www-malware-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

all.html malware-cars.html proprietary-back-doors.html proprietar...


From: Diff Report
Subject: all.html malware-cars.html proprietary-back-doors.html proprietar...
Date: Wed, 27 Nov 2024 00:03:47 -0500

Modified:

    all.html
    malware-cars.html
    proprietary-back-doors.html
    proprietary.html
    proprietary-insecurity.html
    proprietary-surveillance.html

diff -rNU2 all.html all.html
--- all.html    2024-11-22 05:05:24.397647028 +0000
+++ all.html    2024-11-27 05:03:43.148525455 +0000
@@ -60,4 +60,26 @@
 <ul class="blurbs">
 <!-- Copied from workshop/mal.rec; don't edit in all.html. -->
+<!--#set var='ADD' value='2024-11-26' -->
+<!--#set var='PUB' value='2024-09-20' -->
+<li><small class='date-tag'>Added: <span class="gnun-split"></span>
+<!--#echo encoding='none' var='ADD' --><span class="gnun-split"></span>
+&mdash; Latest reference: <span class="gnun-split"></span><!--#echo
+encoding='none' var='PUB' --></small>
+    <p>Kia cars were built with a back door that enabled the company's
+    server to locate them and take control of them. The car's owner had
+    access to these controls through the Kia server. This in itself
+    is not objectionable. However, that Kia itself had such control
+    is Orwellian, and ought to be illegal. The icing on the Orwellian
+    cake is that the server had a security fault which <a
+    href="https://samcurry.net/hacking-kia";>allowed absolutely anyone to
+    activate those controls</a> for any Kia car.</p>
+
+    <p>Many people will be outraged at that security bug, but this was
+    presumably an accident. The fact that Kia had such control over cars
+    after selling them to customers is what outrages us, and that must
+    have been intentional on Kia's part.</p>
+  </li>
+
+<!-- Copied from workshop/mal.rec; don't edit in all.html. -->
 <!--#set var='ADD' value='2024-11-21' -->
 <!--#set var='PUB' value='2024-11-03' -->
@@ -5158,5 +5180,5 @@
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2024/11/21 13:30:08 $
+$Date: 2024/11/26 12:08:00 $
 <!-- timestamp end -->
 </p>
diff -rNU2 malware-cars.html malware-cars.html
--- malware-cars.html   2024-11-22 05:05:24.409647811 +0000
+++ malware-cars.html   2024-11-27 05:03:43.164525650 +0000
@@ -61,4 +61,23 @@
 <ul class="blurbs">
 <!-- Copied from workshop/mal.rec. Do not edit in malware-cars.html. -->
+  <li id="M202409200">
+    <!--#set var="DATE" value='<small class="date-tag">2024-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Kia cars were built with a back door that enabled the company's
+    server to locate them and take control of them. The car's owner had
+    access to these controls through the Kia server. This in itself
+    is not objectionable. However, that Kia itself had such control
+    is Orwellian, and ought to be illegal. The icing on the Orwellian
+    cake is that the server had a security fault which <a
+    href="https://samcurry.net/hacking-kia";>allowed absolutely anyone to
+    activate those controls</a> for any Kia car.</p>
+
+    <p>Many people will be outraged at that security bug, but this was
+    presumably an accident. The fact that Kia had such control over cars
+    after selling them to customers is what outrages us, and that must
+    have been intentional on Kia's part.</p>
+  </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in malware-cars.html. -->
   <li id="M202403110">
     <!--#set var="DATE" value='<small class="date-tag">2024-03</small>'
@@ -679,5 +698,5 @@
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2024/11/19 08:16:54 $
+$Date: 2024/11/26 12:08:01 $
 <!-- timestamp end -->
 </p>
diff -rNU2 proprietary-back-doors.html proprietary-back-doors.html
--- proprietary-back-doors.html 2024-11-22 05:05:24.433649376 +0000
+++ proprietary-back-doors.html 2024-11-27 05:03:43.184525893 +0000
@@ -992,4 +992,23 @@
 <ul class="blurbs">
 <!-- Copied from workshop/mal.rec. Do not edit in proprietary-back-doors.html. 
-->
+  <li id="M202409200">
+    <!--#set var="DATE" value='<small class="date-tag">2024-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Kia cars were built with a back door that enabled the company's
+    server to locate them and take control of them. The car's owner had
+    access to these controls through the Kia server. This in itself
+    is not objectionable. However, that Kia itself had such control
+    is Orwellian, and ought to be illegal. The icing on the Orwellian
+    cake is that the server had a security fault which <a
+    href="https://samcurry.net/hacking-kia";>allowed absolutely anyone to
+    activate those controls</a> for any Kia car.</p>
+
+    <p>Many people will be outraged at that security bug, but this was
+    presumably an accident. The fact that Kia had such control over cars
+    after selling them to customers is what outrages us, and that must
+    have been intentional on Kia's part.</p>
+  </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary-back-doors.html. 
-->
   <li id="M202312270">
     <!--#set var="DATE" value='<small class="date-tag">2023-12</small>'
@@ -1165,5 +1184,5 @@
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2024/11/10 15:50:50 $
+$Date: 2024/11/26 12:08:01 $
 <!-- timestamp end -->
 </p>
diff -rNU2 proprietary.html proprietary.html
--- proprietary.html    2024-11-22 05:05:24.449650421 +0000
+++ proprietary.html    2024-11-27 05:03:43.208526185 +0000
@@ -234,4 +234,23 @@
 <ul class="blurbs">
 <!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. -->
+  <li id="M202409200">
+    <!--#set var="DATE" value='<small class="date-tag">2024-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Kia cars were built with a back door that enabled the company's
+    server to locate them and take control of them. The car's owner had
+    access to these controls through the Kia server. This in itself
+    is not objectionable. However, that Kia itself had such control
+    is Orwellian, and ought to be illegal. The icing on the Orwellian
+    cake is that the server had a security fault which <a
+    href="https://samcurry.net/hacking-kia";>allowed absolutely anyone to
+    activate those controls</a> for any Kia car.</p>
+
+    <p>Many people will be outraged at that security bug, but this was
+    presumably an accident. The fact that Kia had such control over cars
+    after selling them to customers is what outrages us, and that must
+    have been intentional on Kia's part.</p>
+  </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. -->
   <li id="M202411030">
     <!--#set var="DATE" value='<small class="date-tag">2024-11</small>'
@@ -291,18 +310,4 @@
     before we buy it.</p>
   </li>
-
-<!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. -->
-  <li id="M202403150">
-    <!--#set var="DATE" value='<small class="date-tag">2024-03</small>'
-    --><!--#echo encoding="none" var="DATE" -->
-    <p><a
-    
href="https://www.theverge.com/2024/3/15/24101887/microsoft-bing-popups-windows-11-google-chrome";>
-    Microsoft is using malware tactics to get users to switch to
-    their web browser</a>, Microsoft Edge, and their search engine, Microsoft
-    Bing. When users launch the Google Chrome browser Microsoft injects
-    a pop up advertisement in the corner of the screen advising users to
-    switch to Bing. Microsoft also imported users Chrome browsing data
-    without their knowledge or consent.</p>
-  </li>
 </ul>
 <p class="button right-align">
@@ -367,5 +372,5 @@
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2024/11/21 13:30:08 $
+$Date: 2024/11/26 12:08:01 $
 <!-- timestamp end -->
 </p>
diff -rNU2 proprietary-insecurity.html proprietary-insecurity.html
--- proprietary-insecurity.html 2024-11-22 05:05:24.453650681 +0000
+++ proprietary-insecurity.html 2024-11-27 05:03:43.212526234 +0000
@@ -115,4 +115,23 @@
 <ul class="blurbs">
 <!-- Copied from workshop/mal.rec. Do not edit in proprietary-insecurity.html. 
-->
+  <li id="M202409200">
+    <!--#set var="DATE" value='<small class="date-tag">2024-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Kia cars were built with a back door that enabled the company's
+    server to locate them and take control of them. The car's owner had
+    access to these controls through the Kia server. This in itself
+    is not objectionable. However, that Kia itself had such control
+    is Orwellian, and ought to be illegal. The icing on the Orwellian
+    cake is that the server had a security fault which <a
+    href="https://samcurry.net/hacking-kia";>allowed absolutely anyone to
+    activate those controls</a> for any Kia car.</p>
+
+    <p>Many people will be outraged at that security bug, but this was
+    presumably an accident. The fact that Kia had such control over cars
+    after selling them to customers is what outrages us, and that must
+    have been intentional on Kia's part.</p>
+  </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary-insecurity.html. 
-->
   <li id="M202401180.3">
     <!--#set var="DATE" value='<small class="date-tag">2024-01</small>'
@@ -1557,5 +1576,5 @@
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2024/11/10 15:50:50 $
+$Date: 2024/11/26 12:08:01 $
 <!-- timestamp end -->
 </p>
diff -rNU2 proprietary-surveillance.html proprietary-surveillance.html
--- proprietary-surveillance.html       2024-11-22 05:05:24.473651986 +0000
+++ proprietary-surveillance.html       2024-11-27 05:03:43.232526477 +0000
@@ -3471,4 +3471,23 @@
 <ul class="blurbs">
 <!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
+  <li id="M202409200">
+    <!--#set var="DATE" value='<small class="date-tag">2024-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Kia cars were built with a back door that enabled the company's
+    server to locate them and take control of them. The car's owner had
+    access to these controls through the Kia server. This in itself
+    is not objectionable. However, that Kia itself had such control
+    is Orwellian, and ought to be illegal. The icing on the Orwellian
+    cake is that the server had a security fault which <a
+    href="https://samcurry.net/hacking-kia";>allowed absolutely anyone to
+    activate those controls</a> for any Kia car.</p>
+
+    <p>Many people will be outraged at that security bug, but this was
+    presumably an accident. The fact that Kia had such control over cars
+    after selling them to customers is what outrages us, and that must
+    have been intentional on Kia's part.</p>
+  </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
   <li id="M202403110">
     <!--#set var="DATE" value='<small class="date-tag">2024-03</small>'
@@ -4317,5 +4336,5 @@
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2024/11/09 14:35:46 $
+$Date: 2024/11/26 12:08:01 $
 <!-- timestamp end -->
 </p>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]