www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-appliances.html proprie...


From: Therese Godefroy
Subject: www/proprietary malware-appliances.html proprie...
Date: Mon, 22 Jun 2020 03:08:10 -0400 (EDT)

CVSROOT:        /webcvs/www
Module name:    www
Changes by:     Therese Godefroy <th_g> 20/06/22 03:08:09

Modified files:
        proprietary    : malware-appliances.html 
                         proprietary-insecurity.html proprietary.html 
        proprietary/workshop: mal.rec 

Log message:
        Ripple20 bug (www-discuss 2020-06-21).

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.html?cvsroot=www&r1=1.91&r2=1.92
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.html?cvsroot=www&r1=1.118&r2=1.119
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.html?cvsroot=www&r1=1.212&r2=1.213
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/mal.rec?cvsroot=www&r1=1.203&r2=1.204

Patches:
Index: malware-appliances.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-appliances.html,v
retrieving revision 1.91
retrieving revision 1.92
diff -u -b -r1.91 -r1.92
--- malware-appliances.html     13 Jun 2020 09:50:41 -0000      1.91
+++ malware-appliances.html     22 Jun 2020 07:08:09 -0000      1.92
@@ -51,6 +51,16 @@
 <div class="column-limit" id="malware-appliances"></div>
 
 <ul class="blurbs">
+  <li id="M202006160">
+    <p><a
+    
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C";>
+    A disasterous security bug</a> touches millions of products in the
+    Internet of Stings.</p>
+
+    <p>As a result, anyone can sting the user, not only the
+    manufacturer.</p>
+  </li>
+
   <li id="M202005070">
     <p>Wink sells a &ldquo;smart&rdquo; home hub that is tethered
     to a server. In May 2020, it ordered the purchasers to start <a
@@ -983,7 +993,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/06/13 09:50:41 $
+$Date: 2020/06/22 07:08:09 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-insecurity.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-insecurity.html,v
retrieving revision 1.118
retrieving revision 1.119
diff -u -b -r1.118 -r1.119
--- proprietary-insecurity.html 25 Mar 2020 09:58:54 -0000      1.118
+++ proprietary-insecurity.html 22 Jun 2020 07:08:09 -0000      1.119
@@ -65,6 +65,16 @@
 <div class="column-limit" id="proprietary-insecurity"></div>
 
 <ul class="blurbs">
+  <li id="M202006160">
+    <p><a
+    
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C";>
+    A disasterous security bug</a> touches millions of products in the
+    Internet of Stings.</p>
+
+    <p>As a result, anyone can sting the user, not only the
+    manufacturer.</p>
+  </li>
+
   <li id="M201912170">
     <p>Some security breakers (wrongly referred in this article as <a
     
href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker";>&ldquo;hackers&rdquo;</a>)
@@ -759,7 +769,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/03/25 09:58:54 $
+$Date: 2020/06/22 07:08:09 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary.html,v
retrieving revision 1.212
retrieving revision 1.213
diff -u -b -r1.212 -r1.213
--- proprietary.html    13 Jun 2020 09:50:41 -0000      1.212
+++ proprietary.html    22 Jun 2020 07:08:09 -0000      1.213
@@ -173,6 +173,16 @@
 <h3 id="latest">Latest additions</h3>
 
 <ul class="blurbs">
+  <li id="M202006160">
+    <p><a
+    
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C";>
+    A disasterous security bug</a> touches millions of products in the
+    Internet of Stings.</p>
+
+    <p>As a result, anyone can sting the user, not only the
+    manufacturer.</p>
+  </li>
+
   <li id="M201909061">
     <p>Best Buy made controllable appliances and <a
     
href="https://www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-mobile-app-shutdown-november-6";>
@@ -221,18 +231,6 @@
     <p>Forbes exonerates the same wrongs when the culprits are not Chinese,
     but we condemn this no matter who does it.</p>
   </li>
-
-  <li id="M202004130">
-    <p>The <a href="https://www.google.com/mobile/android/market-tos.html";>
-    Google Play Terms of Service</a> insist that the user of Android accept
-    the presence of universal back doors in apps released by Google.</p>
-
-    <p>This does not tell us whether any of Google's apps currently
-    contains a universal back door, but that is a secondary question.
-    In moral terms, demanding that people accept in advance certain bad
-    treatment is equivalent to actually doing it.  Whatever condemnation
-    the latter deserves, the former deserves the same.</p>
-  </li>
 </ul>
 
 </div>
@@ -294,7 +292,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/06/13 09:50:41 $
+$Date: 2020/06/22 07:08:09 $
 <!-- timestamp end -->
 </p>
 </div>

Index: workshop/mal.rec
===================================================================
RCS file: /webcvs/www/www/proprietary/workshop/mal.rec,v
retrieving revision 1.203
retrieving revision 1.204
diff -u -b -r1.203 -r1.204
--- workshop/mal.rec    13 Jun 2020 09:50:42 -0000      1.203
+++ workshop/mal.rec    22 Jun 2020 07:08:09 -0000      1.204
@@ -24,6 +24,21 @@
 ####    Please don't remove the blank line after this marker!    ####
 # ADD NEW BLURB HERE
 
+Added: 2020-06-22
+Id: 202006160
+RT: www-discuss 2020-06-21 (Ripple20 bug)
+PubDate: 2020-06-16
+Target: proprietary-insecurity.html proprietary-insecurity
+Target: malware-appliances.html malware-appliances
+Keywords: Ripple20
+Blurb: <p><a
++   
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C";>
++   A disasterous security bug</a> touches millions of products in the
++   Internet of Stings.</p>
++
++   <p>As a result, anyone can sting the user, not only the
++   manufacturer.</p>
+
 Added: 2020-06-13
 Id: 201909061
 RT: www-discuss 2020-06-12 (Best Buy made appliances...)



reply via email to

[Prev in Thread] Current Thread [Next in Thread]