[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www proprietary/all.fr.html proprietary/proprie...
|
From: |
GNUN |
|
Subject: |
www proprietary/all.fr.html proprietary/proprie... |
|
Date: |
Fri, 19 Jan 2024 18:01:45 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 24/01/19 18:01:45
Modified files:
proprietary : all.fr.html proprietary-back-doors.fr.html
proprietary-drm.fr.html
proprietary-insecurity.fr.html
proprietary-sabotage.fr.html
proprietary-tethers.fr.html proprietary.fr.html
proprietary/po : all.fr-en.html
proprietary-back-doors.fr-en.html
proprietary-drm.fr-en.html
proprietary-insecurity.fr-en.html
proprietary-sabotage.fr-en.html
proprietary-tethers.fr-en.html
proprietary.fr-en.html
server/po : sitemap.fr-en.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/all.fr.html?cvsroot=www&r1=1.116&r2=1.117
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.fr.html?cvsroot=www&r1=1.128&r2=1.129
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-drm.fr.html?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.fr.html?cvsroot=www&r1=1.163&r2=1.164
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.fr.html?cvsroot=www&r1=1.136&r2=1.137
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-tethers.fr.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.fr.html?cvsroot=www&r1=1.314&r2=1.315
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.fr-en.html?cvsroot=www&r1=1.106&r2=1.107
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr-en.html?cvsroot=www&r1=1.118&r2=1.119
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.fr-en.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr-en.html?cvsroot=www&r1=1.151&r2=1.152
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.fr-en.html?cvsroot=www&r1=1.122&r2=1.123
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.fr-en.html?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr-en.html?cvsroot=www&r1=1.296&r2=1.297
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/sitemap.fr-en.html?cvsroot=www&r1=1.392&r2=1.393
Patches:
Index: proprietary/all.fr.html
===================================================================
RCS file: /web/www/www/proprietary/all.fr.html,v
retrieving revision 1.116
retrieving revision 1.117
diff -u -b -r1.116 -r1.117
--- proprietary/all.fr.html 3 Jan 2024 14:01:24 -0000 1.116
+++ proprietary/all.fr.html 19 Jan 2024 23:01:44 -0000 1.117
@@ -46,6 +46,17 @@
<div class="column-limit" id="all-malware"></div>
+<!--#set var='ADD' value='2024-01-18' -->
+<!--#set var='PUB' value='2024-01-18' -->
+<p style="margin-bottom: .5em">
+ <small class='date-tag'>Ajoutâ¯: <!--#echo encoding='none' var='ADD' -->
+ – Dernière référenceâ¯: <!--#echo encoding='none' var='PUB' -->
+</small></p>
+<p id="uhd" class="important" style="margin-top: 0">
+ <strong><a href="/proprietary/uhd-bluray-denies-your-freedom.html">Les
+disquesBlu-ray Ultra HD nient votre liberté</a></strong> â anatomie d'un
+système autoritaire de contrôle total des médias</p>
+
<!--#set var='ADD' value='2022-08-22' -->
<!--#set var='PUB' value='2022-07-26' -->
<p style="margin-bottom: .5em">
@@ -62,26 +73,7 @@
<!-- Copied from workshop/mal.rec; don't edit in all.html. -->
<!--#set var='ADD' value='2024-01-03' -->
-<!--#set var='PUB' value='2023-12-13' -->
-<li><small class='date-tag'>Ajoutâ¯:
-<!--#echo encoding='none' var='ADD' -->
-
-– Dernière référenceâ¯: <!--#echo
-encoding='none' var='PUB' -->
-</small>
- <p>Les ordinateurs basés sur x86 and ARM et livrés avec l'interface UEFI
sont
-<a
-href="https://www.bleepingcomputer.com/news/security/logofail-attack-can-install-uefi-bootkits-through-bootup-logos/">potentiellement
-vulnérables à un défaut de conception appelé LogoFAIL</a>. Un cracker peut
-remplacer le logo du BIOS par une version modifiée contenant du code
-malveillant. Les utilisateurs ne peuvent pas corriger ce défaut car il
-réside dans le micrologiciel non libre de l'UEFI qu'ils ne peuvent pas
-remplacer.</p>
- </li>
-
-<!-- Copied from workshop/mal.rec; don't edit in all.html. -->
-<!--#set var='ADD' value='2024-01-03' -->
-<!--#set var='PUB' value='2023-12-13' -->
+<!--#set var='PUB' value='2023-12-06' -->
<li><small class='date-tag'>Ajoutâ¯:
<!--#echo encoding='none' var='ADD' -->
@@ -113,6 +105,25 @@
<!-- Copied from workshop/mal.rec; don't edit in all.html. -->
<!--#set var='ADD' value='2024-01-03' -->
+<!--#set var='PUB' value='2023-11-30' -->
+<li><small class='date-tag'>Ajoutâ¯:
+<!--#echo encoding='none' var='ADD' -->
+
+– Dernière référenceâ¯: <!--#echo
+encoding='none' var='PUB' -->
+</small>
+ <p>Les ordinateurs basés sur x86 and ARM et livrés avec l'interface UEFI
sont
+<a
+href="https://www.bleepingcomputer.com/news/security/logofail-attack-can-install-uefi-bootkits-through-bootup-logos/">potentiellement
+vulnérables à un défaut de conception appelé LogoFAIL</a>. Un cracker peut
+remplacer le logo du BIOS par une version modifiée contenant du code
+malveillant. Les utilisateurs ne peuvent pas corriger ce défaut car il
+réside dans le micrologiciel non libre de l'UEFI qu'ils ne peuvent pas
+remplacer.</p>
+ </li>
+
+<!-- Copied from workshop/mal.rec; don't edit in all.html. -->
+<!--#set var='ADD' value='2024-01-03' -->
<!--#set var='PUB' value='2023-11-08' -->
<li><small class='date-tag'>Ajoutâ¯:
<!--#echo encoding='none' var='ADD' -->
@@ -186,7 +197,7 @@
<!-- Copied from workshop/mal.rec; don't edit in all.html. -->
<!--#set var='ADD' value='2023-12-09' -->
-<!--#set var='PUB' value='2023-11-30' -->
+<!--#set var='PUB' value='2023-11-09' -->
<li><small class='date-tag'>Ajoutâ¯:
<!--#echo encoding='none' var='ADD' -->
@@ -208,7 +219,7 @@
<!-- Copied from workshop/mal.rec; don't edit in all.html. -->
<!--#set var='ADD' value='2023-12-09' -->
-<!--#set var='PUB' value='2023-11-21' -->
+<!--#set var='PUB' value='2023-11-07' -->
<li><small class='date-tag'>Ajoutâ¯:
<!--#echo encoding='none' var='ADD' -->
@@ -285,7 +296,7 @@
<!-- Copied from workshop/mal.rec; don't edit in all.html. -->
<!--#set var='ADD' value='2023-11-15' -->
-<!--#set var='PUB' value='2023-10-04' -->
+<!--#set var='PUB' value='2023-09-06' -->
<li><small class='date-tag'>Ajoutâ¯:
<!--#echo encoding='none' var='ADD' -->
@@ -307,7 +318,7 @@
<!-- Copied from workshop/mal.rec; don't edit in all.html. -->
<!--#set var='ADD' value='2023-11-04' -->
-<!--#set var='PUB' value='2023-10-31' -->
+<!--#set var='PUB' value='2022-09-22' -->
<li><small class='date-tag'>Ajoutâ¯:
<!--#echo encoding='none' var='ADD' -->
@@ -328,7 +339,7 @@
<!-- Copied from workshop/mal.rec; don't edit in all.html. -->
<!--#set var='ADD' value='2023-11-02' -->
-<!--#set var='PUB' value='2023-10-26' -->
+<!--#set var='PUB' value='2019-12-11' -->
<li><small class='date-tag'>Ajoutâ¯:
<!--#echo encoding='none' var='ADD' -->
@@ -5650,7 +5661,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2024/01/03 14:01:24 $
+$Date: 2024/01/19 23:01:44 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-back-doors.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.fr.html,v
retrieving revision 1.128
retrieving revision 1.129
diff -u -b -r1.128 -r1.129
--- proprietary/proprietary-back-doors.fr.html 17 Jan 2024 16:01:10 -0000
1.128
+++ proprietary/proprietary-back-doors.fr.html 19 Jan 2024 23:01:44 -0000
1.129
@@ -399,6 +399,21 @@
<ul class="blurbs">
<!-- Copied from workshop/mal.rec. Do not edit in
proprietary-back-doors.html. -->
+<li id="M202401180.4">
+
+ <!--#set var="DATE" value='<small class="date-tag">
+2024-01</small>'
+ -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a href="/proprietary/uhd-bluray-denies-your-freedom.html">La lecture des
+disques Blu-ray Ultra HDmet en jeu les pires maliciels</a>. Sur PC, elle
+nécessite le moteur de gestion Intel (Intel ME), qui a des portes dérobées
+et ne peut pas être désactivé. Le micrologiciel des lecteurs Blu-ray ont
+aussi une porte dérobée permettant de révoquer à distance les clés
+nécessaires au déchiffrement de ces disques.</p>
+ </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary-back-doors.html.
-->
<li id="M202302140">
<!--#set var="DATE" value='<small class="date-tag">
@@ -1388,7 +1403,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2024/01/17 16:01:10 $
+$Date: 2024/01/19 23:01:44 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-drm.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-drm.fr.html,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- proprietary/proprietary-drm.fr.html 3 Jan 2024 14:01:24 -0000 1.76
+++ proprietary/proprietary-drm.fr.html 19 Jan 2024 23:01:44 -0000 1.77
@@ -81,7 +81,21 @@
<ul class="blurbs">
<!-- Copied from workshop/mal.rec. Do not edit in proprietary-drm.html. -->
-<li id="M202312130">
+<li id="M202401180.0">
+
+ <!--#set var="DATE" value='<small class="date-tag">
+2024-01</small>'
+ -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a href="/proprietary/uhd-bluray-denies-your-freedom.html">Les disques
+Blu-ray Ultra HD sont chiffrés avdc l'AACS, une des pires sortes de
+DRM</a>. Pour les lire sur PC, il faut un logiciel et du matériel respectant
+des spécifications rigoureuses que les développeurs ne peuvent obtenir
+qu'après avoir signé un accord de confidentialité.</p>
+ </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary-drm.html. -->
+<li id="M202312060">
<!--#set var="DATE" value='<small class="date-tag">
2023-12</small>'
@@ -891,7 +905,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2024/01/03 14:01:24 $
+$Date: 2024/01/19 23:01:44 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-insecurity.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.fr.html,v
retrieving revision 1.163
retrieving revision 1.164
diff -u -b -r1.163 -r1.164
--- proprietary/proprietary-insecurity.fr.html 3 Jan 2024 14:01:24 -0000
1.163
+++ proprietary/proprietary-insecurity.fr.html 19 Jan 2024 23:01:44 -0000
1.164
@@ -126,10 +126,25 @@
<ul class="blurbs">
<!-- Copied from workshop/mal.rec. Do not edit in
proprietary-insecurity.html. -->
-<li id="M202312131">
+<li id="M202401180.3">
<!--#set var="DATE" value='<small class="date-tag">
-2023-12</small>'
+2024-01</small>'
+ -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a href="/proprietary/uhd-bluray-denies-your-freedom.html">Les disques
+Blu-ray Ultra HD sont bourrés de maliciels de la pire espèce</a>. Entre
+autres, leur lecture sur PC exige le module Intel <abbr title="Software
+Guard Extensions">SGX</abbr>, qui non seulement a de nombreuses
+vulnérabilités affectant la sécurité, mais n'est plus utilisé depuis 2022
+dans les principaux modèles de CPU Intel.</p>
+ </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary-insecurity.html.
-->
+<li id="M202311300">
+
+ <!--#set var="DATE" value='<small class="date-tag">
+2023-11</small>'
-->
<!--#echo encoding="none" var="DATE" -->
<p>Les ordinateurs basés sur x86 and ARM et livrés avec l'interface UEFI sont
@@ -1889,7 +1904,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2024/01/03 14:01:24 $
+$Date: 2024/01/19 23:01:44 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-sabotage.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-sabotage.fr.html,v
retrieving revision 1.136
retrieving revision 1.137
diff -u -b -r1.136 -r1.137
--- proprietary/proprietary-sabotage.fr.html 3 Jan 2024 14:01:24 -0000
1.136
+++ proprietary/proprietary-sabotage.fr.html 19 Jan 2024 23:01:44 -0000
1.137
@@ -71,7 +71,22 @@
<ul class="blurbs">
<!-- Copied from workshop/mal.rec. Do not edit in proprietary-sabotage.html.
-->
-<li id="M202312130">
+<li id="M202401180.1">
+
+ <!--#set var="DATE" value='<small class="date-tag">
+2024-01</small>'
+ -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a href="/proprietary/uhd-bluray-denies-your-freedom.html">Les disques
+Blu-ray Ultra HD sont bourrés de maliciels de la pire espèce</a>. Non
+seulement la lecture de ces disques sur PC exige l'usage de logiciel
+privateur et de composants qui mettent en Åuvre l'AACS, un DRM très
+agressif, mais l'utilisateur peut aussi perdre la capacité de lire des
+disques chiffrés par l'AACS s'il essaie de lire un nouveau disque Blu-ray.</p>
+ </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary-sabotage.html.
-->
+<li id="M202312060">
<!--#set var="DATE" value='<small class="date-tag">
2023-12</small>'
@@ -118,7 +133,7 @@
</li>
<!-- Copied from workshop/mal.rec. Do not edit in proprietary-sabotage.html.
-->
-<li id="M202311210">
+<li id="M202311070">
<!--#set var="DATE" value='<small class="date-tag">
2023-11</small>'
@@ -1377,7 +1392,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2024/01/03 14:01:24 $
+$Date: 2024/01/19 23:01:44 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-tethers.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-tethers.fr.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- proprietary/proprietary-tethers.fr.html 3 Jan 2024 14:01:25 -0000
1.70
+++ proprietary/proprietary-tethers.fr.html 19 Jan 2024 23:01:44 -0000
1.71
@@ -77,7 +77,22 @@
<ul class="blurbs">
<!-- Copied from workshop/mal.rec. Do not edit in proprietary-tethers.html.
-->
-<li id="M202312130">
+<li id="M202401180.2">
+
+ <!--#set var="DATE" value='<small class="date-tag">
+2024-01</small>'
+ -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a href="/proprietary/uhd-bluray-denies-your-freedom.html">Les disques
+Blu-ray Ultra HD sont bourrés de maliciels de la pire espèce</a>. Entre
+autres, ils sont chiffrés avec des clés qui doivent être téléchargées
d'un
+serveur distant. Ceci rend obligatoire des connexions à Internet et des
+mises à jour régulières si l'utilisateur achète plusieurs disques Blu-ray
+UHD au cours du temps.</p>
+ </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary-tethers.html. -->
+<li id="M202312060">
<!--#set var="DATE" value='<small class="date-tag">
2023-12</small>'
@@ -673,7 +688,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2024/01/03 14:01:25 $
+$Date: 2024/01/19 23:01:44 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.fr.html,v
retrieving revision 1.314
retrieving revision 1.315
diff -u -b -r1.314 -r1.315
--- proprietary/proprietary.fr.html 3 Jan 2024 14:01:25 -0000 1.314
+++ proprietary/proprietary.fr.html 19 Jan 2024 23:01:44 -0000 1.315
@@ -230,6 +230,17 @@
<p style="margin-bottom: .5em">
<!--#set var="DATE" value='<small class="date-tag">
+2024-01</small>'
+ -->
+<!--#echo encoding="none" var="DATE" -->
+</p>
+<p id="uhd" class="important" style="margin-top: 0">
+ <strong><a href="/proprietary/uhd-bluray-denies-your-freedom.html">Les
+disquesBlu-ray Ultra HD nient votre liberté</a></strong> â anatomie d'un
+système autoritaire de contrôle total des médias</p>
+
+<p style="margin-bottom: .5em">
+ <!--#set var="DATE" value='<small class="date-tag">
2022-07</small>'
-->
<!--#echo encoding="none" var="DATE" -->
@@ -243,24 +254,7 @@
<ul class="blurbs">
<!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. -->
-<li id="M202312131">
-
- <!--#set var="DATE" value='<small class="date-tag">
-2023-12</small>'
- -->
-<!--#echo encoding="none" var="DATE" -->
-<p>Les ordinateurs basés sur x86 and ARM et livrés avec l'interface UEFI sont
-<a
-href="https://www.bleepingcomputer.com/news/security/logofail-attack-can-install-uefi-bootkits-through-bootup-logos/">potentiellement
-vulnérables à un défaut de conception appelé LogoFAIL</a>. Un cracker peut
-remplacer le logo du BIOS par une version modifiée contenant du code
-malveillant. Les utilisateurs ne peuvent pas corriger ce défaut car il
-réside dans le micrologiciel non libre de l'UEFI qu'ils ne peuvent pas
-remplacer.</p>
- </li>
-
-<!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. -->
-<li id="M202312130">
+<li id="M202312060">
<!--#set var="DATE" value='<small class="date-tag">
2023-12</small>'
@@ -290,6 +284,23 @@
</li>
<!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. -->
+<li id="M202311300">
+
+ <!--#set var="DATE" value='<small class="date-tag">
+2023-11</small>'
+ -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Les ordinateurs basés sur x86 and ARM et livrés avec l'interface UEFI sont
+<a
+href="https://www.bleepingcomputer.com/news/security/logofail-attack-can-install-uefi-bootkits-through-bootup-logos/">potentiellement
+vulnérables à un défaut de conception appelé LogoFAIL</a>. Un cracker peut
+remplacer le logo du BIOS par une version modifiée contenant du code
+malveillant. Les utilisateurs ne peuvent pas corriger ce défaut car il
+réside dans le micrologiciel non libre de l'UEFI qu'ils ne peuvent pas
+remplacer.</p>
+ </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. -->
<li id="M202311080">
<!--#set var="DATE" value='<small class="date-tag">
@@ -415,7 +426,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2024/01/03 14:01:25 $
+$Date: 2024/01/19 23:01:44 $
<!-- timestamp end -->
</p>
Index: proprietary/po/all.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/all.fr-en.html,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- proprietary/po/all.fr-en.html 3 Jan 2024 14:01:25 -0000 1.106
+++ proprietary/po/all.fr-en.html 19 Jan 2024 23:01:44 -0000 1.107
@@ -41,6 +41,14 @@
<div class="column-limit" id="all-malware"></div>
+<!--#set var='ADD' value='2024-01-18' --><!--#set var='PUB' value='2024-01-18'
-->
+<p style="margin-bottom: .5em">
+ <small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small></p>
+<p id="uhd" class="important" style="margin-top: 0">
+ <strong><a href="/proprietary/uhd-bluray-denies-your-freedom.html">
+ UHD Blu-ray denies your freedom</a>. This is an anatomy of an all-controlling
+ authoritarian media subjugation system...</strong></p>
+
<!--#set var='ADD' value='2022-08-22' --><!--#set var='PUB' value='2022-07-26'
-->
<p style="margin-bottom: .5em">
<small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small></p>
@@ -52,23 +60,7 @@
<ul class="blurbs">
<!-- Copied from workshop/mal.rec; don't edit in all.html. -->
<!--#set var='ADD' value='2024-01-03' -->
-<!--#set var='PUB' value='2023-12-13' -->
-<li><small class='date-tag'>Added: <span class="gnun-split"></span>
-<!--#echo encoding='none' var='ADD' --><span class="gnun-split"></span>
-— Latest reference: <span class="gnun-split"></span><!--#echo
-encoding='none' var='PUB' --></small>
- <p><a
-
href="https://www.bleepingcomputer.com/news/security/logofail-attack-can-install-uefi-bootkits-through-bootup-logos/">x86
- and ARM based computers shipped with UEFI are potentially vulnerable
- to a design omission called LogoFAIL</a>. A cracker can replace the
- BIOS logo with a fake one that contains malicious code. Users can't
- fix this omission because it is in the nonfree UEFI firmware that
- users can't replace.</p>
- </li>
-
-<!-- Copied from workshop/mal.rec; don't edit in all.html. -->
-<!--#set var='ADD' value='2024-01-03' -->
-<!--#set var='PUB' value='2023-12-13' -->
+<!--#set var='PUB' value='2023-12-06' -->
<li><small class='date-tag'>Added: <span class="gnun-split"></span>
<!--#echo encoding='none' var='ADD' --><span class="gnun-split"></span>
— Latest reference: <span class="gnun-split"></span><!--#echo
@@ -99,6 +91,22 @@
<!-- Copied from workshop/mal.rec; don't edit in all.html. -->
<!--#set var='ADD' value='2024-01-03' -->
+<!--#set var='PUB' value='2023-11-30' -->
+<li><small class='date-tag'>Added: <span class="gnun-split"></span>
+<!--#echo encoding='none' var='ADD' --><span class="gnun-split"></span>
+— Latest reference: <span class="gnun-split"></span><!--#echo
+encoding='none' var='PUB' --></small>
+ <p><a
+
href="https://www.bleepingcomputer.com/news/security/logofail-attack-can-install-uefi-bootkits-through-bootup-logos/">x86
+ and ARM based computers shipped with UEFI are potentially vulnerable
+ to a design omission called LogoFAIL</a>. A cracker can replace the
+ BIOS logo with a fake one that contains malicious code. Users can't
+ fix this omission because it is in the nonfree UEFI firmware that
+ users can't replace.</p>
+ </li>
+
+<!-- Copied from workshop/mal.rec; don't edit in all.html. -->
+<!--#set var='ADD' value='2024-01-03' -->
<!--#set var='PUB' value='2023-11-08' -->
<li><small class='date-tag'>Added: <span class="gnun-split"></span>
<!--#echo encoding='none' var='ADD' --><span class="gnun-split"></span>
@@ -166,7 +174,7 @@
<!-- Copied from workshop/mal.rec; don't edit in all.html. -->
<!--#set var='ADD' value='2023-12-09' -->
-<!--#set var='PUB' value='2023-11-30' -->
+<!--#set var='PUB' value='2023-11-09' -->
<li><small class='date-tag'>Added: <span class="gnun-split"></span>
<!--#echo encoding='none' var='ADD' --><span class="gnun-split"></span>
— Latest reference: <span class="gnun-split"></span><!--#echo
@@ -185,7 +193,7 @@
<!-- Copied from workshop/mal.rec; don't edit in all.html. -->
<!--#set var='ADD' value='2023-12-09' -->
-<!--#set var='PUB' value='2023-11-21' -->
+<!--#set var='PUB' value='2023-11-07' -->
<li><small class='date-tag'>Added: <span class="gnun-split"></span>
<!--#echo encoding='none' var='ADD' --><span class="gnun-split"></span>
— Latest reference: <span class="gnun-split"></span><!--#echo
@@ -254,7 +262,7 @@
<!-- Copied from workshop/mal.rec; don't edit in all.html. -->
<!--#set var='ADD' value='2023-11-15' -->
-<!--#set var='PUB' value='2023-10-04' -->
+<!--#set var='PUB' value='2023-09-06' -->
<li><small class='date-tag'>Added: <span class="gnun-split"></span>
<!--#echo encoding='none' var='ADD' --><span class="gnun-split"></span>
— Latest reference: <span class="gnun-split"></span><!--#echo
@@ -272,7 +280,7 @@
<!-- Copied from workshop/mal.rec; don't edit in all.html. -->
<!--#set var='ADD' value='2023-11-04' -->
-<!--#set var='PUB' value='2023-10-31' -->
+<!--#set var='PUB' value='2022-09-22' -->
<li><small class='date-tag'>Added: <span class="gnun-split"></span>
<!--#echo encoding='none' var='ADD' --><span class="gnun-split"></span>
— Latest reference: <span class="gnun-split"></span><!--#echo
@@ -291,7 +299,7 @@
<!-- Copied from workshop/mal.rec; don't edit in all.html. -->
<!--#set var='ADD' value='2023-11-02' -->
-<!--#set var='PUB' value='2023-10-26' -->
+<!--#set var='PUB' value='2019-12-11' -->
<li><small class='date-tag'>Added: <span class="gnun-split"></span>
<!--#echo encoding='none' var='ADD' --><span class="gnun-split"></span>
— Latest reference: <span class="gnun-split"></span><!--#echo
@@ -5006,7 +5014,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2024/01/03 14:01:25 $
+$Date: 2024/01/19 23:01:44 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-back-doors.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr-en.html,v
retrieving revision 1.118
retrieving revision 1.119
diff -u -b -r1.118 -r1.119
--- proprietary/po/proprietary-back-doors.fr-en.html 17 Jan 2024 16:01:18
-0000 1.118
+++ proprietary/po/proprietary-back-doors.fr-en.html 19 Jan 2024 23:01:45
-0000 1.119
@@ -333,6 +333,19 @@
<ul class="blurbs">
<!-- Copied from workshop/mal.rec. Do not edit in proprietary-back-doors.html.
-->
+ <li id="M202401180.4">
+ <!--#set var="DATE" value='<small class="date-tag">2024-01</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a href="/proprietary/uhd-bluray-denies-your-freedom.html">UHD
+ Blu-ray requires the worst
+ kinds of malware</a>. To playback a UHD Blu-ray disk on a PC requires
+ Intel Management Engine (ME), which has backdoors and cannot be
+ disabled. Every Blu-ray drive also has a back door in the firmware
+ that allows the AACS LA to “revoke” the ability to playback
+ any AACS restricted disk.</p>
+ </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary-back-doors.html.
-->
<li id="M202302140">
<!--#set var="DATE" value='<small class="date-tag">2023-02</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -1137,7 +1150,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2024/01/17 16:01:18 $
+$Date: 2024/01/19 23:01:45 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-drm.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.fr-en.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- proprietary/po/proprietary-drm.fr-en.html 17 Jan 2024 16:01:21 -0000
1.70
+++ proprietary/po/proprietary-drm.fr-en.html 19 Jan 2024 23:01:45 -0000
1.71
@@ -73,7 +73,21 @@
<ul class="blurbs">
<!-- Copied from workshop/mal.rec. Do not edit in proprietary-drm.html. -->
- <li id="M202312130">
+ <li id="M202401180.0">
+ <!--#set var="DATE" value='<small class="date-tag">2024-01</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a href="/proprietary/uhd-bluray-denies-your-freedom.html">UHD
+ Blu-ray disks are encrypted with AACS, one of the worst kinds of DRM</a>.
+ Playing them on a PC requires software and hardware that meet stringent
+ proprietary specifications, which developers can only obtain after
+ signing an agreement that explicitly forbids them from disclosing any
+ source code. The UHD Blu-ray standards also make it extraordinarily
+ difficult for users to play the disks, even if all the requirements
+ are satisfied.</p>
+ </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary-drm.html. -->
+ <li id="M202312060">
<!--#set var="DATE" value='<small class="date-tag">2023-12</small>'
--><!--#echo encoding="none" var="DATE" -->
<p><a
@@ -742,7 +756,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2024/01/17 16:01:21 $
+$Date: 2024/01/19 23:01:45 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-insecurity.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr-en.html,v
retrieving revision 1.151
retrieving revision 1.152
diff -u -b -r1.151 -r1.152
--- proprietary/po/proprietary-insecurity.fr-en.html 3 Jan 2024 14:01:25
-0000 1.151
+++ proprietary/po/proprietary-insecurity.fr-en.html 19 Jan 2024 23:01:45
-0000 1.152
@@ -114,8 +114,20 @@
<ul class="blurbs">
<!-- Copied from workshop/mal.rec. Do not edit in proprietary-insecurity.html.
-->
- <li id="M202312131">
- <!--#set var="DATE" value='<small class="date-tag">2023-12</small>'
+ <li id="M202401180.3">
+ <!--#set var="DATE" value='<small class="date-tag">2024-01</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a href="/proprietary/uhd-bluray-denies-your-freedom.html">UHD
+ Blu-ray disks are loaded with malware of the worst kinds</a>. Among
+ other things, playing them on a PC requires Intel SGX (Software
+ Guard Extensions), which not only has numerous security
+ vulnerabilities, but also has been deprecated and removed from
+ mainstream Intel CPUs in 2022.</p>
+ </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary-insecurity.html.
-->
+ <li id="M202311300">
+ <!--#set var="DATE" value='<small class="date-tag">2023-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://www.bleepingcomputer.com/news/security/logofail-attack-can-install-uefi-bootkits-through-bootup-logos/">x86
@@ -1530,7 +1542,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2024/01/03 14:01:25 $
+$Date: 2024/01/19 23:01:45 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-sabotage.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.fr-en.html,v
retrieving revision 1.122
retrieving revision 1.123
diff -u -b -r1.122 -r1.123
--- proprietary/po/proprietary-sabotage.fr-en.html 3 Jan 2024 14:01:25
-0000 1.122
+++ proprietary/po/proprietary-sabotage.fr-en.html 19 Jan 2024 23:01:45
-0000 1.123
@@ -63,7 +63,20 @@
<ul class="blurbs">
<!-- Copied from workshop/mal.rec. Do not edit in proprietary-sabotage.html.
-->
- <li id="M202312130">
+ <li id="M202401180.1">
+ <!--#set var="DATE" value='<small class="date-tag">2024-01</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a href="/proprietary/uhd-bluray-denies-your-freedom.html">UHD
+ Blu-ray disks are loaded with malware of the worst kinds</a>.
+ Not only does playback of these disks on a PC require proprietary
+ software and hardware that enforce AACS, a very nasty DRM, but
+ developers of software players are forbidden from disclosing any source
+ code. The user could also lose the ability to play AACS-restricted disks
+ anytime by attempting to play a new Blu-ray disk.</p>
+ </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary-sabotage.html.
-->
+ <li id="M202312060">
<!--#set var="DATE" value='<small class="date-tag">2023-12</small>'
--><!--#echo encoding="none" var="DATE" -->
<p><a
@@ -105,7 +118,7 @@
</li>
<!-- Copied from workshop/mal.rec. Do not edit in proprietary-sabotage.html.
-->
- <li id="M202311210">
+ <li id="M202311070">
<!--#set var="DATE" value='<small class="date-tag">2023-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Chamberlain Group <a
@@ -1117,7 +1130,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2024/01/03 14:01:25 $
+$Date: 2024/01/19 23:01:45 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-tethers.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.fr-en.html,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- proprietary/po/proprietary-tethers.fr-en.html 3 Jan 2024 14:01:25
-0000 1.59
+++ proprietary/po/proprietary-tethers.fr-en.html 19 Jan 2024 23:01:45
-0000 1.60
@@ -70,7 +70,18 @@
<ul class="blurbs">
<!-- Copied from workshop/mal.rec. Do not edit in proprietary-tethers.html. -->
- <li id="M202312130">
+ <li id="M202401180.2">
+ <!--#set var="DATE" value='<small class="date-tag">2024-01</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a href="/proprietary/uhd-bluray-denies-your-freedom.html">UHD
+ Blu-ray disks are loaded with malware of the worst kinds</a>. Among other
+ things, they are encrypted with keys that must be retrieved from a remote
+ server. This makes regular update and internet connection a requirement
+ if the user purchases more than one UHD Blu-ray disk over time.</p>
+ </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary-tethers.html. -->
+ <li id="M202312060">
<!--#set var="DATE" value='<small class="date-tag">2023-12</small>'
--><!--#echo encoding="none" var="DATE" -->
<p><a
@@ -554,7 +565,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2024/01/03 14:01:25 $
+$Date: 2024/01/19 23:01:45 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr-en.html,v
retrieving revision 1.296
retrieving revision 1.297
diff -u -b -r1.296 -r1.297
--- proprietary/po/proprietary.fr-en.html 3 Jan 2024 14:01:25 -0000
1.296
+++ proprietary/po/proprietary.fr-en.html 19 Jan 2024 23:01:45 -0000
1.297
@@ -217,6 +217,14 @@
<h3 id="latest">Latest additions</h3>
<p style="margin-bottom: .5em">
+ <!--#set var="DATE" value='<small class="date-tag">2024-01</small>'
+ --><!--#echo encoding="none" var="DATE" --></p>
+<p id="uhd" class="important" style="margin-top: 0">
+ <strong><a href="/proprietary/uhd-bluray-denies-your-freedom.html">
+ UHD Blu-ray denies your freedom. This is an anatomy of an all-controlling
+ authoritarian media subjugation system...</a></strong></p>
+
+<p style="margin-bottom: .5em">
<!--#set var="DATE" value='<small class="date-tag">2022-07</small>'
--><!--#echo encoding="none" var="DATE" --></p>
<p id="uefi-rootkit" class="important" style="margin-top: 0">
@@ -226,20 +234,7 @@
<ul class="blurbs">
<!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. -->
- <li id="M202312131">
- <!--#set var="DATE" value='<small class="date-tag">2023-12</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
-
href="https://www.bleepingcomputer.com/news/security/logofail-attack-can-install-uefi-bootkits-through-bootup-logos/">x86
- and ARM based computers shipped with UEFI are potentially vulnerable
- to a design omission called LogoFAIL</a>. A cracker can replace the
- BIOS logo with a fake one that contains malicious code. Users can't
- fix this omission because it is in the nonfree UEFI firmware that
- users can't replace.</p>
- </li>
-
-<!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. -->
- <li id="M202312130">
+ <li id="M202312060">
<!--#set var="DATE" value='<small class="date-tag">2023-12</small>'
--><!--#echo encoding="none" var="DATE" -->
<p><a
@@ -267,6 +262,19 @@
</li>
<!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. -->
+ <li id="M202311300">
+ <!--#set var="DATE" value='<small class="date-tag">2023-11</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.bleepingcomputer.com/news/security/logofail-attack-can-install-uefi-bootkits-through-bootup-logos/">x86
+ and ARM based computers shipped with UEFI are potentially vulnerable
+ to a design omission called LogoFAIL</a>. A cracker can replace the
+ BIOS logo with a fake one that contains malicious code. Users can't
+ fix this omission because it is in the nonfree UEFI firmware that
+ users can't replace.</p>
+ </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. -->
<li id="M202311080">
<!--#set var="DATE" value='<small class="date-tag">2023-11</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -368,7 +376,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2024/01/03 14:01:25 $
+$Date: 2024/01/19 23:01:45 $
<!-- timestamp end -->
</p>
</div>
Index: server/po/sitemap.fr-en.html
===================================================================
RCS file: /web/www/www/server/po/sitemap.fr-en.html,v
retrieving revision 1.392
retrieving revision 1.393
diff -u -b -r1.392 -r1.393
--- server/po/sitemap.fr-en.html 17 Jan 2024 19:00:17 -0000 1.392
+++ server/po/sitemap.fr-en.html 19 Jan 2024 23:01:45 -0000 1.393
@@ -1856,6 +1856,8 @@
<dd>Proprietary Tethers</dd>
<dt><a
href="/proprietary/proprietary-tyrants.html">proprietary-tyrants.html</a></dt>
<dd>Proprietary Tyrants</dd>
+ <dt><a
href="/proprietary/uhd-bluray-denies-your-freedom.html">uhd-bluray-denies-your-freedom.html</a></dt>
+ <dd>UHD Blu-ray Denies Your Freedom</dd>
</dl>
</dd></dl>
</div>
@@ -2169,7 +2171,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2024/01/17 19:00:17 $
+$Date: 2024/01/19 23:01:45 $
<!-- timestamp end -->
</p>
</div>
| [Prev in Thread] |
Current Thread |
[Next in Thread] |
- www proprietary/all.fr.html proprietary/proprie...,
GNUN <=