www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-education.html workshop...


From: Dora Scilipoti
Subject: www/proprietary malware-education.html workshop...
Date: Fri, 19 Nov 2021 16:40:26 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     Dora Scilipoti <dora>   21/11/19 16:40:26

Modified files:
        proprietary    : malware-education.html 
        proprietary/workshop: mal.rec 

Log message:
        Adding the malware-education target to items in 
prorpietary-surveillance.html and malware-in-online-conferencing.html.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-education.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/mal.rec?cvsroot=www&r1=1.393&r2=1.394

Patches:
Index: malware-education.html
===================================================================
RCS file: /web/www/www/proprietary/malware-education.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- malware-education.html      19 Nov 2021 20:51:04 -0000      1.3
+++ malware-education.html      19 Nov 2021 21:40:25 -0000      1.4
@@ -92,6 +92,85 @@
     and run free (as in freedom) software. That way, the school district
     and/or parents can control what is done with those data.</p>
   </li>
+
+  <li id="M202105060">
+    <!--#set var="DATE" value='<small class="date-tag">2021-05</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://me2ba.org/me2ba-product-testing-spotlight-report-published-data-sharing-in-primary-secondary-school-mobile-apps-2/";>60%
+    of school apps are sending student data to potentially high-risk
+    third parties</a>, putting students and possibly all other school
+    workers under surveillance. This is made possible by using unsafe
+    and proprietary programs made by data-hungry corporations.</p>
+
+    <p><small>Please note that whether students consent to this or not,
+    doesn't justify the surveillance they're imposed to.</small></p>
+  </li>
+
+  <li id="M202104090">
+    <!--#set var="DATE" value='<small class="date-tag">2021-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>A zero-day vulnerability in Zoom which <a
+    
href="https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-code-execution-without-user-input/";>can
+    be used to launch remote code execution (RCE) attacks</a> has been
+    disclosed by researchers. The researchers demonstrated a three-bug
+    attack chain that caused an RCE on a target machine, all this without
+    any form of user interaction.</p>
+  </li>
+
+  <li id="M202012250">
+    <!--#set var="DATE" value='<small class="date-tag">2020-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The HonorLock online exam
+    proctoring program is a surveillance tool that <a
+    
href="https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-against-proctoring-surveillance-apps";>tracks
+    students and collects data</a> such as face, driving license, and
+    network information, among others, in blatant violation of students'
+    privacy.</p>
+
+    <p>Preventing students from cheating should not be an excuse for
+    running malware/spyware on their computers, and it's good that students
+    are protesting. But their petitions overlook a crucial issue, namely,
+    the injustice of being forced to run nonfree software in order to
+    get an education.</p>
+  </li>
+
+  <li id="M202011090">
+    <!--#set var="DATE" value='<small class="date-tag">2020-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>According to FTC, the
+    company behind the Zoom conferencing software <a
+    
href="https://arstechnica.com/tech-policy/2020/11/zoom-lied-to-users-about-end-to-end-encryption-for-years-ftc-says/";>has
+    lied to users about its end-to-end encryption</a> for years, at least
+    since 2016.</p>
+
+    <p>People can use free (as in freedom) programs such as <a
+    href="https://directory.fsf.org/wiki/Jitsi";>Jitsi</a> or BigBlueButton,
+    better still if installed in a server controlled by the users.</p>
+  </li>
+
+  <li id="M202004301">
+    <!--#set var="DATE" value='<small class="date-tag">2020-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Proprietary programs Google Meet, Microsoft Teams, and WebEx <a
+    
href="https://www.consumerreports.org/video-conferencing-services/videoconferencing-privacy-issues-google-microsoft-webex/";>are
+    collecting user's personal and identifiable data</a> including how long
+    a call lasts, who's participating in the call, and the IP addresses
+    of everyone taking part. From experience, this can even harm users
+    physically if those companies hand over data to governments.</p>
+  </li>
+
+  <li id="M202003260">
+    <!--#set var="DATE" value='<small class="date-tag">2020-03</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The Apple iOS version of Zoom <a
+    
href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account";>is
+    sending users' data to Facebook</a> even if the user doesn't have
+    a Facebook account. According to the article, Zoom and Facebook
+    don't even mention this surveillance on their privacy policy page,
+    making this an obvious violation of people's privacy even in their
+    own terms.</p>
+  </li>
 </ul>
 </div>
 
@@ -153,7 +232,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/11/19 20:51:04 $
+$Date: 2021/11/19 21:40:25 $
 <!-- timestamp end -->
 </p>
 </div>

Index: workshop/mal.rec
===================================================================
RCS file: /web/www/www/proprietary/workshop/mal.rec,v
retrieving revision 1.393
retrieving revision 1.394
diff -u -b -r1.393 -r1.394
--- workshop/mal.rec    19 Nov 2021 20:57:23 -0000      1.393
+++ workshop/mal.rec    19 Nov 2021 21:40:25 -0000      1.394
@@ -518,7 +518,8 @@
 RT: www-discuss 2021-05-06
 PubDate: 2021-03-31
 Target: proprietary-surveillance.html SpywareInNetworks
-Keywords: Surveillance, School, Students
+Target: malware-education.html malware-education
+Keywords: Surveillance, School, Students, Ed Tech
 Blurb: <p><a
 +   
href="https://me2ba.org/me2ba-product-testing-spotlight-report-published-data-sharing-in-primary-secondary-school-mobile-apps-2/";>60%
 +   of school apps are sending student data to potentially high-risk
@@ -568,6 +569,7 @@
 PubDate: 2021-04-09
 Target: proprietary-insecurity.html proprietary-insecurity
 Target: malware-in-online-conferencing.html malware-in-online-conferencing
+Target: malware-education.html malware-education
 Keywords: Zoom, Conferencing, Insecurity
 Blurb: <p>A zero-day vulnerability in Zoom which <a
 +   
href="https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-code-execution-without-user-input/";>can
@@ -696,6 +698,7 @@
 Target: proprietary-surveillance.html SpywareInNetworks
 Target: malware-google.html surveillance
 Target: malware-microsoft.html surveillance
+Target: malware-education.html malware-education
 Keywords: Google, Microsoft, WebEx, Surveillance, Privacy
 Blurb: <p>Proprietary programs Google Meet, Microsoft Teams, and WebEx <a
 +   
href="https://www.consumerreports.org/video-conferencing-services/videoconferencing-privacy-issues-google-microsoft-webex/";>are
@@ -816,7 +819,8 @@
 RT: 1687178 www-discuss 2021-02-18
 PubDate: 2020-12-25
 Target: proprietary-surveillance.html SpywareInNetworks
-Keywords: HonorLock, Students, Surveillance, Exam, Proctoring, Schools
+Target: malware-education.html malware-education
+Keywords: HonorLock, Students, Surveillance, Exam, Proctoring, Schools, Ed Tech
 Blurb: <p>The HonorLock online exam
 +   proctoring program is a surveillance tool that <a
 +   
href="https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-against-proctoring-surveillance-apps";>tracks
@@ -1146,6 +1150,7 @@
 RT: 1648629
 PubDate: 2020-11-09
 Target: malware-in-online-conferencing.html malware-in-online-conferencing
+Target: malware-education.html malware-education
 Keywords: Zoom, Conferencing, encryption, e2ee
 Blurb: <p>According to FTC, the
 +   company behind the Zoom conferencing software <a
@@ -1176,6 +1181,7 @@
 PubDate: 2020-03-26
 Target: malware-in-online-conferencing.html malware-in-online-conferencing
 Target: proprietary-surveillance.html SpywareInMobileApps
+Target: malware-education.html malware-education
 Keywords: Zoom, Conferencing, Apple, iOS
 Blurb: <p>The Apple iOS version of Zoom <a
 +   
href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account";>is



reply via email to

[Prev in Thread] Current Thread [Next in Thread]