[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-appliances.html proprie...
From: |
Therese Godefroy |
Subject: |
www/proprietary malware-appliances.html proprie... |
Date: |
Tue, 22 Dec 2020 03:56:46 -0500 (EST) |
CVSROOT: /webcvs/www
Module name: www
Changes by: Therese Godefroy <th_g> 20/12/22 03:56:46
Modified files:
proprietary : malware-appliances.html
proprietary-surveillance.html
malware-mobiles.html
proprietary-insecurity.html
proprietary/workshop: mal.rec
Log message:
Add or change targets.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.html?cvsroot=www&r1=1.100&r2=1.101
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.html?cvsroot=www&r1=1.356&r2=1.357
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.html?cvsroot=www&r1=1.133&r2=1.134
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.html?cvsroot=www&r1=1.133&r2=1.134
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/mal.rec?cvsroot=www&r1=1.266&r2=1.267
Patches:
Index: malware-appliances.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-appliances.html,v
retrieving revision 1.100
retrieving revision 1.101
diff -u -b -r1.100 -r1.101
--- malware-appliances.html 5 Dec 2020 11:24:35 -0000 1.100
+++ malware-appliances.html 22 Dec 2020 08:56:44 -0000 1.101
@@ -64,6 +64,27 @@
<div class="column-limit" id="malware-appliances"></div>
<ul class="blurbs">
+ <li id="M202011230">
+ <p>Some Wavelink and JetStream wifi routers have
+ universal back doors that enable unauthenticated
+ users to remotely control not only the routers, but
+ also any devices connected to the network. There is evidence that <a
+
href="https://cybernews.com/security/walmart-exclusive-routers-others-made-in-china-contain-backdoors-to-control-devices/">
+ this vulnerability is actively exploited</a>.</p>
+
+ <p>If you consider buying a router, we encourage you to get one
+ that <a href="https://ryf.fsf.org/categories/routers">runs on free
+ software</a>. Any attempts at introducing malicious functionalities in
+ it (e.g., through a firmware update) will be detected by the community,
+ and soon corrected.</p>
+
+ <p>If unfortunately you own a router that runs on
+ proprietary software, don't panic! You may be able to
+ replace its firmware with a free operating system such as <a
+ href="https://librecmc.org">libreCMC</a>. If you don't know how,
+ you can get help from a nearby GNU/Linux user group.</p>
+ </li>
+
<li id="M202007280">
<p>The Focals eyeglass display, with snooping
microphone, has been eliminated. Google eliminated
@@ -1037,7 +1058,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/12/05 11:24:35 $
+$Date: 2020/12/22 08:56:44 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-surveillance.html,v
retrieving revision 1.356
retrieving revision 1.357
diff -u -b -r1.356 -r1.357
--- proprietary-surveillance.html 21 Dec 2020 13:31:12 -0000 1.356
+++ proprietary-surveillance.html 22 Dec 2020 08:56:44 -0000 1.357
@@ -890,18 +890,6 @@
</div>
<ul class="blurbs">
- <li id="M202012190">
- <p><a
-
href="https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-china-surveillance/">
- A Zoom executive carried out snooping and censorship for
- China</a>.</p>
-
- <p>This abuse of Zoom's power shows how dangerous that power is. The
- root problem is not the surveillance and censorship, but rather the
- power that Zoom has. It gets that power partly from the use of its
- server, but also partly from the nonfree client program.</p>
- </li>
-
<li id="M202011260">
<p>Microsoft's Office 365 suite enables employers <a
href="https://www.theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-criticised-workplace-surveillance">to
@@ -2830,7 +2818,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/12/21 13:31:12 $
+$Date: 2020/12/22 08:56:44 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-mobiles.html,v
retrieving revision 1.133
retrieving revision 1.134
diff -u -b -r1.133 -r1.134
--- malware-mobiles.html 23 Nov 2020 13:57:28 -0000 1.133
+++ malware-mobiles.html 22 Dec 2020 08:56:44 -0000 1.134
@@ -491,6 +491,15 @@
full-time listening devices</a>.</p>
</li>
+ <li id="M202012070">
+ <p>Baidu apps were <a
+
href="https://www.zdnet.com/article/baidus-android-apps-caught-collecting-sensitive-user-details/">caught
collecting
+ sensitive personal data</a> that can be used for lifetime tracking
+ of users and putting them in danger. More than 1.4 billion people
+ worldwide are affected by these proprietary apps and users'
+ privacy is jeopardized by this surveillance tool. Data collected by Baidu
may be shared with Chinese government, possibly putting Chinese people in
danger.</p>
+ </li>
+
<li id="M202006260">
<p>Most apps are malware, but
Trump's campaign app, like Modi's campaign app, is <a
@@ -1290,7 +1299,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/23 13:57:28 $
+$Date: 2020/12/22 08:56:44 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-insecurity.html,v
retrieving revision 1.133
retrieving revision 1.134
diff -u -b -r1.133 -r1.134
--- proprietary-insecurity.html 19 Dec 2020 13:34:34 -0000 1.133
+++ proprietary-insecurity.html 22 Dec 2020 08:56:44 -0000 1.134
@@ -76,6 +76,18 @@
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
+ <li id="M202012190">
+ <p><a
+
href="https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-china-surveillance/">
+ A Zoom executive carried out snooping and censorship for
+ China</a>.</p>
+
+ <p>This abuse of Zoom's power shows how dangerous that power is. The
+ root problem is not the surveillance and censorship, but rather the
+ power that Zoom has. It gets that power partly from the use of its
+ server, but also partly from the nonfree client program.</p>
+ </li>
+
<li id="M202012070">
<p>Baidu apps were <a
href="https://www.zdnet.com/article/baidus-android-apps-caught-collecting-sensitive-user-details/">caught
collecting
@@ -815,7 +827,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/12/19 13:34:34 $
+$Date: 2020/12/22 08:56:44 $
<!-- timestamp end -->
</p>
</div>
Index: workshop/mal.rec
===================================================================
RCS file: /webcvs/www/www/proprietary/workshop/mal.rec,v
retrieving revision 1.266
retrieving revision 1.267
diff -u -b -r1.266 -r1.267
--- workshop/mal.rec 21 Dec 2020 13:31:11 -0000 1.266
+++ workshop/mal.rec 22 Dec 2020 08:56:45 -0000 1.267
@@ -28,7 +28,7 @@
Id: 202012190
RT: www-discuss 2020-12-21 (Zoom spied and censored for China)
PubDate: 2020-12-19
-Target: proprietary-surveillance.html SpywareInDesktopApps
+Target: proprietary-insecurity.html proprietary-insecurity
Target: malware-in-online-conferencing.html malware-in-online-conferencing
Keywords:
Blurb: <p><a
@@ -46,6 +46,7 @@
RT: www-discuss (2020-12-06 back doors in wifi hubs)
PubDate: 2020-11-23
Target: proprietary-back-doors.html universal
+Target: malware-appliances.html malware-appliances
Keywords: routers jetstream wavelink
Blurb: <p>Some Wavelink and JetStream wifi routers have
+ universal back doors that enable unauthenticated
@@ -72,6 +73,7 @@
PubDate: 2020-12-07
Target: proprietary-insecurity.html proprietary-insecurity
Target: proprietary-surveillance.html SpywareInAndroid
+Target: malware-mobiles.html surveillance
Keywords: Baidu, Android, Surveillance, Insecurity
Blurb: <p>Baidu apps were <a
+
href="https://www.zdnet.com/article/baidus-android-apps-caught-collecting-sensitive-user-details/">caught
collecting
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary malware-appliances.html proprie...,
Therese Godefroy <=