www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-appliances.html proprie...


From: Therese Godefroy
Subject: www/proprietary malware-appliances.html proprie...
Date: Tue, 22 Dec 2020 03:56:46 -0500 (EST)

CVSROOT:        /webcvs/www
Module name:    www
Changes by:     Therese Godefroy <th_g> 20/12/22 03:56:46

Modified files:
        proprietary    : malware-appliances.html 
                         proprietary-surveillance.html 
                         malware-mobiles.html 
                         proprietary-insecurity.html 
        proprietary/workshop: mal.rec 

Log message:
        Add or change targets.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.html?cvsroot=www&r1=1.100&r2=1.101
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.html?cvsroot=www&r1=1.356&r2=1.357
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.html?cvsroot=www&r1=1.133&r2=1.134
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.html?cvsroot=www&r1=1.133&r2=1.134
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/mal.rec?cvsroot=www&r1=1.266&r2=1.267

Patches:
Index: malware-appliances.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-appliances.html,v
retrieving revision 1.100
retrieving revision 1.101
diff -u -b -r1.100 -r1.101
--- malware-appliances.html     5 Dec 2020 11:24:35 -0000       1.100
+++ malware-appliances.html     22 Dec 2020 08:56:44 -0000      1.101
@@ -64,6 +64,27 @@
 <div class="column-limit" id="malware-appliances"></div>
 
 <ul class="blurbs">
+  <li id="M202011230">
+    <p>Some Wavelink and JetStream wifi routers have
+    universal back doors that enable unauthenticated
+    users to remotely control not only the routers, but
+    also any devices connected to the network. There is evidence that <a
+    
href="https://cybernews.com/security/walmart-exclusive-routers-others-made-in-china-contain-backdoors-to-control-devices/";>
+    this vulnerability is actively exploited</a>.</p>
+
+    <p>If you consider buying a router, we encourage you to get one
+    that <a href="https://ryf.fsf.org/categories/routers";>runs on free
+    software</a>. Any attempts at introducing malicious functionalities in
+    it (e.g., through a firmware update) will be detected by the community,
+    and soon corrected.</p>
+
+    <p>If unfortunately you own a router that runs on
+    proprietary software, don't panic! You may be able to
+    replace its firmware with a free operating system such as <a
+    href="https://librecmc.org";>libreCMC</a>. If you don't know how,
+    you can get help from a nearby GNU/Linux user group.</p>
+  </li>
+
   <li id="M202007280">
     <p>The Focals eyeglass display, with snooping
     microphone, has been eliminated.  Google eliminated
@@ -1037,7 +1058,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/12/05 11:24:35 $
+$Date: 2020/12/22 08:56:44 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-surveillance.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-surveillance.html,v
retrieving revision 1.356
retrieving revision 1.357
diff -u -b -r1.356 -r1.357
--- proprietary-surveillance.html       21 Dec 2020 13:31:12 -0000      1.356
+++ proprietary-surveillance.html       22 Dec 2020 08:56:44 -0000      1.357
@@ -890,18 +890,6 @@
 </div>
 
 <ul class="blurbs">
-  <li id="M202012190">
-    <p><a
-    
href="https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-china-surveillance/";>
-    A Zoom executive carried out snooping and censorship for
-    China</a>.</p>
-
-    <p>This abuse of Zoom's power shows how dangerous that power is. The
-    root problem is not the surveillance and censorship, but rather the
-    power that Zoom has. It gets that power partly from the use of its
-    server, but also partly from the nonfree client program.</p>
-  </li>
-
   <li id="M202011260">
     <p>Microsoft's Office 365 suite enables employers <a
     
href="https://www.theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-criticised-workplace-surveillance";>to
@@ -2830,7 +2818,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/12/21 13:31:12 $
+$Date: 2020/12/22 08:56:44 $
 <!-- timestamp end -->
 </p>
 </div>

Index: malware-mobiles.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-mobiles.html,v
retrieving revision 1.133
retrieving revision 1.134
diff -u -b -r1.133 -r1.134
--- malware-mobiles.html        23 Nov 2020 13:57:28 -0000      1.133
+++ malware-mobiles.html        22 Dec 2020 08:56:44 -0000      1.134
@@ -491,6 +491,15 @@
     full-time listening devices</a>.</p>
   </li>
 
+  <li id="M202012070">
+    <p>Baidu apps were <a
+    
href="https://www.zdnet.com/article/baidus-android-apps-caught-collecting-sensitive-user-details/";>caught
 collecting
+    sensitive personal data</a> that can be used for lifetime tracking
+    of users and putting them in danger. More than 1.4 billion people
+    worldwide are affected by these proprietary apps and users'
+    privacy is jeopardized by this surveillance tool. Data collected by Baidu 
may be shared with Chinese government, possibly putting Chinese people in 
danger.</p>
+  </li>
+
   <li id="M202006260">
     <p>Most apps are malware, but
     Trump's campaign app, like Modi's campaign app, is <a
@@ -1290,7 +1299,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/11/23 13:57:28 $
+$Date: 2020/12/22 08:56:44 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-insecurity.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-insecurity.html,v
retrieving revision 1.133
retrieving revision 1.134
diff -u -b -r1.133 -r1.134
--- proprietary-insecurity.html 19 Dec 2020 13:34:34 -0000      1.133
+++ proprietary-insecurity.html 22 Dec 2020 08:56:44 -0000      1.134
@@ -76,6 +76,18 @@
 <div class="column-limit" id="proprietary-insecurity"></div>
 
 <ul class="blurbs">
+  <li id="M202012190">
+    <p><a
+    
href="https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-china-surveillance/";>
+    A Zoom executive carried out snooping and censorship for
+    China</a>.</p>
+
+    <p>This abuse of Zoom's power shows how dangerous that power is. The
+    root problem is not the surveillance and censorship, but rather the
+    power that Zoom has. It gets that power partly from the use of its
+    server, but also partly from the nonfree client program.</p>
+  </li>
+
   <li id="M202012070">
     <p>Baidu apps were <a
     
href="https://www.zdnet.com/article/baidus-android-apps-caught-collecting-sensitive-user-details/";>caught
 collecting
@@ -815,7 +827,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/12/19 13:34:34 $
+$Date: 2020/12/22 08:56:44 $
 <!-- timestamp end -->
 </p>
 </div>

Index: workshop/mal.rec
===================================================================
RCS file: /webcvs/www/www/proprietary/workshop/mal.rec,v
retrieving revision 1.266
retrieving revision 1.267
diff -u -b -r1.266 -r1.267
--- workshop/mal.rec    21 Dec 2020 13:31:11 -0000      1.266
+++ workshop/mal.rec    22 Dec 2020 08:56:45 -0000      1.267
@@ -28,7 +28,7 @@
 Id: 202012190
 RT: www-discuss 2020-12-21 (Zoom spied and censored for China)
 PubDate: 2020-12-19
-Target: proprietary-surveillance.html SpywareInDesktopApps
+Target: proprietary-insecurity.html proprietary-insecurity
 Target: malware-in-online-conferencing.html malware-in-online-conferencing
 Keywords:
 Blurb: <p><a
@@ -46,6 +46,7 @@
 RT: www-discuss (2020-12-06 back doors in wifi hubs)
 PubDate: 2020-11-23
 Target: proprietary-back-doors.html universal
+Target: malware-appliances.html malware-appliances
 Keywords: routers jetstream wavelink
 Blurb: <p>Some Wavelink and JetStream wifi routers have
 +   universal back doors that enable unauthenticated
@@ -72,6 +73,7 @@
 PubDate: 2020-12-07
 Target: proprietary-insecurity.html proprietary-insecurity
 Target: proprietary-surveillance.html SpywareInAndroid
+Target: malware-mobiles.html surveillance
 Keywords: Baidu, Android, Surveillance, Insecurity
 Blurb: <p>Baidu apps were <a
 +   
href="https://www.zdnet.com/article/baidus-android-apps-caught-collecting-sensitive-user-details/";>caught
 collecting



reply via email to

[Prev in Thread] Current Thread [Next in Thread]