[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary proprietary-surveillance.html p...
From: |
rsiddharth |
Subject: |
www/proprietary proprietary-surveillance.html p... |
Date: |
Tue, 5 Jan 2021 21:52:25 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: rsiddharth <rsd> 21/01/05 21:52:25
Modified files:
proprietary : proprietary-surveillance.html proprietary.html
proprietary/workshop: mal.rec
Log message:
[RT#1668813] add iot surveillance
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.html?cvsroot=www&r1=1.360&r2=1.361
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.html?cvsroot=www&r1=1.280&r2=1.281
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/mal.rec?cvsroot=www&r1=1.279&r2=1.280
Patches:
Index: proprietary-surveillance.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.html,v
retrieving revision 1.360
retrieving revision 1.361
diff -u -b -r1.360 -r1.361
--- proprietary-surveillance.html 4 Jan 2021 09:55:31 -0000 1.360
+++ proprietary-surveillance.html 6 Jan 2021 02:52:22 -0000 1.361
@@ -1756,6 +1756,19 @@
<div style="clear: left;"></div>
<ul class="blurbs">
+ <li id="M202101050">
+ <p>Most Internet connected devices in Mozilla's <a
+ href="https://foundation.mozilla.org/en/privacynotincluded">“Privacy
+ Not Included”</a> list <a
+
href="https://foundation.mozilla.org/en/privacynotincluded/arlo-video-doorbell">are
+ designed to snoop on users</a> even if they meet
+ Mozilla's "Minimum Security Standards". Insecure
+ design of the program running on some of these devices <a
+
href="https://foundation.mozilla.org/en/privacynotincluded/vibratissimo-panty-buster">makes
+ the user susceptible to be snooped and exploited by crackers as
+ well</a>.</p>
+ </li>
+
<li id="M201708280">
<p>The bad security in many Internet of Stings devices allows <a
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
@@ -2826,7 +2839,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/01/04 09:55:31 $
+$Date: 2021/01/06 02:52:22 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.html,v
retrieving revision 1.280
retrieving revision 1.281
diff -u -b -r1.280 -r1.281
--- proprietary.html 5 Jan 2021 10:58:41 -0000 1.280
+++ proprietary.html 6 Jan 2021 02:52:22 -0000 1.281
@@ -90,7 +90,7 @@
</div>
<p>As of January, 2021, the pages in this directory list around 500
-instances of malicious functionalities (with more than 560 references to
+instances of malicious functionalities (with more than 570 references to
back them up), but there are surely thousands more we don't know about.</p>
<table id="TOC">
@@ -174,6 +174,19 @@
<h3 id="latest">Latest additions</h3>
<ul class="blurbs">
+ <li id="M202101050">
+ <p>Most Internet connected devices in Mozilla's <a
+ href="https://foundation.mozilla.org/en/privacynotincluded">“Privacy
+ Not Included”</a> list <a
+
href="https://foundation.mozilla.org/en/privacynotincluded/arlo-video-doorbell">are
+ designed to snoop on users</a> even if they meet
+ Mozilla's "Minimum Security Standards". Insecure
+ design of the program running on some of these devices <a
+
href="https://foundation.mozilla.org/en/privacynotincluded/vibratissimo-panty-buster">makes
+ the user susceptible to be snooped and exploited by crackers as
+ well</a>.</p>
+ </li>
+
<li id="M202101040">
<p>The personal finance management software “Quicken” <a
href="https://www.quicken.com/support/quicken-discontinuation-policy">
@@ -220,13 +233,6 @@
are in danger of surveillance</a> and their computers are infected
with malware as a result of installing proprietary software.</p>
</li>
-
- <li id="M202011050">
- <p>HP tricked users into installing
- a mischievous update in their printers that <a
-
href="https://www.eff.org/deeplinks/2020/11/ink-stained-wretches-battle-soul-digital-freedom-taking-place-inside-your-printer">made
- the devices reject all third-party ink cartridges</a>.</p>
- </li>
</ul>
</div>
@@ -289,7 +295,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/01/05 10:58:41 $
+$Date: 2021/01/06 02:52:22 $
<!-- timestamp end -->
</p>
</div>
Index: workshop/mal.rec
===================================================================
RCS file: /web/www/www/proprietary/workshop/mal.rec,v
retrieving revision 1.279
retrieving revision 1.280
diff -u -b -r1.279 -r1.280
--- workshop/mal.rec 5 Jan 2021 10:58:42 -0000 1.279
+++ workshop/mal.rec 6 Jan 2021 02:52:24 -0000 1.280
@@ -24,6 +24,24 @@
#### Please don't remove the blank line after this marker! ####
# ADD NEW BLURB HERE
+Added: 2021-01-05
+Id: 202101050
+RT: RT#1668813 and www-discuss (Backlog of malware suggestions on RT
+2020-01-04)
+PubDate: 2021-01-05
+Target: proprietary-surveillance.html SpywareInEquipment
+Keywords: iot
+Blurb: <p>Most Internet connected devices in Mozilla's <a
++ href="https://foundation.mozilla.org/en/privacynotincluded">“Privacy
++ Not Included”</a> list <a
++
href="https://foundation.mozilla.org/en/privacynotincluded/arlo-video-doorbell">are
++ designed to snoop on users</a> even if they meet
++ Mozilla's "Minimum Security Standards". Insecure
++ design of the program running on some of these devices <a
++
href="https://foundation.mozilla.org/en/privacynotincluded/vibratissimo-panty-buster">makes
++ the user susceptible to be snooped and exploited by crackers as
++ well</a>.</p>
+
Added: 2021-01-04
Id: 202010210
RT: www-discuss 2020-11-24