[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
all.html malware-microsoft.html malware-mobiles.html proprietary-...
From: |
Diff Report |
Subject: |
all.html malware-microsoft.html malware-mobiles.html proprietary-... |
Date: |
Sun, 27 Nov 2022 00:02:29 -0500 |
Modified:
all.html
malware-microsoft.html
malware-mobiles.html
proprietary-back-doors.html
proprietary.html
proprietary-insecurity.html
proprietary-surveillance.html
proprietary-tyrants.html
diff -rNU2 all.html all.html
--- all.html 2022-11-13 05:02:55.111093735 +0000
+++ all.html 2022-11-27 05:02:28.110393660 +0000
@@ -51,4 +51,16 @@
<ul class="blurbs">
+<!--#set var='ADD' value='2022-11-26' --><!--#set var='PUB' value='2022-10-11'
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small>
+ <p>Xiaomi provides a tool to <a
+ href="https://www.guidetoroot.com/unlock-bootloader-on-any-xiaomi-phones/">
+ unlock the bootloader of Xiaomi smartphones and tablets</a>,
+ but this requires creating an account on the company's servers,
+ i.e. providing your phone number. This is the price you have to pay
+ for “legally” running a free software operating system
+ on Xiaomi devices. But the manufacturer retains control of the
+ unlocked device through a backdoor in the bootloader—the same
+ backdoor that was remotely used to unlock it.</p>
+ </li>
+
<!--#set var='ADD' value='2022-09-21' --><!--#set var='PUB' value='2022-09-00'
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small>
<p><a hreflang="ja"
@@ -192,5 +204,5 @@
<!--#set var='ADD' value='2022-09-12' --><!--#set var='PUB' value='2015-07-28'
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small>
<p>Many retail businesses publish cr…apps that ask to <a
- href="https://www.delish.com/kitchen-tools/a43252/how-food-apps-use data/">
+ href="https://www.delish.com/kitchen-tools/a43252/how-food-apps-use-data/">
spy on the user's own data</a>—often many kinds.</p>
@@ -943,5 +955,5 @@
<!--#set var='ADD' value='2021-03-08' --><!--#set var='PUB' value='2020-04-27'
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small>
<p>The proprietary program Microsoft Teams' insecurity <a
-
href="https://www.forbes.com/sites/thomasbrewster/2020/04/27/your-whole-companys-microsoft-teams-data-couldve-been-stolen-with-an-evil-gif">could
+
href="https://www.forbes.com/sites/thomasbrewster/2020/04/27/your-whole-companys-microsoft-teams-data-couldve-been-stolen-with-an-evil-gif/">could
have let a malicious GIF steal user data from Microsoft Teams
accounts</a>, possibly across an entire company, and taken control
@@ -2940,5 +2952,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/11/12 20:56:29 $
+$Date: 2022/11/26 11:26:56 $
<!-- timestamp end -->
</p>
diff -rNU2 malware-microsoft.html malware-microsoft.html
--- malware-microsoft.html 2022-11-13 05:02:55.139093746 +0000
+++ malware-microsoft.html 2022-11-27 05:02:28.138393660 +0000
@@ -290,5 +290,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The proprietary program Microsoft Teams' insecurity <a
-
href="https://www.forbes.com/sites/thomasbrewster/2020/04/27/your-whole-companys-microsoft-teams-data-couldve-been-stolen-with-an-evil-gif">could
+
href="https://www.forbes.com/sites/thomasbrewster/2020/04/27/your-whole-companys-microsoft-teams-data-couldve-been-stolen-with-an-evil-gif/">could
have let a malicious GIF steal user data from Microsoft Teams
accounts</a>, possibly across an entire company, and taken control
@@ -1028,5 +1028,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/08/22 15:07:27 $
+$Date: 2022/11/26 10:18:52 $
<!-- timestamp end -->
</p>
diff -rNU2 malware-mobiles.html malware-mobiles.html
--- malware-mobiles.html 2022-11-13 05:02:55.139093746 +0000
+++ malware-mobiles.html 2022-11-27 05:02:28.138393660 +0000
@@ -94,5 +94,5 @@
<p>This section describes a malicious characteristic of mobile phone
networks: location tracking. The phone
-network <a
href="https://ssd.eff.org/en/playlist/privacy-breakdown-mobile-phones">
+network <a href="https://ssd.eff.org/playlist/privacy-breakdown-mobile-phones">
tracks the movements of each phone</a>.</p>
@@ -1485,5 +1485,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Many retail businesses publish cr…apps that ask to <a
- href="https://www.delish.com/kitchen-tools/a43252/how-food-apps-use data/">
+ href="https://www.delish.com/kitchen-tools/a43252/how-food-apps-use-data/">
spy on the user's own data</a>—often many kinds.</p>
@@ -1709,5 +1709,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/10/14 18:02:22 $
+$Date: 2022/11/26 11:44:35 $
<!-- timestamp end -->
</p>
diff -rNU2 proprietary-back-doors.html proprietary-back-doors.html
--- proprietary-back-doors.html 2022-11-13 05:02:55.151093751 +0000
+++ proprietary-back-doors.html 2022-11-27 05:02:28.150393660 +0000
@@ -303,4 +303,18 @@
<ul class="blurbs">
+ <li id="M202210110">
+ <!--#set var="DATE" value='<small class="date-tag">2022-10</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Xiaomi provides a tool to <a
+ href="https://www.guidetoroot.com/unlock-bootloader-on-any-xiaomi-phones/">
+ unlock the bootloader of Xiaomi smartphones and tablets</a>,
+ but this requires creating an account on the company's servers,
+ i.e. providing your phone number. This is the price you have to pay
+ for “legally” running a free software operating system
+ on Xiaomi devices. But the manufacturer retains control of the
+ unlocked device through a backdoor in the bootloader—the same
+ backdoor that was remotely used to unlock it.</p>
+ </li>
+
<li id="M202208220">
<!--#set var="DATE" value='<small class="date-tag">2022-08</small>'
@@ -1005,5 +1019,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/08/28 07:17:03 $
+$Date: 2022/11/26 11:26:56 $
<!-- timestamp end -->
</p>
diff -rNU2 proprietary.html proprietary.html
--- proprietary.html 2022-11-13 05:02:55.167093756 +0000
+++ proprietary.html 2022-11-27 05:02:28.166393660 +0000
@@ -226,4 +226,18 @@
<ul class="blurbs">
+ <li id="M202210110">
+ <!--#set var="DATE" value='<small class="date-tag">2022-10</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Xiaomi provides a tool to <a
+ href="https://www.guidetoroot.com/unlock-bootloader-on-any-xiaomi-phones/">
+ unlock the bootloader of Xiaomi smartphones and tablets</a>,
+ but this requires creating an account on the company's servers,
+ i.e. providing your phone number. This is the price you have to pay
+ for “legally” running a free software operating system
+ on Xiaomi devices. But the manufacturer retains control of the
+ unlocked device through a backdoor in the bootloader—the same
+ backdoor that was remotely used to unlock it.</p>
+ </li>
+
<li id="M202209000">
<!--#set var="DATE" value='<small class="date-tag">2022-09</small>'
@@ -350,28 +364,4 @@
designed for programmed obsolescence.</p>
</li>
-
- <li id="M202208290">
- <!--#set var="DATE" value='<small class="date-tag">2022-08</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>US states that ban abortion talk about making it a
- crime to go to another state to get an abortion. They could <a
-
href="https://www.cnn.com/2022/08/29/tech/wireless-carriers-locations-fcc/index.html">
- use various forms of location tracking, including the network,
- to prosecute abortion-seekers</a>. The state could subpoena the
- data, so that the network's “privacy” policy would be
- irrelevant.</p>
-
- <p>That article explains why wireless networks collect location
- data, one unavoidable reason and one avoidable (emergency calls).
- It also explains some of the many ways the location data are
- used.</p>
-
- <p>Networks should never do localization for emergency calls
- except when you make an emergency call, or when there is a court order
- to do so. It should be illegal for a network to do precise localization
- (the kind needed for emergency calls) except to handle an emergency
- call, and if a network does so illegally, it should be required to
- inform the owner of the phone in writing on paper, with an apology.</p>
- </li>
</ul>
<p class="button right-align">
@@ -436,5 +426,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/10/10 12:04:02 $
+$Date: 2022/11/26 11:26:56 $
<!-- timestamp end -->
</p>
diff -rNU2 proprietary-insecurity.html proprietary-insecurity.html
--- proprietary-insecurity.html 2022-11-13 05:02:55.171093758 +0000
+++ proprietary-insecurity.html 2022-11-27 05:02:28.170393660 +0000
@@ -453,5 +453,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The proprietary program Microsoft Teams' insecurity <a
-
href="https://www.forbes.com/sites/thomasbrewster/2020/04/27/your-whole-companys-microsoft-teams-data-couldve-been-stolen-with-an-evil-gif">could
+
href="https://www.forbes.com/sites/thomasbrewster/2020/04/27/your-whole-companys-microsoft-teams-data-couldve-been-stolen-with-an-evil-gif/">could
have let a malicious GIF steal user data from Microsoft Teams
accounts</a>, possibly across an entire company, and taken control
@@ -1318,5 +1318,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/11/12 20:56:29 $
+$Date: 2022/11/26 10:18:52 $
<!-- timestamp end -->
</p>
diff -rNU2 proprietary-surveillance.html proprietary-surveillance.html
--- proprietary-surveillance.html 2022-11-13 05:02:55.187093764 +0000
+++ proprietary-surveillance.html 2022-11-27 05:02:28.190393660 +0000
@@ -2006,5 +2006,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Many retail businesses publish cr…apps that ask to <a
- href="https://www.delish.com/kitchen-tools/a43252/how-food-apps-use data/">
+ href="https://www.delish.com/kitchen-tools/a43252/how-food-apps-use-data/">
spy on the user's own data</a>—often many kinds.</p>
@@ -3706,5 +3706,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/11/12 20:56:29 $
+$Date: 2022/11/26 10:18:52 $
<!-- timestamp end -->
</p>
diff -rNU2 proprietary-tyrants.html proprietary-tyrants.html
--- proprietary-tyrants.html 2022-11-13 05:02:55.195093767 +0000
+++ proprietary-tyrants.html 2022-11-27 05:02:28.194393660 +0000
@@ -66,4 +66,18 @@
<ul class="blurbs">
+ <li id="M202210110">
+ <!--#set var="DATE" value='<small class="date-tag">2022-10</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Xiaomi provides a tool to <a
+ href="https://www.guidetoroot.com/unlock-bootloader-on-any-xiaomi-phones/">
+ unlock the bootloader of Xiaomi smartphones and tablets</a>,
+ but this requires creating an account on the company's servers,
+ i.e. providing your phone number. This is the price you have to pay
+ for “legally” running a free software operating system
+ on Xiaomi devices. But the manufacturer retains control of the
+ unlocked device through a backdoor in the bootloader—the same
+ backdoor that was remotely used to unlock it.</p>
+ </li>
+
<li id="M201607150">
<!--#set var="DATE" value='<small class="date-tag">2016-07</small>'
@@ -206,5 +220,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/04/13 07:56:42 $
+$Date: 2022/11/26 11:26:56 $
<!-- timestamp end -->
</p>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- all.html malware-microsoft.html malware-mobiles.html proprietary-...,
Diff Report <=