[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/philosophy/proprietary proprietary-surveill...
From: |
hellekin |
Subject: |
www/philosophy/proprietary proprietary-surveill... |
Date: |
Tue, 21 Oct 2014 21:44:59 +0000 |
CVSROOT: /web/www
Module name: www
Changes by: hellekin <hellekin> 14/10/21 21:44:59
Modified files:
philosophy/proprietary: proprietary-surveillance.html
Log message:
Autumn-Spring cleaning of proprietary surveillance (RT#951781)
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary/proprietary-surveillance.html?cvsroot=www&r1=1.12&r2=1.13
Patches:
Index: proprietary-surveillance.html
===================================================================
RCS file: /web/www/www/philosophy/proprietary/proprietary-surveillance.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- proprietary-surveillance.html 20 Oct 2014 15:14:46 -0000 1.12
+++ proprietary-surveillance.html 21 Oct 2014 21:44:58 -0000 1.13
@@ -6,255 +6,512 @@
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Surveillance</h2>
-<a href="/philosophy/proprietary/">Other examples of proprietary malware</a>
+<p><a href="/philosophy/proprietary/">Other examples of proprietary
malware</a></p>
-<p>Clearly established cases of proprietary software that spies on or
-tracks users:</p>
+<div class="toc">
+ <h3 id="TableOfContents">Table of Contents</h3>
+ <ul>
+ <li><a href="#Introduction">Introduction</a></li>
+ <li><a href="#OSSpyware">Spyware in Operating Systems</a>
+ <ul>
+ <li><a href="#SpywareInWindows">Spyware in Windows</a></li>
+ <li><a href="#SpywareInMacOS">Spyware in MacOS</a></li>
+ <li><a href="#SpywareInAndroid">Spyware in Android</a></li>
+ </ul>
+ </li>
+ <li><a href="#SpywareOnMobiles">Spyware on Mobiles</a>
+ <ul>
+ <li><a href="#SpywareIniThings">Spyware in iThings</a></li>
+ <li><a href="#SpywareInTelephones">Spyware in Telephones</a></li>
+ <li><a href="#SpywareInMobileApps">Spyware in Mobile
Applications</a></li>
+ <li><a href="#SpywareInGames">Spyware in Games</a></li>
+ </ul>
+ </li>
+ <li><a href="#SpywareAtWork">Spyware at Work</a>
+ <ul>
+ <li><a href="#SpywareInSkype">Spyware in Skype</a></li>
+ </ul>
+ </li>
+ <li><a href="#SpywareOnTheRoad">Spyware on the Road</a>
+ <ul>
+ <li><a href="#SpywareInElectronicReaders">Spyware in e-Readers</a></li>
+ <li><a href="#SpywareInVehicles">Spyware in Vehicles</a></li>
+ </ul>
+ </li>
+ <li><a href="#SpywareAtHome">Spyware at Home</a>
+ <ul>
+ <li><a href="#SpywareInTVSets">Spyware in TV Sets</a></li>
+ </ul>
+ </li>
+ <li><a href="#SpywareOnTheWeb">Spyware on the Web</a>
+ <ul>
+ <li><a href="#SpywareInFlash">Spyware in Flash</a></li>
+ </ul>
+ </li>
+ </ul>
+</div><!-- /class="toc" -->
+<!-- #Introduction -->
+
+<div class="big-section">
+ <h3 id="Introduction">Introduction</h3>
+</div>
+<div style="clear: left;"></div>
+
+<p>For decades, the Free Software movement has been denouncing the
+abusive surveillance machine of
+<a href="/philosophy/proprietary/">proprietary software</a>
+companies such as
+<a href="/philosophy/proprietary/malware-microsoft.html">Microsoft</a>
+and
+<a href="/philosophy/proprietary/malware-apple.html">Apple</a>.
+
+In the recent years, this tendency to watch people has spread across
+industries, not only in the software business, but also in the
+hardware. Moreover, it also spread dramatically away from the
+keyboard, in the mobile computing industry, in the office, at home, in
+transportation systems, and in the classroom.</p>
+
+<p class="highlight-para">This document attempts to
+track <strong>clearly established cases of proprietary software that
+spies on or track users.</strong>.</p>
+
+<!-- Latest entries: you can add new articles there, and the
+webmasters will categorize them. Make sure to open a ticket! -->
+
+<h4 id="LatestAdditions">Latest additions</h4>
<ul>
-<li>Spyware in Windows: <a
-href="http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/">
-Windows Update snoops on the user.</a>
-<a
href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175">
-Windows 8.1 snoops on local searches.</a>. And there's a <a
-href="http://www.marketoracle.co.uk/Article40836.html">secret NSA key in
-Windows</a>, whose functions we don't know.
-<p>
-It only gets worse with
-time. <a
href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html">
-Windows 10 requires users to give permission for total snooping</a>,
-including their files, their commands, their text input, and their
-voice input.
-</p>
-</li>
+ <li><p><a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ Spotlight search</a>
+ sends users' search terms to Apple.</p>
+ </li>
+
+ <li><p>It only gets worse with time.
+ <a
href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html">
+ Windows 10 requires users to give permission for total snooping</a>,
+ including their files, their commands, their text input, and their voice
input.</p>
+ </li>
+
+ <li><p>Adobe made “Digital Editions,” the e-reader used
+ by most US libraries,
+ <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data to Adobe</a>.
+ Adobe's “excuse”: it's needed to check DRM!</p>
+ </li>
+
+ <li><p><a
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">
+ Microsoft SkyDrive allows the NSA to directly examine users'
+ data</a>.</p></li>
+</ul>
-<li><p>Spyware in MacOS: <a
-href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
-Spotlight search</a> sends users' search terms to Apple.</p>
-</li>
-
-<li><p>Spyware in iThings: the <a
-href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
-iBeacon</a> lets stores determine exactly where the iThing is, and
-get other info too.</p>
-<!-- http://www.wassom.com/walking-in-snow-ibeacon-ble-and-privacy.html -->
-
-<p>
-There is also a feature for web sites to track users, which is <a
-href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
-enabled by default</a>. (That article talks about iOS 6, but it is
-still true in iOS 7.)</p>
-
-<p>
-The iThing also <a
-href="http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
-tells Apple its geolocation</a> by default, though that can be turned off.
-</p>
-<p>
-Apple can, and regularly does, <a
-href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
-remotely extract some data from iPhones for the state</a>.
-</p>
-<p>
-<a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
-Either Apple helps the NSA snoop on all the data in an iThing, or it is
-totally incompetent.</a>
-</p>
+<!-- #OSSpyware -->
-<p>
-<a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
-Several “features” of iOS seem to exist for no possible purpose
-other than surveillance</a>. Here is the
-<a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms.pdf">
-Technical presentation</a>.
-</p>
-</li>
+<div class="big-section">
+ <h3 id="OSSpyware">Spyware in Operating Systems</h3>
+ <span class="anchor-reference-id">(<a
href="#OSSpyware">#OSSpyware</a>)</span>
+</div>
+<div style="clear: left;"></div>
-<li> Angry Birds <a
-href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
-spies for companies, and the NSA takes advantage to spy through it too</a>.
-Here's information on <a
-href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
-more spyware apps </a>.
-<a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
-More about NSA app spying</a>.
-</li>
-
-<li><p>Spyware in many e-readers—not only the Kindle: <a
-href="https://www.eff.org/pages/reader-privacy-chart-2012">
-they report even which page the user reads at what time</a>.</p>
-</li>
-
-<li><p>Adobe made “Digital Editions,” the e-reader used by most
-US libraries,
-<a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">send
-lots of data to Adobe</a>. Adobe's “excuse”: it's needed
-to check DRM!</p>
-</li>
-
-<li>Spyware in <a
-href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
-LG “smart” TVs</a> reports what the user watches, and the
-switch to turn this off has no effect. (The fact that the transmission
-reports a 404 error really means nothing; the server could save that data
-anyway.)
-
-<p> Even worse, it <a
-href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
-snoops on other devices</a> on the user's local network.
-</p>
-<p>
-LG later said it installed a patch to stop this, but it can happen in
-any product.
-</p>
+<div class="big-subsection">
+ <h4 id="SpywareInWindows">Spyware in Windows</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInWindows">#SpywareInWindows</a>)</span>
+</div>
-<p>However, LG TVs <a
-href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">do
lots of spying anyway</a>
-</p>
-</li>
+<ul>
+ <li><p><a
href="http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/">
+ Windows Update snoops on the user.</a></p>
+ </li>
+
+ <li><p><a
href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175">
+ Windows 8.1 snoops on local searches.</a>.</p>
+ </li>
+
+ <li><p>And there's a
+ <a href="http://www.marketoracle.co.uk/Article40836.html">
+ secret NSA key in Windows</a>,
+ whose functions we don't know.</p>
+ </li>
+
+ <li><p>It only gets worse with time.
+ <a
href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html">
+ Windows 10 requires users to give permission for total snooping</a>,
+ including their files, their commands, their text input, and their voice
input.</p>
+ </li>
+</ul>
-<li>
-<a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
-Rent-to-own computers were programmed to spy on their renters</a>.
-</li>
-
-<li><p>Spyware in Skype: <a
-href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
-Microsoft changed Skype <a
-href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
-specifically for spying</a>.</p>
-</li>
-
-<li>Flash Player's feature that helps web sites track visitors: <a
-href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">
-http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/</a>
-
-<p>
-It is also used for <a
-href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
-“fingerprinting” devices </a> to identify users.
-</p>
+<p>There's a lot more <a
href="/philosophy/proprietary/malware-microsoft.html">Microsoft malware</a>.</p>
-<p>Javascript code is another method of “fingerprinting”
-devices.</p>
-</li>
-
-<li><a
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/">
-Baidu's Japanese-input and Chinese-input apps spy on users.</a>
-</li>
-
-<li><p>FTC says most mobile apps for children don't respect privacy: <a
-href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
-</li>
-
-<li>The Brightest Flashlight app <a
-href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
-sends user data, including geolocation, for use by companies.</a>
-
-<p>
-The FTC criticized this app because it asked the user to approve
-sending personal data to the app developer but did not ask about
-sending it to other companies. This shows the weakness of the
-reject-it-if-you-dislike-snooping “solution” to
-surveillance: why should a flashlight app send any information to
-anyone? A free software flashlight app would not.</p>
-</li>
-
-<li>Spyware is present in some Android devices when they are sold.
-
-<p>Some Motorola phones modify Android to <a
-href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
-send personal data to Motorola.</a>
-</p>
-<p>Some manufacturers add a <a
-href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
-hidden general surveillance package such as Carrier IQ.</a>
-</p>
+<div class="big-subsection">
+ <h4 id="SpywareInMacOS">Spyware in MacOS</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInMacOS">#SpywareInMacOS</a>)</span>
+</div>
-<p><a href="/philosophy/proprietary/proprietary-back-doors.html#samsung">
-Samsung's back door</a> provides access to any file on the system.
-</p>
-</li>
+<ul>
+ <li><p><a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ Spotlight search</a>
+ sends users' search terms to Apple.</p>
+ </li>
+</ul>
+
+<p>There's a lot more <a href="#SpywareIniThings">iThing spyware</a>,
+and <a href="/philosophy/proprietary/malware-apple.html">Apple malware</a>.</p>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInAndroid">Spyware in Android</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInAndroid">#SpywareInAndroid</a>)</span>
+</div>
+
+<ul>
+ <li><p>Spyware is present in some Android devices when they are
+ sold. Some Motorola phones modify Android to
+ <a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ send personal data to Motorola</a>.</p>
+ </li>
+
+ <li><p>Some manufacturers add a
+ <a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general surveillance package such as Carrier IQ.</a></p>
+ </li>
+
+ <li><p><a href="/philosophy/proprietary/proprietary-back-doors.html#samsung">
+ Samsung's back door</a>
+ provides access to any file on the system.</p>
+ </li>
+</ul>
+
+
+
+<!-- #SpywareOnMobiles -->
+
+<div class="big-section">
+ <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareIniThings">Spyware in iThings</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
+</div>
+
+<ul>
+ <li><p>Spyware in iThings:
+ the <a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ iBeacon</a> lets stores determine exactly where the iThing is,
+ and get other info too.</p>
+ <!-- http://www.wassom.com/walking-in-snow-ibeacon-ble-and-privacy.html -->
+ </li>
+
+ <li><p>There is also a feature for web sites to track users, which
+ is <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ enabled by default</a>. (That article talks about iOS 6, but it
+ is still true in iOS 7.)</p>
+ </li>
+
+ <li><p>The iThing
+ also <a
href="http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells Apple its geolocation</a> by default, though that can be
+ turned off.</p>
+ </li>
+
+ <li><p>Apple can, and regularly
+ does, <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones for the state</a>.</p>
+ </li>
+
+ <li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
+ Either Apple helps the NSA snoop on all the data in an iThing,
+ or it is totally incompetent.</a></p>
+ </li>
+
+ <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features” of iOS seem to exist for no
+ possible purpose other than surveillance</a>. Here is
+ the <a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms.pdf">
+ Technical presentation</a>.</p>
+ </li>
+</ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInTelephones">Spyware in Telephones</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInTelephones">#SpywareInTelephones</a>)</span>
+</div>
+
+<ul>
+ <li><p>Spyware in Android phones (and Windows? laptops): The Wall
+ Street Journal (in an article blocked from us by a paywall)
+ reports that
+ <a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
+ the FBI can remotely activate the GPS and microphone in Android
+ phones and laptops</a>.
+ (I suspect this means Windows laptops.) Here is
+ <a href="http://cryptome.org/2013/08/fbi-hackers.htm">more info</a>.</p>
+ </li>
+
+ <li><p>Portable phones with GPS will send their GPS location on
+ remote command and users cannot stop them:
+ <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
+ (The US says it will eventually require all new portable phones
+ to have GPS.)</p>
+ </li>
+
+ <li><p>The nonfree Snapchat app's principal purpose is to restrict
+ the use of data on the user's computer, but it does surveillance
+ too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries to get the user's list of other people's phone
+ numbers.</a></p>
+ </li>
+</ul>
-<li>Spyware in Cisco TNP IP phones: <a
-href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a>
-</li>
-
-<li><p>Spyware in Android phones (and Windows? laptops): The Wall Street
-Journal (in an article blocked from us by a paywall) reports that <a
-href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
-the FBI can remotely activate the GPS and microphone in Android phones and
-laptops</a>. (I suspect this means Windows laptops.) Here is <a
-href="http://cryptome.org/2013/08/fbi-hackers.htm">more info</a>.</p>
-</li>
-
-<li>Portable phones with GPS will send their GPS location on remote
-command and users cannot stop them: <a
-href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
-http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
-(The US says it will eventually require all new portable phones to
-have GPS.)
-</li>
-
-<li><p>The nonfree Snapchat app's principal purpose is to restrict the
-use of data on the user's computer, but it does surveillance too: <a
-href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
-it tries to get the user's list of other people's phone numbers.</a></p>
-</li>
-
-<li>
-Tesla cars allow the company to extract data remotely and determine
-the car's location at any time. (See <a
-href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
-Section 2, paragraphs b and c.</a>)
-
-<p>
-The company says it doesn't store this information, but if the state
-orders it to get the data and hand it over, the state can store it.</p>
-</li>
-</ul>
-
-<p>In addition, many web sites spy on their visitors. Web sites are
-not programs, so it <a
-href="/philosophy/network-services-arent-free-or-nonfree.html"> makes
-no sense to call them “free” or “proprietary”</a>,
+
+<div class="big-subsection">
+ <h4 id="SpywareInMobileApps">Spyware in Mobile Applications</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
+</div>
+
+<ul>
+ <li><p>FTC says most mobile apps for children don't respect privacy:
+ <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
+ </li>
+
+ <li><p>The Brightest Flashlight app
+ <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use by companies.</a></p>
+
+ <p>The FTC criticized this app because it asked the user to
+ approve sending personal data to the app developer but did not
+ ask about sending it to other companies. This shows the
+ weakness of the reject-it-if-you-dislike-snooping
+ “solution” to surveillance: why should a flashlight
+ app send any information to anyone? A free software flashlight
+ app would not.</p>
+ </li>
+</ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInGames">Spyware in Games</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
+</div>
+
+<ul>
+ <li><p>Angry Birds
+ <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies for companies, and the NSA takes advantage to spy through it
too</a>.
+ Here's information on
+ <a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ more spyware apps</a>.</p>
+ <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
+ More about NSA app spying</a>.</p>
+ </li>
+</ul>
+
+
+
+<!-- #SpywareAtWork -->
+
+<div class="big-section">
+ <h3 id="SpywareAtWork">Spyware at Work</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Spyware in Cisco TNP IP phones:
+ <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p>
+ </li>
+</ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInSkype">Spyware in Skype</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+</div>
+
+<ul>
+ <li><p>Spyware in Skype:
+ <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype
+ <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p>
+ </li>
+</ul>
+
+
+
+<!-- #SpywareOnTheRoad -->
+
+<div class="big-section">
+ <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
+</div>
+
+<ul>
+ <li><p>Spyware in many e-readers—not only the
+ Kindle: <a href="https://www.eff.org/pages/reader-privacy-chart-2012">
+ they report even which page the user reads at what time</a>.</p>
+ </li>
+
+ <li><p>Adobe made “Digital Editions,” the e-reader used
+ by most US
+ libraries, <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">send
+ lots of data to Adobe</a>. Adobe's “excuse”: it's
+ needed to check DRM!</p>
+ </li>
+</ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
+</div>
+
+<ul>
+ <li><p>Tesla cars allow the company to extract data remotely and
+ determine the car's location at any time.
+ (See <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b and c.</a>).
+ The company says it doesn't store this information, but if the
+ state orders it to get the data and hand it over, the state can
+ store it.</p>
+ </li>
+</ul>
+
+
+
+
+<!-- #SpywareAtHome -->
+
+<div class="big-section">
+ <h3 id="SpywareAtHome">Spyware at Home</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ Rent-to-own computers were programmed to spy on their renters</a>.</p>
+ </li>
+</ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInTVSets">Spyware in TV Sets</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
+</div>
+
+<ul>
+ <li><p>Spyware in
+ <a
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ LG “smart” TVs</a>
+ reports what the user watches, and the switch to turn this off
+ has no effect. (The fact that the transmission reports a 404
+ error really means nothing; the server could save that data
+ anyway.)</p>
+
+ <p>Even worse, it
+ <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ snoops on other devices on the user's local network.</a></p>
+
+ <p>LG later said it installed a patch to stop this, but it can
+ happen in any product.</p>
+
+ <p>However, LG TVs
+ <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
+ do lots of spying anyway</a>.</p>
+ </li>
+</ul>
+
+
+
+<!-- #SpywareOnTheWeb -->
+
+<div class="big-section">
+ <h3 id="SpywareOnTheWeb">Spyware on the Web</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnTheWeb">#SpywareOnTheWeb</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<p>In addition, many web sites spy on their visitors. Web sites are not
programs, so it
+<a href="/philosophy/network-services-arent-free-or-nonfree.html">
+makes no sense to call them “free” or
“proprietary”</a>,
but the surveillance is an abuse all the same.</p>
<ul>
-<li>Pages that contain “Like” buttons <a
-href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html">
-enable Facebook to track visitors to those pages</a>—even
-users that don't have Facebook accounts.</li>
-
-<li><p>Many web sites rat their visitors to advertising networks that
-track users. Of the top 1000 web sites, <a
-href="http://www.law.berkeley.edu/15402.htm">93% fed their visitors
-third-party cookies, allowing other sites to track them</a>.</p>
-</li>
-
-<li>Many web sites report all their visitors to Google by using the
-Google Analytics service, which <a
-href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
-tells Google the IP address and the page that was visited.</a></li>
-
-<li><p>Many web sites try to collect users' address books (the user's
-list of other people's phone numbers or email addresses). This
-violates the privacy of those other people.</p>
-</li>
-
-<li>
-<a
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">
-Microsoft SkyDrive allows the NSA to directly examine users' data</a>.
-</li>
+ <li><p><a
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/">
+ Baidu's Japanese-input and Chinese-input apps spy on users.</a></p>
+ </li>
+
+ <li><p>Pages that contain “Like” buttons
+ <a
href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html">
+ enable Facebook to track visitors to those pages</a>—even
+ users that don't have Facebook accounts.</p>
+ </li>
+
+ <li><p>Many web sites rat their visitors to advertising networks
+ that track users. Of the top 1000 web sites,
+ <a href="http://www.law.berkeley.edu/15402.htm">93% fed
+ their visitors third-party cookies, allowing other sites to
+ track them</a>.</p>
+ </li>
+
+ <li><p>Many web sites report all their visitors to Google by using
+ the Google Analytics service, which
+ <a
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
+ tells Google the IP address and the page that was
+ visited.</a></p>
+ </li>
+
+ <li><p>Many web sites try to collect users' address books (the
+ user's list of other people's phone numbers or email addresses).
+ This violates the privacy of those other people.</p>
+ </li>
+
+ <li><p><a
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">
+ Microsoft SkyDrive allows the NSA to directly examine users'
data</a>.</p>
+ </li>
</ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInFlash">Spyware in Flash</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInFlash">#SpywareInFlash</a>)</span>
+</div>
+
+<ul>
+ <li><p>Flash Player's
+ <a
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">
+ cookie feature helps web sites track visitors</a>.</p>
+ </li>
+
+ <li><p>Flash is also used for
+ <a
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
+ “fingerprinting” devices </a>
+ to identify users.</p>
+ </li>
+</ul>
+
+<p><a href="/philosophy/javascript-trap.html">Javascript code</a>
+is another method of “fingerprinting” devices.</p>
+
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
<div id="footer">
@@ -312,7 +569,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2014/10/20 15:14:46 $
+$Date: 2014/10/21 21:44:58 $
<!-- timestamp end -->
</p>
</div>
- www/philosophy/proprietary proprietary-surveill..., Richard M. Stallman, 2014/10/11
- www/philosophy/proprietary proprietary-surveill..., Richard M. Stallman, 2014/10/20
- www/philosophy/proprietary proprietary-surveill...,
hellekin <=
- www/philosophy/proprietary proprietary-surveill..., GNUN, 2014/10/22
- www/philosophy/proprietary proprietary-surveill..., GNUN, 2014/10/22
- www/philosophy/proprietary proprietary-surveill..., GNUN, 2014/10/23
- www/philosophy/proprietary proprietary-surveill..., Pavel Kharitonov, 2014/10/24
- www/philosophy/proprietary proprietary-surveill..., GNUN, 2014/10/24
- www/philosophy/proprietary proprietary-surveill..., GNUN, 2014/10/24
- www/philosophy/proprietary proprietary-surveill..., hellekin, 2014/10/25