advanced help
phrase:
attribute:
attribute:
attribute:
order:
per page:
clip:
action:
Results of 1 - 1 of about 747 for Android 12 (1.905 sec.)
android (2819), 12 (27881)
malware-appliances.pt-br.po
#score: 5139
@digest: cffa77d1d9b640e95b7e3a7e6691fca7
@id: 395798
@mdate: 2024-02-22T08:16:03Z
@size: 56809
@type: text/html
content-type: text/html; charset=utf-8
#keywords: techdirt (31824), inteligentes (25238), privacynotincluded (21240), seguranca (16971), arstechnica (16808), dispositivos (12175), boingboing (11229), smart (10696), vizio (9739), cameras (9299), tethered (9261), hospital (9217), ldquo (8269), philips (7935), https (7859), rdquo (7622), tvs (7539), theguardian (6950), printers (6744), href (6363), vulnerable (6272), mozilla (5862), technology (5396), samsung (5310), servidor (5143), empresa (5131), crackers (4860), backdoor (4706), subscription (4069), security (3931), pessoas (3652), com (3504)
malware-appliances.pt-br.po Mismatched links: 133. Mismatched ids: 0. # text 15 The appliances we are dealing with contain software, almost always nonfree software. It is reasonable to treat this software as <a href=" /philosophy/free-hardware-designs.html#boundary ">equivalent to a bunch of circuits</a>, provided it is <em>never</em> changed (not even if the change is called an &ldquo;upgrade&rdquo;). 23 Surveillance cameras put in by government A to surveil for it may be surveilling for government B as well. That's because A put in a product <a href=" https://www.rferl.org/a/ukraine-cctv-moscow-spying-schemes-investigation/32747767.html "> made by B with nonfree software</a>. 25 In Australia, people assume that &ldquo;smart&rdquo; means &ldquo;tethered.&rdquo; When people's ISP goes down, <a href=" https://www.theguardian.com/business/2023/nov/10/optus-went-down-and-the-smart-lights-came-on-and-then-marayke-was-stranded-in-bed "> all the tethered devices become useless</a>. 28 Chamberlain Group <a href=" https://arstechnica.com/gadgets/2023/11/chamberlain-blocks-smart-garage-door-opener-from-working-with-smart-homes/ ">blocks users from using third-party software</a> with its garage openers. This is an intentional attack on using free software. The official garage opener proprietary mobile app is now also <a href=" https://pluralistic.net/2023/11/09/lead-me-not-into-temptation/#chamberlain ">infested with ads, including up-selling its other services and devices.</a> 29 Philips Hue, the most ubiquitous home automation product in the US, is planning to soon <a href=" https://boingboing.net/2023/09/27/philips-hue-to-make-you-create-an-account-and-log-in-to-adjust-your-lightbulbs.html "> force users to log in to the app server</a> in order to be able to adjust a lightbulb, or use other functionalities, in what amounts to a massive user-tracking data grab. 30 Google Nest snooper/surveillance cameras are always tethered to Google servers, record videos 24/7, and are <a href=" https://arstechnica.com/gadgets/2023/09/google-nest-cameras-get-a-25-33-subscription-price-hike/ "> subscription-based, which is an injustice to people who use them</a>. The article discusses the rise in prices for &ldquo;plans&rdquo; you can buy from Google, which include storing videos in the &ldquo;cloud&rdquo;&mdash;another word for someone else's computer. 31 Some Bambu Lab 3D printers were reported to <a href=" https://arstechnica.com/gadgets/2023/08/3d-printers-print-break-on-their-own-due-to-cloud-outage/ "> start printing without user's consent</a>, as a result of a malfunction of the servers to which they were tethered. This caused significant damage. 32 <a href=" https://www.theguardian.com/technology/2023/jul/04/smile-youre-on-camera-self-driving-cars-are-here-and-theyre-watching-you "> Driverless cars in San Francisco collect videos constantly</a>, using cameras inside and outside, and governments have already collected those videos secretly. 33 As the Surveillance Technology Oversight Project says, they are &ldquo;driving us straight into authoritarianism.&rdquo; We must <a href=" /philosophy/surveillance-vs-democracy.html ">regulate <em>all</em> cameras that collect images that can be used to track people</a>, to make sure they are not used for that. 34 HP delivers printers with a universal back door, and recently used it to <a href=" https://www.theguardian.com/money/2023/may/10/how-can-hp-block-me-from-using-a-cheaper-printer-cartridge "> sabotage them by remotely installing malware</a>. The malware makes the printer refuse to function with non-HP ink cartrides, and even with old HP cartridges which HP now declares to have &ldquo;expired.&rdquo; HP calls the back door &ldquo;dynamic security,&rdquo; and has the gall to claim that this &ldquo;security&rdquo; protects users from malware. 37 Controlling Honeywell internet thermostats with the dedicated app has proven unreliable, due to <a href=" https://piunikaweb.com/2022/03/15/honeywell-total-connect-comfort-app-website-not-working-issue/ "> recurrent connection issues with the server these thermostats are tethered to</a>. 38 <a hreflang="ja" href=" https://ja.wikipedia.org/wiki/B-CAS ">B-CAS</a> <a href=" #m1 ">[1]</a> is the digital restrictions management (DRM) system used by Japanese TV broadcasters, including NHK (public-service TV). It is sold by the B-CAS company, which has a de-facto monopoly on it. Initially intended for pay-TV, its use was extended to digital free-to-air broadcasting as a means to enforce restrictions on copyrighted works. The system encrypts works that permit free redistribution just like other works, thus denying users their nominal rights. 48 Some Epson printers are programmed to <a href=" https://hardware.slashdot.org/story/22/08/07/0350244/epson-programs-some-printers-to-stop-operating-claiming-danger-of-ink-spills "> stop working after they have printed a predetermined number of pages</a>, on the pretext that ink pads become saturated with ink. This constitutes an unacceptable infringement on users' freedom to use their printers as they wish, and on their <a href=" https://fighttorepair.substack.com/p/citing-danger-of-ink-spills-epson "> right to repair them</a>. 49 Today's &ldquo;smart&rdquo; TVs <a href=" https://www.techdirt.com/2022/04/14/its-still-stupidly-ridiculously-difficult-to-buy-a-dumb-tv/ "> push people to surrender to tracking via internet</a>. Some won't work unless they have a chance to download nonfree software. And they are designed for programmed obsolescence. 50 Hewlett-Packard is <a href=" https://www.theguardian.com/money/2022/feb/19/how-cheap-ink-cartridges-can-cost-you-dear "> implementing DRM in its printers</a> so they refuse to print with ink cartridges from another supplier. 51 <a href=" https://www.eff.org/deeplinks/2022/02/worst-timeline-printer-company-putting-drm-paper-now "> Dymo is now embedding DRM in the paper rolls for its label printers</a> to make those printers reject equivalent paper rolls made by other companies. This is implemented by an RFID tag, which keeps track of how many labels remain on the roll, and blocks further printing when the roll is empty&mdash;an efficient way to prevent reusing the same RFID with a third-party roll. 52 &ldquo;Smart&rdquo; TV manufacturers <a href=" https://www.theguardian.com/technology/2022/jan/29/what-your-smart-tv-knows-about-you-and-how-to-stop-it-harvesting-data "> spy on people using various methods</a>, and harvest their data. They are collecting audio, video, and TV usage data to profile people. 55 Most Internet connected devices in Mozilla's <a href=" https://web.archive.org/web/20220129065321/https://foundation.mozilla.org/en/privacynotincluded/ ">&ldquo;Privacy Not Included&rdquo;</a> list <a href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell">are designed to snoop on users</a> even if they meet Mozilla's &ldquo;Minimum Security Standards.&rdquo; Insecure design of the program running on some of these devices <a href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster">makes the user susceptible to be snooped on and exploited by crackers as well</a>. A maioria dos dispositivos conectados à Internet na lista de <a href=" https://foundation.mozilla.org/en/privacynotincluded ">“Privacidade não incluída”</a> da Mozilla <a href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell">é projetada para bisbilhotar usuários</a> mesmo se o dispositivo atender os “Padrões Mínimos de Segurança” (<i lang="en">Minimum Security Standards</i>) da Mozilla. O design inseguro do programa em execução em alguns destes dispositivos <a href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster">torna o usuário suscetível a ser bisbilhotado por <em>crackers</em> também</a>. 61 The Mellow sous-vide cooker is tethered to a server. The company suddenly <a href=" https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-subscription-surprise-28630842/ "> turned this tethering into a subscription</a>, forbidding users from taking advantage of the &ldquo;advanced features&rdquo; of the cooker unless they pay a monthly fee. O fogão <i lang="fr">sous-vide</i> Mellow está amarrado a um servidor. A empresa repentinamente <a href=" https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-subscription-surprise-27630842/ "> transformou essa amarração em uma assinatura</a>, proibindo os usuários aproveitem os “recursos avançados” do fogão, a menos que pagassem uma taxa mensal. 63 <a href=" https://www.wired.com/story/ripple20-iot-vulnerabilities/ "> A disasterous security bug</a> touches millions of products in the Internet of Stings. <a href=" https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C "> Um erro de segurança desastroso</a> afeta milhões de produtos conectados. 65 Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In May 2020, it ordered the purchasers to start <a href=" https://www.techhive.com/article/578539/wink-users-revolt-following-its-sudden-shift-to-a-subscription-model.html "> paying a monthly fee for the use of that server</a>. Because of the tethering, the hub is useless without that. A Wink vende um hub doméstico “inteligente” que é amarrado a um servidor. Em maio de 2020, ordenou que os compradores começassem a <a href=" https://www.techhive.com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-subscription-model.html "> pagar uma taxa mensal pelo uso desse servidor</a>. Por causa da amarração, o hub é inútil sem isso. 67 As tech companies add microphones to a wide range of products, including refrigerators and motor vehicles, they also set up transcription farms where human employees <a href=" https://getpocket.com/explore/item/silicon-valley-got-millions-to-let-siri-and-alexa-listen-in "> listen to what people say</a> and tweak the recognition algorithms. 72 The Jibo robot toys were tethered to the manufacturer's server, and <a href=" https://apnews.com/article/san-francisco-north-america-technology-business-ap-top-news-99c9ec8ebad242ca88178e22c7642648 "> the company made them all cease to work</a> by shutting down that server. Os robôs de brinquedo Jibo foram amarrados ao servidor do fabricante, e <a href=" https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648 "> a empresa fez com que todos parassem de funcionar</a> desligando o servidor. 75 The Medtronics Conexus Telemetry Protocol has <a href=" https://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/ "> two vulnerabilities that affect several models of implantable defibrillators</a> and the devices they connect to. O Protocolo de Telemetria da Medtronics Conexus tem <a href=" http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/ "> duas vulnerabilidades que afetam vários modelos de desfibriladores implantáveis</a> e os dispositivos aos quais eles se conectam. 81 Amazon Ring &ldquo;security&rdquo; devices <a href=" https://www.engadget.com/2019-01-10-ring-gave-employees-access-customer-video-feeds.html "> send the video they capture to Amazon servers</a>, which save it long-term. Os dispositivos de “segurança” Amazon Ring <a href=" https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/ "> enviam o vídeo que eles capturam para os servidores da Amazon</a>, os quais armazenam-o a longo prazo. 87 Nearly all &ldquo;home security cameras&rdquo; <a href=" https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds-a8814384448/ "> give the manufacturer an unencrypted copy of everything they see</a>. &ldquo;Home insecurity camera&rdquo; would be a better name! Quase todas as “câmeras de segurança residencial” <a href=" https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/ "> fornecem ao fabricante uma cópia não criptografada de tudo que elas veem</a>. “Câmeras de insegurança residencial” seria um nome melhor! 92 Researchers have discovered how to <a href=" https://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co "> hide voice commands in other audio</a>, so that people cannot hear them, but Alexa and Siri can. Pesquisadores descobriram como <a href=" http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co "> ocultar comandos de voz em outro áudio</a>, para que as pessoas não possam ouvi-los, mas Alexa e Siri podem. 95 A medical insurance company <a href=" https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next/ "> offers a gratis electronic toothbrush that snoops on its user by sending usage data back over the Internet</a>. Uma empresa de seguro médico <a href=" https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next "> oferece uma escova de dentes eletrônica grátis que bisbilhota o usuário, enviando dados de uso pela Internet</a>. 101 Amazon recently invited consumers to be suckers and <a href=" https://www.techdirt.com/2017/11/22/vulnerability-found-amazon-key-again-showing-how-dumber-tech-is-often-smarter-option/ "> allow delivery staff to open their front doors</a>. Wouldn't you know it, the system has a grave security flaw. A Amazon recentemente convidou os consumidores a serem otários e <a href=" https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo "> permitir que a equipe de entrega abrisse as portas da frente</a>. Você não sabe, mas o sistema tem uma grave falha de segurança. 102 A remote-control sex toy was found to make <a href=" https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-surveillance ">audio recordings of the conversation between two users</a>. Um brinquedo sexual de controle remoto foi encontrado para fazer <a href=" https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei ">gravações de áudio da conversa entre dois usuários</a>. 113 A &ldquo;smart&rdquo; intravenous pump designed for hospitals is connected to the internet. Naturally <a href=" https://www.techdirt.com/2017/09/22/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack/ "> its security has been cracked</a>. Uma bomba intravenosa “inteligente” projetada para hospitais está conectada à internet. Naturalmente <a href=" https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml "> sua segurança foi violada</a>. 115 The bad security in many Internet of Stings devices allows <a href=" https://www.techdirt.com/2017/08/28/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you/ ">ISPs to snoop on the people that use them</a>. A segurança ruim em muitos dispositivos da Internet das Picadas permite aos <a href=" https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml ">ISPs bisbilhotarem as pessoas que os usam</a>. 118 Sonos <a href=" https://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/ "> told all its customers, &ldquo;Agree&rdquo; to snooping or the product will stop working</a>. <a href="https://www.consumerreports.org/consumerist/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/"> Another article</a> says they won't forcibly change the software, but people won't be able to get any upgrades and eventually it will stop working. Sonos <a href=" http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/ "> disse a todos os seus consumidores: “Concordem” com bisbilhotamento ou o produto vai parar de funcionar</a>. <a href="https://www.consumerreports.org/consumerist/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/">Outro artigo</a> diz que eles não mudarão o software à força, mas as pessoas não conseguirão fazer nenhuma atualização e, eventualmente, ele vai parar de funcionar. 120 Many models of Internet-connected cameras are tremendously insecure. They have login accounts with hard-coded passwords, which can't be changed, and <a href=" https://arstechnica.com/information-technology/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/ ">there is no way to delete these accounts either</a>. Muitos modelos de câmeras conectadas à Internet são extremamente inseguros. Eles têm contas de login com senhas embutidas em código, que não podem ser alteradas, e <a href=" https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/ ">também não há como excluir essas contas</a>. 121 The proprietary code that runs pacemakers, insulin pumps, and other medical devices is <a href=" https://www.bbc.com/news/technology-40042584 "> full of gross security faults</a>. O código privativo que executa marca-passos, bombas de insulina e outros dispositivos médicos está <a href=" http://www.bbc.co.uk/news/technology-40042584 "> cheio de falhas graves de segurança</a>. 122 Bird and rabbit pets were implemented for Second Life by a company that tethered their food to a server. <a href=" https://www.rockpapershotgun.com/second-life-ozimals-pet-rabbits-dying "> It shut down the server and the pets more or less died</a>. As aves e coelhos de estimação foram implementados para o Second Life por uma empresa que amarrou seus alimentos a um servidor. <a href=" https://www.rockpapershotgun.com/2017/05/19/second-life-ozimals-pet-rabbits-dying "> Ela desligou o servidor e os animais morreram, por assim dizer</a>. 134 The CIA exploited existing vulnerabilities in &ldquo;smart&rdquo; TVs and phones to design a malware that <a href=" https://www.independent.co.uk/tech/wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-assange-a7616651.html "> spies through their microphones and cameras while making them appear to be turned off</a>. Since the spyware sniffs signals, it bypasses encryption. A CIA explorou as vulnerabilidades existentes em TVs e telefones “inteligentes” para projetar um <em>malware</em> que <a href=" https://www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-assange-a7616651.html "> espia através de seus microfones e câmeras enquanto os faz parecer desligados</a>. Como o <i lang="en">spyware</i> detecta sinais, ignora a criptografia. 137 If you buy a used &ldquo;smart&rdquo; car, house, TV, refrigerator, etc., usually <a href=" https://boingboing.net/2017/02/20/the-previous-owners-of-used.html ">the previous owners can still remotely control it</a>. Se você comprar produtos “inteligentes” usados, como um carro, casa, TV, geladeira etc., geralmente <a href=" http://boingboing.net/2017/02/20/the-previous-owners-of-used.html ">os donos anteriores ainda podem remotamente controlá-los</a>. 138 Vizio &ldquo;smart&rdquo; <a href=" https://www.ftc.gov/business-guidance/blog/2017/02/what-vizio-was-doing-behind-tv-screen ">TVs report everything that is viewed on them, and not just broadcasts and cable</a>. Even if the image is coming from the user's own computer, the TV reports what it is. The existence of a way to disable the surveillance, even if it were not hidden as it was in these TVs, does not legitimize the surveillance. <a href=" https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen ">TVs “inteligentes” da Vizio relatam tudo o que é visto sobre elas, e não apenas transmissões e canais a cabo</a>. Ainda que a imagem venha do próprio computador do usuário, a TV relata o que é. A existência de uma forma de desabilitar a vigilância, mesmo que não estivesse oculta como estava nessas TVs, não legitima a vigilância. 143 The developer of Ham Radio Deluxe <a href=" https://www.techdirt.com/2016/12/22/software-company-shows-how-not-to-handle-negative-review/ ">sabotaged a customer's installation as punishment for posting a negative review</a>. O desenvolvedor do Ham Radio Deluxe <a href=" https://www.techdirt.com/articles/20161220/12411836320/company-bricks-users-software-after-he-posts-negative-review.shtml ">sabotou um instalação do cliente como punição por postar um comentário negativo</a>. 145 The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que can be <a href=" https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws/ ">remotely controlled with a mobile phone</a>; physical access is not necessary. This would enable crackers to listen in on a child's conversations, and even speak into the toys themselves. Os brinquedos “inteligentes” My Friend Cayla e i-Que podem ser <a href=" https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws ">controlados remotamente com um telefone celular</a>; o acesso físico não é necessário. Isso permitiria aos <em>crackers</em> ouvir as conversas de uma criança e até falar para os próprios brinquedos. 149 Samsung's &ldquo;Smart Home&rdquo; has a big security hole; <a href=" https://arstechnica.com/information-technology/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/ "> unauthorized people can remotely control it</a>. O “Smart Home” da Samsung tem uma grande falha de segurança; <a href=" http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/ "> pessoas não autorizadas podem controlá-lo remotamente</a>. 157 The <a href=" https://michaelweinberg.org/post/137045828005/free-the-cube "> &ldquo;Cube&rdquo; 3D printer was designed with DRM</a>: it won't accept third-party printing materials. It is the Keurig of printers. Now it is being discontinued, which means that eventually authorized materials won't be available and the printers may become unusable. <a href=" http://michaelweinberg.org/post/137045828005/free-the-cube "> A impressora 3D “Cube” foi projetada com DRM</a>: ela não aceita materiais de impressão de terceiros. É o Keurig das impressoras. Agora ela está sendo descontinuada, o que significa que eventualmente materiais autorizados não estarão disponíveis e as impressoras podem ficar inutilizáveis. 158 With a <a href=" https://www.fsf.org/resources/hw/endorsement/aleph-objects "> printer that gets the Respects Your Freedom</a>, this problem would not even be a remote possibility. Com uma <a href=" http://www.fsf.org/resources/hw/endorsement/aleph-objects "> impressora que obtém a certificação Respects Your Freedom</a>, esse problema não seria nem mesmo uma possibilidade remota. 160 Philips &ldquo;smart&rdquo; lightbulbs had initially been designed to interact with other companies' smart light bulbs, but <a href=" https://www.techdirt.com/2015/12/14/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update/ "> later the company updated the firmware to disallow interoperability</a>. Lâmpadas “inteligentes” da Philips foram inicialmente projetadas para interagir com lâmpadas inteligentes de outras empresas, mas <a href=" https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml "> posteriormente, a empresa atualizou o firmware para impedir a interoperabilidade</a>. 162 <a href=" https://www.computerworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html "> Some D-Link routers</a> have a back door for changing settings in a dlink of an eye. <a href=" http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html "> Alguns roteadores da D-Link</a> têm um <em>backdoor</em> para alterar as configurações em um piscar de olhos. 163 <a href=" https://sekurak.pl/tp-link-httptftp-backdoor/ "> The TP-Link router has a back door</a>. <a href=" http://sekurak.pl/tp-link-httptftp-backdoor/ "> O roteador da TP-Link tem um <em>backdoor</em></a>. 164 <a href=" https://gothub.frontendfriendly.xyz/elvanderb/TCP-32764/blob/master/README.md ">Many models of routers have back doors</a>. <a href=" https://github.com/elvanderb/TCP-32764 ">Muitos modelos de roteadores têm <em>backdoors</em></a>. 165 The Nest Cam &ldquo;smart&rdquo; camera is <a href=" https://www.bbc.com/news/technology-34922712 ">always watching</a>, even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo; A câmera “inteligente” Nest Cam está <a href=" http://www.bbc.com/news/technology-34922712 ">sempre assistindo</a>, mesmo quando o “dono” desliga-a. 168 Some web and TV advertisements play inaudible sounds to be picked up by proprietary malware running on other devices in range so as to determine that they are nearby. Once your Internet devices are paired with your TV, advertisers can correlate ads with Web activity, and other <a href=" https://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/ "> cross-device tracking</a>. Alguns anúncios na web e na TV reproduzem sons inaudíveis a serem captados por <em>malware</em> privativo em execução em outros dispositivos ao alcance, a fim de determinar que eles estão próximos. Assim que seus dispositivos de Internet estiverem emparelhados com sua TV, os anunciantes podem correlacionar anúncios com atividades na web e outros <a href=" http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/ "> rastreamento entre dispositivos</a>. 171 Tivo's alliance with Viacom adds 2.3 million households to the 600 millions social media profiles the company already monitors. Tivo customers are unaware they're being watched by advertisers. By combining TV viewing information with online social media participation, Tivo can now <a href=" https://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102/ "> correlate TV advertisement with online purchases</a>, exposing all users to new combined surveillance by default. A aliança da Tivo com a Viacom adiciona 2,3 milhões de residências aos 600 milhões de perfis de mídia social que a empresa já monitora. Os clientes da Tivo não sabem que estão sendo observados pelos anunciantes. Ao combinar informações de exibição de TV com participação em mídia social online, o Tivo agora pode <a href=" http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102 "> correlacionar anúncios de TV com compras online</a>, expondo todos os usuários a uma nova vigilância combinada por padrão. 172 FitBit fitness trackers have a <a href=" https://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/ "> Bluetooth vulnerability</a> that allows attackers to send malware to the devices, which can subsequently spread to computers and other FitBit trackers that interact with them. Os rastreadores de condicionamento físico da FitBit têm um <a href=" http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/ "> vulnerabilidade de Bluetooth</a> que permite que invasores enviem <em>malware</em> aos dispositivos, que podem se espalhar posteriormente para computadores e outros rastreadores FitBit que interagem com eles. 174 Vizio &ldquo;smart&rdquo; TVs recognize and <a href=" https://www.engadget.com/2015-07-24-vizio-ipo-inscape-acr.html ">track what people are watching</a>, even if it isn't a TV channel. As TVs “inteligentes” da Vizio reconhecem e <a href=" http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/ ">rastreiam o que as pessoas estão assistindo</a>, mesmo que não seja um canal de TV. 175 Due to bad security in a drug pump, crackers could use it to <a href=" https://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/ "> kill patients</a>. Devido à segurança ruim em uma bomba de drogas, os <em>crackers</em> podem usá-la para <a href=" http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/ "> matar pacientes</a>. 176 Verizon cable TV <a href=" https://arstechnica.com/information-technology/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/ "> snoops on what programs people watch, and even what they wanted to record</a>. A TV a cabo da Verizon <a href=" http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/ "> bisbilhota quais programas as pessoas assistem e até o que eles queriam gravar</a>. 179 Vizio <a href=" https://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html "> used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what users watch</a>. The TVs did not do that when first sold. Vizio <a href=" http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html "> usou uma “atualização” de firmware para fazer suas TVs bisbilhotarem o que os usuários assistem</a>. As TVs não faziam isso quando vendidas pela primeira vez. 180 Barbie <a href=" https://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673 ">is going to spy on children and adults</a>. Barbie <a href=" http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673 ">vai espionar crianças e adultos</a>. 183 In its privacy policy, Samsung explicitly confirms that <a href=" https://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs ">voice data containing sensitive information will be transmitted to third parties</a>. Em sua política de privacidade, a Samsung confirma explicitamente que <a href=" http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs "> dados de voz contendo informações sensíveis serão transmitidas a terceiros</a>. 184 The Amazon &ldquo;Smart&rdquo; TV is <a href=" https://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance "> snooping all the time</a>. A TV “inteligente” da Amazon está <a href=" http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance "> bisbilhotando a todo momento</a>. 185 More or less all &ldquo;smart&rdquo; TVs <a href=" https://myce.wiki/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/ ">spy on their users</a>. Mais ou menos todas as TVs “inteligentes” <a href=" http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/ ">espionam seus usuários</a>. 189 Nest thermometers send <a href=" https://bgr.com/general/google-nest-jailbreak-hack/ ">a lot of data about the user</a>. Termostatos do Nest enviam <a href=" http://bgr.com/2014/07/17/google-nest-jailbreak-hack ">muitos dados sobre o usuário</a>. 190 LG <a href=" https://www.techdirt.com/2014/05/20/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties/ "> disabled network features</a> on <em>previously purchased</em> &ldquo;smart&rdquo; TVs, unless the purchasers agreed to let LG begin to snoop on them and distribute their personal data. A LG <a href=" http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml "> desativou recursos de rede</a> em TVs “inteligentes” <em>adquiridas anteriormente</em>, a menos que os compradores concordassem em permitir que a LG comece a bisbilhotá-los e distribuir seus dados pessoais. 192 Even worse, it <a href=" https://rrrrambles.wordpress.com/2013/11/21/lg-tv-logging-filenames-from-network-folders/ "> snoops on other devices on the user's local network</a>. Pior ainda, ela <a href=" http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/ "> bisbilhota outros dispositivos na rede local do usuário</a>. 194 Meanwhile, LG TVs <a href=" https://www.techdirt.com/2014/05/20/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties/ "> do lots of spying anyway</a>. A LG <a href=" http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml "> desativou recursos de rede</a> em TVs “inteligentes” <em>adquiridas anteriormente</em>, a menos que os compradores concordassem em permitir que a LG comece a bisbilhotá-los e distribuir seus dados pessoais. 195 Lots of <a href=" https://www.wired.com/2014/04/hospital-equipment-vulnerable/ "> hospital equipment has lousy security</a>, and it can be fatal. Muitos <a href=" http://www.wired.com/2014/04/hospital-equipment-vulnerable/ "> equipamentos hospitalares têm péssima segurança</a> e isso pode ser fatal. 196 <a href=" https://www.bunniestudios.com/blog/?p=3554 "> Some flash memories have modifiable software</a>, which makes them vulnerable to viruses. <a href=" http://www.bunniestudios.com/blog/?p=3554 "> Algumas memórias flash têm software modificável</a>, o que as torna vulneráveis a vírus. 198 <a href=" https://arstechnica.com/information-technology/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/ "> Point-of-sale terminals running Windows were taken over</a> and turned into a botnet for the purpose of collecting customers' credit card numbers. <a href=" http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/ "> Terminais de ponto de venda com Windows foram invadidos</a> e transformados em botnet com o objetivo de coletar números de cartão de crédito dos clientes. 199 Spyware in LG &ldquo;smart&rdquo; TVs <a href=" https://doctorbeet.blogspot.com/2013/11/lg-smart-tvs-logging-usb-filenames-and.html "> reports what the user watches, and the switch to turn this off has no effect</a>. (The fact that the transmission reports a 404 error really means nothing; the server could save that data anyway.) <i lang="en">Spyware</i> nas TVs “inteligentes” da LG <a href=" http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html "> relata o que o usuário assiste e a opção para desligar isso não tem efeito</a>. (O fato de a transmissão relatar um erro 404 realmente não significa nada; o servidor poderia salvar esses dados de qualquer maneira.) 200 <a href=" https://web.archive.org/web/20131007102857/http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up "> DVDs and Blu-ray disks have DRM</a>. <a href=" http://web.archive.org/web/20131007102857/http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up "> DVDs e discos Bluray têm DRM</a>. 203 The FTC punished a company for making webcams with <a href=" https://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html "> bad security so that it was easy for anyone to watch through them</a>. A FTC puniu uma empresa por fazer webcams com <a href=" http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html "> segurança ruim para que seja fácil para qualquer um ver através delas</a>. 205 It is possible to <a href=" https://siliconangle.com/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/ "> kill people by taking control of medical implants by radio</a>. More information in <a href=" https://www.bbc.com/news/technology-17631838 ">BBC News</a> and <a href="https://ioactive.com/broken-hearts-how-plausible-was-the-homeland-pacemaker-hack/"> IOActive Labs Research blog</a>. É possível <a href=" http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/ "> matar pessoas assumindo o controle de implantes médicos por rádio</a>. Mais informações em <a href=" http://www.bbc.co.uk/news/technology-17631838 ">BBC News</a> e <a href="https://ioactive.com/broken-hearts-how-plausible-was-the-homeland-pacemaker-hack/"> IOActive Labs Research blog</a>. 206 <a href=" https://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/ "> &ldquo;Smart homes&rdquo;</a> turn out to be stupidly vulnerable to intrusion. <a href=" http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/ "> “Casas inteligentes”</a> acabam sendo estupidamente vulneráveis a intrusões. 208 The Cisco TNP IP phones are <a href=" https://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html "> spying devices</a>. Os telefones IP Cisco TNP são <a href=" http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html "> dispositivos espiões</a>. 214 Please see the <a href="/server/standards/README.translations.html">Translations README</a> for information on coordinating and contributing translations of this article. A equipe de traduções para o português brasileiro se esforça para oferecer traduções precisas e de boa qualidade, mas não estamos isentos de erros. Por favor, envie seus comentários e sugestões em geral sobre as traduções para <a href=" mailto:web-translators@gnu.org ">&lt;web-translators@gnu.org&gt;</a>. </p><p>Consulte o <a href="/server/standards/README.translations.html">Guia para as traduções</a> para mais informações sobre a coordenação e a contribuição com traduções das páginas deste site. ...
http://www.gnu.org/savannah-checkouts/gnu/gnun/reports/pt-br/proprietary/malware-appliances.html - [detail] - [similar]
PREV NEXT
Powered by Hyper Estraier 1.4.13, with 213369 documents and 1081681 words.