www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www proprietary/all.fr.html proprietary/proprie...


From: GNUN
Subject: www proprietary/all.fr.html proprietary/proprie...
Date: Fri, 19 Jan 2024 18:01:45 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     24/01/19 18:01:45

Modified files:
        proprietary    : all.fr.html proprietary-back-doors.fr.html 
                         proprietary-drm.fr.html 
                         proprietary-insecurity.fr.html 
                         proprietary-sabotage.fr.html 
                         proprietary-tethers.fr.html proprietary.fr.html 
        proprietary/po : all.fr-en.html 
                         proprietary-back-doors.fr-en.html 
                         proprietary-drm.fr-en.html 
                         proprietary-insecurity.fr-en.html 
                         proprietary-sabotage.fr-en.html 
                         proprietary-tethers.fr-en.html 
                         proprietary.fr-en.html 
        server/po      : sitemap.fr-en.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/all.fr.html?cvsroot=www&r1=1.116&r2=1.117
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.fr.html?cvsroot=www&r1=1.128&r2=1.129
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-drm.fr.html?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.fr.html?cvsroot=www&r1=1.163&r2=1.164
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.fr.html?cvsroot=www&r1=1.136&r2=1.137
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-tethers.fr.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.fr.html?cvsroot=www&r1=1.314&r2=1.315
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.fr-en.html?cvsroot=www&r1=1.106&r2=1.107
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr-en.html?cvsroot=www&r1=1.118&r2=1.119
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.fr-en.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr-en.html?cvsroot=www&r1=1.151&r2=1.152
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.fr-en.html?cvsroot=www&r1=1.122&r2=1.123
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.fr-en.html?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr-en.html?cvsroot=www&r1=1.296&r2=1.297
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/sitemap.fr-en.html?cvsroot=www&r1=1.392&r2=1.393

Patches:
Index: proprietary/all.fr.html
===================================================================
RCS file: /web/www/www/proprietary/all.fr.html,v
retrieving revision 1.116
retrieving revision 1.117
diff -u -b -r1.116 -r1.117
--- proprietary/all.fr.html     3 Jan 2024 14:01:24 -0000       1.116
+++ proprietary/all.fr.html     19 Jan 2024 23:01:44 -0000      1.117
@@ -46,6 +46,17 @@
 
 <div class="column-limit" id="all-malware"></div>
 
+<!--#set var='ADD' value='2024-01-18' -->
+<!--#set var='PUB' value='2024-01-18' -->
+<p style="margin-bottom: .5em">
+  <small class='date-tag'>Ajout : <!--#echo encoding='none' var='ADD' -->
+ &ndash; Dernière référence : <!--#echo encoding='none' var='PUB' -->
+</small></p>
+<p id="uhd" class="important" style="margin-top: 0">
+  <strong><a href="/proprietary/uhd-bluray-denies-your-freedom.html">Les
+disquesBlu-ray Ultra HD nient votre liberté</a></strong> – anatomie d'un
+système autoritaire de contrôle total des médias</p>
+
 <!--#set var='ADD' value='2022-08-22' -->
 <!--#set var='PUB' value='2022-07-26' -->
 <p style="margin-bottom: .5em">
@@ -62,26 +73,7 @@
 
 <!-- Copied from workshop/mal.rec; don't edit in all.html. -->
 <!--#set var='ADD' value='2024-01-03' -->
-<!--#set var='PUB' value='2023-12-13' -->
-<li><small class='date-tag'>Ajout : 
-<!--#echo encoding='none' var='ADD' -->
-
-&ndash; Dernière référence : <!--#echo
-encoding='none' var='PUB' -->
-</small>
-    <p>Les ordinateurs basés sur x86 and ARM et livrés avec l'interface UEFI 
sont
-<a
-href="https://www.bleepingcomputer.com/news/security/logofail-attack-can-install-uefi-bootkits-through-bootup-logos/";>potentiellement
-vulnérables à un défaut de conception appelé LogoFAIL</a>. Un cracker peut
-remplacer le logo du BIOS par une version modifiée contenant du code
-malveillant. Les utilisateurs ne peuvent pas corriger ce défaut car il
-réside dans le micrologiciel non libre de l'UEFI qu'ils ne peuvent pas
-remplacer.</p>
-  </li>
-
-<!-- Copied from workshop/mal.rec; don't edit in all.html. -->
-<!--#set var='ADD' value='2024-01-03' -->
-<!--#set var='PUB' value='2023-12-13' -->
+<!--#set var='PUB' value='2023-12-06' -->
 <li><small class='date-tag'>Ajout : 
 <!--#echo encoding='none' var='ADD' -->
 
@@ -113,6 +105,25 @@
 
 <!-- Copied from workshop/mal.rec; don't edit in all.html. -->
 <!--#set var='ADD' value='2024-01-03' -->
+<!--#set var='PUB' value='2023-11-30' -->
+<li><small class='date-tag'>Ajout : 
+<!--#echo encoding='none' var='ADD' -->
+
+&ndash; Dernière référence : <!--#echo
+encoding='none' var='PUB' -->
+</small>
+    <p>Les ordinateurs basés sur x86 and ARM et livrés avec l'interface UEFI 
sont
+<a
+href="https://www.bleepingcomputer.com/news/security/logofail-attack-can-install-uefi-bootkits-through-bootup-logos/";>potentiellement
+vulnérables à un défaut de conception appelé LogoFAIL</a>. Un cracker peut
+remplacer le logo du BIOS par une version modifiée contenant du code
+malveillant. Les utilisateurs ne peuvent pas corriger ce défaut car il
+réside dans le micrologiciel non libre de l'UEFI qu'ils ne peuvent pas
+remplacer.</p>
+  </li>
+
+<!-- Copied from workshop/mal.rec; don't edit in all.html. -->
+<!--#set var='ADD' value='2024-01-03' -->
 <!--#set var='PUB' value='2023-11-08' -->
 <li><small class='date-tag'>Ajout : 
 <!--#echo encoding='none' var='ADD' -->
@@ -186,7 +197,7 @@
 
 <!-- Copied from workshop/mal.rec; don't edit in all.html. -->
 <!--#set var='ADD' value='2023-12-09' -->
-<!--#set var='PUB' value='2023-11-30' -->
+<!--#set var='PUB' value='2023-11-09' -->
 <li><small class='date-tag'>Ajout : 
 <!--#echo encoding='none' var='ADD' -->
 
@@ -208,7 +219,7 @@
 
 <!-- Copied from workshop/mal.rec; don't edit in all.html. -->
 <!--#set var='ADD' value='2023-12-09' -->
-<!--#set var='PUB' value='2023-11-21' -->
+<!--#set var='PUB' value='2023-11-07' -->
 <li><small class='date-tag'>Ajout : 
 <!--#echo encoding='none' var='ADD' -->
 
@@ -285,7 +296,7 @@
 
 <!-- Copied from workshop/mal.rec; don't edit in all.html. -->
 <!--#set var='ADD' value='2023-11-15' -->
-<!--#set var='PUB' value='2023-10-04' -->
+<!--#set var='PUB' value='2023-09-06' -->
 <li><small class='date-tag'>Ajout : 
 <!--#echo encoding='none' var='ADD' -->
 
@@ -307,7 +318,7 @@
 
 <!-- Copied from workshop/mal.rec; don't edit in all.html. -->
 <!--#set var='ADD' value='2023-11-04' -->
-<!--#set var='PUB' value='2023-10-31' -->
+<!--#set var='PUB' value='2022-09-22' -->
 <li><small class='date-tag'>Ajout : 
 <!--#echo encoding='none' var='ADD' -->
 
@@ -328,7 +339,7 @@
 
 <!-- Copied from workshop/mal.rec; don't edit in all.html. -->
 <!--#set var='ADD' value='2023-11-02' -->
-<!--#set var='PUB' value='2023-10-26' -->
+<!--#set var='PUB' value='2019-12-11' -->
 <li><small class='date-tag'>Ajout : 
 <!--#echo encoding='none' var='ADD' -->
 
@@ -5650,7 +5661,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2024/01/03 14:01:24 $
+$Date: 2024/01/19 23:01:44 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-back-doors.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.fr.html,v
retrieving revision 1.128
retrieving revision 1.129
diff -u -b -r1.128 -r1.129
--- proprietary/proprietary-back-doors.fr.html  17 Jan 2024 16:01:10 -0000      
1.128
+++ proprietary/proprietary-back-doors.fr.html  19 Jan 2024 23:01:44 -0000      
1.129
@@ -399,6 +399,21 @@
 <ul class="blurbs">
 
   <!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-back-doors.html. -->
+<li id="M202401180.4">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2024-01</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a href="/proprietary/uhd-bluray-denies-your-freedom.html">La lecture des
+disques Blu-ray Ultra HDmet en jeu les pires maliciels</a>. Sur PC, elle
+nécessite le moteur de gestion Intel (Intel ME), qui a des portes dérobées
+et ne peut pas être désactivé. Le micrologiciel des lecteurs Blu-ray ont
+aussi une porte dérobée permettant de révoquer à distance les clés
+nécessaires au déchiffrement de ces disques.</p>
+  </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary-back-doors.html. 
-->
 <li id="M202302140">
     
     <!--#set var="DATE" value='<small class="date-tag">
@@ -1388,7 +1403,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2024/01/17 16:01:10 $
+$Date: 2024/01/19 23:01:44 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-drm.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-drm.fr.html,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- proprietary/proprietary-drm.fr.html 3 Jan 2024 14:01:24 -0000       1.76
+++ proprietary/proprietary-drm.fr.html 19 Jan 2024 23:01:44 -0000      1.77
@@ -81,7 +81,21 @@
 <ul class="blurbs">
 
   <!-- Copied from workshop/mal.rec. Do not edit in proprietary-drm.html. -->
-<li id="M202312130">
+<li id="M202401180.0">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2024-01</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a href="/proprietary/uhd-bluray-denies-your-freedom.html">Les disques
+Blu-ray Ultra HD sont chiffrés avdc l'AACS, une des pires sortes de
+DRM</a>. Pour les lire sur PC, il faut un logiciel et du matériel respectant
+des spécifications rigoureuses que les développeurs ne peuvent obtenir
+qu'après avoir signé un accord de confidentialité.</p>
+  </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary-drm.html. -->
+<li id="M202312060">
     
     <!--#set var="DATE" value='<small class="date-tag">
 2023-12</small>'
@@ -891,7 +905,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2024/01/03 14:01:24 $
+$Date: 2024/01/19 23:01:44 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-insecurity.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.fr.html,v
retrieving revision 1.163
retrieving revision 1.164
diff -u -b -r1.163 -r1.164
--- proprietary/proprietary-insecurity.fr.html  3 Jan 2024 14:01:24 -0000       
1.163
+++ proprietary/proprietary-insecurity.fr.html  19 Jan 2024 23:01:44 -0000      
1.164
@@ -126,10 +126,25 @@
 <ul class="blurbs">
 
   <!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-insecurity.html. -->
-<li id="M202312131">
+<li id="M202401180.3">
     
     <!--#set var="DATE" value='<small class="date-tag">
-2023-12</small>'
+2024-01</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a href="/proprietary/uhd-bluray-denies-your-freedom.html">Les disques
+Blu-ray Ultra HD sont bourrés de maliciels de la pire espèce</a>. Entre
+autres, leur lecture sur PC exige le module Intel <abbr title="Software
+Guard Extensions">SGX</abbr>, qui non seulement a de nombreuses
+vulnérabilités affectant la sécurité, mais n'est plus utilisé depuis 2022
+dans les principaux modèles de CPU Intel.</p>
+  </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary-insecurity.html. 
-->
+<li id="M202311300">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2023-11</small>'
     -->
 <!--#echo encoding="none" var="DATE" -->
 <p>Les ordinateurs basés sur x86 and ARM et livrés avec l'interface UEFI sont
@@ -1889,7 +1904,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2024/01/03 14:01:24 $
+$Date: 2024/01/19 23:01:44 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-sabotage.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-sabotage.fr.html,v
retrieving revision 1.136
retrieving revision 1.137
diff -u -b -r1.136 -r1.137
--- proprietary/proprietary-sabotage.fr.html    3 Jan 2024 14:01:24 -0000       
1.136
+++ proprietary/proprietary-sabotage.fr.html    19 Jan 2024 23:01:44 -0000      
1.137
@@ -71,7 +71,22 @@
 <ul class="blurbs">
 
   <!-- Copied from workshop/mal.rec. Do not edit in proprietary-sabotage.html. 
-->
-<li id="M202312130">
+<li id="M202401180.1">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2024-01</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a href="/proprietary/uhd-bluray-denies-your-freedom.html">Les disques
+Blu-ray Ultra HD sont bourrés de maliciels de la pire espèce</a>. Non
+seulement la lecture de ces disques sur PC exige l'usage de logiciel
+privateur et de composants qui mettent en œuvre l'AACS, un DRM très
+agressif, mais l'utilisateur peut aussi perdre la capacité de lire des
+disques chiffrés par l'AACS s'il essaie de lire un nouveau disque Blu-ray.</p>
+  </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary-sabotage.html. 
-->
+<li id="M202312060">
     
     <!--#set var="DATE" value='<small class="date-tag">
 2023-12</small>'
@@ -118,7 +133,7 @@
   </li>
 
 <!-- Copied from workshop/mal.rec. Do not edit in proprietary-sabotage.html. 
-->
-<li id="M202311210">
+<li id="M202311070">
     
     <!--#set var="DATE" value='<small class="date-tag">
 2023-11</small>'
@@ -1377,7 +1392,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2024/01/03 14:01:24 $
+$Date: 2024/01/19 23:01:44 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-tethers.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-tethers.fr.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- proprietary/proprietary-tethers.fr.html     3 Jan 2024 14:01:25 -0000       
1.70
+++ proprietary/proprietary-tethers.fr.html     19 Jan 2024 23:01:44 -0000      
1.71
@@ -77,7 +77,22 @@
 <ul class="blurbs">
 
   <!-- Copied from workshop/mal.rec. Do not edit in proprietary-tethers.html. 
-->
-<li id="M202312130">
+<li id="M202401180.2">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2024-01</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a href="/proprietary/uhd-bluray-denies-your-freedom.html">Les disques
+Blu-ray Ultra HD sont bourrés de maliciels de la pire espèce</a>. Entre
+autres, ils sont chiffrés avec des clés qui doivent être téléchargées 
d'un
+serveur distant. Ceci rend obligatoire des connexions à Internet et des
+mises à jour régulières si l'utilisateur achète plusieurs disques Blu-ray
+UHD au cours du temps.</p>
+  </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary-tethers.html. -->
+<li id="M202312060">
     
     <!--#set var="DATE" value='<small class="date-tag">
 2023-12</small>'
@@ -673,7 +688,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2024/01/03 14:01:25 $
+$Date: 2024/01/19 23:01:44 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.fr.html,v
retrieving revision 1.314
retrieving revision 1.315
diff -u -b -r1.314 -r1.315
--- proprietary/proprietary.fr.html     3 Jan 2024 14:01:25 -0000       1.314
+++ proprietary/proprietary.fr.html     19 Jan 2024 23:01:44 -0000      1.315
@@ -230,6 +230,17 @@
 
 <p style="margin-bottom: .5em">
   <!--#set var="DATE" value='<small class="date-tag">
+2024-01</small>'
+  -->
+<!--#echo encoding="none" var="DATE" -->
+</p>
+<p id="uhd" class="important" style="margin-top: 0">
+  <strong><a href="/proprietary/uhd-bluray-denies-your-freedom.html">Les
+disquesBlu-ray Ultra HD nient votre liberté</a></strong> – anatomie d'un
+système autoritaire de contrôle total des médias</p>
+
+<p style="margin-bottom: .5em">
+  <!--#set var="DATE" value='<small class="date-tag">
 2022-07</small>'
   -->
 <!--#echo encoding="none" var="DATE" -->
@@ -243,24 +254,7 @@
 <ul class="blurbs">
 
   <!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. -->
-<li id="M202312131">
-    
-    <!--#set var="DATE" value='<small class="date-tag">
-2023-12</small>'
-    -->
-<!--#echo encoding="none" var="DATE" -->
-<p>Les ordinateurs basés sur x86 and ARM et livrés avec l'interface UEFI sont
-<a
-href="https://www.bleepingcomputer.com/news/security/logofail-attack-can-install-uefi-bootkits-through-bootup-logos/";>potentiellement
-vulnérables à un défaut de conception appelé LogoFAIL</a>. Un cracker peut
-remplacer le logo du BIOS par une version modifiée contenant du code
-malveillant. Les utilisateurs ne peuvent pas corriger ce défaut car il
-réside dans le micrologiciel non libre de l'UEFI qu'ils ne peuvent pas
-remplacer.</p>
-  </li>
-
-<!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. -->
-<li id="M202312130">
+<li id="M202312060">
     
     <!--#set var="DATE" value='<small class="date-tag">
 2023-12</small>'
@@ -290,6 +284,23 @@
   </li>
 
 <!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. -->
+<li id="M202311300">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2023-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Les ordinateurs basés sur x86 and ARM et livrés avec l'interface UEFI sont
+<a
+href="https://www.bleepingcomputer.com/news/security/logofail-attack-can-install-uefi-bootkits-through-bootup-logos/";>potentiellement
+vulnérables à un défaut de conception appelé LogoFAIL</a>. Un cracker peut
+remplacer le logo du BIOS par une version modifiée contenant du code
+malveillant. Les utilisateurs ne peuvent pas corriger ce défaut car il
+réside dans le micrologiciel non libre de l'UEFI qu'ils ne peuvent pas
+remplacer.</p>
+  </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. -->
 <li id="M202311080">
     
     <!--#set var="DATE" value='<small class="date-tag">
@@ -415,7 +426,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2024/01/03 14:01:25 $
+$Date: 2024/01/19 23:01:44 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/po/all.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/all.fr-en.html,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- proprietary/po/all.fr-en.html       3 Jan 2024 14:01:25 -0000       1.106
+++ proprietary/po/all.fr-en.html       19 Jan 2024 23:01:44 -0000      1.107
@@ -41,6 +41,14 @@
 
 <div class="column-limit" id="all-malware"></div>
 
+<!--#set var='ADD' value='2024-01-18' --><!--#set var='PUB' value='2024-01-18' 
-->
+<p style="margin-bottom: .5em">
+  <small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo 
encoding='none' var='ADD' --><span class="gnun-split"></span> &mdash; Latest 
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB' 
--></small></p>
+<p id="uhd" class="important" style="margin-top: 0">
+  <strong><a href="/proprietary/uhd-bluray-denies-your-freedom.html">
+  UHD Blu-ray denies your freedom</a>. This is an anatomy of an all-controlling
+  authoritarian media subjugation system...</strong></p>
+
 <!--#set var='ADD' value='2022-08-22' --><!--#set var='PUB' value='2022-07-26' 
-->
 <p style="margin-bottom: .5em">
   <small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo 
encoding='none' var='ADD' --><span class="gnun-split"></span> &mdash; Latest 
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB' 
--></small></p>
@@ -52,23 +60,7 @@
 <ul class="blurbs">
 <!-- Copied from workshop/mal.rec; don't edit in all.html. -->
 <!--#set var='ADD' value='2024-01-03' -->
-<!--#set var='PUB' value='2023-12-13' -->
-<li><small class='date-tag'>Added: <span class="gnun-split"></span>
-<!--#echo encoding='none' var='ADD' --><span class="gnun-split"></span>
-&mdash; Latest reference: <span class="gnun-split"></span><!--#echo
-encoding='none' var='PUB' --></small>
-    <p><a
-    
href="https://www.bleepingcomputer.com/news/security/logofail-attack-can-install-uefi-bootkits-through-bootup-logos/";>x86
-    and ARM based computers shipped with UEFI are potentially vulnerable
-    to a design omission called LogoFAIL</a>. A cracker can replace the
-    BIOS logo with a fake one that contains malicious code. Users can't
-    fix this omission because it is in the nonfree UEFI firmware that
-    users can't replace.</p>
-  </li>
-
-<!-- Copied from workshop/mal.rec; don't edit in all.html. -->
-<!--#set var='ADD' value='2024-01-03' -->
-<!--#set var='PUB' value='2023-12-13' -->
+<!--#set var='PUB' value='2023-12-06' -->
 <li><small class='date-tag'>Added: <span class="gnun-split"></span>
 <!--#echo encoding='none' var='ADD' --><span class="gnun-split"></span>
 &mdash; Latest reference: <span class="gnun-split"></span><!--#echo
@@ -99,6 +91,22 @@
 
 <!-- Copied from workshop/mal.rec; don't edit in all.html. -->
 <!--#set var='ADD' value='2024-01-03' -->
+<!--#set var='PUB' value='2023-11-30' -->
+<li><small class='date-tag'>Added: <span class="gnun-split"></span>
+<!--#echo encoding='none' var='ADD' --><span class="gnun-split"></span>
+&mdash; Latest reference: <span class="gnun-split"></span><!--#echo
+encoding='none' var='PUB' --></small>
+    <p><a
+    
href="https://www.bleepingcomputer.com/news/security/logofail-attack-can-install-uefi-bootkits-through-bootup-logos/";>x86
+    and ARM based computers shipped with UEFI are potentially vulnerable
+    to a design omission called LogoFAIL</a>. A cracker can replace the
+    BIOS logo with a fake one that contains malicious code. Users can't
+    fix this omission because it is in the nonfree UEFI firmware that
+    users can't replace.</p>
+  </li>
+
+<!-- Copied from workshop/mal.rec; don't edit in all.html. -->
+<!--#set var='ADD' value='2024-01-03' -->
 <!--#set var='PUB' value='2023-11-08' -->
 <li><small class='date-tag'>Added: <span class="gnun-split"></span>
 <!--#echo encoding='none' var='ADD' --><span class="gnun-split"></span>
@@ -166,7 +174,7 @@
 
 <!-- Copied from workshop/mal.rec; don't edit in all.html. -->
 <!--#set var='ADD' value='2023-12-09' -->
-<!--#set var='PUB' value='2023-11-30' -->
+<!--#set var='PUB' value='2023-11-09' -->
 <li><small class='date-tag'>Added: <span class="gnun-split"></span>
 <!--#echo encoding='none' var='ADD' --><span class="gnun-split"></span>
 &mdash; Latest reference: <span class="gnun-split"></span><!--#echo
@@ -185,7 +193,7 @@
 
 <!-- Copied from workshop/mal.rec; don't edit in all.html. -->
 <!--#set var='ADD' value='2023-12-09' -->
-<!--#set var='PUB' value='2023-11-21' -->
+<!--#set var='PUB' value='2023-11-07' -->
 <li><small class='date-tag'>Added: <span class="gnun-split"></span>
 <!--#echo encoding='none' var='ADD' --><span class="gnun-split"></span>
 &mdash; Latest reference: <span class="gnun-split"></span><!--#echo
@@ -254,7 +262,7 @@
 
 <!-- Copied from workshop/mal.rec; don't edit in all.html. -->
 <!--#set var='ADD' value='2023-11-15' -->
-<!--#set var='PUB' value='2023-10-04' -->
+<!--#set var='PUB' value='2023-09-06' -->
 <li><small class='date-tag'>Added: <span class="gnun-split"></span>
 <!--#echo encoding='none' var='ADD' --><span class="gnun-split"></span>
 &mdash; Latest reference: <span class="gnun-split"></span><!--#echo
@@ -272,7 +280,7 @@
 
 <!-- Copied from workshop/mal.rec; don't edit in all.html. -->
 <!--#set var='ADD' value='2023-11-04' -->
-<!--#set var='PUB' value='2023-10-31' -->
+<!--#set var='PUB' value='2022-09-22' -->
 <li><small class='date-tag'>Added: <span class="gnun-split"></span>
 <!--#echo encoding='none' var='ADD' --><span class="gnun-split"></span>
 &mdash; Latest reference: <span class="gnun-split"></span><!--#echo
@@ -291,7 +299,7 @@
 
 <!-- Copied from workshop/mal.rec; don't edit in all.html. -->
 <!--#set var='ADD' value='2023-11-02' -->
-<!--#set var='PUB' value='2023-10-26' -->
+<!--#set var='PUB' value='2019-12-11' -->
 <li><small class='date-tag'>Added: <span class="gnun-split"></span>
 <!--#echo encoding='none' var='ADD' --><span class="gnun-split"></span>
 &mdash; Latest reference: <span class="gnun-split"></span><!--#echo
@@ -5006,7 +5014,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2024/01/03 14:01:25 $
+$Date: 2024/01/19 23:01:44 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-back-doors.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr-en.html,v
retrieving revision 1.118
retrieving revision 1.119
diff -u -b -r1.118 -r1.119
--- proprietary/po/proprietary-back-doors.fr-en.html    17 Jan 2024 16:01:18 
-0000      1.118
+++ proprietary/po/proprietary-back-doors.fr-en.html    19 Jan 2024 23:01:45 
-0000      1.119
@@ -333,6 +333,19 @@
 
 <ul class="blurbs">
 <!-- Copied from workshop/mal.rec. Do not edit in proprietary-back-doors.html. 
-->
+  <li id="M202401180.4">
+    <!--#set var="DATE" value='<small class="date-tag">2024-01</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a href="/proprietary/uhd-bluray-denies-your-freedom.html">UHD 
+    Blu-ray requires the worst
+    kinds of malware</a>. To playback a UHD Blu-ray disk on a PC requires
+    Intel Management Engine (ME), which has backdoors and cannot be
+    disabled. Every Blu-ray drive also has a back door in the firmware
+    that allows the AACS LA to &ldquo;revoke&rdquo; the ability to playback
+    any AACS restricted disk.</p>
+  </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary-back-doors.html. 
-->
   <li id="M202302140">
     <!--#set var="DATE" value='<small class="date-tag">2023-02</small>'
     --><!--#echo encoding="none" var="DATE" -->
@@ -1137,7 +1150,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2024/01/17 16:01:18 $
+$Date: 2024/01/19 23:01:45 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-drm.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.fr-en.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- proprietary/po/proprietary-drm.fr-en.html   17 Jan 2024 16:01:21 -0000      
1.70
+++ proprietary/po/proprietary-drm.fr-en.html   19 Jan 2024 23:01:45 -0000      
1.71
@@ -73,7 +73,21 @@
 
 <ul class="blurbs">
 <!-- Copied from workshop/mal.rec. Do not edit in proprietary-drm.html. -->
-  <li id="M202312130">
+  <li id="M202401180.0">
+    <!--#set var="DATE" value='<small class="date-tag">2024-01</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a href="/proprietary/uhd-bluray-denies-your-freedom.html">UHD 
+    Blu-ray disks are encrypted with AACS, one of the worst kinds of DRM</a>.
+    Playing them on a PC requires software and hardware that meet stringent
+    proprietary specifications, which developers can only obtain after
+    signing an agreement that explicitly forbids them from disclosing any
+    source code. The UHD Blu-ray standards also make it extraordinarily
+    difficult for users to play the disks, even if all the requirements
+    are satisfied.</p>
+  </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary-drm.html. -->
+  <li id="M202312060">
     <!--#set var="DATE" value='<small class="date-tag">2023-12</small>'
     --><!--#echo encoding="none" var="DATE" -->
     <p><a
@@ -742,7 +756,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2024/01/17 16:01:21 $
+$Date: 2024/01/19 23:01:45 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-insecurity.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr-en.html,v
retrieving revision 1.151
retrieving revision 1.152
diff -u -b -r1.151 -r1.152
--- proprietary/po/proprietary-insecurity.fr-en.html    3 Jan 2024 14:01:25 
-0000       1.151
+++ proprietary/po/proprietary-insecurity.fr-en.html    19 Jan 2024 23:01:45 
-0000      1.152
@@ -114,8 +114,20 @@
 
 <ul class="blurbs">
 <!-- Copied from workshop/mal.rec. Do not edit in proprietary-insecurity.html. 
-->
-  <li id="M202312131">
-    <!--#set var="DATE" value='<small class="date-tag">2023-12</small>'
+  <li id="M202401180.3">
+    <!--#set var="DATE" value='<small class="date-tag">2024-01</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a href="/proprietary/uhd-bluray-denies-your-freedom.html">UHD 
+    Blu-ray disks are loaded with malware of the worst kinds</a>. Among
+    other things, playing them on a PC requires Intel SGX (Software
+    Guard Extensions), which not only has numerous security 
+    vulnerabilities, but also has been deprecated and removed from
+    mainstream Intel CPUs in 2022.</p>
+  </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary-insecurity.html. 
-->
+  <li id="M202311300">
+    <!--#set var="DATE" value='<small class="date-tag">2023-11</small>'
     --><!--#echo encoding="none" var="DATE" -->
     <p><a
     
href="https://www.bleepingcomputer.com/news/security/logofail-attack-can-install-uefi-bootkits-through-bootup-logos/";>x86
@@ -1530,7 +1542,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2024/01/03 14:01:25 $
+$Date: 2024/01/19 23:01:45 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-sabotage.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.fr-en.html,v
retrieving revision 1.122
retrieving revision 1.123
diff -u -b -r1.122 -r1.123
--- proprietary/po/proprietary-sabotage.fr-en.html      3 Jan 2024 14:01:25 
-0000       1.122
+++ proprietary/po/proprietary-sabotage.fr-en.html      19 Jan 2024 23:01:45 
-0000      1.123
@@ -63,7 +63,20 @@
 
 <ul class="blurbs">
 <!-- Copied from workshop/mal.rec. Do not edit in proprietary-sabotage.html. 
-->
-  <li id="M202312130">
+  <li id="M202401180.1">
+    <!--#set var="DATE" value='<small class="date-tag">2024-01</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a href="/proprietary/uhd-bluray-denies-your-freedom.html">UHD 
+    Blu-ray disks are loaded with malware of the worst kinds</a>.
+    Not only does playback of these disks on a PC require proprietary
+    software and hardware that enforce AACS, a very nasty DRM, but
+    developers of software players are forbidden from disclosing any source
+    code. The user could also lose the ability to play AACS-restricted disks
+    anytime by attempting to play a new Blu-ray disk.</p>
+  </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary-sabotage.html. 
-->
+  <li id="M202312060">
     <!--#set var="DATE" value='<small class="date-tag">2023-12</small>'
     --><!--#echo encoding="none" var="DATE" -->
     <p><a
@@ -105,7 +118,7 @@
   </li>
 
 <!-- Copied from workshop/mal.rec. Do not edit in proprietary-sabotage.html. 
-->
-  <li id="M202311210">
+  <li id="M202311070">
     <!--#set var="DATE" value='<small class="date-tag">2023-11</small>'
     --><!--#echo encoding="none" var="DATE" -->
     <p>Chamberlain Group <a
@@ -1117,7 +1130,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2024/01/03 14:01:25 $
+$Date: 2024/01/19 23:01:45 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-tethers.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.fr-en.html,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- proprietary/po/proprietary-tethers.fr-en.html       3 Jan 2024 14:01:25 
-0000       1.59
+++ proprietary/po/proprietary-tethers.fr-en.html       19 Jan 2024 23:01:45 
-0000      1.60
@@ -70,7 +70,18 @@
 
 <ul class="blurbs">
 <!-- Copied from workshop/mal.rec. Do not edit in proprietary-tethers.html. -->
-  <li id="M202312130">
+  <li id="M202401180.2">
+    <!--#set var="DATE" value='<small class="date-tag">2024-01</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a href="/proprietary/uhd-bluray-denies-your-freedom.html">UHD 
+    Blu-ray disks are loaded with malware of the worst kinds</a>. Among other
+    things, they are encrypted with keys that must be retrieved from a remote
+    server. This makes regular update and internet connection a requirement
+    if the user purchases more than one UHD Blu-ray disk over time.</p>
+  </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary-tethers.html. -->
+  <li id="M202312060">
     <!--#set var="DATE" value='<small class="date-tag">2023-12</small>'
     --><!--#echo encoding="none" var="DATE" -->
     <p><a
@@ -554,7 +565,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2024/01/03 14:01:25 $
+$Date: 2024/01/19 23:01:45 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr-en.html,v
retrieving revision 1.296
retrieving revision 1.297
diff -u -b -r1.296 -r1.297
--- proprietary/po/proprietary.fr-en.html       3 Jan 2024 14:01:25 -0000       
1.296
+++ proprietary/po/proprietary.fr-en.html       19 Jan 2024 23:01:45 -0000      
1.297
@@ -217,6 +217,14 @@
 <h3 id="latest">Latest additions</h3>
 
 <p style="margin-bottom: .5em">
+  <!--#set var="DATE" value='<small class="date-tag">2024-01</small>'
+  --><!--#echo encoding="none" var="DATE" --></p>
+<p id="uhd" class="important" style="margin-top: 0">
+  <strong><a href="/proprietary/uhd-bluray-denies-your-freedom.html">
+  UHD Blu-ray denies your freedom. This is an anatomy of an all-controlling
+  authoritarian media subjugation system...</a></strong></p>
+
+<p style="margin-bottom: .5em">
   <!--#set var="DATE" value='<small class="date-tag">2022-07</small>'
   --><!--#echo encoding="none" var="DATE" --></p>
 <p id="uefi-rootkit" class="important" style="margin-top: 0">
@@ -226,20 +234,7 @@
 
 <ul class="blurbs">
 <!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. -->
-  <li id="M202312131">
-    <!--#set var="DATE" value='<small class="date-tag">2023-12</small>'
-    --><!--#echo encoding="none" var="DATE" -->
-    <p><a
-    
href="https://www.bleepingcomputer.com/news/security/logofail-attack-can-install-uefi-bootkits-through-bootup-logos/";>x86
-    and ARM based computers shipped with UEFI are potentially vulnerable
-    to a design omission called LogoFAIL</a>. A cracker can replace the
-    BIOS logo with a fake one that contains malicious code. Users can't
-    fix this omission because it is in the nonfree UEFI firmware that
-    users can't replace.</p>
-  </li>
-
-<!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. -->
-  <li id="M202312130">
+  <li id="M202312060">
     <!--#set var="DATE" value='<small class="date-tag">2023-12</small>'
     --><!--#echo encoding="none" var="DATE" -->
     <p><a
@@ -267,6 +262,19 @@
   </li>
 
 <!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. -->
+  <li id="M202311300">
+    <!--#set var="DATE" value='<small class="date-tag">2023-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://www.bleepingcomputer.com/news/security/logofail-attack-can-install-uefi-bootkits-through-bootup-logos/";>x86
+    and ARM based computers shipped with UEFI are potentially vulnerable
+    to a design omission called LogoFAIL</a>. A cracker can replace the
+    BIOS logo with a fake one that contains malicious code. Users can't
+    fix this omission because it is in the nonfree UEFI firmware that
+    users can't replace.</p>
+  </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. -->
   <li id="M202311080">
     <!--#set var="DATE" value='<small class="date-tag">2023-11</small>'
     --><!--#echo encoding="none" var="DATE" -->
@@ -368,7 +376,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2024/01/03 14:01:25 $
+$Date: 2024/01/19 23:01:45 $
 <!-- timestamp end -->
 </p>
 </div>

Index: server/po/sitemap.fr-en.html
===================================================================
RCS file: /web/www/www/server/po/sitemap.fr-en.html,v
retrieving revision 1.392
retrieving revision 1.393
diff -u -b -r1.392 -r1.393
--- server/po/sitemap.fr-en.html        17 Jan 2024 19:00:17 -0000      1.392
+++ server/po/sitemap.fr-en.html        19 Jan 2024 23:01:45 -0000      1.393
@@ -1856,6 +1856,8 @@
   <dd>Proprietary Tethers</dd>
   <dt><a 
href="/proprietary/proprietary-tyrants.html">proprietary-tyrants.html</a></dt>
   <dd>Proprietary Tyrants</dd>
+  <dt><a 
href="/proprietary/uhd-bluray-denies-your-freedom.html">uhd-bluray-denies-your-freedom.html</a></dt>
+  <dd>UHD Blu-ray Denies Your Freedom</dd>
 </dl>
 </dd></dl>
 </div>
@@ -2169,7 +2171,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2024/01/17 19:00:17 $
+$Date: 2024/01/19 23:01:45 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]