[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-mobiles.html proprietar...
From: |
Ineiev |
Subject: |
www/proprietary malware-mobiles.html proprietar... |
Date: |
Mon, 1 Feb 2021 05:54:25 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: Ineiev <ineiev> 21/02/01 05:54:25
Modified files:
proprietary : malware-mobiles.html proprietary.html
proprietary/workshop: mal.rec
Log message:
Tracking in Venice, per www-discuss.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.html?cvsroot=www&r1=1.144&r2=1.145
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.html?cvsroot=www&r1=1.292&r2=1.293
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/mal.rec?cvsroot=www&r1=1.294&r2=1.295
Patches:
Index: malware-mobiles.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.html,v
retrieving revision 1.144
retrieving revision 1.145
diff -u -b -r1.144 -r1.145
--- malware-mobiles.html 31 Jan 2021 17:19:33 -0000 1.144
+++ malware-mobiles.html 1 Feb 2021 10:54:23 -0000 1.145
@@ -85,7 +85,23 @@
<div class="frame">
<h3 id="phone-communications">Cell-phone communications</h3>
+<p>This section describes one other malicious characteristic of mobile
+phones, location tracking which is caused by the underlying radio system
+rather than by the specific software in them.</p>
+
<ul class="blurbs">
+ <li id="M202101130">
+ <!--#set var="DATE" value='<small class="date-tag">2021-01</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>The authorities in Venice track the <a
+
href="https://edition.cnn.com/travel/article/venice-control-room-tourism/index.html">
+ movements of all tourists</a> using their portable phones. The article
+ says that <em>at present</em> the system is configured to report only
+ aggregated information. But that could be changed. What will that
+ system do 10 years from now? What will a similar system in another
+ country do? Those are the questions this raises.</p>
+ </li>
+
<li id="M201502100">
<!--#set var="DATE" value='<small class="date-tag">2015-02</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -99,39 +115,6 @@
(including the US and the EU) require the network to store all
these location data for months or years.</p>
</li>
-
- <li id="M201311120.1">
- <!--#set var="DATE" value='<small class="date-tag">2013-11</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p id="universal-back-door-phone-modem">
- Almost every phone's communication processor has
- a universal back door which is <a
-
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
- often used to make a phone transmit all conversations it hears</a>.</p>
-
- <p>The back door <a class="not-a-duplicate"
-
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
- may take the form of bugs that have gone 20 years unfixed</a>.
- The choice to leave the security holes in place is morally
- equivalent to writing a back door.</p>
-
- <p>The back door is in the “modem processor”, whose
- job is to communicate with the radio network. In most phones,
- the modem processor controls the microphone. In most phones it
- has the power to rewrite the software for the main processor
- too.</p>
-
- <p>A few phone models are specially designed so that the modem
- processor does not control the microphone, and so that it can't
- change the software in the main processor. They still have the
- back door, but at least it is unable to turn the phone unto a
- listening device.</p>
-
- <p>The universal back door is apparently also used to make phones <a
-
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
- transmit even when they are turned off</a>. This means their movements
- are tracked, and may also make the listening feature work.</p>
- </li>
</ul>
</div>
@@ -172,9 +155,34 @@
<h3 id="back-doors">Back Doors</h3>
- <p>See above for the <a href="#universal-back-door-phone-modem">general
universal back
- door</a> in essentially all mobile phones, which permits converting
- them into full-time listening devices.</p>
+ <p id="universal-back-door-phone-modem">
+ Almost every phone's communication processor has
+ a universal back door which is <a
+
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
+ often used to make a phone transmit all conversations it hears</a>.</p>
+
+ <p>The back door <a class="not-a-duplicate"
+
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
+ may take the form of bugs that have gone 20 years unfixed</a>.
+ The choice to leave the security holes in place is morally
+ equivalent to writing a back door.</p>
+
+ <p>The back door is in the “modem processor”, whose
+ job is to communicate with the radio network. In most phones,
+ the modem processor controls the microphone. In most phones it
+ has the power to rewrite the software for the main processor
+ too.</p>
+
+ <p>A few phone models are specially designed so that the modem
+ processor does not control the microphone, and so that it can't
+ change the software in the main processor. They still have the
+ back door, but at least it is unable to turn the phone unto a
+ listening device.</p>
+
+ <p>The universal back door is apparently also used to make phones <a
+
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
+ transmit even when they are turned off</a>. This means their movements
+ are tracked, and may also make the listening feature work.</p>
<ul class="blurbs">
<li id="M202001090">
@@ -1518,7 +1526,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/01/31 17:19:33 $
+$Date: 2021/02/01 10:54:23 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.html,v
retrieving revision 1.292
retrieving revision 1.293
diff -u -b -r1.292 -r1.293
--- proprietary.html 20 Jan 2021 08:34:00 -0000 1.292
+++ proprietary.html 1 Feb 2021 10:54:24 -0000 1.293
@@ -77,6 +77,12 @@
software often leads to further injustices: malicious
functionalities.</p>
+<p>In this section, we also list <a
+href="/proprietary/malware-mobiles.html#phone-communications">one
+other malicious characteristic of mobile phones, location tracking</a>
+which is caused by the underlying radio system rather than by the
+specific software in them.</p>
+
<p>Power corrupts; the proprietary program's developer is tempted to
design the program to mistreat its users. (Software whose functioning
mistreats the user is called <em>malware</em>.) Of course, the
@@ -180,6 +186,18 @@
<h3 id="latest">Latest additions</h3>
<ul class="blurbs">
+ <li id="M202101130">
+ <!--#set var="DATE" value='<small class="date-tag">2021-01</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>The authorities in Venice track the <a
+
href="https://edition.cnn.com/travel/article/venice-control-room-tourism/index.html">
+ movements of all tourists</a> using their portable phones. The article
+ says that <em>at present</em> the system is configured to report only
+ aggregated information. But that could be changed. What will that
+ system do 10 years from now? What will a similar system in another
+ country do? Those are the questions this raises.</p>
+ </li>
+
<li id="M202101110">
<!--#set var="DATE" value='<small class="date-tag">2021-01</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -234,17 +252,6 @@
the user susceptible to be snooped and exploited by crackers as
well</a>.</p>
</li>
-
- <li id="M202101040">
- <!--#set var="DATE" value='<small class="date-tag">2021-01</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>The personal finance management software “Quicken” <a
- href="https://www.quicken.com/support/quicken-discontinuation-policy">
- has a discontinuation policy, a.k.a. planned obsolescence</a>, which is
- an injustice to users. A free (as in freedom) program would let users
- control the software. But when you use a proprietary software,
- you won't be in control.</p>
- </li>
</ul>
</div>
@@ -307,7 +314,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/01/20 08:34:00 $
+$Date: 2021/02/01 10:54:24 $
<!-- timestamp end -->
</p>
</div>
Index: workshop/mal.rec
===================================================================
RCS file: /web/www/www/proprietary/workshop/mal.rec,v
retrieving revision 1.294
retrieving revision 1.295
diff -u -b -r1.294 -r1.295
--- workshop/mal.rec 31 Jan 2021 17:19:34 -0000 1.294
+++ workshop/mal.rec 1 Feb 2021 10:54:24 -0000 1.295
@@ -24,6 +24,20 @@
#### Please don't remove the blank line after this marker! ####
# ADD NEW BLURB HERE
+Added: 2021-01-27
+Id: 202101130
+RT: www-discuss 2021-01-15 <E1l0Hie-0005fO-BR@fencepost.gnu.org>
+PubDate: 2021-01-13
+Target: malware-mobiles.html phone-communications
+Keywords:
+Blurb: <p>The authorities in Venice track the <a
++
href="https://edition.cnn.com/travel/article/venice-control-room-tourism/index.html">
++ movements of all tourists</a> using their portable phones. The article
++ says that <em>at present</em> the system is configured to report only
++ aggregated information. But that could be changed. What will that
++ system do 10 years from now? What will a similar system in another
++ country do? Those are the questions this raises.</p>
+
Added: 2021-01-19
Id: 202101110
RT: www-discuss 2021-01-13
@@ -2584,41 +2598,6 @@
+ (including the US and the EU) require the network to store all
+ these location data for months or years.</p>
-Id: 201311120.1
-Target: malware-mobiles.html phone-communications
-PubDate: 2006-12-05
-PubDate: 2013-11-12
-PubDate: 2013-07-22
-Keywords: communication processor backdoor
-Blurb: <p id="universal-back-door-phone-modem">
-+ Almost every phone's communication processor has
-+ a universal back door which is <a
-+
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
-+ often used to make a phone transmit all conversations it hears</a>.</p>
-+
-+ <p>The back door <a class="not-a-duplicate"
-+
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
-+ may take the form of bugs that have gone 20 years unfixed</a>.
-+ The choice to leave the security holes in place is morally
-+ equivalent to writing a back door.</p>
-+
-+ <p>The back door is in the “modem processor”, whose
-+ job is to communicate with the radio network. In most phones,
-+ the modem processor controls the microphone. In most phones it
-+ has the power to rewrite the software for the main processor
-+ too.</p>
-+
-+ <p>A few phone models are specially designed so that the modem
-+ processor does not control the microphone, and so that it can't
-+ change the software in the main processor. They still have the
-+ back door, but at least it is unable to turn the phone unto a
-+ listening device.</p>
-+
-+ <p>The universal back door is apparently also used to make phones <a
-+
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
-+ transmit even when they are turned off</a>. This means their movements
-+ are tracked, and may also make the listening feature work.</p>
-
Added: 2018-10-11
Id: 201805080
Target: proprietary-interference.html proprietary-interference
- www/proprietary malware-mobiles.html proprietar...,
Ineiev <=