[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary all.html malware-apple.html mal...
From: |
Ali Reza Hayati |
Subject: |
www/proprietary all.html malware-apple.html mal... |
Date: |
Sat, 31 Jul 2021 12:38:26 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: Ali Reza Hayati <arh> 21/07/31 12:38:26
Modified files:
proprietary : all.html malware-apple.html malware-google.html
proprietary-insecurity.html proprietary.html
proprietary/workshop: mal.rec
Log message:
Minor fixes to remove unnecessary information
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/all.html?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.html?cvsroot=www&r1=1.140&r2=1.141
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-google.html?cvsroot=www&r1=1.99&r2=1.100
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.html?cvsroot=www&r1=1.174&r2=1.175
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.html?cvsroot=www&r1=1.357&r2=1.358
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/mal.rec?cvsroot=www&r1=1.359&r2=1.360
Patches:
Index: all.html
===================================================================
RCS file: /web/www/www/proprietary/all.html,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- all.html 31 Jul 2021 06:56:53 -0000 1.36
+++ all.html 31 Jul 2021 16:38:25 -0000 1.37
@@ -45,7 +45,7 @@
<!--#set var='ADD' value='2021-07-30' --><!--#set var='PUB' value='2021-07-19'
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small>
<p><a
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/">Crackers
- used a zero-day and zero-click exploit in Apple iThings to install
+ used an exploit in Apple iThings to install
spyware</a> on people's devices, many of them to be journalists, even
if they were using the latest version of the proprietary operating
system installed on their iDevice.</p>
@@ -66,7 +66,7 @@
The pegasus spyware used vulnerabilities on proprietary smartphone
operating systems</a> to impose surveillance on people. It can record
people's calls, copy their messages, and secretly film them, using a
- zero-click (means no interaction is needed) vulnerability.</p>
+ security vulnerability.</p>
<p>A free operating system would've let people to fix the bugs for
themselves but now infected people are forced to wait for corporations to
@@ -2350,7 +2350,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/07/31 06:56:53 $
+$Date: 2021/07/31 16:38:25 $
<!-- timestamp end -->
</p>
</div>
Index: malware-apple.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.html,v
retrieving revision 1.140
retrieving revision 1.141
diff -u -b -r1.140 -r1.141
--- malware-apple.html 31 Jul 2021 06:56:53 -0000 1.140
+++ malware-apple.html 31 Jul 2021 16:38:25 -0000 1.141
@@ -259,7 +259,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/">Crackers
- used a zero-day and zero-click exploit in Apple iThings to install
+ used an exploit in Apple iThings to install
spyware</a> on people's devices, many of them to be journalists, even
if they were using the latest version of the proprietary operating
system installed on their iDevice.</p>
@@ -282,7 +282,7 @@
The pegasus spyware used vulnerabilities on proprietary smartphone
operating systems</a> to impose surveillance on people. It can record
people's calls, copy their messages, and secretly film them, using a
- zero-click (means no interaction is needed) vulnerability.</p>
+ security vulnerability.</p>
<p>A free operating system would've let people to fix the bugs for
themselves but now infected people are forced to wait for corporations to
@@ -1214,7 +1214,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/07/31 06:56:53 $
+$Date: 2021/07/31 16:38:25 $
<!-- timestamp end -->
</p>
</div>
Index: malware-google.html
===================================================================
RCS file: /web/www/www/proprietary/malware-google.html,v
retrieving revision 1.99
retrieving revision 1.100
diff -u -b -r1.99 -r1.100
--- malware-google.html 31 Jul 2021 06:56:53 -0000 1.99
+++ malware-google.html 31 Jul 2021 16:38:25 -0000 1.100
@@ -257,7 +257,7 @@
The pegasus spyware used vulnerabilities on proprietary smartphone
operating systems</a> to impose surveillance on people. It can record
people's calls, copy their messages, and secretly film them, using a
- zero-click (means no interaction is needed) vulnerability.</p>
+ security vulnerability.</p>
<p>A free operating system would've let people to fix the bugs for
themselves but now infected people are forced to wait for corporations to
@@ -777,7 +777,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/07/31 06:56:53 $
+$Date: 2021/07/31 16:38:25 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.html,v
retrieving revision 1.174
retrieving revision 1.175
diff -u -b -r1.174 -r1.175
--- proprietary-insecurity.html 31 Jul 2021 16:32:09 -0000 1.174
+++ proprietary-insecurity.html 31 Jul 2021 16:38:25 -0000 1.175
@@ -84,7 +84,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/">Crackers
- used a zero-day and zero-click exploit in Apple iThings to install
+ used an exploit in Apple iThings to install
spyware</a> on people's devices, many of them to be journalists, even
if they were using the latest version of the proprietary operating
system installed on their iDevice.</p>
@@ -107,7 +107,7 @@
The pegasus spyware used vulnerabilities on proprietary smartphone
operating systems</a> to impose surveillance on people. It can record
people's calls, copy their messages, and secretly film them, using a
- zero-click (means no interaction is needed) vulnerability.</p>
+ security vulnerability.</p>
<p>A free operating system would've let people to fix the bugs for
themselves but now infected people are forced to wait for corporations to
@@ -1205,7 +1205,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/07/31 16:32:09 $
+$Date: 2021/07/31 16:38:25 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.html,v
retrieving revision 1.357
retrieving revision 1.358
diff -u -b -r1.357 -r1.358
--- proprietary.html 31 Jul 2021 06:56:53 -0000 1.357
+++ proprietary.html 31 Jul 2021 16:38:25 -0000 1.358
@@ -191,7 +191,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/">Crackers
- used a zero-day and zero-click exploit in Apple iThings to install
+ used an exploit in Apple iThings to install
spyware</a> on people's devices, many of them to be journalists, even
if they were using the latest version of the proprietary operating
system installed on their iDevice.</p>
@@ -214,7 +214,7 @@
The pegasus spyware used vulnerabilities on proprietary smartphone
operating systems</a> to impose surveillance on people. It can record
people's calls, copy their messages, and secretly film them, using a
- zero-click (means no interaction is needed) vulnerability.</p>
+ security vulnerability.</p>
<p>A free operating system would've let people to fix the bugs for
themselves but now infected people are forced to wait for corporations to
@@ -340,7 +340,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/07/31 06:56:53 $
+$Date: 2021/07/31 16:38:25 $
<!-- timestamp end -->
</p>
</div>
Index: workshop/mal.rec
===================================================================
RCS file: /web/www/www/proprietary/workshop/mal.rec,v
retrieving revision 1.359
retrieving revision 1.360
diff -u -b -r1.359 -r1.360
--- workshop/mal.rec 31 Jul 2021 06:56:53 -0000 1.359
+++ workshop/mal.rec 31 Jul 2021 16:38:25 -0000 1.360
@@ -37,7 +37,7 @@
+ The pegasus spyware used vulnerabilities on proprietary smartphone
+ operating systems</a> to impose surveillance on people. It can record
+ people's calls, copy their messages, and secretly film them, using a
-+ zero-click (means no interaction is needed) vulnerability.</p>
++ security vulnerability.</p>
+
+ <p>A free operating system would've let people to fix the bugs for
+ themselves but now infected people are forced to wait for corporations to
@@ -56,7 +56,7 @@
Keywords: Apple, Insecurity, Pegasus, Spyware, iThings
Blurb: <p><a
+
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/">Crackers
-+ used a zero-day and zero-click exploit in Apple iThings to install
++ used an exploit in Apple iThings to install
+ spyware</a> on people's devices, many of them to be journalists, even
+ if they were using the latest version of the proprietary operating
+ system installed on their iDevice.</p>