www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary proprietary-insecurity.html mal...


From: Ali Reza Hayati
Subject: www/proprietary proprietary-insecurity.html mal...
Date: Fri, 30 Jul 2021 11:24:55 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     Ali Reza Hayati <arh>   21/07/30 11:24:55

Modified files:
        proprietary    : proprietary-insecurity.html malware-apple.html 
                         proprietary.html all.html 
        proprietary/workshop: mal.rec 

Log message:
        Added item Pegasus spyware in Apple iThings (www-discuss 2021-07-23)

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.html?cvsroot=www&r1=1.169&r2=1.170
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.html?cvsroot=www&r1=1.137&r2=1.138
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.html?cvsroot=www&r1=1.354&r2=1.355
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/all.html?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/mal.rec?cvsroot=www&r1=1.356&r2=1.357

Patches:
Index: proprietary-insecurity.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.html,v
retrieving revision 1.169
retrieving revision 1.170
diff -u -b -r1.169 -r1.170
--- proprietary-insecurity.html 15 Jul 2021 07:18:30 -0000      1.169
+++ proprietary-insecurity.html 30 Jul 2021 15:24:54 -0000      1.170
@@ -71,6 +71,26 @@
 <div class="column-limit" id="proprietary-insecurity"></div>
 
 <ul class="blurbs">
+  <li id="M202107190">
+    <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/";>Crackers
+    used a zero-day and zero-click exploit in Apple iThings to install
+    spyware</a> on people's devices, many of them to be journalists, even
+    if they were using the latest version of the proprietary operating
+    system installed on their iDevice.</p>
+
+    <p>Nobody can do anything about these vulnerabilities and people
+    have to wait until Apple fixes these security holes, if it decides
+    to fix it. A free operating system would let people to identify the
+    hole and fix it.</p>
+
+    <p><small>Please note that the article
+    wrongly refers to crackers as &ldquo;<a
+    
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo;.</small></p>
+  </li>
+
   <li id="M202107090">
     <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
     --><!--#echo encoding="none" var="DATE" -->
@@ -1158,7 +1178,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/07/15 07:18:30 $
+$Date: 2021/07/30 15:24:54 $
 <!-- timestamp end -->
 </p>
 </div>

Index: malware-apple.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.html,v
retrieving revision 1.137
retrieving revision 1.138
diff -u -b -r1.137 -r1.138
--- malware-apple.html  13 Jun 2021 08:13:32 -0000      1.137
+++ malware-apple.html  30 Jul 2021 15:24:54 -0000      1.138
@@ -254,6 +254,26 @@
   bugs.</p>
 
 <ul class="blurbs">
+  <li id="M202107190">
+    <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/";>Crackers
+    used a zero-day and zero-click exploit in Apple iThings to install
+    spyware</a> on people's devices, many of them to be journalists, even
+    if they were using the latest version of the proprietary operating
+    system installed on their iDevice.</p>
+
+    <p>Nobody can do anything about these vulnerabilities and people
+    have to wait until Apple fixes these security holes, if it decides
+    to fix it. A free operating system would let people to identify the
+    hole and fix it.</p>
+
+    <p><small>Please note that the article
+    wrongly refers to crackers as &ldquo;<a
+    
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo;.</small></p>
+  </li>
+
   <li id="M202012200">
     <!--#set var="DATE" value='<small class="date-tag">2020-12</small>'
     --><!--#echo encoding="none" var="DATE" -->
@@ -1175,7 +1195,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/06/13 08:13:32 $
+$Date: 2021/07/30 15:24:54 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.html,v
retrieving revision 1.354
retrieving revision 1.355
diff -u -b -r1.354 -r1.355
--- proprietary.html    15 Jul 2021 07:21:12 -0000      1.354
+++ proprietary.html    30 Jul 2021 15:24:54 -0000      1.355
@@ -186,6 +186,26 @@
 <h3 id="latest">Latest additions</h3>
 
 <ul class="blurbs">
+  <li id="M202107190">
+    <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/";>Crackers
+    used a zero-day and zero-click exploit in Apple iThings to install
+    spyware</a> on people's devices, many of them to be journalists, even
+    if they were using the latest version of the proprietary operating
+    system installed on their iDevice.</p>
+
+    <p>Nobody can do anything about these vulnerabilities and people
+    have to wait until Apple fixes these security holes, if it decides
+    to fix it. A free operating system would let people to identify the
+    hole and fix it.</p>
+
+    <p><small>Please note that the article
+    wrongly refers to crackers as &ldquo;<a
+    
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo;.</small></p>
+  </li>
+
   <li id="M202107090">
     <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
     --><!--#echo encoding="none" var="DATE" -->
@@ -249,17 +269,6 @@
     might or might not do malicious things but the power Google has over 
proprietary
     Android phones is dangerous.</p>
   </li>
-
-  <li id="M202106170">
-    <!--#set var="DATE" value='<small class="date-tag">2021-06</small>'
-    --><!--#echo encoding="none" var="DATE" -->
-    <p><a
-    
href="https://www.theguardian.com/technology/2021/jun/17/nine-out-of-10-health-apps-harvest-user-data-global-study-shows";>Almost
-    all proprietary health apps harvest users' data</a>, including
-    sensitive health information, tracking identifiers, and cookies to
-    track user activities. Some of these applications are tracking users
-    across different platforms.</p>
-  </li>
 </ul>
 <p class="button right-align">
 <a href="/proprietary/all.html">More items&hellip;</a></p>
@@ -322,7 +331,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/07/15 07:21:12 $
+$Date: 2021/07/30 15:24:54 $
 <!-- timestamp end -->
 </p>
 </div>

Index: all.html
===================================================================
RCS file: /web/www/www/proprietary/all.html,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- all.html    25 Jul 2021 05:52:32 -0000      1.33
+++ all.html    30 Jul 2021 15:24:54 -0000      1.34
@@ -42,6 +42,24 @@
 <div class="column-limit" id="all-malware"></div>
 
 <ul class="blurbs">
+<!--#set var='ADD' value='2021-07-30' --><!--#set var='PUB' value='2021-07-19' 
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo 
encoding='none' var='ADD' --><span class="gnun-split"></span> &mdash; Latest 
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB' 
--></small>
+    <p><a
+    
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/";>Crackers
+    used a zero-day and zero-click exploit in Apple iThings to install
+    spyware</a> on people's devices, many of them to be journalists, even
+    if they were using the latest version of the proprietary operating
+    system installed on their iDevice.</p>
+
+    <p>Nobody can do anything about these vulnerabilities and people
+    have to wait until Apple fixes these security holes, if it decides
+    to fix it. A free operating system would let people to identify the
+    hole and fix it.</p>
+
+    <p><small>Please note that the article
+    wrongly refers to crackers as &ldquo;<a
+    
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo;.</small></p>
+  </li>
+
 <!--#set var='ADD' value='2021-07-15' --><!--#set var='PUB' value='2021-07-09' 
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo 
encoding='none' var='ADD' --><span class="gnun-split"></span> &mdash; Latest 
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB' 
--></small>
     <p>A newly found Microsoft Windows vulnerability <a
     
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/";>
@@ -2315,7 +2333,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/07/25 05:52:32 $
+$Date: 2021/07/30 15:24:54 $
 <!-- timestamp end -->
 </p>
 </div>

Index: workshop/mal.rec
===================================================================
RCS file: /web/www/www/proprietary/workshop/mal.rec,v
retrieving revision 1.356
retrieving revision 1.357
diff -u -b -r1.356 -r1.357
--- workshop/mal.rec    25 Jul 2021 05:52:33 -0000      1.356
+++ workshop/mal.rec    30 Jul 2021 15:24:55 -0000      1.357
@@ -24,6 +24,29 @@
 ####    Please don't remove the blank line after this marker!    ####
 # ADD NEW BLURB HERE
 
+Added: 2021-07-30
+Id: 202107190
+RT: www-discuss 2021-07-23
+PubDate: 2021-07-19
+Target: proprietary-insecurity.html proprietary-insecurity
+Target: malware-apple.html insecurity
+Keywords: Apple, Insecurity, Pegasus, iThings
+Blurb: <p><a
++   
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/";>Crackers
++   used a zero-day and zero-click exploit in Apple iThings to install
++   spyware</a> on people's devices, many of them to be journalists, even
++   if they were using the latest version of the proprietary operating
++   system installed on their iDevice.</p>
++
++   <p>Nobody can do anything about these vulnerabilities and people
++   have to wait until Apple fixes these security holes, if it decides
++   to fix it. A free operating system would let people to identify the
++   hole and fix it.</p>
++
++   <p><small>Please note that the article
++   wrongly refers to crackers as &ldquo;<a
++   
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo;.</small></p>
+
 Added: 2021-07-15
 Id: 202107050
 RT: www-discuss 2021-07-07



reply via email to

[Prev in Thread] Current Thread [Next in Thread]