www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary all.html malware-apple.html mal...


From: Ali Reza Hayati
Subject: www/proprietary all.html malware-apple.html mal...
Date: Sat, 31 Jul 2021 12:38:26 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     Ali Reza Hayati <arh>   21/07/31 12:38:26

Modified files:
        proprietary    : all.html malware-apple.html malware-google.html 
                         proprietary-insecurity.html proprietary.html 
        proprietary/workshop: mal.rec 

Log message:
        Minor fixes to remove unnecessary information

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/all.html?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.html?cvsroot=www&r1=1.140&r2=1.141
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-google.html?cvsroot=www&r1=1.99&r2=1.100
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.html?cvsroot=www&r1=1.174&r2=1.175
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.html?cvsroot=www&r1=1.357&r2=1.358
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/mal.rec?cvsroot=www&r1=1.359&r2=1.360

Patches:
Index: all.html
===================================================================
RCS file: /web/www/www/proprietary/all.html,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- all.html    31 Jul 2021 06:56:53 -0000      1.36
+++ all.html    31 Jul 2021 16:38:25 -0000      1.37
@@ -45,7 +45,7 @@
 <!--#set var='ADD' value='2021-07-30' --><!--#set var='PUB' value='2021-07-19' 
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo 
encoding='none' var='ADD' --><span class="gnun-split"></span> &mdash; Latest 
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB' 
--></small>
     <p><a
     
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/";>Crackers
-    used a zero-day and zero-click exploit in Apple iThings to install
+    used an exploit in Apple iThings to install
     spyware</a> on people's devices, many of them to be journalists, even
     if they were using the latest version of the proprietary operating
     system installed on their iDevice.</p>
@@ -66,7 +66,7 @@
     The pegasus spyware used vulnerabilities on proprietary smartphone
     operating systems</a> to impose surveillance on people. It can record
     people's calls, copy their messages, and secretly film them, using a
-    zero-click (means no interaction is needed) vulnerability.</p>
+    security vulnerability.</p>
 
     <p>A free operating system would've let people to fix the bugs for
     themselves but now infected people are forced to wait for corporations to
@@ -2350,7 +2350,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/07/31 06:56:53 $
+$Date: 2021/07/31 16:38:25 $
 <!-- timestamp end -->
 </p>
 </div>

Index: malware-apple.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.html,v
retrieving revision 1.140
retrieving revision 1.141
diff -u -b -r1.140 -r1.141
--- malware-apple.html  31 Jul 2021 06:56:53 -0000      1.140
+++ malware-apple.html  31 Jul 2021 16:38:25 -0000      1.141
@@ -259,7 +259,7 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p><a
     
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/";>Crackers
-    used a zero-day and zero-click exploit in Apple iThings to install
+    used an exploit in Apple iThings to install
     spyware</a> on people's devices, many of them to be journalists, even
     if they were using the latest version of the proprietary operating
     system installed on their iDevice.</p>
@@ -282,7 +282,7 @@
     The pegasus spyware used vulnerabilities on proprietary smartphone
     operating systems</a> to impose surveillance on people. It can record
     people's calls, copy their messages, and secretly film them, using a
-    zero-click (means no interaction is needed) vulnerability.</p>
+    security vulnerability.</p>
 
     <p>A free operating system would've let people to fix the bugs for
     themselves but now infected people are forced to wait for corporations to
@@ -1214,7 +1214,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/07/31 06:56:53 $
+$Date: 2021/07/31 16:38:25 $
 <!-- timestamp end -->
 </p>
 </div>

Index: malware-google.html
===================================================================
RCS file: /web/www/www/proprietary/malware-google.html,v
retrieving revision 1.99
retrieving revision 1.100
diff -u -b -r1.99 -r1.100
--- malware-google.html 31 Jul 2021 06:56:53 -0000      1.99
+++ malware-google.html 31 Jul 2021 16:38:25 -0000      1.100
@@ -257,7 +257,7 @@
     The pegasus spyware used vulnerabilities on proprietary smartphone
     operating systems</a> to impose surveillance on people. It can record
     people's calls, copy their messages, and secretly film them, using a
-    zero-click (means no interaction is needed) vulnerability.</p>
+    security vulnerability.</p>
 
     <p>A free operating system would've let people to fix the bugs for
     themselves but now infected people are forced to wait for corporations to
@@ -777,7 +777,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/07/31 06:56:53 $
+$Date: 2021/07/31 16:38:25 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-insecurity.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.html,v
retrieving revision 1.174
retrieving revision 1.175
diff -u -b -r1.174 -r1.175
--- proprietary-insecurity.html 31 Jul 2021 16:32:09 -0000      1.174
+++ proprietary-insecurity.html 31 Jul 2021 16:38:25 -0000      1.175
@@ -84,7 +84,7 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p><a
     
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/";>Crackers
-    used a zero-day and zero-click exploit in Apple iThings to install
+    used an exploit in Apple iThings to install
     spyware</a> on people's devices, many of them to be journalists, even
     if they were using the latest version of the proprietary operating
     system installed on their iDevice.</p>
@@ -107,7 +107,7 @@
     The pegasus spyware used vulnerabilities on proprietary smartphone
     operating systems</a> to impose surveillance on people. It can record
     people's calls, copy their messages, and secretly film them, using a
-    zero-click (means no interaction is needed) vulnerability.</p>
+    security vulnerability.</p>
 
     <p>A free operating system would've let people to fix the bugs for
     themselves but now infected people are forced to wait for corporations to
@@ -1205,7 +1205,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/07/31 16:32:09 $
+$Date: 2021/07/31 16:38:25 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.html,v
retrieving revision 1.357
retrieving revision 1.358
diff -u -b -r1.357 -r1.358
--- proprietary.html    31 Jul 2021 06:56:53 -0000      1.357
+++ proprietary.html    31 Jul 2021 16:38:25 -0000      1.358
@@ -191,7 +191,7 @@
     --><!--#echo encoding="none" var="DATE" -->
     <p><a
     
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/";>Crackers
-    used a zero-day and zero-click exploit in Apple iThings to install
+    used an exploit in Apple iThings to install
     spyware</a> on people's devices, many of them to be journalists, even
     if they were using the latest version of the proprietary operating
     system installed on their iDevice.</p>
@@ -214,7 +214,7 @@
     The pegasus spyware used vulnerabilities on proprietary smartphone
     operating systems</a> to impose surveillance on people. It can record
     people's calls, copy their messages, and secretly film them, using a
-    zero-click (means no interaction is needed) vulnerability.</p>
+    security vulnerability.</p>
 
     <p>A free operating system would've let people to fix the bugs for
     themselves but now infected people are forced to wait for corporations to
@@ -340,7 +340,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/07/31 06:56:53 $
+$Date: 2021/07/31 16:38:25 $
 <!-- timestamp end -->
 </p>
 </div>

Index: workshop/mal.rec
===================================================================
RCS file: /web/www/www/proprietary/workshop/mal.rec,v
retrieving revision 1.359
retrieving revision 1.360
diff -u -b -r1.359 -r1.360
--- workshop/mal.rec    31 Jul 2021 06:56:53 -0000      1.359
+++ workshop/mal.rec    31 Jul 2021 16:38:25 -0000      1.360
@@ -37,7 +37,7 @@
 +   The pegasus spyware used vulnerabilities on proprietary smartphone
 +   operating systems</a> to impose surveillance on people. It can record
 +   people's calls, copy their messages, and secretly film them, using a
-+   zero-click (means no interaction is needed) vulnerability.</p>
++   security vulnerability.</p>
 +
 +   <p>A free operating system would've let people to fix the bugs for
 +   themselves but now infected people are forced to wait for corporations to
@@ -56,7 +56,7 @@
 Keywords: Apple, Insecurity, Pegasus, Spyware, iThings
 Blurb: <p><a
 +   
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/";>Crackers
-+   used a zero-day and zero-click exploit in Apple iThings to install
++   used an exploit in Apple iThings to install
 +   spyware</a> on people's devices, many of them to be journalists, even
 +   if they were using the latest version of the proprietary operating
 +   system installed on their iDevice.</p>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]