[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/philosophy/proprietary proprietary-surveill...
From: |
Dora Scilipoti |
Subject: |
www/philosophy/proprietary proprietary-surveill... |
Date: |
Thu, 13 Nov 2014 08:41:04 +0000 |
CVSROOT: /web/www
Module name: www
Changes by: Dora Scilipoti <dora> 14/11/13 08:41:04
Modified files:
philosophy/proprietary: proprietary-surveillance.html
Log message:
Modify 'Latest additions' section (RT #951781). Wrap long lines.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary/proprietary-surveillance.html?cvsroot=www&r1=1.16&r2=1.17
Patches:
Index: proprietary-surveillance.html
===================================================================
RCS file: /web/www/www/philosophy/proprietary/proprietary-surveillance.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary-surveillance.html 5 Nov 2014 18:16:06 -0000 1.16
+++ proprietary-surveillance.html 13 Nov 2014 08:41:04 -0000 1.17
@@ -6,7 +6,8 @@
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Surveillance</h2>
-<p><a href="/philosophy/proprietary/proprietary.html">Other examples of
proprietary malware</a></p>
+<p><a href="/philosophy/proprietary/proprietary.html">
+ Other examples of proprietary malware</a></p>
<div class="toc">
<h3 id="TableOfContents">Table of Contents</h3>
@@ -76,44 +77,13 @@
track <strong>clearly established cases of proprietary software that
spies on or track users</strong>.</p>
-<!-- Latest entries: you can add new articles there, and the
-webmasters will categorize them. Make sure to open a ticket! -->
<h3 id="LatestAdditions">Latest additions</h3>
-<ul>
- <li><p>Apple has made
- various <a
href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud">MacOS
- programs send files to Apple servers without asking
- permission</a>. This exposes the files to Big Brother and perhaps to
- other snoops.</p>
- </li>
- <li><p>Various operations in
- <a
href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540">
- the latest MacOS send reports to Apple</a> servers.</p>
- </li>
-
- <li><p>Apple admits the
- <a
href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/">
- spying in a search facility</a>,
- but there's a lot
- <a href="https://github.com/fix-macosx/yosemite-phone-home">more
snooping that Apple has not talked about</a>.</p>
- </li>
-
- <li><p><a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- Spotlight search</a>
- sends users' search terms to Apple.</p>
- </li>
-
- <li><p>It only gets worse with time.
- <a
href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html">
- Windows 10 requires users to give permission for total snooping</a>,
- including their files, their commands, their text input, and their voice
input.</p>
- </li>
-</ul>
-
+<p>Latest additions are found on top under each category.</p>
<!-- #OSSpyware -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
<div class="big-section">
<h3 id="OSSpyware">Spyware in Operating Systems</h3>
@@ -128,6 +98,13 @@
</div>
<ul>
+ <li><p>It only gets worse with time.
+ <a
href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html">
+ Windows 10 requires users to give permission for total snooping</a>,
+ including their files, their commands, their text input, and their
+ voice input.</p>
+ </li>
+
<li><p><a
href="http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/">
Windows Update snoops on the user.</a></p>
</li>
@@ -141,15 +118,10 @@
secret NSA key in Windows</a>,
whose functions we don't know.</p>
</li>
-
- <li><p>It only gets worse with time.
- <a
href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html">
- Windows 10 requires users to give permission for total snooping</a>,
- including their files, their commands, their text input, and their voice
input.</p>
- </li>
</ul>
-<p>There's a lot more <a
href="/philosophy/proprietary/malware-microsoft.html">Microsoft malware</a>.</p>
+<p>There's a lot more <a href="/philosophy/proprietary/malware-microsoft.html">
+ Microsoft malware</a>.</p>
<div class="big-subsection">
@@ -158,9 +130,9 @@
</div>
<ul>
- <li><p>Apple has made
- various <a
href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud">MacOS
- programs send files to Apple servers without asking
+ <li><p>Apple has made various
+ <a
href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud">
+ MacOS programs send files to Apple servers without asking
permission</a>. This exposes the files to Big Brother and perhaps to
other snoops.</p>
@@ -170,6 +142,7 @@
remove the malfeature unless many users push back hard, and the users
can't remove it themselves.</p>
</li>
+
<li><p>Various operations in
<a
href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540">
the latest MacOS send reports to Apple</a> servers.</p>
@@ -177,19 +150,18 @@
<li><p>Apple admits the
<a
href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/">
- spying in a search facility</a>,
- but there's a lot
- <a href="https://github.com/fix-macosx/yosemite-phone-home">more
snooping that Apple has not talked about</a>.</p>
+ spying in a search facility</a>, but there's a lot
+ <a href="https://github.com/fix-macosx/yosemite-phone-home">
+ more snooping that Apple has not talked about</a>.</p>
</li>
<li><p><a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- Spotlight search</a>
- sends users' search terms to Apple.</p>
+ Spotlight search</a> sends users' search terms to Apple.</p>
</li>
</ul>
-<p>There's a lot more <a href="#SpywareIniThings">iThing spyware</a>,
-and <a href="/philosophy/proprietary/malware-apple.html">Apple malware</a>.</p>
+<p>There's a lot more <a href="#SpywareIniThings">iThing spyware</a>, and
+<a href="/philosophy/proprietary/malware-apple.html">Apple malware</a>.</p>
<div class="big-subsection">
@@ -198,8 +170,8 @@
</div>
<ul>
- <li><p>Spyware is present in some Android devices when they are
- sold. Some Motorola phones modify Android to
+ <li><p>Spyware is present in some Android devices when they are sold.
+ Some Motorola phones modify Android to
<a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
send personal data to Motorola</a>.</p>
</li>
@@ -210,14 +182,14 @@
</li>
<li><p><a href="/philosophy/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a>
- provides access to any file on the system.</p>
+ Samsung's back door</a> provides access to any file on the system.</p>
</li>
</ul>
<!-- #SpywareOnMobiles -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
<div class="big-section">
<h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
@@ -239,20 +211,20 @@
<!-- http://www.wassom.com/walking-in-snow-ibeacon-ble-and-privacy.html -->
</li>
- <li><p>There is also a feature for web sites to track users, which
- is <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ <li><p>There is also a feature for web sites to track users, which is
+ <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
enabled by default</a>. (That article talks about iOS 6, but it
is still true in iOS 7.)</p>
</li>
- <li><p>The iThing
- also <a
href="http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ <li><p>The iThing also
+ <a
href="http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
tells Apple its geolocation</a> by default, though that can be
turned off.</p>
</li>
- <li><p>Apple can, and regularly
- does, <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ <li><p>Apple can, and regularly does,
+ <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
remotely extract some data from iPhones for the state</a>.</p>
</li>
@@ -263,8 +235,8 @@
<li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
Several “features” of iOS seem to exist for no
- possible purpose other than surveillance</a>. Here is
- the <a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms.pdf">
+ possible purpose other than surveillance</a>. Here is the
+ <a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms.pdf">
Technical presentation</a>.</p>
</li>
</ul>
@@ -349,6 +321,7 @@
<!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
<div class="big-section">
<h3 id="SpywareAtWork">Spyware at Work</h3>
@@ -382,6 +355,7 @@
<!-- #SpywareOnTheRoad -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
<div class="big-section">
<h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
@@ -402,9 +376,9 @@
</li>
<li><p>Adobe made “Digital Editions,” the e-reader used
- by most US
- libraries, <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">send
- lots of data to Adobe</a>. Adobe's “excuse”: it's
+ by most US libraries,
+ <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data to Adobe</a>. Adobe's “excuse”: it's
needed to check DRM!</p>
</li>
</ul>
@@ -417,19 +391,17 @@
<ul>
<li><p>Tesla cars allow the company to extract data remotely and
- determine the car's location at any time.
- (See <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b and c.</a>).
- The company says it doesn't store this information, but if the
- state orders it to get the data and hand it over, the state can
- store it.</p>
+ determine the car's location at any time. (See
+ <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b and c.</a>). The company says it doesn't
+ store this information, but if the state orders it to get the data
+ and hand it over, the state can store it.</p>
</li>
</ul>
-
-
<!-- #SpywareAtHome -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
<div class="big-section">
<h3 id="SpywareAtHome">Spyware at Home</h3>
@@ -452,11 +424,10 @@
<ul>
<li><p>Spyware in
<a
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- LG “smart” TVs</a>
- reports what the user watches, and the switch to turn this off
- has no effect. (The fact that the transmission reports a 404
- error really means nothing; the server could save that data
- anyway.)</p>
+ LG “smart” TVs</a> reports what the user watches, and
+ the switch to turn this off has no effect. (The fact that the
+ transmission reports a 404 error really means nothing; the server
+ could save that data anyway.)</p>
<p>Even worse, it
<a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
@@ -466,14 +437,14 @@
happen in any product.</p>
<p>However, LG TVs
- <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
- do lots of spying anyway</a>.</p>
+ <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots of spying anyway</a>.</p>
</li>
</ul>
<!-- #SpywareOnTheWeb -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
<div class="big-section">
<h3 id="SpywareOnTheWeb">Spyware on the Web</h3>
@@ -481,10 +452,11 @@
</div>
<div style="clear: left;"></div>
-<p>In addition, many web sites spy on their visitors. Web sites are not
programs, so it
-<a href="/philosophy/network-services-arent-free-or-nonfree.html">
-makes no sense to call them “free” or
“proprietary”</a>,
-but the surveillance is an abuse all the same.</p>
+<p>In addition, many web sites spy on their visitors. Web sites are not
+ programs, so it
+ <a href="/philosophy/network-services-arent-free-or-nonfree.html">
+ makes no sense to call them “free” or
“proprietary”</a>,
+ but the surveillance is an abuse all the same.</p>
<ul>
<li><p><a
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/">
@@ -507,8 +479,7 @@
<li><p>Many web sites report all their visitors to Google by using
the Google Analytics service, which
<a
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
- tells Google the IP address and the page that was
- visited.</a></p>
+ tells Google the IP address and the page that was visited.</a></p>
</li>
<li><p>Many web sites try to collect users' address books (the
@@ -535,8 +506,7 @@
<li><p>Flash is also used for
<a
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
- “fingerprinting” devices </a>
- to identify users.</p>
+ “fingerprinting” devices </a> to identify users.</p>
</li>
</ul>
@@ -600,7 +570,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2014/11/05 18:16:06 $
+$Date: 2014/11/13 08:41:04 $
<!-- timestamp end -->
</p>
</div>
- www/philosophy/proprietary proprietary-surveill...,
Dora Scilipoti <=
- www/philosophy/proprietary proprietary-surveill..., GNUN, 2014/11/13
- www/philosophy/proprietary proprietary-surveill..., Quentin Pradet, 2014/11/18
- www/philosophy/proprietary proprietary-surveill..., Dora Scilipoti, 2014/11/18
- www/philosophy/proprietary proprietary-surveill..., GNUN, 2014/11/18
- www/philosophy/proprietary proprietary-surveill..., Richard M. Stallman, 2014/11/30