www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-appliances.html malware...


From: Pavel Kharitonov
Subject: www/proprietary malware-appliances.html malware...
Date: Sun, 24 Jul 2016 12:52:57 +0000 (UTC)

CVSROOT:        /web/www
Module name:    www
Changes by:     Pavel Kharitonov <ineiev>       16/07/24 12:52:57

Added files:
        proprietary    : malware-appliances.html malware-games.html 

Log message:
        New pages RT #1128137.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-games.html?cvsroot=www&rev=1.1

Patches:
Index: malware-appliances.html
===================================================================
RCS file: malware-appliances.html
diff -N malware-appliances.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ malware-appliances.html     24 Jul 2016 12:52:56 -0000      1.1
@@ -0,0 +1,521 @@
+<!--#include virtual="/server/header.html" -->
+<!-- Parent-Version: 1.79 -->
+<title>Malware in Appliances
+- GNU Project - Free Software Foundation</title>
+<!--#include virtual="/server/gnun/initial-translations-list.html" -->
+<!--#include virtual="/server/banner.html" -->
+<h2>Malware in Appliances</h2>
+
+<p><a href="/proprietary/proprietary.html">Other examples of proprietary
+malware</a></p>
+
+<div class="highlight-para">
+<p>
+<em>Malware</em> means software designed to function in ways that
+mistreat or harm the user.  (This does not include accidental errors.)
+</p>
+
+<p>
+Malware and nonfree software are two different issues.  The difference
+between <a href="/philosophy/free-sw.html">free software</a> and
+nonfree software is in <a
+href="/philosophy/free-software-even-more-important.html">
+whether the users have control of the program or vice versa</a>.  It's
+not directly a question of what the program <em>does</em> when it
+runs.  However, in practice nonfree software is often malware, because
+the developer's awareness that the users would be powerless to fix any
+malicious functionalities tempts the developer to impose some.
+</p>
+</div>
+
+<p>Here are examples of malware in appliances.</p>
+
+<ul>
+<li>
+<p>ARRIS cable modem has a <a
+href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1";>
+backdoor in the backdoor</a>.</p>
+</li>
+
+<li>
+<p>Caterpillar vehicles come with a <a
+href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it";>
+back-door to shutoff the engine</a> remotely.</p>
+</li>
+
+<li>
+<p>HP &ldquo;storage appliances&rdquo; that use the proprietary
+&ldquo;Left Hand&rdquo; operating system have back doors that give HP
+<a
+href="http://news.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/";>
+remote login access</a> to them.  HP claims that this does not give HP
+access to the customer's data, but if the back door allows
+installation of software changes, a change could be installed that
+would give access to the customer's data.
+</p>
+</li>
+
+<li>
+<p><a
+href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html";>
+Some D-Link routers</a> have a back door for changing settings in a
+dlink of an eye.</p>
+
+<p>
+<a href="https://github.com/elvanderb/TCP-32764";>Many models of router
+have back doors</a>.</p>
+</li>
+
+<li>
+<p><a href="http://sekurak.pl/tp-link-httptftp-backdoor/";>
+The TP-Link router has a backdoor</a>.</p>
+</li>
+
+<li>
+<p><a
+href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions";>
+Volkswagen programmed its car engine computers to detect the
+Environmental Protection Agency's emission tests</a>,
+and run dirty the rest of the time.</p>
+
+<p>In real driving, the cars exceeded emissions standards by a factor
+of up to 35.</p>
+
+<p>Using free software would not have stopped Volkswagen from
+programming it this way, but would have made it harder to conceal.</p>
+</li>
+
+<li>
+<p>The <a href="http://michaelweinberg.org/post/137045828005/free-the-cube";>
+&ldquo;Cube&rdquo; 3D printer was designed with DRM</a>: it won't accept
+third-party printing materials.  It is the Keurig of printers.  Now it is
+being discontinued, which means that eventually authorized materials won't
+be available and the printers may become unusable.</p>
+
+<p>With a <a href="http://www.fsf.org/resources/hw/endorsement/aleph-objects";>
+printer that gets the Respects Your Freedom</a>, this problem would not
+even be a remote possibility.</p>
+
+<p>How pitiful that the author of that article says that there was
+&ldquo;nothing wrong&rdquo; with designing the device to restrict users in
+the first place.  This is like putting a &ldquo;cheat me and mistreat me&rdquo;
+sign on your chest.  We should know better: we should condemn all companies
+that take advantage of people like him.  Indeed, it is the acceptance of
+their unjust practice that teaches people to be doormats.</p>
+</li>
+
+<li>
+<p>Phillips &ldquo;smart&rdquo; lightbulbs <a
+href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml";>
+have been designed not to interact with other companies' smart
+lightbulbs</a>.</p>
+
+<p>If a product is &ldquo;smart&rdquo;, and you didn't build it, it is
+cleverly serving its manufacturer <em>against you</em>.</p>
+</li>
+
+<li>
+<p><a
+href="http://web.archive.org/web/20131007102857/http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up";>
+DVDs and Bluray disks have DRM</a>.
+</p>
+
+<p>That page uses spin terms that favor DRM,
+including <a href="/philosophy/words-to-avoid.html#DigitalRightsManagement">
+digital &ldquo;rights&rdquo; management</a>
+and <a 
href="/philosophy/words-to-avoid.html#Protection">&ldquo;protect&rdquo;</a>,
+and it claims that &ldquo;artists&rdquo; (rather than companies) are
+primarily responsible for putting digital restrictions management into
+these disks.  Nonetheless, it is a reference for the facts.
+</p>
+
+<p>Every Bluray disk (with few, rare exceptions) has DRM&mdash;so
+don't use Bluray disks!</p>
+</li>
+
+<li>
+<p><a 
href="https://www.eff.org/deeplinks/2013/11/drm-cars-will-drive-consumers-crazy";>
+DRM in cars will drive consumers crazy</a>.</p>
+</li>
+
+<li>
+<p>Over 70 brands of network-connected surveillance cameras have <a
+href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html";>
+security bugs that allow anyone to watch through them</a>.</p>
+</li>
+
+<li>
+<p>Samsung's &ldquo;Smart Home&rdquo; has a big security hole; <a
+href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/";>
+unauthorized people can remotely control it</a>.</p>
+
+<p>Samsung claims that this is an &ldquo;open&rdquo; platform so the
+problem is partly the fault of app developers. That is clearly true if
+the apps are proprietary software.</p>
+
+<p>Anything whose name is &ldquo;Smart&rdquo; is most likely going to
+screw you.</p>
+</li>
+
+<li>
+<p>
+The Nissan Leaf has a built-in cell phone modem which allows
+effectively anyone to <a
+href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/";>
+access its computers remotely and make changes in various
+settings</a>.</p>
+
+<p>That's easy to do because the system has no authentication when
+accessed through the modem.  However, even if it asked for
+authentication, you couldn't be confident that Nissan has no
+access.  The software in the car is
+proprietary, <a href="/philosophy/free-software-even-more-important.html">which
+means it demands blind faith from its users</a>.</p>
+
+<p>Even if no one connects to the car remotely, the cell phone modem
+enables the phone company to track the car's movements all the time;
+it is possible to physically remove the cell phone modem though.</p>
+</li>
+
+<li>
+<p>
+Malware found on <a
+href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html";>
+security cameras available through Amazon</a>.
+</p>
+
+<p>A camera that records locally on physical media, and has no network
+connection, does not threaten people with surveillance&mdash;neither
+by watching people through the camera, nor through malware in the
+camera.</p>
+</li>
+
+<li>
+<p> <a
+href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/";>
+FitBit fitness trackers have a Bluetooth vulnerability</a> that allows
+attackers to send malware to the devices, which can subsequently
+spread to computers and other FitBit trackers that interact with
+them.</p>
+</li>
+
+<li>
+<p> &ldquo;Self-encrypting&rdquo; disk drives do the encryption with
+proprietary firmware so you can't trust it.  Western Digital's <a
+href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption";>
+&ldquo;My Passport&rdquo; drives have a back door</a>.</p>
+</li>
+
+<li>
+<p>Security researchers discovered a <a
+href="http://www.theguardian.com/technology/2015/aug/12/hack-car-brakes-sms-text";>
+vulnerability in diagnostic dongles used for vehicle tracking and
+insurance</a> that let them take remote control of a car or
+lorry using an SMS.</p>
+</li>
+
+<li>
+<p>Crackers were able to <a
+href="http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/";>
+take remote control of the Jeep</a> &ldquo;connected car&rdquo;.</p>
+
+<p>They could track the car, start or stop the engine, and
+activate or deactivate the brakes, and more.</p>
+
+<p>I expect that Chrysler and the NSA can do this too.</p>
+
+<p>If I ever own a car, and it contains a portable phone, I will
+deactivate that.</p>
+</li>
+
+<li>
+<p>
+Hospira infusion pumps, which are used to administer drugs to
+a patient, were rated &ldquo;<a
+href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/";>
+least secure IP device I've ever seen</a>&rdquo; by a security
+researcher.</p>
+
+<p>Depending on what drug is being infused, the insecurity could
+open the door to murder.</p>
+</li>
+
+<li>
+<p>Due to bad security in a drug pump, crackers could use it to <a
+href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/";>
+kill patients</a>.</p>
+</li>
+
+<li>
+<p><a
+href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/";>
+&ldquo;Smart homes&rdquo;</a> turn out to be stupidly vulnerable to
+intrusion.</p>
+</li>
+
+<li>
+<p>The <a
+href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html";>
+FTC punished a company for making webcams with bad security</a> so
+that it was easy for anyone to watch them.</p>
+</li>
+
+<li>
+<p>It is possible to <a
+href="http://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/";>
+take control of some car computers through malware in music files</a>.
+Also <a
+href="http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0";>by
+radio</a>.  More information in <a
+href="http://www.autosec.org/faq.html";> Automotive Security And
+Privacy Center</a>.</p>
+</li>
+
+<li>
+<p>It is possible to <a
+href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/";>
+kill people by taking control of medical implants by radio</a>.  More
+information in <a
+href="http://www.bbc.co.uk/news/technology-17631838";>BBC News</a> and
+<a
+href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html";>
+IOActive Labs Research blog</a>.</p>
+</li>
+
+<li>
+<p>Lots of <a
+href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/";>
+hospital equipment has lousy security</a>, and it can be fatal.</p>
+</li>
+
+<li>
+<p><a
+href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/";>
+Point-of-sale terminals running Windows were taken over</a> and turned
+into a botnet for the purpose of collecting customers' credit card
+numbers.</p>
+</li>
+
+<li>
+<p>Phillips &ldquo;smart&rdquo; lightbulbs had initially been 
+designed to interact with other companies' smart light bulbs, but
+later the <a 
+href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml";>
+company updated the firmware to disallow interoperability</a>.</p>
+
+<p>If a product is &ldquo;smart&rdquo;, and you didn't build it, it is 
+cleverly serving its manufacturer <em>against you</em>.</p>
+</li>
+
+<li>
+<p>Vizio
+<a href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html";>
+used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what
+users watch</a>.  The TVs did not do that when first sold.</p>
+</li>
+
+<li>
+<p>LG <a
+href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml";>
+disabled network features</a> on <em>previously purchased</em>
+&ldquo;smart&rdquo; TVs, unless the purchasers agreed to let LG
+begin to snoop on them and distribute their personal data.</p>
+</li>
+
+<li>
+<p><a
+href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673";>
+Barbie is going to spy</a> on children and adults.</p>
+</li>
+
+<li>
+<p><a
+href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html";>
+Cisco TNP IP phones are spying devices</a>.</p>
+</li>
+
+<li>
+<p>The <a
+href="http://www.bbc.com/news/technology-34922712";>Nest Cam
+&ldquo;smart&rdquo; camera is always watching</a>, even when the
+&ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;</p>
+
+<p>A &ldquo;smart&rdquo; device means the manufacturer is using it to outsmart
+you.</p>
+</li>
+
+<li><p>Computerized cars with nonfree software are <a
+href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data";>
+snooping devices</a>.</p>
+</li>
+
+<li>
+<p>Proprietary software in cars <a
+href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/";>
+records information about drivers' movements</a>, which is made
+available to car manufacturers, insurance companies, and others.</p>
+
+<p>The case of toll-collection systems, mentioned in this article, is not
+really a matter of proprietary surveillance.  These systems are an
+intolerable invasion of privacy, and should be replaced with anonymous
+payment systems, but the invasion isn't done by malware.  The other
+cases mentioned are done by proprietary malware in the car.</p>
+</li>
+
+<li>
+<p>Tesla cars allow the company to extract data remotely and determine
+the car's location at any time.  (See <a
+href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf";>
+Section 2, paragraphs b and c.</a>).  The company says it doesn't
+store this information, but if the state orders it to get the data and
+hand it over, the state can store it.</p>
+</li>
+
+<li>
+<p>Vizio goes a step further than other TV manufacturers in spying on 
+their users: their <a
+href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you";>
+&ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
+link them your IP address</a> so that advertisers can track you 
+across devices.</p>
+
+<p>It is possible to turn this off, but having it enabled by default
+is an injustice already.</p>
+</li>
+
+<li>
+<p>Tivo's alliance with Viacom adds 2.3 million households to the 600
+millions social media profiles the company already monitors.  Tivo
+customers are unaware they're being watched by advertisers.  By
+combining TV viewing information with online social media
+participation, Tivo can now <a
+href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102";>
+correlate TV advertisement with online purchases</a>, exposing all
+users to new combined surveillance by default.</p>
+</li>
+
+<li>
+<p>Some web and TV advertisements play inaudible sounds to be picked
+up by proprietary malware running on other devices in range so as to
+determine that they are nearby.  Once your Internet devices are paired
+with your TV, advertisers can correlate ads with Web activity, and
+other <a
+href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/";>
+cross-device tracking</a>.</p>
+</li>
+
+<li>
+<p>Vizio &ldquo;smart&rdquo; TVs recognize and <a
+href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/";>track
+what people are watching</a>, even if it isn't a TV channel.</p>
+</li>
+
+<li>
+<p>The Amazon &ldquo;smart&rdquo; TV is <a
+href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance";>
+watching and listening all the time</a>.</p>
+</li>
+
+<li>
+<p>The Samsung &ldquo;smart&rdquo; TV <a
+href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm";>
+transmits users' voice on the internet to another company, Nuance</a>.
+Nuance can save it and would then have to give it to the US or some
+other government.</p>
+
+<p>Speech recognition is not to be trusted unless it is done by free
+software in your own computer.</p>
+</li>
+
+<li>
+<p><a
+href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html";>
+Spyware in LG &ldquo;smart&rdquo; TVs</a> reports what the user
+watches, and the switch to turn this off has no effect.  (The fact
+that the transmission reports a 404 error really means nothing; the
+server could save that data anyway.)</p>
+
+<p>Even worse, it <a
+href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/";>
+snoops on other devices on the user's local network</a>.</p>
+
+<p>LG later said it had installed a patch to stop this, but any
+product could spy this way.</p>
+
+<p>Meanwhile, LG TVs <a
+href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml";>
+do lots of spying anyway</a>.</p>
+</li>
+<li>
+<p><a
+href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/";>
+Verizon cable TV snoops on what programs people watch</a>, and even what
+they wanted to record.</p>
+</li>
+
+</ul>
+
+</div><!-- for id="content", starts in the include above -->
+<!--#include virtual="/server/footer.html" -->
+<div id="footer">
+<div class="unprintable">
+
+<p>Please send general FSF &amp; GNU inquiries to
+<a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF.  Broken links and other corrections or suggestions can be sent
+to <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>.</p>
+
+<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to <a href="mailto:address@hidden";>
+        &lt;address@hidden&gt;</a>.</p>
+
+        <p>For information on coordinating and submitting translations of
+        our web pages, see <a
+        href="/server/standards/README.translations.html">Translations
+        README</a>. -->
+Please see the <a
+href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and submitting translations
+of this article.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. -->
+
+<p>Copyright &copy; 2016 Free Software Foundation, Inc.</p>
+
+<p>This page is licensed under a <a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative
+Commons Attribution-NoDerivatives 4.0 International License</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.html" -->
+
+<p class="unprintable">Updated:
+<!-- timestamp start -->
+$Date: 2016/07/24 12:52:56 $
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+</body>
+</html>

Index: malware-games.html
===================================================================
RCS file: malware-games.html
diff -N malware-games.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ malware-games.html  24 Jul 2016 12:52:56 -0000      1.1
@@ -0,0 +1,144 @@
+<!--#include virtual="/server/header.html" -->
+<!-- Parent-Version: 1.79 -->
+<title>Malware in Games
+- GNU Project - Free Software Foundation</title>
+<!--#include virtual="/server/gnun/initial-translations-list.html" -->
+<style type="text/css" media="print,screen">
+<!--
+#content div.toc li { list-style: none; margin-bottom: 1em; }
+#content div.toc { margin-top: 1em; }
+-->
+</style>
+<!--#include virtual="/server/banner.html" -->
+<h2>Malware in Games</h2>
+
+<p><a href="/proprietary/proprietary.html">Other examples of proprietary
+malware</a></p>
+
+<div class="highlight-para">
+<p>
+<em>Malware</em> means software designed to function in ways that
+mistreat or harm the user.  (This does not include accidental errors.)
+</p>
+
+<p>
+Malware and nonfree software are two different issues.  The difference
+between <a href="/philosophy/free-sw.html">free software</a> and
+nonfree software is in <a
+href="/philosophy/free-software-even-more-important.html">
+whether the users have control of the program or vice versa</a>.  It's
+not directly a question of what the program <em>does</em> when it
+runs.  However, in practice nonfree software is often malware, because
+the developer's awareness that the users would be powerless to fix any
+malicious functionalities tempts the developer to impose some.
+</p>
+</div>
+
+<p>Here are examples of malware in games.</p>
+
+<ul>
+<li><p>Modern gratis game cr&hellip;apps
+    <a 
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/";>
+    collect a wide range of data about their users and their users' 
+    friends and associates</a>.</p>
+
+    <p>Even nastier, they do it through ad networks that merge the data
+    collected by various cr&hellip;apps and sites made by different 
+    companies.</p>
+
+    <p>They use this data to manipulate people to buy things, and hunt 
+    for &ldquo;whales&rdquo; who can be led to spend a lot of money. They 
+    also use a back door to manipulate the game play for specific players.</p>
+
+    <p>While the article describes gratis games, games that cost money 
+    can use the same tactics.</p>    
+</li>
+
+<li>
+<p>Oculus Rift games now have
+<a href="http://motherboard.vice.com/read/new-oculus-drm-cross-platform";>
+DRM meant to prevent running them on other systems</a>.</p>
+</li>
+
+<li>
+<p>Some proprietary <a
+href="http://www.theguardian.com/technology/2014/jan/19/apple-talking-cats-in-app-purchases";>
+games lure children to spend their parents' money</a>.
+</p>
+</li>
+
+<li><p>Angry Birds
+    <a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html";>
+    spies for companies, and the NSA takes advantage to spy through it too</a>.
+    Here's information on
+    <a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html";>
+    more spyware apps</a>.</p>
+    <p><a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data";>
+    More about NSA app spying</a>.</p>
+</li>
+</ul>
+
+</div><!-- for id="content", starts in the include above -->
+<!--#include virtual="/server/footer.html" -->
+<div id="footer">
+<div class="unprintable">
+
+<p>Please send general FSF &amp; GNU inquiries to
+<a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF.  Broken links and other corrections or suggestions can be sent
+to <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>.</p>
+
+<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to <a href="mailto:address@hidden";>
+        &lt;address@hidden&gt;</a>.</p>
+
+        <p>For information on coordinating and submitting translations of
+        our web pages, see <a
+        href="/server/standards/README.translations.html">Translations
+        README</a>. -->
+Please see the <a
+href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and submitting translations
+of this article.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. -->
+
+<p>Copyright &copy; 2016 Free Software Foundation, Inc.</p>
+
+<p>This page is licensed under a <a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative
+Commons Attribution-NoDerivatives 4.0 International License</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.html" -->
+
+<p class="unprintable">Updated:
+<!-- timestamp start -->
+$Date: 2016/07/24 12:52:56 $
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+</body>
+</html>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]