2020 09:50:41 -0000 1.91
+++ malware-appliances.html 22 Jun 2020 07:08:09 -0000 1.92
@@ -51,6 +51,16 @@
<div class="column-limit" id="malware-appliances"></div>
<ul class="blurbs">
+ <li id="M202006160">
+ <p><a
+
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C">
+ A disasterous security bug</a> touches millions of products in the
+ Internet of Stings.</p>
+
+ <p>As a result, anyone can sting the user, not only the
+ manufacturer.</p>
+ </li>
+
<li id="M202005070">
<p>Wink sells a “smart” home hub that is tethered
to a server. In May 2020, it ordered the purchasers to start <a
@@ -983,7 +993,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/13 09:50:41 $
+$Date: 2020/06/22 07:08:09 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-insecurity.html,v
retrieving revision 1.118
retrieving revision 1.119
diff -u -b -r1.118 -r1.119
--- proprietary-insecurity.html 25 Mar 2020 09:58:54 -0000 1.118
+++ proprietary-insecurity.html 22 Jun 2020 07:08:09 -0000 1.119
@@ -65,6 +65,16 @@
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
+ <li id="M202006160">
+ <p><a
+
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C">
+ A disasterous security bug</a> touches millions of products in the
+ Internet of Stings.</p>
+
+ <p>As a result, anyone can sting the user, not only the
+ manufacturer.</p>
+ </li>
+
<li id="M201912170">
<p>Some security breakers (wrongly referred in this article as <a
href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker">“hackers”</a>)
@@ -759,7 +769,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/03/25 09:58:54 $
+$Date: 2020/06/22 07:08:09 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary.html,v
retrieving revision 1.212
retrieving revision 1.213
diff -u -b -r1.212 -r1.213
--- proprietary.html 13 Jun 2020 09:50:41 -0000 1.212
+++ proprietary.html 22 Jun 2020 07:08:09 -0000 1.213
@@ -173,6 +173,16 @@
<h3 id="latest">Latest additions</h3>
<ul class="blurbs">
+ <li id="M202006160">
+ <p><a
+
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C">
+ A disasterous security bug</a> touches millions of products in the
+ Internet of Stings.</p>
+
+ <p>As a result, anyone can sting the user, not only the
+ manufacturer.</p>
+ </li>
+
<li id="M201909061">
<p>Best Buy made controllable appliances and <a
href="https://www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-mobile-app-shutdown-november-6">
@@ -221,18 +231,6 @@
<p>Forbes exonerates the same wrongs when the culprits are not Chinese,
but we condemn this no matter who does it.</p>
</li>
-
- <li id="M202004130">
- <p>The <a href="https://www.google.com/mobile/android/market-tos.html">
- Google Play Terms of Service</a> insist that the user of Android accept
- the presence of universal back doors in apps released by Google.</p>
-
- <p>This does not tell us whether any of Google's apps currently
- contains a universal back door, but that is a secondary question.
- In moral terms, demanding that people accept in advance certain bad
- treatment is equivalent to actually doing it. Whatever condemnation
- the latter deserves, the former deserves the same.</p>
- </li>
</ul>
</div>
@@ -294,7 +292,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/13 09:50:41 $
+$Date: 2020/06/22 07:08:09 $
<!-- timestamp end -->
</p>
</div>
Index: workshop/mal.rec
===================================================================
RCS file: /webcvs/www/www/proprietary/workshop/mal.rec,v
retrieving revision 1.203
retrieving revision 1.204
diff -u -b -r1.203 -r1.204
--- workshop/mal.rec 13 Jun 2020 09:50:42 -0000 1.203
+++ workshop/mal.rec 22 Jun 2020 07:08:09 -0000 1.204
@@ -24,6 +24,21 @@
#### Please don't remove the blank line after this marker! ####
# ADD NEW BLURB HERE
+Added: 2020-06-22
+Id: 202006160
+RT: www-discuss 2020-06-21 (Ripple20 bug)
+PubDate: 2020-06-16
+Target: proprietary-insecurity.html proprietary-insecurity
+Target: malware-appliances.html malware-appliances
+Keywords: Ripple20
+Blurb: <p><a
++
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C">
++ A disasterous security bug</a> touches millions of products in the
++ Internet of Stings.</p>
++
++ <p>As a result, anyone can sting the user, not only the
++ manufacturer.</p>
+
Added: 2020-06-13
Id: 201909061
RT: www-discuss 2020-06-12 (Best Buy made appliances...)