www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary workshop/mal.rec proprietary.ht...


From: Therese Godefroy
Subject: www/proprietary workshop/mal.rec proprietary.ht...
Date: Thu, 20 Aug 2020 03:27:59 -0400 (EDT)

CVSROOT:        /webcvs/www
Module name:    www
Changes by:     Therese Godefroy <th_g> 20/08/20 03:27:59

Modified files:
        proprietary/workshop: mal.rec 
        proprietary    : proprietary.html proprietary-insecurity.html 
                         malware-google.html 

Log message:
        TikTok surveillance through an Android bug (www-discuss 2020-08-18).

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/mal.rec?cvsroot=www&r1=1.220&r2=1.221
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.html?cvsroot=www&r1=1.229&r2=1.230
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.html?cvsroot=www&r1=1.122&r2=1.123
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-google.html?cvsroot=www&r1=1.78&r2=1.79

Patches:
Index: workshop/mal.rec
===================================================================
RCS file: /webcvs/www/www/proprietary/workshop/mal.rec,v
retrieving revision 1.220
retrieving revision 1.221
diff -u -b -r1.220 -r1.221
--- workshop/mal.rec    18 Aug 2020 07:47:27 -0000      1.220
+++ workshop/mal.rec    20 Aug 2020 07:27:58 -0000      1.221
@@ -24,6 +24,18 @@
 ####    Please don't remove the blank line after this marker!    ####
 # ADD NEW BLURB HERE
 
+Added: 2020-08-20
+Id: 202008110
+RT: www-discuss 2020-08-18 (TikTok surveillance through an Android bug)
+PubDate: Aug 11, 2020-08-11
+Target: proprietary-insecurity.html proprietary-insecurity
+Target: malware-google.html insecurity
+Keywords:
+Blurb: <p>TikTok <a
++   
href="https://boingboing.net/2020/08/11/tiktok-exploited-android-secur.html";>
++   exploited an Android vulnerability</a> to obtain user MAC
++   addresses.</p>
+
 Added: 2020-08-18
 Id: 202004200
 RT: www-discuss 2020-08-16 (Apple uses Siri to listen to people...)

Index: proprietary.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary.html,v
retrieving revision 1.229
retrieving revision 1.230
diff -u -b -r1.229 -r1.230
--- proprietary.html    18 Aug 2020 07:47:28 -0000      1.229
+++ proprietary.html    20 Aug 2020 07:27:59 -0000      1.230
@@ -173,6 +173,13 @@
 <h3 id="latest">Latest additions</h3>
 
 <ul class="blurbs">
+  <li id="M202008110">
+    <p>TikTok <a
+    
href="https://boingboing.net/2020/08/11/tiktok-exploited-android-secur.html";>
+    exploited an Android vulnerability</a> to obtain user MAC
+    addresses.</p>
+  </li>
+
   <li id="M202004200">
     <p>Apple whistleblower Thomas Le Bonniec reports that Apple
     made a practice of surreptitiously activating the Siri software to <a
@@ -224,19 +231,6 @@
     enable and disable functionality in cars</a> through a universal
     back door.</p>
   </li>
-
-  <li id="M202006300">
-    <p>&ldquo;Bossware&rdquo; is malware that bosses <a
-    
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers";>
-    coerce workers into installing in their own computers</a>, so the
-    bosses can spy on them.</p>
-
-    <p>This shows why requiring the user's &ldquo;consent&rdquo; is not
-    an adequate basis for protecting digital privacy.  The boss can coerce
-    most workers into consenting to almost anything, even probable exposure
-    to contagious disease that can be fatal.  Software like this should
-    be illegal and bosses that demand it should be prosecuted for it.</p>
-  </li>
 </ul>
 
 </div>
@@ -298,7 +292,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/08/18 07:47:28 $
+$Date: 2020/08/20 07:27:59 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-insecurity.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-insecurity.html,v
retrieving revision 1.122
retrieving revision 1.123
diff -u -b -r1.122 -r1.123
--- proprietary-insecurity.html 24 Jun 2020 05:01:12 -0000      1.122
+++ proprietary-insecurity.html 20 Aug 2020 07:27:59 -0000      1.123
@@ -78,6 +78,13 @@
 <div class="column-limit" id="proprietary-insecurity"></div>
 
 <ul class="blurbs">
+  <li id="M202008110">
+    <p>TikTok <a
+    
href="https://boingboing.net/2020/08/11/tiktok-exploited-android-secur.html";>
+    exploited an Android vulnerability</a> to obtain user MAC
+    addresses.</p>
+  </li>
+
   <li id="M202006160">
     <p><a
     
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C";>
@@ -782,7 +789,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/06/24 05:01:12 $
+$Date: 2020/08/20 07:27:59 $
 <!-- timestamp end -->
 </p>
 </div>

Index: malware-google.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-google.html,v
retrieving revision 1.78
retrieving revision 1.79
diff -u -b -r1.78 -r1.79
--- malware-google.html 15 Aug 2020 06:40:10 -0000      1.78
+++ malware-google.html 20 Aug 2020 07:27:59 -0000      1.79
@@ -232,6 +232,13 @@
   bugs.</p>
 
 <ul class="blurbs">
+  <li id="M202008110">
+    <p>TikTok <a
+    
href="https://boingboing.net/2020/08/11/tiktok-exploited-android-secur.html";>
+    exploited an Android vulnerability</a> to obtain user MAC
+    addresses.</p>
+  </li>
+
   <li id="M201907080">
     <p>Many Android apps can track
     users' movements even when the user says <a
@@ -593,7 +600,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/08/15 06:40:10 $
+$Date: 2020/08/20 07:27:59 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]