[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary all.html malware-apple.html pro...
From: |
Ali Reza Hayati |
Subject: |
www/proprietary all.html malware-apple.html pro... |
Date: |
Tue, 3 Aug 2021 10:06:59 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: Ali Reza Hayati <arh> 21/08/03 10:06:59
Modified files:
proprietary : all.html malware-apple.html
proprietary-insecurity.html proprietary.html
Log message:
Removed redundant item
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/all.html?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.html?cvsroot=www&r1=1.142&r2=1.143
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.html?cvsroot=www&r1=1.176&r2=1.177
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.html?cvsroot=www&r1=1.359&r2=1.360
Patches:
Index: all.html
===================================================================
RCS file: /web/www/www/proprietary/all.html,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- all.html 1 Aug 2021 17:06:59 -0000 1.38
+++ all.html 3 Aug 2021 14:06:59 -0000 1.39
@@ -42,24 +42,6 @@
<div class="column-limit" id="all-malware"></div>
<ul class="blurbs">
-<!--#set var='ADD' value='2021-07-30' --><!--#set var='PUB' value='2021-07-19'
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small>
- <p><a
-
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/">Crackers
- used an exploit in Apple iThings to install
- spyware</a> on people's devices, many of them to be journalists, even
- if they were using the latest version of the proprietary operating
- system installed on their iDevice.</p>
-
- <p>Nobody can do anything about these vulnerabilities and people
- have to wait until Apple fixes these security holes, if it decides
- to fix it. A free operating system would let people to identify the
- hole and fix it.</p>
-
- <p><small>Please note that the article
- wrongly refers to crackers as “<a
-
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
- </li>
-
<!--#set var='ADD' value='2021-07-30' --><!--#set var='PUB' value='2021-07-18'
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small>
<p><a
href="https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones">
@@ -2350,7 +2332,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/08/01 17:06:59 $
+$Date: 2021/08/03 14:06:59 $
<!-- timestamp end -->
</p>
</div>
Index: malware-apple.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.html,v
retrieving revision 1.142
retrieving revision 1.143
diff -u -b -r1.142 -r1.143
--- malware-apple.html 1 Aug 2021 17:06:59 -0000 1.142
+++ malware-apple.html 3 Aug 2021 14:06:59 -0000 1.143
@@ -254,26 +254,6 @@
bugs.</p>
<ul class="blurbs">
- <li id="M202107190">
- <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
-
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/">Crackers
- used an exploit in Apple iThings to install
- spyware</a> on people's devices, many of them to be journalists, even
- if they were using the latest version of the proprietary operating
- system installed on their iDevice.</p>
-
- <p>Nobody can do anything about these vulnerabilities and people
- have to wait until Apple fixes these security holes, if it decides
- to fix it. A free operating system would let people to identify the
- hole and fix it.</p>
-
- <p><small>Please note that the article
- wrongly refers to crackers as “<a
-
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
- </li>
-
<li id="M202107180">
<!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -1214,7 +1194,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/08/01 17:06:59 $
+$Date: 2021/08/03 14:06:59 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.html,v
retrieving revision 1.176
retrieving revision 1.177
diff -u -b -r1.176 -r1.177
--- proprietary-insecurity.html 1 Aug 2021 17:06:59 -0000 1.176
+++ proprietary-insecurity.html 3 Aug 2021 14:06:59 -0000 1.177
@@ -79,26 +79,6 @@
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
- <li id="M202107190">
- <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
-
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/">Crackers
- used an exploit in Apple iThings to install
- spyware</a> on people's devices, many of them to be journalists, even
- if they were using the latest version of the proprietary operating
- system installed on their iDevice.</p>
-
- <p>Nobody can do anything about these vulnerabilities and people
- have to wait until Apple fixes these security holes, if it decides
- to fix it. A free operating system would let people to identify the
- hole and fix it.</p>
-
- <p><small>Please note that the article
- wrongly refers to crackers as “<a
-
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
- </li>
-
<li id="M202107180">
<!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -1205,7 +1185,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/08/01 17:06:59 $
+$Date: 2021/08/03 14:06:59 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.html,v
retrieving revision 1.359
retrieving revision 1.360
diff -u -b -r1.359 -r1.360
--- proprietary.html 1 Aug 2021 17:07:00 -0000 1.359
+++ proprietary.html 3 Aug 2021 14:06:59 -0000 1.360
@@ -186,26 +186,6 @@
<h3 id="latest">Latest additions</h3>
<ul class="blurbs">
- <li id="M202107190">
- <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
-
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/">Crackers
- used an exploit in Apple iThings to install
- spyware</a> on people's devices, many of them to be journalists, even
- if they were using the latest version of the proprietary operating
- system installed on their iDevice.</p>
-
- <p>Nobody can do anything about these vulnerabilities and people
- have to wait until Apple fixes these security holes, if it decides
- to fix it. A free operating system would let people to identify the
- hole and fix it.</p>
-
- <p><small>Please note that the article
- wrongly refers to crackers as “<a
-
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
- </li>
-
<li id="M202107180">
<!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -278,6 +258,16 @@
features (and the proprietary software that is their entry path)
to the point that even the most powerful companies don't dare.</p>
</li>
+
+ <li id="M202106190">
+ <!--#set var="DATE" value='<small class="date-tag">2021-06</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://arstechnica.com/gadgets/2021/06/even-creepier-covid-tracking-google-silently-pushed-app-to-users-phones/">Google
+ automatically installed an app on many proprietary Android phones</a>. The
app
+ might or might not do malicious things but the power Google has over
proprietary
+ Android phones is dangerous.</p>
+ </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -340,7 +330,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/08/01 17:07:00 $
+$Date: 2021/08/03 14:06:59 $
<!-- timestamp end -->
</p>
</div>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary all.html malware-apple.html pro...,
Ali Reza Hayati <=