[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary all.html malware-microsoft.html...
From: |
Therese Godefroy |
Subject: |
www/proprietary all.html malware-microsoft.html... |
Date: |
Mon, 5 Dec 2022 06:23:18 -0500 (EST) |
CVSROOT: /webcvs/www
Module name: www
Changes by: Therese Godefroy <th_g> 22/12/05 06:23:18
Modified files:
proprietary : all.html malware-microsoft.html
proprietary-insecurity.html proprietary.html
proprietary/workshop: mal.rec
Log message:
Weak encryption of Office 365 (www-discuss 2022-10-05).
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/all.html?cvsroot=www&r1=1.137&r2=1.138
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.html?cvsroot=www&r1=1.161&r2=1.162
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.html?cvsroot=www&r1=1.203&r2=1.204
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.html?cvsroot=www&r1=1.457&r2=1.458
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/mal.rec?cvsroot=www&r1=1.479&r2=1.480
Patches:
Index: all.html
===================================================================
RCS file: /webcvs/www/www/proprietary/all.html,v
retrieving revision 1.137
retrieving revision 1.138
diff -u -b -r1.137 -r1.138
--- all.html 3 Dec 2022 20:22:22 -0000 1.137
+++ all.html 5 Dec 2022 11:23:10 -0000 1.138
@@ -50,6 +50,17 @@
to detect once installed...</a></strong></p>
<ul class="blurbs">
+<!--#set var='ADD' value='2022-12-05' --><!--#set var='PUB' value='2022-10-14'
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small>
+ <p><a
+
href="https://www.bleepingcomputer.com/news/security/microsoft-office-365-email-encryption-could-expose-message-content/">
+ The Microsoft Office encryption is weak</a>, and susceptible to
+ attack.</p>
+
+ <p>Encryption is a tricky field, and easy to mess up. It is wise
+ to insist on encryption software that is (1) free software and (2)
+ studied by experts.</p>
+ </li>
+
<!--#set var='ADD' value='2022-12-03' --><!--#set var='PUB' value='2022-11-30'
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small>
<p><a href="https://www.techarp.com/mobile/apple-china-limit-airdrop/">
Obeying a demand by the Chinese government, Apple restricted the
@@ -2963,7 +2974,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/12/03 20:22:22 $
+$Date: 2022/12/05 11:23:10 $
<!-- timestamp end -->
</p>
</div>
Index: malware-microsoft.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-microsoft.html,v
retrieving revision 1.161
retrieving revision 1.162
diff -u -b -r1.161 -r1.162
--- malware-microsoft.html 26 Nov 2022 10:18:52 -0000 1.161
+++ malware-microsoft.html 5 Dec 2022 11:23:10 -0000 1.162
@@ -234,6 +234,19 @@
bugs.</p>
<ul class="blurbs">
+ <li id="M202210140">
+ <!--#set var="DATE" value='<small class="date-tag">2022-10</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.bleepingcomputer.com/news/security/microsoft-office-365-email-encryption-could-expose-message-content/">
+ The Microsoft Office encryption is weak</a>, and susceptible to
+ attack.</p>
+
+ <p>Encryption is a tricky field, and easy to mess up. It is wise
+ to insist on encryption software that is (1) free software and (2)
+ studied by experts.</p>
+ </li>
+
<li id="M202202090">
<!--#set var="DATE" value='<small class="date-tag">2022-02</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -1027,7 +1040,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/11/26 10:18:52 $
+$Date: 2022/12/05 11:23:10 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-insecurity.html,v
retrieving revision 1.203
retrieving revision 1.204
diff -u -b -r1.203 -r1.204
--- proprietary-insecurity.html 26 Nov 2022 10:18:52 -0000 1.203
+++ proprietary-insecurity.html 5 Dec 2022 11:23:10 -0000 1.204
@@ -113,6 +113,19 @@
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
+ <li id="M202210140">
+ <!--#set var="DATE" value='<small class="date-tag">2022-10</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.bleepingcomputer.com/news/security/microsoft-office-365-email-encryption-could-expose-message-content/">
+ The Microsoft Office encryption is weak</a>, and susceptible to
+ attack.</p>
+
+ <p>Encryption is a tricky field, and easy to mess up. It is wise
+ to insist on encryption software that is (1) free software and (2)
+ studied by experts.</p>
+ </li>
+
<li id="M202208240">
<!--#set var="DATE" value='<small class="date-tag">2022-08</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -1317,7 +1330,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/11/26 10:18:52 $
+$Date: 2022/12/05 11:23:10 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary.html,v
retrieving revision 1.457
retrieving revision 1.458
diff -u -b -r1.457 -r1.458
--- proprietary.html 3 Dec 2022 20:22:22 -0000 1.457
+++ proprietary.html 5 Dec 2022 11:23:10 -0000 1.458
@@ -225,6 +225,19 @@
to detect once installed...</a></strong></p>
<ul class="blurbs">
+ <li id="M202210140">
+ <!--#set var="DATE" value='<small class="date-tag">2022-10</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.bleepingcomputer.com/news/security/microsoft-office-365-email-encryption-could-expose-message-content/">
+ The Microsoft Office encryption is weak</a>, and susceptible to
+ attack.</p>
+
+ <p>Encryption is a tricky field, and easy to mess up. It is wise
+ to insist on encryption software that is (1) free software and (2)
+ studied by experts.</p>
+ </li>
+
<li id="M202211300">
<!--#set var="DATE" value='<small class="date-tag">2022-11</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -354,19 +367,6 @@
<p><small>Please note that the article wrongly refers
to crackers as “hackers.”</small></p>
</li>
-
- <li id="M202208070">
- <!--#set var="DATE" value='<small class="date-tag">2022-08</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Some Epson printers are programmed to <a
-
href="https://hardware.slashdot.org/story/22/08/07/0350244/epson-programs-some-printers-to-stop-operating-claiming-danger-of-ink-spills">
- stop working after they have printed a predetermined number
- of pages</a>, on the pretext that ink pads become saturated
- with ink. This constitutes an unacceptable infringement on
- users' freedom to use their printers as they wish, and on their <a
-
href="https://fighttorepair.substack.com/p/citing-danger-of-ink-spills-epson">
- right to repair them</a>.</p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -429,7 +429,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/12/03 20:22:22 $
+$Date: 2022/12/05 11:23:10 $
<!-- timestamp end -->
</p>
</div>
Index: workshop/mal.rec
===================================================================
RCS file: /webcvs/www/www/proprietary/workshop/mal.rec,v
retrieving revision 1.479
retrieving revision 1.480
diff -u -b -r1.479 -r1.480
--- workshop/mal.rec 3 Dec 2022 20:22:24 -0000 1.479
+++ workshop/mal.rec 5 Dec 2022 11:23:18 -0000 1.480
@@ -24,6 +24,22 @@
#### Please don't remove the blank line after this marker! ####
# ADD NEW BLURB HERE
+Added: 2022-12-05
+Id: 202210140
+RT: www-discuss 2022-12-05 (proprietary-insecurity)
+PubDate: 2022-10-14
+Target: proprietary-insecurity.html proprietary-insecurity
+Target: malware-microsoft.html insecurity
+Keywords: Office 365
+Blurb: <p><a
++
href="https://www.bleepingcomputer.com/news/security/microsoft-office-365-email-encryption-could-expose-message-content/">
++ The Microsoft Office encryption is weak</a>, and susceptible to
++ attack.</p>
++
++ <p>Encryption is a tricky field, and easy to mess up. It is wise
++ to insist on encryption software that is (1) free software and (2)
++ studied by experts.</p>
+
Added: 2022-12-03
Id: 202211300
RT: www-discuss Nov. 12, 2022
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary all.html malware-microsoft.html...,
Therese Godefroy <=