www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary all.html malware-apple.html pro...


From: Ali Reza Hayati
Subject: www/proprietary all.html malware-apple.html pro...
Date: Tue, 3 Aug 2021 10:06:59 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     Ali Reza Hayati <arh>   21/08/03 10:06:59

Modified files:
        proprietary    : all.html malware-apple.html 
                         proprietary-insecurity.html proprietary.html 

Log message:
        Removed redundant item

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/all.html?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.html?cvsroot=www&r1=1.142&r2=1.143
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.html?cvsroot=www&r1=1.176&r2=1.177
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.html?cvsroot=www&r1=1.359&r2=1.360

Patches:
Index: all.html
===================================================================
RCS file: /web/www/www/proprietary/all.html,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- all.html    1 Aug 2021 17:06:59 -0000       1.38
+++ all.html    3 Aug 2021 14:06:59 -0000       1.39
@@ -42,24 +42,6 @@
 <div class="column-limit" id="all-malware"></div>
 
 <ul class="blurbs">
-<!--#set var='ADD' value='2021-07-30' --><!--#set var='PUB' value='2021-07-19' 
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo 
encoding='none' var='ADD' --><span class="gnun-split"></span> &mdash; Latest 
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB' 
--></small>
-    <p><a
-    
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/";>Crackers
-    used an exploit in Apple iThings to install
-    spyware</a> on people's devices, many of them to be journalists, even
-    if they were using the latest version of the proprietary operating
-    system installed on their iDevice.</p>
-
-    <p>Nobody can do anything about these vulnerabilities and people
-    have to wait until Apple fixes these security holes, if it decides
-    to fix it. A free operating system would let people to identify the
-    hole and fix it.</p>
-
-    <p><small>Please note that the article
-    wrongly refers to crackers as &ldquo;<a
-    
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo;.</small></p>
-  </li>
-
 <!--#set var='ADD' value='2021-07-30' --><!--#set var='PUB' value='2021-07-18' 
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo 
encoding='none' var='ADD' --><span class="gnun-split"></span> &mdash; Latest 
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB' 
--></small>
     <p><a
     
href="https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones";>
@@ -2350,7 +2332,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/08/01 17:06:59 $
+$Date: 2021/08/03 14:06:59 $
 <!-- timestamp end -->
 </p>
 </div>

Index: malware-apple.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.html,v
retrieving revision 1.142
retrieving revision 1.143
diff -u -b -r1.142 -r1.143
--- malware-apple.html  1 Aug 2021 17:06:59 -0000       1.142
+++ malware-apple.html  3 Aug 2021 14:06:59 -0000       1.143
@@ -254,26 +254,6 @@
   bugs.</p>
 
 <ul class="blurbs">
-  <li id="M202107190">
-    <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
-    --><!--#echo encoding="none" var="DATE" -->
-    <p><a
-    
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/";>Crackers
-    used an exploit in Apple iThings to install
-    spyware</a> on people's devices, many of them to be journalists, even
-    if they were using the latest version of the proprietary operating
-    system installed on their iDevice.</p>
-
-    <p>Nobody can do anything about these vulnerabilities and people
-    have to wait until Apple fixes these security holes, if it decides
-    to fix it. A free operating system would let people to identify the
-    hole and fix it.</p>
-
-    <p><small>Please note that the article
-    wrongly refers to crackers as &ldquo;<a
-    
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo;.</small></p>
-  </li>
-
   <li id="M202107180">
     <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
     --><!--#echo encoding="none" var="DATE" -->
@@ -1214,7 +1194,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/08/01 17:06:59 $
+$Date: 2021/08/03 14:06:59 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-insecurity.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.html,v
retrieving revision 1.176
retrieving revision 1.177
diff -u -b -r1.176 -r1.177
--- proprietary-insecurity.html 1 Aug 2021 17:06:59 -0000       1.176
+++ proprietary-insecurity.html 3 Aug 2021 14:06:59 -0000       1.177
@@ -79,26 +79,6 @@
 <div class="column-limit" id="proprietary-insecurity"></div>
 
 <ul class="blurbs">
-  <li id="M202107190">
-    <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
-    --><!--#echo encoding="none" var="DATE" -->
-    <p><a
-    
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/";>Crackers
-    used an exploit in Apple iThings to install
-    spyware</a> on people's devices, many of them to be journalists, even
-    if they were using the latest version of the proprietary operating
-    system installed on their iDevice.</p>
-
-    <p>Nobody can do anything about these vulnerabilities and people
-    have to wait until Apple fixes these security holes, if it decides
-    to fix it. A free operating system would let people to identify the
-    hole and fix it.</p>
-
-    <p><small>Please note that the article
-    wrongly refers to crackers as &ldquo;<a
-    
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo;.</small></p>
-  </li>
-
   <li id="M202107180">
     <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
     --><!--#echo encoding="none" var="DATE" -->
@@ -1205,7 +1185,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/08/01 17:06:59 $
+$Date: 2021/08/03 14:06:59 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.html,v
retrieving revision 1.359
retrieving revision 1.360
diff -u -b -r1.359 -r1.360
--- proprietary.html    1 Aug 2021 17:07:00 -0000       1.359
+++ proprietary.html    3 Aug 2021 14:06:59 -0000       1.360
@@ -186,26 +186,6 @@
 <h3 id="latest">Latest additions</h3>
 
 <ul class="blurbs">
-  <li id="M202107190">
-    <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
-    --><!--#echo encoding="none" var="DATE" -->
-    <p><a
-    
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/";>Crackers
-    used an exploit in Apple iThings to install
-    spyware</a> on people's devices, many of them to be journalists, even
-    if they were using the latest version of the proprietary operating
-    system installed on their iDevice.</p>
-
-    <p>Nobody can do anything about these vulnerabilities and people
-    have to wait until Apple fixes these security holes, if it decides
-    to fix it. A free operating system would let people to identify the
-    hole and fix it.</p>
-
-    <p><small>Please note that the article
-    wrongly refers to crackers as &ldquo;<a
-    
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo;.</small></p>
-  </li>
-
   <li id="M202107180">
     <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
     --><!--#echo encoding="none" var="DATE" -->
@@ -278,6 +258,16 @@
     features (and the proprietary software that is their entry path)
     to the point that even the most powerful companies don't dare.</p>
   </li>
+
+  <li id="M202106190">
+    <!--#set var="DATE" value='<small class="date-tag">2021-06</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://arstechnica.com/gadgets/2021/06/even-creepier-covid-tracking-google-silently-pushed-app-to-users-phones/";>Google
+    automatically installed an app on many proprietary Android phones</a>. The 
app
+    might or might not do malicious things but the power Google has over 
proprietary
+    Android phones is dangerous.</p>
+  </li>
 </ul>
 <p class="button right-align">
 <a href="/proprietary/all.html">More items&hellip;</a></p>
@@ -340,7 +330,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/08/01 17:07:00 $
+$Date: 2021/08/03 14:06:59 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]