[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/philosophy/proprietary proprietary-surveill...
From: |
Dora Scilipoti |
Subject: |
www/philosophy/proprietary proprietary-surveill... |
Date: |
Wed, 25 Jun 2014 06:24:35 +0000 |
CVSROOT: /web/www
Module name: www
Changes by: Dora Scilipoti <dora> 14/06/25 06:24:35
Modified files:
philosophy/proprietary: proprietary-surveillance.html
Log message:
Remove spurious word 'were'. Wrap lines. Make some list items <p> for
better, easier to read layout. Updated copyright year.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary/proprietary-surveillance.html?cvsroot=www&r1=1.5&r2=1.6
Patches:
Index: proprietary-surveillance.html
===================================================================
RCS file: /web/www/www/philosophy/proprietary/proprietary-surveillance.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary-surveillance.html 24 Jun 2014 11:56:04 -0000 1.5
+++ proprietary-surveillance.html 25 Jun 2014 06:24:34 -0000 1.6
@@ -15,61 +15,77 @@
<li>Spyware in Windows: <a
href="http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/">
Windows Update snoops on the user.</a>
-<a
href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175">Windows
8.1 snoops on local searches.</a>.
-And there's a <a href="http://www.marketoracle.co.uk/Article40836.html">secret
NSA key in Windows</a>, whose functions we don't know.
+<a
href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175">
+Windows 8.1 snoops on local searches.</a>. And there's a <a
+href="http://www.marketoracle.co.uk/Article40836.html">secret NSA key in
+Windows</a>, whose functions we don't know.
</li>
-<li>Spyware in iThings: the <a
-href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">iBeacon</a>
lets stores
-determine exactly where the iThing is, and get other info too.
+
+<li><p>Spyware in iThings: the <a
+href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+iBeacon</a> lets stores determine exactly where the iThing is, and
+get other info too.</p>
<!-- http://www.wassom.com/walking-in-snow-ibeacon-ble-and-privacy.html -->
+
+<p>
+There is also a feature for web sites to track users, which is <a
+href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+enabled by default</a>. (That article talks about iOS 6, but it is
+still true in iOS 7.)</p>
+
<p>
-There is also a feature for web sites to track users, which is
-<a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
-enabled by default</a>. (That article talks about iOS 6, but it is still
-true in iOS 7.)</p>
-<p>
-The iThing
-also <a
href="http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">tells
-Apple its geolocation</a> by default, though that can be turned off.
+The iThing also <a
+href="http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+tells Apple its geolocation</a> by default, though that can be turned off.
</p>
+
<p>
-Apple can, and regularly
-does, <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">remotely
-extract some data from iPhones for the state</a>.
+Apple can, and regularly does, <a
+href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+remotely extract some data from iPhones for the state</a>.
</p>
+
<p>
<a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
-Either Apple helps the NSA snoop on all the data in an iThing, or it
-is totally incompetent.</a>
+Either Apple helps the NSA snoop on all the data in an iThing, or it is
+totally incompetent.</a>
</p>
</li>
-<li> Angry Birds
- <a
-href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
spies for companies, and the NSA takes advantage
-to spy through it too</a>.
-Here's information on <a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps </a>.
+
+<li> Angry Birds <a
+href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+spies for companies, and the NSA takes advantage to spy through it too</a>.
+Here's information on <a
+href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+more spyware apps </a>.
<a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
More about NSA app spying</a>.
</li>
-<li>Spyware in many e-readers—not only the Kindle: <a
+
+<li><p>Spyware in many e-readers—not only the Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
-they report even which page the user reads at what time</a>.
+they report even which page the user reads at what time</a>.</p>
</li>
-<li>Spyware
-in <a
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+
+<li>Spyware in <a
+href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
LG “smart” TVs</a> reports what the user watches, and the
-switch to turn this off has no effect. (The fact that the transmission
reports a 404 error really means nothing;
-the server could save that data anyway.)
-<p> Even worse, it <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
-snoops on
-other devices</a> on the user's local network.
+switch to turn this off has no effect. (The fact that the transmission
+reports a 404 error really means nothing; the server could save that data
+anyway.)
+
+<p> Even worse, it <a
+href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+snoops on other devices</a> on the user's local network.
</p>
+
<p>
LG later said it installed a patch to stop this, but it can happen in
any product.
</p>
-<p>However, LG TVs <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">do
lots of spying anyway</a>
+<p>However, LG TVs <a
+href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">do
lots of spying anyway</a>
</p>
</li>
@@ -77,18 +93,25 @@
<a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
Rent-to-own computers were programmed to spy on their renters</a>.
</li>
-<li>Spyware in Skype: <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
-Microsoft changed Skype <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">specifically
for spying</a>.
+
+<li><p>Spyware in Skype: <a
+href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+Microsoft changed Skype <a
+href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+specifically for spying</a>.</p>
</li>
+
<li>Flash Player's feature that helps web sites track visitors: <a
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">
http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/</a>
+
<p>
-It is also used for
-<a
+It is also used for <a
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
“fingerprinting” devices </a> to identify users.
</p>
+
<p>Javascript code is another method of “fingerprinting”
devices.</p>
</li>
@@ -97,12 +120,15 @@
Baidu's Japanese-input and Chinese-input apps spy on users.</a>
</li>
-<li>FTC says most mobile apps for children don't respect privacy: <a
+<li><p>FTC says most mobile apps for children don't respect privacy: <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>
+http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
</li>
-<li>The Brightest Flashlight app <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+
+<li>The Brightest Flashlight app <a
+href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
sends user data, including geolocation, for use by companies.</a>
+
<p>
The FTC criticized this app because it asked the user to approve
sending personal data to the app developer but did not ask about
@@ -113,47 +139,55 @@
</li>
<li>Spyware is present in some Android devices when they are sold.
-<p>Some Motorola phones modify Android to
-were <a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">send
personal data to Motorola.</a>
+
+<p>Some Motorola phones modify Android to <a
+href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+send personal data to Motorola.</a>
</p>
-<p>Some manufacturers add
-a <a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">hidden
-general surveillance package such as Carrier IQ.</a>
+
+<p>Some manufacturers add a <a
+href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+hidden general surveillance package such as Carrier IQ.</a>
</p>
-<p><a
href="/philosophy/proprietary/proprietary-back-doors.html#samsung">Samsung's
-back door</a> provides access to any file on the system.
+
+<p><a href="/philosophy/proprietary/proprietary-back-doors.html#samsung">
+Samsung's back door</a> provides access to any file on the system.
</p>
</li>
-<li>Spyware in Cisco TNP IP
-phones: <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+<li>Spyware in Cisco TNP IP phones: <a
+href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a>
</li>
-<li>Spyware in Android phones (and Windows? laptops): The Wall Street
-Journal (in an article blocked from us by a paywall) reports
-that<a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">the
-FBI can remotely activate the GPS and microphone in Android phones and
-laptops</a>. (I suspect this means Windows laptops.) Here
-is <a href="http://cryptome.org/2013/08/fbi-hackers.htm">more info
-</a>.
+
+<li><p>Spyware in Android phones (and Windows? laptops): The Wall Street
+Journal (in an article blocked from us by a paywall) reports that <a
+href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
+the FBI can remotely activate the GPS and microphone in Android phones and
+laptops</a>. (I suspect this means Windows laptops.) Here is <a
+href="http://cryptome.org/2013/08/fbi-hackers.htm">more info</a>.</p>
</li>
+
<li>Portable phones with GPS will send their GPS location on remote
-command and users cannot stop
-them: <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+command and users cannot stop them: <a
+href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
(The US says it will eventually require all new portable phones to
have GPS.)
</li>
-<li>The nonfree Snapchat app's principal purpose is to restrict the
-use of data on the user's computer, but it does surveillance too:
-<a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
-it tries to get the user's list of other people's phone numbers.</a>
+
+<li><p>The nonfree Snapchat app's principal purpose is to restrict the
+use of data on the user's computer, but it does surveillance too: <a
+href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+it tries to get the user's list of other people's phone numbers.</a></p>
</li>
+
<li>
Tesla cars allow the company to extract data remotely and determine
-the car's location at any time.
-(See <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">Section
-2, paragraphs b and c.</a>)
+the car's location at any time. (See <a
+href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+Section 2, paragraphs b and c.</a>)
+
<p>
The company says it doesn't store this information, but if the state
orders it to get the data and hand it over, the state can store it.</p>
@@ -163,31 +197,34 @@
<p>In addition, many web sites spy on their visitors. Web sites are
not programs, so it <a
href="/philosophy/network-services-arent-free-or-nonfree.html"> makes
-no sense to call them “free” or
-“proprietary”</a>, but the surveillance is an abuse all
-the same.</p>
+no sense to call them “free” or “proprietary”</a>,
+but the surveillance is an abuse all the same.</p>
<ul>
<li>Pages that contain “Like” buttons <a
href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html">
enable Facebook to track visitors to those pages</a>—even
users that don't have Facebook accounts.</li>
-<li>Many web sites rat their visitors to advertising networks that
+
+<li><p>Many web sites rat their visitors to advertising networks that
track users. Of the top 1000 web sites, <a
-href="http://www.law.berkeley.edu/15402.htm">93% fed their
-visitors third-party cookies, allowing other sites to track them</a>.
+href="http://www.law.berkeley.edu/15402.htm">93% fed their visitors
+third-party cookies, allowing other sites to track them</a>.</p>
</li>
+
<li>Many web sites report all their visitors to Google by using the
Google Analytics service, which <a
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
tells Google the IP address and the page that was visited.</a></li>
-<li>Many web sites try to collect users' address books (the user's
+
+<li><p>Many web sites try to collect users' address books (the user's
list of other people's phone numbers or email addresses). This
-violates the privacy of those other people.</li>
+violates the privacy of those other people.</p>
+</li>
+
<li>
-<a href="http://www.itproportal.com/2014/05/14/
-microsoft-openly-offered-cloud-data-fbi-and-nsa/">Microsoft SkyDrive allows
- the NSA to directly examine users' data</a>.
+<a
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">
+Microsoft SkyDrive allows the NSA to directly examine users' data</a>.
</li>
</ul>
@@ -238,7 +275,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2013 Free Software Foundation, Inc.</p>
+<p>Copyright © 2014 Free Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/3.0/us/">Creative
@@ -248,7 +285,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2014/06/24 11:56:04 $
+$Date: 2014/06/25 06:24:34 $
<!-- timestamp end -->
</p>
</div>