www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary all.html malware-microsoft.html...


From: Therese Godefroy
Subject: www/proprietary all.html malware-microsoft.html...
Date: Mon, 5 Dec 2022 06:23:18 -0500 (EST)

CVSROOT:        /webcvs/www
Module name:    www
Changes by:     Therese Godefroy <th_g> 22/12/05 06:23:18

Modified files:
        proprietary    : all.html malware-microsoft.html 
                         proprietary-insecurity.html proprietary.html 
        proprietary/workshop: mal.rec 

Log message:
        Weak encryption of Office 365 (www-discuss 2022-10-05).

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/all.html?cvsroot=www&r1=1.137&r2=1.138
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.html?cvsroot=www&r1=1.161&r2=1.162
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.html?cvsroot=www&r1=1.203&r2=1.204
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.html?cvsroot=www&r1=1.457&r2=1.458
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/mal.rec?cvsroot=www&r1=1.479&r2=1.480

Patches:
Index: all.html
===================================================================
RCS file: /webcvs/www/www/proprietary/all.html,v
retrieving revision 1.137
retrieving revision 1.138
diff -u -b -r1.137 -r1.138
--- all.html    3 Dec 2022 20:22:22 -0000       1.137
+++ all.html    5 Dec 2022 11:23:10 -0000       1.138
@@ -50,6 +50,17 @@
   to detect once installed...</a></strong></p>
 
 <ul class="blurbs">
+<!--#set var='ADD' value='2022-12-05' --><!--#set var='PUB' value='2022-10-14' 
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo 
encoding='none' var='ADD' --><span class="gnun-split"></span> &mdash; Latest 
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB' 
--></small>
+    <p><a
+    
href="https://www.bleepingcomputer.com/news/security/microsoft-office-365-email-encryption-could-expose-message-content/";>
+    The Microsoft Office encryption is weak</a>, and susceptible to
+    attack.</p>
+
+    <p>Encryption is a tricky field, and easy to mess up. It is wise
+    to insist on encryption software that is (1) free software and (2)
+    studied by experts.</p>
+  </li>
+
 <!--#set var='ADD' value='2022-12-03' --><!--#set var='PUB' value='2022-11-30' 
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo 
encoding='none' var='ADD' --><span class="gnun-split"></span> &mdash; Latest 
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB' 
--></small>
     <p><a href="https://www.techarp.com/mobile/apple-china-limit-airdrop/";>
     Obeying a demand by the Chinese government, Apple restricted the
@@ -2963,7 +2974,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2022/12/03 20:22:22 $
+$Date: 2022/12/05 11:23:10 $
 <!-- timestamp end -->
 </p>
 </div>

Index: malware-microsoft.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-microsoft.html,v
retrieving revision 1.161
retrieving revision 1.162
diff -u -b -r1.161 -r1.162
--- malware-microsoft.html      26 Nov 2022 10:18:52 -0000      1.161
+++ malware-microsoft.html      5 Dec 2022 11:23:10 -0000       1.162
@@ -234,6 +234,19 @@
   bugs.</p>
 
 <ul class="blurbs">
+  <li id="M202210140">
+    <!--#set var="DATE" value='<small class="date-tag">2022-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://www.bleepingcomputer.com/news/security/microsoft-office-365-email-encryption-could-expose-message-content/";>
+    The Microsoft Office encryption is weak</a>, and susceptible to
+    attack.</p>
+
+    <p>Encryption is a tricky field, and easy to mess up. It is wise
+    to insist on encryption software that is (1) free software and (2)
+    studied by experts.</p>
+  </li>
+
   <li id="M202202090">
     <!--#set var="DATE" value='<small class="date-tag">2022-02</small>'
     --><!--#echo encoding="none" var="DATE" -->
@@ -1027,7 +1040,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2022/11/26 10:18:52 $
+$Date: 2022/12/05 11:23:10 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-insecurity.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-insecurity.html,v
retrieving revision 1.203
retrieving revision 1.204
diff -u -b -r1.203 -r1.204
--- proprietary-insecurity.html 26 Nov 2022 10:18:52 -0000      1.203
+++ proprietary-insecurity.html 5 Dec 2022 11:23:10 -0000       1.204
@@ -113,6 +113,19 @@
 <div class="column-limit" id="proprietary-insecurity"></div>
 
 <ul class="blurbs">
+  <li id="M202210140">
+    <!--#set var="DATE" value='<small class="date-tag">2022-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://www.bleepingcomputer.com/news/security/microsoft-office-365-email-encryption-could-expose-message-content/";>
+    The Microsoft Office encryption is weak</a>, and susceptible to
+    attack.</p>
+
+    <p>Encryption is a tricky field, and easy to mess up. It is wise
+    to insist on encryption software that is (1) free software and (2)
+    studied by experts.</p>
+  </li>
+
   <li id="M202208240">
     <!--#set var="DATE" value='<small class="date-tag">2022-08</small>'
     --><!--#echo encoding="none" var="DATE" -->
@@ -1317,7 +1330,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2022/11/26 10:18:52 $
+$Date: 2022/12/05 11:23:10 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary.html,v
retrieving revision 1.457
retrieving revision 1.458
diff -u -b -r1.457 -r1.458
--- proprietary.html    3 Dec 2022 20:22:22 -0000       1.457
+++ proprietary.html    5 Dec 2022 11:23:10 -0000       1.458
@@ -225,6 +225,19 @@
   to detect once installed...</a></strong></p>
 
 <ul class="blurbs">
+  <li id="M202210140">
+    <!--#set var="DATE" value='<small class="date-tag">2022-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://www.bleepingcomputer.com/news/security/microsoft-office-365-email-encryption-could-expose-message-content/";>
+    The Microsoft Office encryption is weak</a>, and susceptible to
+    attack.</p>
+
+    <p>Encryption is a tricky field, and easy to mess up. It is wise
+    to insist on encryption software that is (1) free software and (2)
+    studied by experts.</p>
+  </li>
+
   <li id="M202211300">
     <!--#set var="DATE" value='<small class="date-tag">2022-11</small>'
     --><!--#echo encoding="none" var="DATE" -->
@@ -354,19 +367,6 @@
     <p><small>Please note that the article wrongly refers
     to crackers as &ldquo;hackers.&rdquo;</small></p>
   </li>
-
-  <li id="M202208070">
-    <!--#set var="DATE" value='<small class="date-tag">2022-08</small>'
-    --><!--#echo encoding="none" var="DATE" -->
-    <p>Some Epson printers are programmed to <a
-    
href="https://hardware.slashdot.org/story/22/08/07/0350244/epson-programs-some-printers-to-stop-operating-claiming-danger-of-ink-spills";>
-    stop working after they have printed a predetermined number
-    of pages</a>, on the pretext that ink pads become saturated
-    with ink. This constitutes an unacceptable infringement on
-    users' freedom to use their printers as they wish, and on their <a
-    
href="https://fighttorepair.substack.com/p/citing-danger-of-ink-spills-epson";>
-    right to repair them</a>.</p>
-  </li>
 </ul>
 <p class="button right-align">
 <a href="/proprietary/all.html">More items&hellip;</a></p>
@@ -429,7 +429,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2022/12/03 20:22:22 $
+$Date: 2022/12/05 11:23:10 $
 <!-- timestamp end -->
 </p>
 </div>

Index: workshop/mal.rec
===================================================================
RCS file: /webcvs/www/www/proprietary/workshop/mal.rec,v
retrieving revision 1.479
retrieving revision 1.480
diff -u -b -r1.479 -r1.480
--- workshop/mal.rec    3 Dec 2022 20:22:24 -0000       1.479
+++ workshop/mal.rec    5 Dec 2022 11:23:18 -0000       1.480
@@ -24,6 +24,22 @@
 ####    Please don't remove the blank line after this marker!    ####
 # ADD NEW BLURB HERE
 
+Added: 2022-12-05
+Id: 202210140
+RT: www-discuss 2022-12-05 (proprietary-insecurity)
+PubDate: 2022-10-14
+Target: proprietary-insecurity.html proprietary-insecurity
+Target: malware-microsoft.html insecurity
+Keywords: Office 365
+Blurb: <p><a
++   
href="https://www.bleepingcomputer.com/news/security/microsoft-office-365-email-encryption-could-expose-message-content/";>
++   The Microsoft Office encryption is weak</a>, and susceptible to
++   attack.</p>
++
++   <p>Encryption is a tricky field, and easy to mess up. It is wise
++   to insist on encryption software that is (1) free software and (2)
++   studied by experts.</p>
+
 Added: 2022-12-03
 Id: 202211300
 RT: www-discuss Nov. 12, 2022



reply via email to

[Prev in Thread] Current Thread [Next in Thread]