advanced help
phrase:
attribute:
attribute:
attribute:
order:
per page:
clip:
action:
Results of 1 - 1 of about 725 for Android 12 (1.870 sec.)
android (2801), 12 (27798)
proprietary-back-doors.de.po
#score: 5143
@digest: 61cba7c52575a13a8711d604c78a9889
@id: 306547
@mdate: 2023-05-20T10:40:02Z
@size: 79835
@type: text/html
content-type: text/html; charset=utf-8
#keywords: hintertur (52992), arstechnica (24576), computerworld (21908), fighter (21299), theregister (20465), coolpad (19302), backdoor (18058), remotely (17598), universal (14668), theguardian (13905), universelle (13590), xiaomi (12928), door (11615), https (11017), href (10271), iphone (9778), phones (7601), ldquo (7596), android (7553), unter (7148), windows (7037), rdquo (7000), router (6161), technology (6074), google (6049), subscription (5813), doors (5176), com (5061), back (5027), apple (4941), microsoft (4915), swindle (4814)
proprietary-back-doors.de.po Mismatched links: 143. Mismatched ids: 0. # text 8 | {+</a>&nbsp;/+} <a [-href="/proprietary/proprietary.html">Other examples | of proprietary malware</a>-] | {+href="/proprietary/proprietary.html">Malware</a>&nbsp;/ By | type&nbsp;/+} </a>&nbsp;/ <a href=" /proprietary/proprietary.html ">Malware</a>&nbsp;/ By type&nbsp;/ <a href=" /proprietary/ ">Weitere Beispiele proprietärer Schadsoftware</a> 10 | Nonfree (proprietary) software is very often malware (designed to mistreat | the user). Nonfree software is controlled by its developers, which puts | them in a position of power over the users; <a | href="/philosophy/free-software-even-more-important.html">that is the | basic injustice</a>. The developers {+and manufacturers+} often exercise | that power to the detriment of the users they ought to serve. Nonfree (proprietary) software is very often malware (designed to mistreat the user). Nonfree software is controlled by its developers, which puts them in a position of power over the users; <a href=" /philosophy/free-software-even-more-important.html ">that is the basic injustice</a>. The developers and manufacturers often exercise that power to the detriment of the users they ought to serve. Unfreie (proprietäre) Software entspricht sehr häufig einem Schadprogramm (entworfen, um <ins>unerwünschte und gegebenenfalls schädliche Funktionen auszuführen,</ins> Nutzer also schlecht behandeln). Unfreie Software wird von seinen Entwicklern kontrolliert, welches sie in eine Position der Macht gegenüber Nutzer versetzt. Das ist die <a href=" /philosophy/free-software-even-more-important ">grundlegende Ungerechtigkeit</a>. Häufig üben Entwickler diese Macht zum Schaden derer aus, denen sie eigentlich dienen sollte. 12 | {+Some malicious functionalities are mediated by <a | href="/proprietary/proprietary.html#f1">back doors</a>.+} Here are | examples of [-demonstrated back doors in proprietary software. They are | sorted out-] {+programs that contain one or several of those, classified+} | according to what [-they are-] {+the back door is+} known to [-allow.-] | {+have the power to do.+} Back doors that allow full control over the | [-operating system-] {+programs which contain them+} are said to be | [-&ldquo;universal&rdquo;.-] {+&ldquo;universal.&rdquo;+} Some malicious functionalities are mediated by <a href=" /proprietary/proprietary.html#f1 ">back doors</a>. Here are examples of programs that contain one or several of those, classified according to what the back door is known to have the power to do. Back doors that allow full control over the programs which contain them are said to be &ldquo;universal.&rdquo; Hier sind Beispiele von Hintertüren in proprietärer Software aufgeführt, und sind nach dem was sie zulassen geordnet. Hintertüren, die die volle Kontrolle über das Betriebssystem ermöglichen, werden als „universell“ bezeichnet. 15 <a href=" #spy ">Spying</a> 16 | [-Altering-]{+<a href="#alter-data">Altering+} user's data or | [-settings-] {+settings</a>+} <a href=" #alter-data ">Altering user's data or settings</a> Ändern&#160;von&#160;Benutzerdaten/&#8209;einstellungen 17 | [-Installing or-]{+<a href="#install-delete">Installing,+} deleting | [-programs-] {+or disabling programs</a>+} <a href=" #install-delete ">Installing, deleting or disabling programs</a> Programme&#160;installieren/entfernen 18 <a href=" #universal ">Full control</a> 19 <a href=" #other ">Other/undefined</a> 21 Google Nest <a href=" https://blog.google/products/google-nest/partnership-adt-smarter-home-security/ "> is taking over ADT</a>. Google sent out a software update to its speaker devices using their back door <a href=" https://www.protocol.com/google-smart-speaker-alarm-adt "> that listens for things like smoke alarms</a> and then notifies your phone that an alarm is happening. This means the devices now listen for more than just their wake words. Google says the software update was sent out prematurely and on accident and Google was planning on disclosing this new feature and offering it to customers who pay for it. 22 | Many models of Internet-connected cameras contain a glaring back | door&mdash;they have login accounts with hard-coded passwords, which can't | be changed, and <a | [-href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">-] | {+href="https://arstechnica.com/information-technology/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">+} | there is no way to delete these accounts either</a>. Many models of Internet-connected cameras contain a glaring back door&mdash;they have login accounts with hard-coded passwords, which can't be changed, and <a href=" https://arstechnica.com/information-technology/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/ "> there is no way to delete these accounts either</a>. Viele Modelle internetfähiger Kameras enthalten eine eklatante Hintertür: Anmeldekonten mit hartcodierten, <a href=" https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/ " title="Internet cameras have hard-coded password that can't be changed, unter: arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/ 2017.">nicht änderbaren Passwörtern, und nicht loschbaren Konten</a>. 27 | Apple can, and regularly does, <a | [-href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">-] | {+href="https://arstechnica.com/gadgets/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">+} | remotely extract some data from iPhones for the state</a>. Apple can, and regularly does, <a href=" https://arstechnica.com/gadgets/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/ "> remotely extract some data from iPhones for the state</a>. Apple kann <a href=" //arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/ " title="New guidelines outline what iPhone data Apple can give to police, unter: arstechnica.com 2014.">aus der Ferne irgendwelche Daten von iPhones für Vater Staat anzapfen</a>&#160;&#8209;&#160;und macht es regelmäßig. 28 | This may have improved with <a | [-href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">-] | {+href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/">+} | iOS 8 security improvements</a>; but <a | [-href="https://firstlook.org/theintercept/2014/09/22/apple-data/">-] | {+href="https://theintercept.com/2014/09/22/apple-data/">+} not as much | as Apple claims</a>. This may have improved with <a href=" https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/ "> iOS 8 security improvements</a>; but <a href=" https://theintercept.com/2014/09/22/apple-data/ "> not as much as Apple claims</a>. Dies mag sich mit den jüngsten <a href=" //www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html " title="Apple will no longer unlock most iPhones, iPads for police, even with search warrants, unter: washingtonpost.com 2014.">iOS 8-Sicherheitsverbesserungen</a> gebessert haben, allerdings <a href=" https://firstlook.org/theintercept/2014/09/22/apple-data/ " title="Apple Still Has Plenty of Your Data for the Feds, unter: firstlook.org 2014.">nicht so sehr wie es Apple behauptet</a>. 30 BMW is now luring British customers into <a href=" https://edition.cnn.com/2022/07/14/business/bmw-subscription/index.html "> paying for the built-in heated-seat feature of their new cars on a subscription basis</a>. People also have the option to buy the feature when they are paying for the car, but those who bought a used car have to pay BMW extra money to remotely enable the heated seats. This is probably done by BMW accessing a back door in the car software. 31 Some Xiaomi phones <a href=" https://www.theguardian.com/world/2021/sep/22/lithuania-tells-citizens-to-throw-out-chinese-phones-over-censorship-concerns ">have a malfeature to bleep out phrases that express political views China does not like</a>. In phones sold in Europe, Xiaomi leaves this deactivated by default, but has a back door to activate the censorship. 33 BlizzCon 2019 imposed a <a href=" https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/ "> requirement to run a proprietary phone app</a> to be allowed into the event. 34 This app is a spyware that can snoop on a lot of sensitive data, including user's location and contact list, and has <a href=" https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/ "> near-complete control</a> over the phone. 35 Android has a <a href=" https://www.theverge.com/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change "> back door for remotely changing &ldquo;user&rdquo; settings</a>. 37 | The Dropbox app for Macintosh <a | [-href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/">-] | {+href="https://web.archive.org/web/20180124123506/http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/">+} | takes control of user interface items after luring the user into entering | an admin password</a>. The Dropbox app for Macintosh <a href=" https://web.archive.org/web/20180124123506/http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/ "> takes control of user interface items after luring the user into entering an admin password</a>. Dropbox-App für Macintosh <a href=" //applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/ " title="Revealing Dropbox's Dirty Little Security Hack, unter: applehelpwriter.com 2016.">übernimmt Kontrolle über Elemente der Benutzeroberfläche nachdem Nutzer zur Eingabe eines Administratorpassworts geködert wurden</a>. 38 | A pregnancy test controller application not only can <a | href="http{+s+}://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"> | spy on many sorts of data in the phone, and in server accounts, it can | alter them too</a>. A pregnancy test controller application not only can <a href=" https://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security "> spy on many sorts of data in the phone, and in server accounts, it can alter them too</a>. Ein Bluetooth-Schwangerschaftstest- App kann nicht nur viele <a href=" //www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security " title="First Response's Bluetooth pregnancy test is intriguing — and a privacy nightmare, unter: TheVerge.com 2016.">Daten im Smartphone und in Server-Konten ausschnüffeln, sondern auch ändern</a>. 39 | <a | [-href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html">-] | {+href="https://www.computerworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html">+} | Some D-Link routers</a> have a back door for changing settings in a dlink | of an eye. <a href=" https://www.computerworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html "> Some D-Link routers</a> have a back door for changing settings in a dlink of an eye. <a href=" //www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html ">Einige D-Link Router</a> haben eine Hintertür zum Ändern von Einstellungen.<a href="#tn03" id="tn03-ref" class="transnote">[3]</a> 40 | <a href="http{+s+}://sekurak.pl/tp-link-httptftp-backdoor/"> The TP-Link | router has a back door</a>. <a href=" https://sekurak.pl/tp-link-httptftp-backdoor/ "> The TP-Link router has a back door</a>. <a href=" //sekurak.pl/tp-link-httptftp-backdoor/ " title="TP-Link HTTP/TFTP backdoor, unter: sekurak.pl 2013.">TP-Link-Router hat eine Hintertür</a>. 42 | Google has long had <a | href="http{+s+}://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted">a | back door to remotely unlock an Android device</a>, unless its disk is | encrypted (possible since Android 5.0 Lollipop, but still not quite the | default). Google has long had <a href=" https://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted ">a back door to remotely unlock an Android device</a>, unless its disk is encrypted (possible since Android 5.0 Lollipop, but still not quite the default). Google hat eine <a href=" //www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted " title="Samuel Gibbs, Google can unlock some Android devices remotely, district attorney says, unter: theguardian.com 2015.">Hintertür eingebaut, um ein Android-Gerät aus der Ferne zurückzusetzen</a>, sofern die Daten auf dem Gerät nicht vollverschlüsselt sind (geplant seit Android 5.0 Lollipop, aber noch nicht ganz der Standard). 43 | Caterpillar vehicles come with <a | [-href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">-] | {+href="https://web.archive.org/web/20201108113943/https://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">+} | a back door to shutoff the engine</a> remotely. Caterpillar vehicles come with <a href=" https://web.archive.org/web/20201108113943/https://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it "> a back door to shutoff the engine</a> remotely. Fahrzeuge von Caterpillar, weltgrößter US-Baumaschinen-Hersteller, sind mit einer <a href=" //www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it " title="Tyler Durden, For Caterpillar The Depression Has Never Been Worse… But It Has A Cunning Plan How To Deal With It, Zero Hedge 2015.">Hintertür zur Abschaltung des Motors via Fernzugriff</a> ausgestattet. 44 | Modern gratis game cr&hellip;apps <a | href="http{+s+}://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"> | collect a wide range of data about their users and their users' friends | and associates</a>. Modern gratis game cr&hellip;apps <a href=" https://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/ "> collect a wide range of data about their users and their users' friends and associates</a>. Moderne, kostenlose Spiele-Apps von sehr schlechter Qualität <a href=" //toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/ " title="Eli Hodapp, ‚We Own You“ - Confessions of an Anonymous Free to Play Producer, unter: http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/ TouchArcade 2015.">sammeln eine Vielzahl von Daten über ihre Nutzer und deren Freunde und Partner</a>. 49 | The Amazon Kindle-Swindle has a back door that has been used to <a | [-href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">-] | {+href="https://web.archive.org/web/20220319193415/https://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">+} | remotely erase books</a>. One of the books erased was [-1984,-] | {+<cite>1984</cite>,+} by George Orwell. The Amazon Kindle-Swindle has a back door that has been used to <a href=" https://web.archive.org/web/20220319193415/https://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/ "> remotely erase books</a>. One of the books erased was <cite>1984</cite>, by George Orwell. Der Amazon Sw(K)indle verfügt über eine bereits ausgenutzte Hintertür um <a href=" //pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/ " title="Some E-Books Are More Equal Than Others, unter: nytimes.com 2013.">Bücher aus der Ferne zu löschen</a>. Eines der gelöschten Bücher war <cite>1984</cite> von George Orwell. 50 | Amazon responded to criticism by saying it would delete books only | following orders from the state. However, that policy didn't last. In | 2012 it <a | href="http{+s+}://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html"> | wiped a user's Kindle-Swindle and deleted her account</a>, then offered | her kafkaesque &ldquo;explanations.&rdquo; Amazon responded to criticism by saying it would delete books only following orders from the state. However, that policy didn't last. In 2012 it <a href=" https://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html "> wiped a user's Kindle-Swindle and deleted her account</a>, then offered her kafkaesque &ldquo;explanations.&rdquo; Amazon reagierte auf die Kritik mit den Worten, dass es Bücher erst nach Anordnungen staatlicher Stellen löschen würde. Jedoch hielt diese Politik nicht lange. Im Jahr 2012 wurden einer Benutzerin <a href=" http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html ">alle gekauften elektronischen Bücher ihres Kindle-Schwindel gelöscht und ihr Benutzerkonto entfernt</a>, dann folgten kafkaeske „Erklärungen“. 52 # (" ") unnecessary inconvenience!!! | The iPhone has a back door for <a | href="http{+s+}://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"> | remote wipe</a>. It's not always enabled, but users are led into enabling | it without understanding. The iPhone has a back door for <a href=" https://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone "> remote wipe</a>. It's not always enabled, but users are led into enabling it without understanding. Das iPhone enthält eine Hintertür zur <a href=" //www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone " title="Martin Kaste, Wipeout: When Your Company Kills Your iPhone, unter: npr.org 2010.">Fern-Löschung</a>. Sie ist nicht immer aktiviert, aber Nutzer werden dazu angehalten sie ohne es wirklich zu verstehen zu aktivieren. 54 | Microsoft is <a | [-href="http://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1"> | repeatedly nagging many-] | {+href="https://www.theguardian.com/technology/2023/feb/14/microsoft-to-phase-out-internet-explorer-with-new-edge-browser"> | remotely disabling Internet Explorer, forcibly redirecting+} users to | [-install Windows 10</a>.-] {+Microsoft Edge</a>.+} Microsoft is <a href=" https://www.theguardian.com/technology/2023/feb/14/microsoft-to-phase-out-internet-explorer-with-new-edge-browser "> remotely disabling Internet Explorer, forcibly redirecting users to Microsoft Edge</a>. Microsoft <a href=" https://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1 " title="Microsoft downloads Windows 10 on user machines without asking, unter: The Guardian 2015.">bohrt wiederholt bei vielen Nutzern nach, Windows 10 zu installieren</a>. 56 Microsoft <a href=" https://betanews.com/2023/01/19/microsoft-is-using-the-kb5021751-update-to-see-if-you-have-an-unsupported-version-of-office-installed/ "> released an &ldquo;update&rdquo; that installs a surveillance program</a> on users' computers to gather data on some installed programs for Microsoft's benefit. The update is rolling out automatically, and the program runs &ldquo;one time silently.&rdquo; 57 Xiaomi provides a tool to <a href=" https://www.guidetoroot.com/unlock-bootloader-on-any-xiaomi-phones/ "> unlock the bootloader of Xiaomi smartphones and tablets</a>, but this requires creating an account on the company's servers, i.e. providing your phone number. This is the price you have to pay for &ldquo;legally&rdquo; running a free software operating system on Xiaomi devices. But the manufacturer retains control of the unlocked device through a backdoor in the bootloader&mdash;the same backdoor that was remotely used to unlock it. 58 Tesla <a href=" https://www.cnn.com/2022/08/22/business/tesla-fsd-price-increase/index.html "> sells an add-on software feature that drivers are not allowed to use</a>. 60 Adobe <a href=" https://web.archive.org/web/20211014123717/https://pluralistic.net/2021/10/13/theres-an-app-for-that/#gnash ">has licensed its Flash Player to China's Zhong Cheng Network</a> who is offering the program bundled with spyware and a back door that can remotely deactivate it. 61 Adobe is responsible for this since they gave Zhong Cheng Network permission to do this. This injustice involves &ldquo;misuse&rdquo; of the DMCA, but &ldquo;proper,&rdquo; intended use of the DMCA is a much bigger injustice. There is <a href=" /philosophy/right-to-read.html ">a series of errors related to DMCA</a>. 62 Recent Samsung TVs have a back door with which Samsung can <a href=" https://www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide "> brick them remotely</a>. 63 <a href=" https://arstechnica.com/gadgets/2021/06/even-creepier-covid-tracking-google-silently-pushed-app-to-users-phones/ ">Google automatically installed an app on many proprietary Android phones</a>. The app might or might not do malicious things but the power Google has over proprietary Android phones is dangerous. 64 Adobe Flash Player <a href=" https://www.adobe.com/products/flashplayer/end-of-life.html "> has a universal back door</a> which lets Adobe control the software and, for example, disable it whenever it wants. Adobe will block Flash content from running in Flash Player beginning January 12, 2021, which indicates that they have access to every Flash Player through a back door. 66 BMW is trying to <a href=" https://www.theverge.com/2020/7/2/21311332/bmw-in-car-purchase-heated-seats-software-over-the-air-updates ">lock certain features of its cars, and force people to pay to use part of the car they already bought</a>. This is done through forced update of the car software via a radio-operated back door. 67 A very popular app found in the Google Play store contained a module that was designed to <a href=" https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/ ">secretly install malware on the user's computer</a>. The app developers regularly used it to make the computer download and execute any code they wanted. 69 Apple appears to say that <a href=" https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/ "> there is a back door in MacOS</a> for automatically updating some (all?) apps. 71 Corel Paintshop Pro has a <a href=" https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/ "> back door that can make it cease to function</a>. 75 &ldquo;<a href=" /philosophy/words-to-avoid.html#Piracy ">Piracy</a>&rdquo; means attacking ships. Using that word to refer to sharing copies is a smear; please don't smear sharing. 76 The idea of &ldquo;protecting our IP&rdquo; is total confusion. The term &ldquo;IP&rdquo; itself is a <a href=" /philosophy/not-ipr.html ">bogus generalization about things that have nothing in common</a>. 78 | Some &ldquo;Smart&rdquo; TVs automatically <a | [-href="https://news.ycombinator.com/item?id=16727319">load-] | {+href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"> | load+} downgrades that install a surveillance app</a>. Some &ldquo;Smart&rdquo; TVs automatically <a href=" https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928 "> load downgrades that install a surveillance app</a>. Einige „Kluge“ TVs <a href=" https://news.ycombinator.com/item?id=16727319 " title="Unter: Guidelines 2018.">laden automatisch Downgrades herunter, die eine Überwachungs-App installieren</a>. 82 | {+In addition to its+} <a | [-href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html">Windows-] | {+href="#windows-update">universal back door</a>, Windows+} 8 [-also-] | has a back door for {+<a | href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html">+} | remotely deleting apps</a>. In addition to its <a href=" #windows-update ">universal back door</a>, Windows 8 has a back door for <a href=" https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html "> remotely deleting apps</a>. <a href=" http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html " title="Microsoft: We can remotely delete Windows 8 apps, unter: computerworld.com 2011.">Windows 8 hat auch eine Hintertür zum rechnerfernen Löschen von Anwendungssoftware</a>. 84 <a href="#tn02" id="tn02-ref" class="transnote">[2]</a> | In Android, <a | [-href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">-] | {+href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html">+} | Google has a back door to remotely delete [-apps.</a>-] {+apps</a>.+} (It | was in a program called GTalkService, which seems since then to have been | merged into Google Play.) In Android, <a href=" https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html "> Google has a back door to remotely delete apps</a>. (It was in a program called GTalkService, which seems since then to have been merged into Google Play.) Google hat in <a href=" //www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html " title="Google throws 'kill switch' on Android phones, unter: computerworld.com 2011.">Android eine Hintertür um Apps aus der Ferne zu löschen</a>: sie befand sich in einem Programm namens <em>GTalkService</em>, der dann im <em>Google Play</em>-Dienst verschmolzen worden zu sein scheint. 87 | The iPhone has a back door <a | href="http{+s+}://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"> | that allows Apple to remotely delete apps</a> which Apple considers | &ldquo;inappropriate&rdquo;. Jobs said it's OK for Apple to have this | power because of course we can trust Apple. The iPhone has a back door <a href=" https://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html "> that allows Apple to remotely delete apps</a> which Apple considers &ldquo;inappropriate&rdquo;. Jobs said it's OK for Apple to have this power because of course we can trust Apple. Das iPhone hat eine Hintertür, die <a href=" //www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html " title="Apple's Jobs confirms iPhone 'kill switch', unter: telegraph.co.uk 2008.">Apple per Fernzugriff das Löschen von Apps erlaubt</a>, die als „unangemessen“ betrachtet werden. Steve Jobs<ins>, damaliger Apple-CEO,</ins> sagte, es sei <em>für Apple in Ordnung diese Macht zu haben</em>, weil wir Apple selbstverfreilich vertrauen können.<a href="#tn02" id="tn02-ref" class="transnote">[2]</a> 89 HP delivers printers with a universal back door, and recently used it to <a href=" https://www.theguardian.com/money/2023/may/10/how-can-hp-block-me-from-using-a-cheaper-printer-cartridge "> sabotage them by remotely installing malware</a>. The malware makes the printer refuse to function with non-HP ink cartrides, and even with old HP cartridges which HP now declares to have &ldquo;expired.&rdquo; HP calls the back door &ldquo;dynamic security,&rdquo; and has the gall to claim that this &ldquo;security&rdquo; protects users from malware. 92 NordicTrack, a company that sells exercise machines with ability to show videos <a href=" https://arstechnica.com/information-technology/2021/11/locked-out-of-god-mode-runners-are-hacking-their-treadmills/ ">limits what people can watch, and recently disabled a feature</a> that was originally functional. This happened through automatic update and probably involved a universal back door. 93 Peloton company which produces treadmills recently <a href=" https://www.bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-monthly-subscription-after-recall/ ">locked people out of basic features of people's treadmills by a software update</a>. The company now asks people for a membership/subscription for what people already paid for. 97 Microsoft is <a href=" https://uk.pcmag.com/operating-systems/131798/microsoft-starts-automatically-removing-flash-from-windows ">forcibly removing the Flash player from computers running Windows 10</a>, using <a href=" /proprietary/proprietary-back-doors.html#windows-update ">a universal backdoor in Windows</a>. 98 The fact that Flash has been <a href=" /proprietary/proprietary-back-doors.html#M202012020 ">disabled by Adobe</a> is no excuse for this abuse of power. The nature of proprietary software, such as Microsoft Windows, gives the developers power to impose their decisions on users. Free software on the other hand empowers users to make their own decisions. 99 Some Wavelink and JetStream wifi routers have universal back doors that enable unauthenticated users to remotely control not only the routers, but also any devices connected to the network. There is evidence that <a href=" https://cybernews.com/security/walmart-exclusive-routers-others-made-in-china-contain-backdoors-to-control-devices/ "> this vulnerability is actively exploited</a>. 100 If you consider buying a router, we encourage you to get one that <a href=" https://ryf.fsf.org/categories/routers ">runs on free software</a>. Any attempts at introducing malicious functionalities in it (e.g., through a firmware update) will be detected by the community, and soon corrected. 101 If unfortunately you own a router that runs on proprietary software, don't panic! You may be able to replace its firmware with a free operating system such as <a href=" https://librecmc.org ">libreCMC</a>. If you don't know how, you can get help from a nearby GNU/Linux user group. 102 A new app published by Google <a href=" https://www.xda-developers.com/google-device-lock-controller-banks-payments/ ">lets banks and creditors deactivate people's Android devices</a> if they fail to make payments. If someone's device gets deactivated, it will be limited to basic functionality, such as emergency calling and access to settings. 103 BMW will remotely <a href=" https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/ "> enable and disable functionality in cars</a> through a universal back door. 104 The <a href=" https://play.google.com/about/play-terms/ "> Google Play Terms of Service</a> insist that the user of Android accept the presence of universal back doors in apps released by Google. 106 Android phones subsidized by the US government come with <a href=" https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/ "> preinstalled adware and a back door for forcing installation of apps</a>. 107 The adware is in a modified version of an essential system configuration app. The back door is a surreptitious addition to a program whose stated purpose is to be a <a href=" https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/ "> universal back door for firmware</a>. 109 The Chinese Communist Party's <a href=" /proprietary/proprietary-surveillance.html#M201910130 "> &ldquo;Study the Great Nation&rdquo; app</a> was found to contain <a href=" https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962 "> a back-door allowing developers to run any code they wish</a> in the users' phone, as &ldquo;superusers.&rdquo; 110 Note: The <a href=" http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html "> Washington Post version of the article</a> (partly obfuscated, but readable after copy-pasting in a text editor) includes a clarification saying that the tests were only performed on the Android version of the app, and that, according to Apple, &ldquo;this kind of &lsquo;superuser&rsquo; surveillance could not be conducted on Apple's operating system.&rdquo; 111 ChromeBooks are programmed for obsolescence: ChromeOS has a universal back door that is used for updates and <a href=" https://www.theregister.com/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/ "> ceases to operate at a predefined date</a>. From then on, there appears to be no support whatsoever for the computer. 113 The FordPass Connect feature of some Ford vehicles has <a href=" https://web.archive.org/web/20200530023040/https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html "> near-complete access to the internal car network</a>. It is constantly connected to the cellular phone network and sends Ford a lot of data, including car location. This feature operates even when the ignition key is removed, and users report that they can't disable it. 115 New GM cars <a href=" https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html "> offer the feature of a universal back door</a>. 117 | The Furby Connect has a <a | [-href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">-] | {+href="https://web.archive.org/web/20220604212722/https://www.contextis.com/en/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">+} | universal back door</a>. If the product as shipped doesn't act as a | listening device, remote changes to the code could surely convert it into | one. The Furby Connect has a <a href=" https://web.archive.org/web/20220604212722/https://www.contextis.com/en/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect "> universal back door</a>. If the product as shipped doesn't act as a listening device, remote changes to the code could surely convert it into one. Das elektronische Haustier <b>Furby Connect</b> hat eine <a href=" https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect " title="Don't Feed Them After Midnight: Reverse-Engineering the Furby Connect, unter: https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect Context 2017.">universelle Hintertür</a>. Wenn das Produkt&#160;&#8209;&#160;wie geliefert&#160;&#8209;&#160;nicht als Abhörgerät fungiert, könnte es die Änderung des Codes sicher in eins umwandeln. 118 | Sony has brought back its robotic pet Aibo, this time <a | [-href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet">-] | {+href="https://www.vice.com/en/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet">+} | with a universal back door, and tethered to a server that requires a | subscription</a>. Sony has brought back its robotic pet Aibo, this time <a href=" https://www.vice.com/en/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet "> with a universal back door, and tethered to a server that requires a subscription</a>. Sony bringt Roboterhund <b>Aibo</b> zurück: <a href=" https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet "> mit universeller Hintertür und an einen Server angebunden, der ein Abonnement erforderlich macht</a>. 121 | Vizio &ldquo;smart&rdquo; TVs <a | [-href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">-] | {+href="https://www.ftc.gov/business-guidance/blog/2017/02/what-vizio-was-doing-behind-tv-screen">+} | have a universal back door</a>. Vizio &ldquo;smart&rdquo; TVs <a href=" https://www.ftc.gov/business-guidance/blog/2017/02/what-vizio-was-doing-behind-tv-screen "> have a universal back door</a>. Vizio „Smart“-TVs haben <a href=" https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen ">universelle Hintertür</a>. 122 | Xiaomi phones come with <a | [-href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered">-] | {+href="https://web.archive.org/web/20190424082647/http://blog.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered/">+} | a universal back door in the application processor, for Xiaomi's use</a>. Xiaomi phones come with <a href=" https://web.archive.org/web/20190424082647/http://blog.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered/ "> a universal back door in the application processor, for Xiaomi's use</a>. Xiaomi Telefone kommen mit einer <a href=" https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered ">universellen Hintertür im Applikations-Prozessor</a>, zur Nutzung durch Xiaomi. 124 | Microsoft Windows has a universal back door through which <a | [-href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183">-] | {+href="https://www.informationweek.com/government/microsoft-updates-windows-without-user-permission-apologizes">+} | any change whatsoever can be imposed on the users</a>. Microsoft Windows has a universal back door through which <a href=" https://www.informationweek.com/government/microsoft-updates-windows-without-user-permission-apologizes "> any change whatsoever can be imposed on the users</a>. Microsoft Windows enthält universelle Hintertür, durch welche <a href=" https://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183 " title="Microsoft Updates Windows Without User Permission, Apologizes, unter: informationweek.com 2007.">Nutzern Änderungen jeglicher Art aufgezwungen</a> werden können.<a href="#tn01" id="tn01-ref" class="transnote">[1]</a> 125 This was <a href=" https://web.archive.org/web/20200219180230/http://slated.org/windows_by_stealth_the_updates_you_dont_want "> reported in 2007</a> for XP and Vista, and it seems that Microsoft used the same method to push the <a href=" /proprietary/malware-microsoft.html#windows10-forcing "> Windows 10 downgrade</a> to computers running Windows 7 and 8. 126 | In Windows 10, the universal back door is no longer hidden; all | &ldquo;upgrades&rdquo; will be <a | href="http{+s+}://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/"> | forcibly and immediately imposed</a>. In Windows 10, the universal back door is no longer hidden; all &ldquo;upgrades&rdquo; will be <a href=" https://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/ "> forcibly and immediately imposed</a>. In Windows 10 wird die universelle Hintertür nicht mehr verborgen; alle <i>„Verbesserungen“</i> werden <a href=" //arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/ " title="Windows 10 updates to be automatic and mandatory for Home users, unter: arstechnica.com 2015.">zwangsweise und unmittelbar durchgesetzt</a>. 129 | <a | href="http{+s+}://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"> | A Chinese version of Android has a universal back door</a>. Nearly all | models of mobile phones have a <a [-href="#universal-back-door">-] | {+href="#universal-back-door-phone-modem">+} universal back door in the | modem chip</a>. So why did Coolpad bother to introduce another? Because | this one is controlled by Coolpad. <a href=" https://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor "> A Chinese version of Android has a universal back door</a>. Nearly all models of mobile phones have a <a href=" #universal-back-door-phone-modem "> universal back door in the modem chip</a>. So why did Coolpad bother to introduce another? Because this one is controlled by Coolpad. Eine <a href=" //www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor " title="Chinese Android phones contain in-built hacker ‘backdoor', unter: theguardian.com 2014.">chinesische Android-Variante verfügt über eine universelle Hintertür</a>. Nahezu alle Smartphone-Modelle verfügen über eine <a href=" #universal-back-door ">universelle Hintertür im Modem-Chip</a>. Warum also bemüht sich Coolpad, eine andere einzuführen? Weil diese durch Coolpad kontrolliert wird. 130 | <a | href="http://www.techienews.co.uk/973462/bitcoin-miners-bundled-pups-legitimate-applications-backed-eula/"> | Some applications come with MyFreeProxy, which is a universal back | [-door-] {+door</a>+} that can download programs and run [-them.</a>-] | {+them.+} <a href=" http://www.techienews.co.uk/973462/bitcoin-miners-bundled-pups-legitimate-applications-backed-eula/ "> Some applications come with MyFreeProxy, which is a universal back door</a> that can download programs and run them. <a href=" //www.techienews.co.uk/973462/bitcoin-miners-bundled-pups-legitimate-applications-backed-eula/ " title="Ravi Mandalia, Bitcoin miners bundled with PUPs in legitimate applications backed by EULA, unter: techienews.co.uk 2013.">Einige Anwendungen kommen mit MyFreeProxy, bei dem es sich um eine universelle Hintertür handelt, die Programme herunterladen und ausführen kann</a>. 132 | In addition to its <a href="#swindle-eraser">book eraser</a>, the | Kindle-Swindle has a <a | href="http{+s+}://www.amazon.com/gp/help/customer/display.html?nodeId=200774090"> | universal back door</a>. In addition to its <a href="#swindle-eraser">book eraser</a>, the Kindle-Swindle has a <a href=" https://www.amazon.com/gp/help/customer/display.html?nodeId=200774090 "> universal back door</a>. Der Sw(K)indle besitzt neben seinem <a href="#swindle-eraser">Buchlöscher</a> eine <a href=" https://www.amazon.de/gp/help/customer/display.html?nodeId=200774090 ">universelle Hintertür</a>. 133 | Almost every phone's communication processor has a universal back door | which is <a | href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"> | often used to make a phone transmit all conversations it hears</a>. {+See | <a | href="/proprietary/malware-mobiles.html#universal-back-door-phone-modem">Malware | in Mobile Devices</a> for more info.+} Almost every phone's communication processor has a universal back door which is <a href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"> often used to make a phone transmit all conversations it hears</a>. See <a href=" /proprietary/malware-mobiles.html#universal-back-door-phone-modem ">Malware in Mobile Devices</a> for more info. Fast jeder Telefon-Kommunikationsprozessor hat eine universelle Hintertür, der <a href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html" title="Remotely Eavesdropping on Cell Phone Microphones, in: Schneier on Security 2006.">oft dazu verwendet wird alle Gespräche <ins>in der Nähe des Telefons</ins> abzuhören und zu übertragen</a>. 135 | Intel's intentional &ldquo;management engine&rdquo; back door has <a | [-href="https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/">-] | {+href="https://www.theregister.com/2017/11/20/intel_flags_firmware_flaws/">+} | unintended back doors</a> too. Intel's intentional &ldquo;management engine&rdquo; back door has <a href=" https://www.theregister.com/2017/11/20/intel_flags_firmware_flaws/ "> unintended back doors</a> too. Intels vorsätzliche „Management Engine“-Hintertür hat <a href=" https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/ " title="Intel finds critical holes in secret Management Engine hidden in tons of desktop, server chipsets, unter: https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/ The Register 2017.">auch unbeabsichtigte Hintertüren</a>. 136 | A Capcom's Street Fighter V update <a | [-href="https://www.theregister.co.uk/2016/09/23/capcom_street_fighter_v/">-] | {+href="https://www.theregister.com/2016/09/23/capcom_street_fighter_v/">+} | installed a driver that could be used as a back door by any application | installed on a Windows computer</a>, but was <a | [-href="https://www.rockpapershotgun.com/2016/09/24/street-fighter-v-removes-new-anti-crack">-] | {+href="https://www.rockpapershotgun.com/street-fighter-v-removes-new-anti-crack">+} | immediately rolled back</a> in response to public outcry. A Capcom's Street Fighter V update <a href=" https://www.theregister.com/2016/09/23/capcom_street_fighter_v/ "> installed a driver that could be used as a back door by any application installed on a Windows computer</a>, but was <a href=" https://www.rockpapershotgun.com/street-fighter-v-removes-new-anti-crack "> immediately rolled back</a> in response to public outcry. Eine Aktualisierung für Capcoms Street Fighter V <a href=" https://www.theregister.co.uk/2016/09/23/capcom_street_fighter_v/ " title="Double KO! Capcom's Street Fighter V installs hidden rootkit on PCs, unter: The Register 2016.">installiert einen Treiber, der als Hintertür von jeder installierten Anwendung auf einem Windows-Rechner genutzt werden könnte</a>, jedoch sofort als Reaktion nach öffentlicher Protestwelle <a href=" https://www.rockpapershotgun.com/2016/09/24/street-fighter-v-removes-new-anti-crack ">zurückgezogen wurde</a>. 137 | Dell computers, shipped with Windows, had a bogus root certificate that <a | href="http{+s+}://fossforce.com/2015/11/dell-comcast-intel-who-knows-who-else-are-out-to-get-you/"> | allowed anyone (not just Dell) to remotely authorize any software to | run</a> on the computer. Dell computers, shipped with Windows, had a bogus root certificate that <a href=" https://fossforce.com/2015/11/dell-comcast-intel-who-knows-who-else-are-out-to-get-you/ "> allowed anyone (not just Dell) to remotely authorize any software to run</a> on the computer. Mit Windows ausgelieferte Dell-Rechner hatten ein falsches Root-Zertifikat, das <a href=" //fossforce.com/2015/11/dell-comcast-intel-who-knows-who-else-are-out-to-get-you/ " title="Christine Hall, Dell, Comcast, Intel &amp; Who Knows Who Else Are Out to Get You, FOSS Force 2015.">jedermann (nicht nur Dell) autorisierte per Fernzugriff jegliche Software auf dem Rechner auszuführen</a>. 138 ARRIS cable modem has a <a href=" https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1 "> back door in the back door</a>. Kabelmodems von Arris haben <a href=" //w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1 " title="Bernardo Rodrigues, ARRIS Cable Modem has a Backdoor in the Backdoor, w00tsec 2015.">Hintertür in der Hintertür</a>. 139 | &ldquo;Self-encrypting&rdquo; disk drives do the encryption with | proprietary firmware so you can't trust it. Western Digital's [-<a | href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">-] | &ldquo;My Passport&rdquo; drives {+<a | href="https://www.vice.com/en/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">+} | have a back door</a>. &ldquo;Self-encrypting&rdquo; disk drives do the encryption with proprietary firmware so you can't trust it. Western Digital's &ldquo;My Passport&rdquo; drives <a href=" https://www.vice.com/en/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption "> have a back door</a>. „Selbstverschlüsselnde“ Plattenlaufwerke führen die Verschlüsselung mittels proprietärer Firmware durch, der man daher nicht uneingeschränkt vertrauen kann. Western Digitals „My Passport“-Festplatten <a href=" https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption " title="Some Popular 'Self Encrypting' Hard Drives Have Really Bad Encryption, unter: motherboard.vice.com 2015.">haben eine Hintertür</a>. 141 | Here is a big problem whose details are still secret: <a | [-href="http://mashable.com/2013/09/11/fbi-microsoft-bitlocker-backdoor/">-] | {+href="https://mashable.com/archive/fbi-microsoft-bitlocker-backdoor">+} | The FBI asks lots of companies to put back doors in proprietary | programs</a>. We don't know of specific cases where this was done, but | every proprietary program for encryption is a possibility. Here is a big problem whose details are still secret: <a href=" https://mashable.com/archive/fbi-microsoft-bitlocker-backdoor "> The FBI asks lots of companies to put back doors in proprietary programs</a>. We don't know of specific cases where this was done, but every proprietary program for encryption is a possibility. Hier liegt ein großes Problem vor, dessen Einzelheiten geheim gehalten werden:<a href=" //mashable.com/2013/09/11/fbi-microsoft-bitlocker-backdoor/ ">Das FBI fordert viele Unternehmen auf Hintertüren in proprietäre Programme hinzuzufügen</a><br />&#8209;&#160;uns sind zwar keine konkreten Fälle bekannt, aber jedes proprietäre Programm was der Verschlüsselung dient ist eine potentielle Möglichkeit. 142 [1] http://www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa [1-1] https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/Presse2013/Windows_TPM_Pl_21082013.html („Dementi“) | {+The+} German government <a | [-href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">veers-] | {+href="https://www.theregister.com/2013/08/23/nsa_germany_windows_8/">veers+} | away from Windows 8 computers with TPM [-2.0-] {+2.0</a> (<a | href="https://www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa">original | article in German</a>),+} due to potential back door capabilities of the | TPM 2.0 [-chip</a>.-] {+chip.+} The German government <a href=" https://www.theregister.com/2013/08/23/nsa_germany_windows_8/ ">veers away from Windows 8 computers with TPM 2.0</a> (<a href=" https://www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa ">original article in German</a>), due to potential back door capabilities of the TPM 2.0 chip. Deutsche Bundesbehörde sieht <a href=" https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/ " title="LEAKED: German Government Warns Key Entities Not To Use Windows 8 – Linked to NSA, unter: DrLeonardColdwell.com 2013 (Internet Archive)."><ins cite="https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/Presse2013/Windows_TPM_Pl_21082013.html">„… einige kritische Aspekte im Zusammenhang mit bestimmten Einsatzszenarien, in denen Windows 8 in Kombination mit einer Hardware betrieben wird, die über ein TPM 2.0 verfügt.“</ins></a><a href="#tn01" id="tn01-ref" class="tnote">[1]</a><a href="#tn01-1" id="tn01-1-ref" class="tnote">[1-1]</a> 143 | Here is a suspicion that we can't prove, but is worth thinking about: <a | href="http{+s+}://web.archive.org/web/20150206003913/http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI"> | Writable microcode for Intel and AMD microprocessors</a> may be a vehicle | for the NSA to invade computers, with the help of Microsoft, say respected | security experts. Here is a suspicion that we can't prove, but is worth thinking about: <a href=" https://web.archive.org/web/20150206003913/http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI "> Writable microcode for Intel and AMD microprocessors</a> may be a vehicle for the NSA to invade computers, with the help of Microsoft, say respected security experts. Ein unbewiesener Verdacht, aber Wert darübernachzudenken: <a href=" https://web.archive.org/web/20150206003913/www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI " title="Christopher Joye, Intel chips could let US spies inside: expert, The Australian Financial Review 2013.">Schreibbarer Mikrocode für Intel- und AMD-Mikroprozessoren</a> kann durchaus ein Instrument für den US-Geheimdienst NSA sein, um&#160;&#8209;&#160;mit der Hilfe von Microsoft&#160;&#8209;&#160;in Rechner einzudringen, sagen angesehene Sicherheitsexperten. 146 !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! ! GNU should report facts briefly and crisply! Also resulting ! ! consequences should not be swept away by an own opinion! ! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! TRANSLATORS: Use space (SPC) as msgstr if you don't have notes. *GNUN-SLOT: TRANSLATOR'S NOTES* <p><strong>Anmerkungen des Übersetzungsteams</strong>:</p> <ol id="transnote"> <li><p><strong>Weiterführende Referenzen</strong>:</p> <ol style="list-style-type:none"> <li id="tn01"><a href="#tn01-ref">[1]</a> Zeit Online, <cite><a href=" //www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa ">Bundesbehörden sehen Risiken beim Einsatz von Windows 8</a></cite>, unter: zeit.de 2013. (abgerufen 2013-11-20)<br /> <span id="tn01-1"><a href="#tn01-1-ref">[1-1]</a> BSI, <cite><a href=" https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/Presse2013/Windows_TPM_Pl_21082013.html ">Stellungnahme des BSI zur aktuellen Berichterstattung zu MS Windows 8 und TPM</a></cite>, unter: bsi.bund.de 2013. (abgerufen 2017-01-26)</span></li> <li id="tn02"><a href="#tn02-ref">[2]</a> Spiegel Online, <cite><a href=" //www.spiegel.de/netzwelt/mobil/apple-jobs-bestaetigt-iphone-hintertuer-a-571219.html ">Apple: Jobs bestätigt iPhone-Hintertür</a></cite>, unter: spiegel.de 2008. (abgerufen 2014-02-24)</li> <li id="tn03"><a href="#tn03-ref">[3]</a> Heise Security, <cite><a href=" //www.heise.de/security/meldung/D-Link-Router-mit-Hintertuer-1977835.html ">D-Link-Router mit Hintertür</a></cite>, unter: heise.de 2013. (abgerufen 2014-02-24)</li> <li id="tn04"><a href="#tn04-ref">[4]</a> Heise Online, <cite><a href=" //heise.de/-211807 ">Google kann Android-Anwendungen löschen</a></cite>, unter: heise.de 2008. (abgerufen 2014-07-04)</li> <li id="tn05"><a href="#tn05-ref">[5]</a> Heise Online, <cite><a href=" //heise.de/-1029709 ">Googles Einfluss auf Android-Handys</a></cite>, unter: heise.de 2010. (abgerufen 2014-07-04)</li> <li id="tn06"><a href="#tn06-ref">[6]</a> Heise Online, <cite><a href=" //heise.de/-1028907 ">Google löscht Android-App auf Smartphones aus der Ferne</a></cite>, unter: heise.de 2010. (abgerufen 2014-07-04)</li> </ol></li></ol> 148 || No change detected. The change might only be in amounts of spaces. Please see the <a href=" /server/standards/README.translations.html ">Translations README</a> for information on coordinating and contributing translations of this article. Bei der Übersetzung dieses Werkes wurde mit größter Sorgfalt vorgegangen. Trotzdem können Fehler nicht völlig ausgeschlossen werden. Sollten Sie Fehler bemerken oder Vorschläge, Kommentare oder Fragen zu diesem Dokument haben, wenden Sie sich bitte an unser Übersetzungsteam <a href=" mailto:web-translators@gnu.org?cc=www-de-translators@gnu.org ">&lt;web-translators@gnu.org&gt;</a>.</p> <p>Weitere Informationen über die Koordinierung und Einsendung von Übersetzungen unserer Internetpräsenz finden Sie in der <a href=" /server/standards/README.translations ">LIESMICH für Übersetzungen</a>. 150 This page is licensed under a <a rel="license" href=" http://creativecommons.org/licenses/by/4.0/ ">Creative Commons Attribution 4.0 International License</a>. Dieses Werk ist lizenziert unter einer <a rel="license" href=" //creativecommons.org/licenses/by/4.0/deed.de ">Creative Commons Namensnennung 4.0 International</a>-Lizenz. ...
http://www.gnu.org/savannah-checkouts/gnu/gnun/reports/de/proprietary/proprietary-back-doors.html - [detail] - [similar]
PREV NEXT
Powered by Hyper Estraier 1.4.13, with 213331 documents and 1081083 words.