advanced help
phrase:
attribute:
attribute:
attribute:
order:
per page:
clip:
action:
Results of 1 - 1 of about 725 for Android 12 (1.936 sec.)
android (2801), 12 (27799)
proprietary-back-doors.it.po
#score: 5143
@digest: 60e286b49de29f8c77b3065302699348
@id: 400373
@mdate: 2024-03-26T14:22:04Z
@size: 68524
@type: text/html
content-type: text/html; charset=utf-8
#keywords: backdoor (31400), arstechnica (21989), universale (19694), coolpad (19302), computerworld (18256), remotely (16310), fighter (15974), theregister (13643), xiaomi (12928), universal (12335), theguardian (11918), door (11062), https (10206), href (8854), ldquo (8287), iphone (7944), rdquo (7319), samsung (7310), phones (7178), android (6940), kindle (6558), technology (6298), router (6161), swindle (5884), windows (5674), google (5444), back (4830), chinese (4679), doors (4658), com (4380), microsoft (4329), apple (4181)
proprietary-back-doors.it.po Mismatched links: 129. Mismatched ids: 2. # text 12 Some malicious functionalities are mediated by <a href=" /proprietary/proprietary.html#f1 ">back doors</a>. Here are examples of programs that contain one or several of those, classified according to what the back door is known to have the power to do. Back doors that allow full control over the programs which contain them are said to be &ldquo;universal.&rdquo; 15 <a href=" #spy ">Spying</a> 16 <a href=" #alter-data ">Altering user's data or settings</a> 17 <a href=" #install-delete ">Installing, deleting or disabling programs</a> 18 <a href=" #universal ">Full control</a> 19 | <a [-id="TOCother">Other</a>-] {+href="#other">Other/undefined</a>+} <a href=" #other ">Other/undefined</a> <a id=" TOCother ">Altri</a> 21 Google Nest <a href=" https://blog.google/products/google-nest/partnership-adt-smarter-home-security/ "> is taking over ADT</a>. Google sent out a software update to its speaker devices using their back door <a href=" https://web.archive.org/web/20240123114737/https://www.protocol.com/google-smart-speaker-alarm-adt "> that listens for things like smoke alarms</a> and then notifies your phone that an alarm is happening. This means the devices now listen for more than just their wake words. Google says the software update was sent out prematurely and on accident and Google was planning on disclosing this new feature and offering it to customers who pay for it. 22 | Many models of Internet-connected cameras contain a glaring back{+ | +}door&mdash;they have login accounts with hard-coded passwords, which | can't be changed, and <a | [-href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">-] | {+href="https://arstechnica.com/information-technology/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">+} | there is no way to delete these accounts either</a>. Many models of Internet-connected cameras contain a glaring back door&mdash;they have login accounts with hard-coded passwords, which can't be changed, and <a href=" https://arstechnica.com/information-technology/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/ "> there is no way to delete these accounts either</a>. Molti modelli di telecamere collegate ad Internet hanno evidenti problemi di sicurezza: nome utente e password sono preimpostati e non possono essere cambiati o <a href=" https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/ "> cancellati</a>. 27 | Apple can, and regularly does, <a | [-href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">-] | {+href="https://arstechnica.com/gadgets/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">+} | remotely extract some data from iPhones for the state</a>. Apple can, and regularly does, <a href=" https://arstechnica.com/gadgets/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/ "> remotely extract some data from iPhones for the state</a>. Apple può, e lo fa davvero, <a href=" http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/ "> estrarre dati da remoto dagli iPhone per conto del governo</a>. 28 | This may have improved with <a | [-href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">-] | {+href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/">+} | iOS 8 security improvements</a>; but <a | [-href="https://firstlook.org/theintercept/2014/09/22/apple-data/">-] | {+href="https://theintercept.com/2014/09/22/apple-data/">+} not as much | as Apple claims</a>. This may have improved with <a href=" https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/ "> iOS 8 security improvements</a>; but <a href=" https://theintercept.com/2014/09/22/apple-data/ "> not as much as Apple claims</a>. Con gli ultimi <a href=" http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html "> miglioramenti di sicurezza di iOS 8</a> questo problema dovrebbe essere stato mitigato; ma <a href=" https://firstlook.org/theintercept/2014/09/22/apple-data/ "> meno di quanto dichiarato da Apple</a>. 30 BMW is now luring British customers into <a href=" https://edition.cnn.com/2022/07/14/business/bmw-subscription/index.html "> paying for the built-in heated-seat feature of their new cars on a subscription basis</a>. People also have the option to buy the feature when they are paying for the car, but those who bought a used car have to pay BMW extra money to remotely enable the heated seats. This is probably done by BMW accessing a back door in the car software. 31 Some Xiaomi phones <a href=" https://www.theguardian.com/world/2021/sep/22/lithuania-tells-citizens-to-throw-out-chinese-phones-over-censorship-concerns ">have a malfeature to bleep out phrases that express political views the Chinese government does not like</a>. In phones sold in Europe, Xiaomi leaves this deactivated by default, but has a back door to activate the censorship. 33 BlizzCon 2019 imposed a <a href=" https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/ "> requirement to run a proprietary phone app</a> to be allowed into the event. 34 This app is a spyware that can snoop on a lot of sensitive data, including user's location and contact list, and has <a href=" https://web.archive.org/web/20220321042716/https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/ "> near-complete control</a> over the phone. 35 Android has a <a href=" https://www.theverge.com/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change "> back door for remotely changing &ldquo;user&rdquo; settings</a>. 37 | The Dropbox app for Macintosh <a | [-href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/">takes | total-] | {+href="https://web.archive.org/web/20180124123506/http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/"> | takes+} control of [-the machine by repeatedly nagging-] {+user interface | items after luring+} the user [-for-] {+into entering+} an admin[-i-] | password</a>. The Dropbox app for Macintosh <a href=" https://web.archive.org/web/20180124123506/http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/ "> takes control of user interface items after luring the user into entering an admin password</a>. L'applicazione Dropbox per Macintosh <a href=" http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/ ">prende controllo totale della macchina chiedendo ripetutamente all'utente la password di amministratore</a>. 38 | A pregnancy test controller application not only can <a | [-href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy-] | {+href="https://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"> | spy+} on many sorts of data in the phone, and in server accounts, it can | alter them too</a>. A pregnancy test controller application not only can <a href=" https://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security "> spy on many sorts of data in the phone, and in server accounts, it can alter them too</a>. Un'applicazione per il test di gravidanza non solo può spiare vari dati nel telefono, ma <a href=" http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security ">li può anche modificare</a>. 39 | <a | [-href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html">-] | {+href="https://www.computerworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html">+} | Some D-Link routers</a> have a back door for changing settings in a dlink | of an eye. <a href=" https://www.computerworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html "> Some D-Link routers</a> have a back door for changing settings in a dlink of an eye. <a href=" http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html "> Alcuni router D-Link</a> hanno una backdoor per cambiare le impostazioni immediatamente. 40 | <a href="http{+s+}://sekurak.pl/tp-link-httptftp-backdoor/"> The TP-Link | router has a back{+ +}door</a>. <a href=" https://sekurak.pl/tp-link-httptftp-backdoor/ "> The TP-Link router has a back door</a>. <a href=" http://sekurak.pl/tp-link-httptftp-backdoor/ ">Il router TP-Link ha una backdoor</a>. 41 | <a [-href="https://github.com/elvanderb/TCP-32764">Many-] | {+href="https://gothub.frontendfriendly.xyz/elvanderb/TCP-32764/blob/master/README.md">Many+} | models of router{+s+} have back doors</a>. <a href=" https://gothub.frontendfriendly.xyz/elvanderb/TCP-32764/blob/master/README.md ">Many models of routers have back doors</a>. <a href=" https://github.com/elvanderb/TCP-32764 ">Molti modelli di router hanno backdoor</a>. 42 | Google has long had <a | href="http{+s+}://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted">a | back door to remotely unlock an Android device</a>, unless its disk is | encrypted (possible since Android 5.0 Lollipop, but still not quite the | default). Google has long had <a href=" https://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted ">a back door to remotely unlock an Android device</a>, unless its disk is encrypted (possible since Android 5.0 Lollipop, but still not quite the default). Google da tempo ha una <a href=" http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted ">back door per sbloccare da remoto un dispositivo Android</a>, a meno che il suo disco non sia criptato (opzione possibile da Android 5.0 Lollipop). 43 | Caterpillar vehicles come with <a | [-href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">a | back-door-] | {+href="https://web.archive.org/web/20201108113943/https://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it"> | a back door+} to shutoff the engine</a> remotely. Caterpillar vehicles come with <a href=" https://web.archive.org/web/20201108113943/https://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it "> a back door to shutoff the engine</a> remotely. I veicoli caterpillar hanno una <a href=" http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it ">back-door che spegne il motore</a> da remoto. 44 | Modern gratis game cr&hellip;apps <a | href="http{+s+}://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"> | collect a wide range of data about their users and their users' friends | and associates</a>. Modern gratis game cr&hellip;apps <a href=" https://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/ "> collect a wide range of data about their users and their users' friends and associates</a>. Le applicazioni moderne per giocare <a href=" http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/ "> raccolgono molti dati sui loro utenti e sugli amici dei loro utenti</a>. 48 | <a [-id="samsung"-] | href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor"> | Samsung Galaxy devices running proprietary Android versions come with a | back door</a> that provides remote access to the files stored on the | device. <a href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor"> Samsung Galaxy devices running proprietary Android versions come with a back door</a> that provides remote access to the files stored on the device. <a id=" samsung " href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">Dispositivi Samsung Galaxy che eseguono versioni proprietarie di Android hanno annessa una backdoor</a> che fornisce accesso remoto ai file contenuti nel dispositivo. 49 | The Amazon Kindle-Swindle has a back door that has been used to <a | [-href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">-] | {+href="https://web.archive.org/web/20220319193415/https://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">+} | remotely erase books</a>. One of the books erased was [-1984,-] | {+<cite>1984</cite>,+} by George Orwell. The Amazon Kindle-Swindle has a back door that has been used to <a href=" https://web.archive.org/web/20220319193415/https://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/ "> remotely erase books</a>. One of the books erased was <cite>1984</cite>, by George Orwell. Il Kindle-Swindle di Amazon ha una backdoor che è stata usata per <a href=" http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/ ">cancellare libri a distanza</a>. Uno dei libri cancellati è stato 1984, di George Orwell. 50 | Amazon responded to criticism by saying it would delete books only | following orders from the state. However, that policy didn't last. In | 2012 it <a | [-href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html">wiped-] | {+href="https://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html"> | wiped+} a user's Kindle-Swindle and deleted her account</a>, then offered | her kafkaesque &ldquo;explanations.&rdquo; Amazon responded to criticism by saying it would delete books only following orders from the state. However, that policy didn't last. In 2012 it <a href=" https://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html "> wiped a user's Kindle-Swindle and deleted her account</a>, then offered her kafkaesque &ldquo;explanations.&rdquo; Amazon ha risposto alle critiche dicendo che cancella libri solo in presenza di ordini statali, ma questa posizione non è durata a lungo. Nel 2012 ha <a href=" http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html ">ripulito il dispositivo Kindle-Swindle di un utente</a> e ha cancellato il suo account, dando solo spiegazioni kafkiane. 52 | The iPhone has a back door for <a | href="http{+s+}://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"> | remote wipe</a>. It's not always enabled, but users are led into enabling | it without understanding. The iPhone has a back door for <a href=" https://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone "> remote wipe</a>. It's not always enabled, but users are led into enabling it without understanding. L'iPhone ha una backdoor per <a href=" http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone ">la formattazione a distanza</a>. Non è sempre abilitata, ma gli utenti vengono spinti ad abilitarla a loro insaputa. 54 <a href=" /proprietary/uhd-bluray-denies-your-freedom.html ">UHD Blu-ray disks are loaded with malware of the worst kinds</a>, including the AACS DRM. Playing them on a PC requires the Intel Management Engine, which has back doors and cannot be disabled. Every Blu-ray drive also has a back door in its firmware, which allows the AACS-enforcing organization to &ldquo;revoke&rdquo; the ability to play any AACS-restricted disk. 55 | Microsoft is <a | [-href="http://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1"> | repeatedly nagging many-] | {+href="https://www.theguardian.com/technology/2023/feb/14/microsoft-to-phase-out-internet-explorer-with-new-edge-browser"> | remotely disabling Internet Explorer, forcibly redirecting+} users to | [-install Windows 10</a>.-] {+Microsoft Edge</a>.+} Microsoft is <a href=" https://www.theguardian.com/technology/2023/feb/14/microsoft-to-phase-out-internet-explorer-with-new-edge-browser "> remotely disabling Internet Explorer, forcibly redirecting users to Microsoft Edge</a>. Microsoft sta ripetutamente <a href=" http://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1 "> sollecitando molti utenti ad installare Windows 10</a>. 57 Microsoft <a href=" https://betanews.com/2023/01/19/microsoft-is-using-the-kb5021751-update-to-see-if-you-have-an-unsupported-version-of-office-installed/ "> released an &ldquo;update&rdquo; that installs a surveillance program</a> on users' computers to gather data on some installed programs for Microsoft's benefit. The update is rolling out automatically, and the program runs &ldquo;one time silently.&rdquo; 58 Xiaomi provides a tool to <a href=" https://www.guidetoroot.com/unlock-bootloader-on-any-xiaomi-phones/ "> unlock the bootloader of Xiaomi smartphones and tablets</a>, but this requires creating an account on the company's servers, i.e. providing your phone number. This is the price you have to pay for &ldquo;legally&rdquo; running a free software operating system on Xiaomi devices. But the manufacturer retains control of the unlocked device through a backdoor in the bootloader&mdash;the same backdoor that was remotely used to unlock it. 59 Tesla <a href=" https://www.cnn.com/2022/08/22/business/tesla-fsd-price-increase/index.html "> sells an add-on software feature that drivers are not allowed to use</a>. 61 Adobe <a href=" https://web.archive.org/web/20211014123717/https://pluralistic.net/2021/10/13/theres-an-app-for-that/#gnash ">has licensed its Flash Player to China's Zhong Cheng Network</a> who is offering the program bundled with spyware and a back door that can remotely deactivate it. 62 Adobe is responsible for this since they gave Zhong Cheng Network permission to do this. This injustice involves &ldquo;misuse&rdquo; of the DMCA, but &ldquo;proper,&rdquo; intended use of the DMCA is a much bigger injustice. There is <a href=" /philosophy/right-to-read.html ">a series of errors related to DMCA</a>. 63 Recent Samsung TVs have a back door with which Samsung can <a href=" https://www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide "> brick them remotely</a>. 64 <a href=" https://arstechnica.com/gadgets/2021/06/even-creepier-covid-tracking-google-silently-pushed-app-to-users-phones/ ">Google automatically installed an app on many proprietary Android phones</a>. The app might or might not do malicious things but the power Google has over proprietary Android phones is dangerous. 65 Adobe Flash Player <a href=" https://www.adobe.com/products/flashplayer/end-of-life.html "> has a universal back door</a> which lets Adobe control the software and, for example, disable it whenever it wants. Adobe will block Flash content from running in Flash Player beginning January 12, 2021, which indicates that they have access to every Flash Player through a back door. 67 BMW is trying to <a href=" https://www.theverge.com/2020/7/2/21311332/bmw-in-car-purchase-heated-seats-software-over-the-air-updates ">lock certain features of its cars, and force people to pay to use part of the car they already bought</a>. This is done through forced update of the car software via a radio-operated back door. 68 A very popular app found in the Google Play store contained a module that was designed to <a href=" https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/ ">secretly install malware on the user's computer</a>. The app developers regularly used it to make the computer download and execute any code they wanted. 70 Apple appears to say that <a href=" https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/ "> there is a back door in MacOS</a> for automatically updating some (all?) apps. 72 Corel Paintshop Pro has a <a href=" https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/ "> back door that can make it cease to function</a>. 76 &ldquo;<a href=" /philosophy/words-to-avoid.html#Piracy ">Piracy</a>&rdquo; means attacking ships. Using that word to refer to sharing copies is a smear; please don't smear sharing. 77 The idea of &ldquo;protecting our IP&rdquo; is total confusion. The term &ldquo;IP&rdquo; itself is a <a href=" /philosophy/not-ipr.html ">bogus generalization about things that have nothing in common</a>. 79 Some &ldquo;Smart&rdquo; TVs automatically <a href=" https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928 "> load downgrades that install a surveillance app</a>. 80 We link to the article for the facts it presents. It is too bad that the article finishes by advocating the moral weakness of surrendering to Netflix. The Netflix app <a href=" /proprietary/malware-google.html#netflix-app-geolocation-drm ">is malware too</a>. 83 | {+In addition to its+} <a | [-href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html">-] | {+href="#windows-update">universal back door</a>,+} Windows 8 [-also-] | has a back door for {+<a | href="https://www.computerworld.com/article/2732767/microsoft--we-can-remotely-delete-windows-8-apps.html">+} | remotely deleting apps</a>. In addition to its <a href=" #windows-update ">universal back door</a>, Windows 8 has a back door for <a href=" https://www.computerworld.com/article/2732767/microsoft--we-can-remotely-delete-windows-8-apps.html "> remotely deleting apps</a>. <a href=" http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html ">Windows 8 ha anche una backdoor per disinstallare programmi a distanza</a>. 85 | In Android, <a | [-href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">-] | {+href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html">+} | Google has a back door to remotely delete [-apps.</a>-] {+apps</a>.+} (It | [-is-] {+was+} in a program called [-GTalkService).-] {+GTalkService, | which seems since then to have been merged into Google Play.)+} In Android, <a href=" https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html "> Google has a back door to remotely delete apps</a>. (It was in a program called GTalkService, which seems since then to have been merged into Google Play.) In Android, <a href=" http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html ">Google ha una backdoor per disinstallare applicazioni a distanza</a>. (Si trova all'interno di un programma chiamato GTalkService). 88 | The iPhone has a back door <a | href="http{+s+}://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"> | that allows Apple to remotely delete apps</a> which Apple considers | &ldquo;inappropriate&rdquo;. Jobs said it's [-ok-] {+OK+} for Apple to | have this power because of course we can trust Apple. The iPhone has a back door <a href=" https://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html "> that allows Apple to remotely delete apps</a> which Apple considers &ldquo;inappropriate&rdquo;. Jobs said it's OK for Apple to have this power because of course we can trust Apple. L'iPhone ha una backdoor <a href=" http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html ">che permette ad Apple di disinstallare a distanza applicazioni</a> che reputa &ldquo;inappropriate&rdquo;. Jobs ha detto che è giusto che Apple abbia questo potere perché di Apple ci si può fidare, eccome. 90 HP delivers printers with a universal back door, and recently used it to <a href=" https://www.theguardian.com/money/2023/may/10/how-can-hp-block-me-from-using-a-cheaper-printer-cartridge "> sabotage them by remotely installing malware</a>. The malware makes the printer refuse to function with non-HP ink cartrides, and even with old HP cartridges which HP now declares to have &ldquo;expired.&rdquo; HP calls the back door &ldquo;dynamic security,&rdquo; and has the gall to claim that this &ldquo;security&rdquo; protects users from malware. 93 NordicTrack, a company that sells exercise machines with ability to show videos <a href=" https://arstechnica.com/information-technology/2021/11/locked-out-of-god-mode-runners-are-hacking-their-treadmills/ ">limits what people can watch, and recently disabled a feature</a> that was originally functional. This happened through automatic update and probably involved a universal back door. 94 Peloton company which produces treadmills recently <a href=" https://www.bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-monthly-subscription-after-recall/ ">locked people out of basic features of people's treadmills by a software update</a>. The company now asks people for a membership/subscription for what people already paid for. 98 Microsoft is <a href=" https://uk.pcmag.com/operating-systems/131798/microsoft-starts-automatically-removing-flash-from-windows ">forcibly removing the Flash player from computers running Windows 10</a>, using <a href=" /proprietary/proprietary-back-doors.html#windows-update ">a universal backdoor in Windows</a>. 99 The fact that Flash has been <a href=" /proprietary/proprietary-back-doors.html#M202012020 ">disabled by Adobe</a> is no excuse for this abuse of power. The nature of proprietary software, such as Microsoft Windows, gives the developers power to impose their decisions on users. Free software on the other hand empowers users to make their own decisions. 100 Some Wavelink and JetStream wifi routers have universal back doors that enable unauthenticated users to remotely control not only the routers, but also any devices connected to the network. There is evidence that <a href=" https://cybernews.com/security/walmart-exclusive-routers-others-made-in-china-contain-backdoors-to-control-devices/ "> this vulnerability is actively exploited</a>. 101 If you consider buying a router, we encourage you to get one that <a href=" https://ryf.fsf.org/categories/routers ">runs on free software</a>. Any attempts at introducing malicious functionalities in it (e.g., through a firmware update) will be detected by the community, and soon corrected. 102 If unfortunately you own a router that runs on proprietary software, don't panic! You may be able to replace its firmware with a free operating system such as <a href=" https://librecmc.org ">libreCMC</a>. If you don't know how, you can get help from a nearby GNU/Linux user group. 103 A new app published by Google <a href=" https://www.xda-developers.com/google-device-lock-controller-banks-payments/ ">lets banks and creditors deactivate people's Android devices</a> if they fail to make payments. If someone's device gets deactivated, it will be limited to basic functionality, such as emergency calling and access to settings. 104 BMW will remotely <a href=" https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/ "> enable and disable functionality in cars</a> through a universal back door. 105 The <a href=" https://play.google.com/about/play-terms/ "> Google Play Terms of Service</a> insist that the user of Android accept the presence of universal back doors in apps released by Google. 107 Android phones subsidized by the US government come with <a href=" https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/ "> preinstalled adware and a back door for forcing installation of apps</a>. 108 The adware is in a modified version of an essential system configuration app. The back door is a surreptitious addition to a program whose stated purpose is to be a <a href=" https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/ "> universal back door for firmware</a>. 110 The Chinese Communist Party's <a href=" /proprietary/proprietary-surveillance.html#M201910130 "> &ldquo;Study the Great Nation&rdquo; app</a> was found to contain <a href=" https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962 "> a back-door allowing developers to run any code they wish</a> in the users' phone, as &ldquo;superusers.&rdquo; 111 Note: The <a href=" http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html "> Washington Post version of the article</a> (partly obfuscated, but readable after copy-pasting in a text editor) includes a clarification saying that the tests were only performed on the Android version of the app, and that, according to Apple, &ldquo;this kind of &lsquo;superuser&rsquo; surveillance could not be conducted on Apple's operating system.&rdquo; 112 ChromeBooks are programmed for obsolescence: ChromeOS has a universal back door that is used for updates and <a href=" https://www.theregister.com/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/ "> ceases to operate at a predefined date</a>. From then on, there appears to be no support whatsoever for the computer. 114 The FordPass Connect feature of some Ford vehicles has <a href=" https://web.archive.org/web/20200530023040/https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html "> near-complete access to the internal car network</a>. It is constantly connected to the cellular phone network and sends Ford a lot of data, including car location. This feature operates even when the ignition key is removed, and users report that they can't disable it. 116 New GM cars <a href=" https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html "> offer the feature of a universal back door</a>. 118 The Furby Connect has a <a href=" https://web.archive.org/web/20220604212722/https://www.contextis.com/en/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect "> universal back door</a>. If the product as shipped doesn't act as a listening device, remote changes to the code could surely convert it into one. 119 Sony has brought back its robotic pet Aibo, this time <a href=" https://www.vice.com/en/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet "> with a universal back door, and tethered to a server that requires a subscription</a>. 120 Tesla used software to limit the part of the battery that was available to customers in some cars, and <a href=" https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/ "> a universal back door in the software</a> to temporarily increase this limit. 122 | Vizio &ldquo;smart&rdquo; TVs <a | [-href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">have-] | {+href="https://www.ftc.gov/business-guidance/blog/2017/02/what-vizio-was-doing-behind-tv-screen"> | have+} a universal back door</a>. Vizio &ldquo;smart&rdquo; TVs <a href=" https://www.ftc.gov/business-guidance/blog/2017/02/what-vizio-was-doing-behind-tv-screen "> have a universal back door</a>. Le TV di Vizio &ldquo;smart&rdquo; TVs <a href=" https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen ">hanno una backdoor universale</a>. 123 | Xiaomi phones come with <a | [-href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered">a-] | {+href="https://web.archive.org/web/20190424082647/http://blog.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered/"> | a+} universal back door in the application processor, for Xiaomi's use</a>. Xiaomi phones come with <a href=" https://web.archive.org/web/20190424082647/http://blog.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered/ "> a universal back door in the application processor, for Xiaomi's use</a>. I telefoni di Xiaomi hanno <a href=" https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered ">una backdoor universale nel processore delle applicazioni</a>, per utilizzo da parte di Xiaomi. 125 | Microsoft Windows has a universal back door through which <a | [-href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183">-] | {+href="https://www.informationweek.com/government/microsoft-updates-windows-without-user-permission-apologizes">+} | any change whatsoever can be imposed on the users</a>. Microsoft Windows has a universal back door through which <a href=" https://www.informationweek.com/government/microsoft-updates-windows-without-user-permission-apologizes "> any change whatsoever can be imposed on the users</a>. Microsoft Windows ha una backdoor universale tramite la quale <a href=" http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183 ">si può imporre agli utenti un qualsiasi cambiamento</a>. 126 This was <a href=" https://web.archive.org/web/20200219180230/http://slated.org/windows_by_stealth_the_updates_you_dont_want "> reported in 2007</a> for XP and Vista, and it seems that Microsoft used the same method to push the <a href=" /proprietary/malware-microsoft.html#windows10-forcing "> Windows 10 downgrade</a> to computers running Windows 7 and 8. 127 | In Windows 10, the universal back door is no longer hidden; all | &ldquo;upgrades&rdquo; will be <a | [-href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">forcibly-] | {+href="https://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/"> | forcibly+} and immediately imposed</a>. In Windows 10, the universal back door is no longer hidden; all &ldquo;upgrades&rdquo; will be <a href=" https://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/ "> forcibly and immediately imposed</a>. In Windows 10 la backdoor universale non è più nascosta: tutti gli &ldquo;aggironamenti&ldquo; saranno <a href=" http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users ">forzati e immediati</a>. 130 | <a | href="http{+s+}://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"> | A Chinese version of Android has a universal back door</a>. Nearly all | models of mobile phones have a {+<a | href="#universal-back-door-phone-modem">+} universal back door in the | modem [-chip.-] {+chip</a>.+} So why did Coolpad bother to introduce | another? Because this one is controlled by Coolpad. <a href=" https://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor "> A Chinese version of Android has a universal back door</a>. Nearly all models of mobile phones have a <a href=" #universal-back-door-phone-modem "> universal back door in the modem chip</a>. So why did Coolpad bother to introduce another? Because this one is controlled by Coolpad. <a href=" http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor ">Una versione cinese di Android ha una backdoor universale</a>. Quasi tutti i modelli di cellulari hanno una backdoor universale nel chip del modem. Perché quindi Coolpad ha deciso di introdurne un'altra? Perché questa è controllata da Coolpad. 132 | [-The-]{+In addition to its <a href="#swindle-eraser">book eraser</a>, | the+} Kindle-Swindle [-also-] has a <a | [-href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090">-] | {+href="https://web.archive.org/web/20120715070050/http://www.amazon.com/gp/help/customer/display.html/?nodeId=200774090">+} | universal back door</a>. In addition to its <a href=" #swindle-eraser ">book eraser</a>, the Kindle-Swindle has a <a href=" https://web.archive.org/web/20120715070050/http://www.amazon.com/gp/help/customer/display.html/?nodeId=200774090 "> universal back door</a>. Il Kindle-Swindle ha anche una <a href=" http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090 ">backdoor universale</a>. 133 | [-The-]{+Almost every phone's communication processor has a+} universal | back door [-in portable phones-] {+which is+} <a | href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"> | [-is employed-] {+often used+} to [-listen through their | microphones</a>.-] {+make a phone transmit all conversations it hears</a>. | See <a | href="/proprietary/malware-mobiles.html#universal-back-door-phone-modem">Malware | in Mobile Devices</a> for more info.+} Almost every phone's communication processor has a universal back door which is <a href=" https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html "> often used to make a phone transmit all conversations it hears</a>. See <a href=" /proprietary/malware-mobiles.html#universal-back-door-phone-modem ">Malware in Mobile Devices</a> for more info. La backdoor universale nei telefoni cellulari è effettivamente <a href=" https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html/ ">usata per ascoltare attraverso i loro microfoni</a>. 135 Intel's intentional &ldquo;management engine&rdquo; back door has <a href=" https://www.theregister.com/2017/11/20/intel_flags_firmware_flaws/ "> unintended back doors</a> too. 136 | {+A+} Capcom's Street Fighter V update <a | [-href="https://web.archive.org/web/20160930051146/http://www.theregister.co.uk/2016/09/23/capcom_street_fighter_v/">installed-] | {+href="https://www.theregister.com/2016/09/23/capcom_street_fighter_v/"> | installed+} a driver that [-can-] {+could+} be used as a back{+ +}door by | any application installed on a Windows [-computer</a>.-] {+computer</a>, | but was <a | href="https://www.rockpapershotgun.com/street-fighter-v-removes-new-anti-crack"> | immediately rolled back</a> in response to public outcry.+} A Capcom's Street Fighter V update <a href=" https://www.theregister.com/2016/09/23/capcom_street_fighter_v/ "> installed a driver that could be used as a back door by any application installed on a Windows computer</a>, but was <a href=" https://www.rockpapershotgun.com/street-fighter-v-removes-new-anti-crack "> immediately rolled back</a> in response to public outcry. L'aggiornamento di Capcom per Street Fighter V <a href=" https://web.archive.org/web/20160930051146/http://www.theregister.co.uk/2016/09/23/capcom_street_fighter_v/ ">installava un driver che può essere usato come backdoor</a> da qualsiasi applicazione installata su un computer Windows. 137 | Dell computers, shipped with Windows, had a bogus root certificate that <a | [-href="http://fossforce.com/2015/11/dell-comcast-intel-who-knows-who-else-are-out-to-get-you/">allowed-] | {+href="https://fossforce.com/2015/11/dell-comcast-intel-who-knows-who-else-are-out-to-get-you/"> | allowed+} anyone (not just Dell) to remotely authorize any software to | run</a> on the computer. Dell computers, shipped with Windows, had a bogus root certificate that <a href=" https://fossforce.com/2015/11/dell-comcast-intel-who-knows-who-else-are-out-to-get-you/ "> allowed anyone (not just Dell) to remotely authorize any software to run</a> on the computer. Alcuni computer Dell che venivano venduti con Windows avevano un certificato di sicurezza contraffatto che permetteva a tutti (non solo a Dell) di <a href=" http://fossforce.com/2015/11/dell-comcast-intel-who-knows-who-else-are-out-to-get-you/ ">autorizzare da remoto l'esecuzione di qualsiasi programma</a> sul computer. 139 | &ldquo;Self-encrypting&rdquo; disk drives do the encryption with | proprietary firmware so you can't trust it. Western Digital's &ldquo;My | Passport&rdquo; drives <a | [-href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">have-] | {+href="https://www.vice.com/en/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"> | have+} a back door</a>. &ldquo;Self-encrypting&rdquo; disk drives do the encryption with proprietary firmware so you can't trust it. Western Digital's &ldquo;My Passport&rdquo; drives <a href=" https://www.vice.com/en/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption "> have a back door</a>. Le funzioni di &ldquo;cifratura nativa&rdquo; dei dischi usano firmware proprietario per cifrare, e sono pertanto inaffidabili. I dischi &ldquo;My Passport&rdquo; di Western Digital <a href=" https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption ">hanno una back door</a>. 141 | {+Here is a big problem whose details are still secret:+} <a | [-href="http://mashable.com/2013/09/11/fbi-microsoft-bitlocker-backdoor/">-] | {+href="https://mashable.com/archive/fbi-microsoft-bitlocker-backdoor">+} | The FBI asks lots of companies to put back doors in proprietary | [-programs. </a>-] {+programs</a>.+} We don't know of specific cases | where this was done, but every proprietary program for encryption is a | possibility. Here is a big problem whose details are still secret: <a href=" https://mashable.com/archive/fbi-microsoft-bitlocker-backdoor "> The FBI asks lots of companies to put back doors in proprietary programs</a>. We don't know of specific cases where this was done, but every proprietary program for encryption is a possibility. <a href=" http://mashable.com/2013/09/11/fbi-microsoft-bitlocker-backdoor/ ">L'FBI chiede a molte società di inserire backdoor in programmi proprietari</a>. Non sappiamo in quali specifici casi sia successo, ma riteniamo a rischio ogni programma proprietario di crittografia. 142 | {+The+} German government <a | [-href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">veers-] | {+href="https://www.theregister.com/2013/08/23/nsa_germany_windows_8/">veers+} | away from Windows 8 computers with TPM [-2.0-] {+2.0</a> (<a | href="https://www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa">original | article in German</a>),+} due to potential back door capabilities of the | TPM 2.0 [-chip</a>.-] {+chip.+} The German government <a href=" https://www.theregister.com/2013/08/23/nsa_germany_windows_8/ ">veers away from Windows 8 computers with TPM 2.0</a> (<a href=" https://www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa ">original article in German</a>), due to potential back door capabilities of the TPM 2.0 chip. Il governo tedesco <a href=" https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/ ">si allontana dai computer Windows 8 con TPM 2.0</a> a causa di potenziali backdoor nel chip TPM 2.0. 143 | {+Here is a suspicion that we can't prove, but is worth thinking about:+} | <a | href="http{+s+}://web.archive.org/web/20150206003913/http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI"> | Writable microcode for Intel and AMD microprocessors</a> may be a vehicle | for the NSA to invade computers, with the help of Microsoft, say respected | security experts. Here is a suspicion that we can't prove, but is worth thinking about: <a href=" https://web.archive.org/web/20150206003913/http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI "> Writable microcode for Intel and AMD microprocessors</a> may be a vehicle for the NSA to invade computers, with the help of Microsoft, say respected security experts. A detta di rispettati esperti di sicurezza informatica, <a href=" http://web.archive.org/web/20150206003913/http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI ">il microcodice scrivibile per processori Intel ed AMD</a> può essere un veicolo attraverso cui l'NSA può invadere i computer, con l'aiuto di Microsoft. 148 || No change detected. The change might only be in amounts of spaces. Please see the <a href="/server/standards/README.translations.html">Translations README</a> for information on coordinating and contributing translations of this article. Le traduzioni italiane sono effettuate ponendo la massima attenzione ai dettagli e alla qualità, ma a volte potrebbero contenere imperfezioni. Se ne riscontrate, inviate i vostri commenti e suggerimenti riguardo le traduzioni a <a href=" mailto:web-translators@gnu.org ">&lt;web-translators@gnu.org&gt;</a> oppure contattate direttamente il <a href=" http://savannah.gnu.org/projects/www-it/ ">gruppo dei traduttori italiani</a>.<br/>Per informazioni su come gestire e inviare traduzioni delle nostre pagine web consultate la <a href="/server/standards/README.translations.html">Guida alle traduzioni</a>. 150 | This page is licensed under a <a rel="license" | [-href="http://creativecommons.org/licenses/by-nd/4.0/">Creative-] | {+href="http://creativecommons.org/licenses/by/4.0/">Creative+} Commons | [-Attribution-NoDerivatives-] {+Attribution+} 4.0 International | License</a>. This page is licensed under a <a rel="license" href=" http://creativecommons.org/licenses/by/4.0/ ">Creative Commons Attribution 4.0 International License</a>. Questa pagina è distribuita secondo i termini della licenza <a rel="license" href=" http://creativecommons.org/licenses/by-nd/4.0/ ">Creative Commons Attribuzione - Non opere derivate 4.0 internazionale</a> (CC BY-ND 4.0). ...
http://www.gnu.org/savannah-checkouts/gnu/gnun/reports/it/proprietary/proprietary-back-doors.html - [detail] - [similar]
PREV NEXT
Powered by Hyper Estraier 1.4.13, with 213332 documents and 1081104 words.