www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-google.de.html malware-...


From: GNUN
Subject: www/proprietary malware-google.de.html malware-...
Date: Mon, 17 Jul 2017 01:30:13 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     17/07/17 01:30:12

Modified files:
        proprietary    : malware-google.de.html malware-mobiles.de.html 
                         proprietary-drm.de.html 
        proprietary/po : malware-mobiles.de-diff.html 
                         proprietary-drm.de-diff.html 
Added files:
        proprietary/po : malware-google.de-diff.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-google.de.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.de.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-drm.de.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.de-diff.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.de-diff.html?cvsroot=www&rev=1.1

Patches:
Index: malware-google.de.html
===================================================================
RCS file: /web/www/www/proprietary/malware-google.de.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- malware-google.de.html      8 May 2017 03:04:34 -0000       1.1
+++ malware-google.de.html      17 Jul 2017 05:30:12 -0000      1.2
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/malware-google.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/malware-google.de.po">
+ https://www.gnu.org/proprietary/po/malware-google.de.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/malware-google.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/malware-google.de-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2017-05-18" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/malware-google.en.html" -->
 
 <!--#include virtual="/server/header.de.html" -->
 <!-- Parent-Version: 1.83 -->
@@ -8,6 +13,7 @@
 
 <!--#include virtual="/proprietary/po/malware-google.translist" -->
 <!--#include virtual="/server/banner.de.html" -->
+<!--#include virtual="/server/outdated.de.html" -->
 <h2>Googles Software ist Schadsoftware</h2>
 
 <p><a href="/proprietary/">Weitere Beispiele proprietärer 
Schadsoftware</a></p>
@@ -346,7 +352,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Letzte Änderung:
 
-$Date: 2017/05/08 03:04:34 $
+$Date: 2017/07/17 05:30:12 $
 
 <!-- timestamp end -->
 </p>

Index: malware-mobiles.de.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.de.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- malware-mobiles.de.html     10 May 2017 14:30:05 -0000      1.15
+++ malware-mobiles.de.html     17 Jul 2017 05:30:12 -0000      1.16
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/malware-mobiles.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/malware-mobiles.de.po">
+ https://www.gnu.org/proprietary/po/malware-mobiles.de.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/malware-mobiles.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/malware-mobiles.de-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2017-05-18" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/malware-mobiles.en.html" -->
 
 <!--#include virtual="/server/header.de.html" -->
 <!-- Parent-Version: 1.79 -->
@@ -8,6 +13,7 @@
 
 <!--#include virtual="/proprietary/po/malware-mobiles.translist" -->
 <!--#include virtual="/server/banner.de.html" -->
+<!--#include virtual="/server/outdated.de.html" -->
 <h2>Schadprogramme auf Mobilgeräten</h2>
 
 <p><a href="/proprietary/">Weitere Beispiele proprietärer 
Schadsoftware</a></p>
@@ -544,7 +550,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Letzte Änderung:
 
-$Date: 2017/05/10 14:30:05 $
+$Date: 2017/07/17 05:30:12 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-drm.de.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-drm.de.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- proprietary-drm.de.html     28 Mar 2017 16:00:42 -0000      1.15
+++ proprietary-drm.de.html     17 Jul 2017 05:30:12 -0000      1.16
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/proprietary-drm.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/proprietary-drm.de.po">
+ https://www.gnu.org/proprietary/po/proprietary-drm.de.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/proprietary-drm.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/proprietary-drm.de-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2017-05-18" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/proprietary-drm.en.html" -->
 
 <!--#include virtual="/server/header.de.html" -->
 <!-- Parent-Version: 1.79 -->
@@ -9,6 +14,7 @@
 
 <!--#include virtual="/proprietary/po/proprietary-drm.translist" -->
 <!--#include virtual="/server/banner.de.html" -->
+<!--#include virtual="/server/outdated.de.html" -->
 <h2>Proprietäre Digitale Rechte-Minderung (DRM)</h2>
 
 <a href="/proprietary/">Weitere Beispiele proprietärer Schadsoftware</a>
@@ -314,7 +320,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Letzte Änderung:
 
-$Date: 2017/03/28 16:00:42 $
+$Date: 2017/07/17 05:30:12 $
 
 <!-- timestamp end -->
 </p>

Index: po/malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- po/malware-mobiles.de-diff.html     29 Jun 2015 08:28:53 -0000      1.4
+++ po/malware-mobiles.de-diff.html     17 Jul 2017 05:30:12 -0000      1.5
@@ -11,26 +11,17 @@
 </style></head>
 <body><pre>
 &lt;!--#include virtual="/server/header.html" --&gt;
-&lt;!-- Parent-Version: 1.77 --&gt;
+&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.79</strong></del></span> <span 
class="inserted"><ins><em>1.83</em></ins></span> --&gt;
 &lt;title&gt;Malware in Mobile Devices
 - GNU Project - Free Software Foundation&lt;/title&gt;
  &lt;!--#include virtual="/proprietary/po/malware-mobiles.translist" --&gt;
-<span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
-&lt;!--
-#content div.toc li { list-style: none; margin-bottom: 1em; }
-#content div.toc { margin-top: 1em; }
---&gt;
-&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Malware in Mobile Devices&lt;/h2&gt;
 
-<span class="removed"><del><strong>&lt;a</strong></del></span>
+&lt;p&gt;&lt;a href="/proprietary/proprietary.html"&gt;Other examples of 
proprietary
+malware&lt;/a&gt;&lt;/p&gt;
 
-<span class="inserted"><ins><em>&lt;p&gt;&lt;a</em></ins></span> 
href="/philosophy/proprietary.html"&gt;Other examples of proprietary 
-<span class="removed"><del><strong>malware&lt;/a&gt;</strong></del></span>
-<span class="inserted"><ins><em>malware&lt;/a&gt;&lt;/p&gt;
-
-&lt;div class="highlight-para"&gt;</em></ins></span>
+&lt;div class="highlight-para"&gt;
 &lt;p&gt;
 &lt;em&gt;Malware&lt;/em&gt; means software designed to function in ways that
 mistreat or harm the user.  (This does not include accidental errors.)
@@ -47,51 +38,45 @@
 the developer's awareness that the users would be powerless to fix any
 malicious functionalities tempts the developer to impose some.
 &lt;/p&gt;
-<span class="inserted"><ins><em>&lt;/div&gt;</em></ins></span>
+&lt;/div&gt;
 
 &lt;p&gt;Here are examples of malware in mobile devices.  See also
-the &lt;a href="/philosophy/malware-apple.html"&gt;the Apple malware
+the &lt;a href="/proprietary/malware-apple.html"&gt;the Apple malware
 page&lt;/a&gt; for malicious functionalities specific to the Apple 
iThings.&lt;/p&gt;
 
-<span class="inserted"><ins><em>&lt;div class="toc"&gt;
-&lt;div class="malfunctions"&gt;</em></ins></span>
+&lt;div class="summary" style="margin-top: 1em"&gt;
+&lt;h3&gt;Type&nbsp;of malware&lt;/h3&gt;
 &lt;ul&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many proprietary apps 
for mobile devices report which other
-       apps the user has
-       installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-       is doing this in a way that at least is visible and
-       optional&lt;/a&gt;. Not as bad as</strong></del></span>
-<span class="inserted"><ins><em>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;
 &lt;li&gt;&lt;a href="#back-doors"&gt;Back doors&lt;/a&gt;&lt;/li&gt;
 &lt;!--&lt;li&gt;&lt;a 
href="#censorship"&gt;Censorship&lt;/a&gt;&lt;/li&gt;--&gt;
 &lt;li&gt;&lt;a href="#insecurity"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;
 &lt;!--&lt;li&gt;&lt;a href="#sabotage"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;--&gt;
 &lt;!--&lt;li&gt;&lt;a 
href="#interference"&gt;Interference&lt;/a&gt;&lt;/li&gt;--&gt;
 &lt;li&gt;&lt;a href="#surveillance"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
-&lt;!--&lt;li&gt;&lt;a href="#drm"&gt;Digital restrictions
+&lt;li&gt;&lt;a href="#drm"&gt;Digital restrictions
     management&lt;/a&gt; or &ldquo;DRM&rdquo; means functionalities designed
-    to restrict</em></ins></span> what <span class="removed"><del><strong>the 
others do.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Portable phones</strong></del></span> <span 
class="inserted"><ins><em>users can do</em></ins></span> with <span 
class="removed"><del><strong>GPS will send</strong></del></span> <span 
class="inserted"><ins><em>the data in</em></ins></span> their <span 
class="removed"><del><strong>GPS location</strong></del></span> <span 
class="inserted"><ins><em>computers.&lt;/li&gt;--&gt;
+    to restrict what users can do with the data in their computers.&lt;/li&gt;
 &lt;li&gt;&lt;a href="#jails"&gt;Jails&lt;/a&gt;&mdash;systems
-    that impose censorship</em></ins></span> on <span 
class="removed"><del><strong>remote
-  command and users cannot stop them: &lt;a 
-  
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-  
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
 
-  (The US says it will eventually require all new portable phones to have 
-  GPS.)&lt;/p&gt;
-  &lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>application programs.&lt;/li&gt;
+    that impose censorship on application programs.&lt;/li&gt;
 &lt;li&gt;&lt;a href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems
     that reject any operating system not &ldquo;authorized&rdquo; by the
     manufacturer.&lt;/li&gt;
 &lt;/ul&gt;
 &lt;/div&gt;
-&lt;/div&gt;
 
 &lt;h3 id="back-doors"&gt;Mobile Back Doors&lt;/h3&gt;
-&lt;ul&gt;</em></ins></span>
-  &lt;li&gt;&lt;p&gt;Most mobile phones have a universal back door, which has 
been
+&lt;ul&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The</strong></del></span>
+  <span class="inserted"><ins><em>&lt;li id="back-door-microphone"&gt;
+    &lt;p&gt;The</em></ins></span> universal back door in portable phones &lt;a
+    
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;is
+    employed to listen through their microphones&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Most</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="back-door-malicious"&gt;
+    &lt;p&gt;Most</em></ins></span> mobile phones have a universal back door, 
which has been
   used to &lt;a
   
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
   turn them malicious&lt;/a&gt;.&lt;/p&gt;
@@ -103,38 +88,7 @@
   device.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a <span 
class="removed"><del><strong>href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
-  The NSA can tap data in smart phones, including iPhones, Android, and
-  BlackBerry&lt;/a&gt;. While there is not much detail here, it seems that 
this 
-  does not operate via the universal back door that we know nearly all 
-  portable phones have. It may involve exploiting various bugs. There are 
-  &lt;a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
-  lots of bugs in the phones' radio software&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones: &lt;a 
-  
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-  
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in Android phones (and Windows? laptops): The 
Wall Street
-  Journal (in an article blocked from us by a paywall) reports that &lt;a 
-  
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
-  the FBI can remotely activate the GPS and microphone in Android phones 
-  and laptops&lt;/a&gt;. (I suspect this means Windows laptops.) Here is &lt;a 
-  href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Some Motorola phones modify Android to &lt;a 
-  href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-  send personal data to Motorola.&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Some manufacturers add a &lt;a 
-  
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-  hidden general surveillance package such as Carrier IQ.&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a</strong></del></span> 
href="/philosophy/proprietary/proprietary-back-doors.html#samsung"&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
   Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -145,13 +99,11 @@
   called GTalkService).
   &lt;/p&gt;
 
-  &lt;p&gt;
-  Google can
-  also &lt;a 
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"&gt;forcibly
-  and remotely install apps&lt;/a&gt; through GTalkService (which seems, since
-  that article, to have been merged into Google Play).  This adds up to
-  a universal back door.
-  &lt;/p&gt;
+&lt;p&gt;Google can also &lt;a
+href="https://web.archive.org/web/20150520235257/https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/";
+title="at the Wayback Machine (archived May 20, 2015)"&gt;forcibly and remotely
+install apps&lt;/a&gt; through GTalkService (which seems, since that article, 
to have
+been merged into Google Play).  This adds up to a universal back door. 
&lt;/p&gt;
 
   &lt;p&gt;
   Although Google's &lt;em&gt;exercise&lt;/em&gt; of this power has not been
@@ -163,12 +115,40 @@
   decide who (if anyone) to trust in this way.
   &lt;/p&gt;
   &lt;/li&gt;
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 &lt;h3 id="insecurity"&gt;Mobile Insecurity&lt;/h3&gt;
-&lt;ul&gt;</em></ins></span>
-  &lt;li&gt;&lt;p&gt;&lt;a <span 
class="removed"><del><strong>href="http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html"&gt;
-  Some Android phones are tyrants&lt;/a&gt; (though someone 
found</strong></del></span> <span 
class="inserted"><ins><em>href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
+
+&lt;p&gt;These bugs are/were not intentional, so unlike the rest of the file
+  they do not count as malware. We mention them to refute the
+  supposition that prestigious proprietary software doesn't have grave
+  bugs.&lt;/p&gt;
+
+&lt;ul&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Many Android devices &lt;a 
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/"&gt;
+       can be hijacked through their Wi-Fi chips&lt;/a&gt; because of a bug in
+       Broadcom's non-free firmware.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Samsung
+phones &lt;a 
href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"&gt;have
+a security hole that allows an SMS message to install
+ransomeware&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Many proprietary payment apps &lt;a
+href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data"&gt;
+transmit personal data in an insecure way&lt;/a&gt;.
+However, the worse aspect of these apps is that
+&lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;payment is not 
anonymous&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
   The NSA can tap data in smart phones, including iPhones, Android, and
   BlackBerry&lt;/a&gt;. While there is not much detail here, it seems that this
   does not operate via the universal back door that we know nearly all
@@ -180,10 +160,185 @@
 
 &lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
 &lt;ul&gt;
+
+&lt;li&gt;
+  <span class="inserted"><ins><em>&lt;p&gt;Facebook's app listens all the 
time, &lt;a 
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop
+  on what people are listening to or watching&lt;/a&gt;. In addition, it may
+  be analyzing people's conversations to serve them with targeted
+  advertisements.&lt;/p&gt;
+&lt;/li&gt;
+
+
+&lt;li&gt;
+  &lt;p&gt;A
+    &lt;a 
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
+      research paper&lt;/a&gt; that investigated the privacy and security
+    of 283 Android VPN apps concluded that &ldquo;in spite of the
+    promises for privacy, security, and anonymity given by the
+    majority of VPN apps&mdash;millions of users may be unawarely subject
+    to poor security guarantees and abusive practices inflicted by
+    VPN apps.&rdquo;&lt;/p&gt;
+
+  &lt;p&gt;Following is a non-exhaustive list of proprietary VPN apps from
+    the research paper that tracks and infringes the privacy of
+    users:&lt;/p&gt;
+
+  &lt;dl&gt;
+    &lt;dt&gt;SurfEasy&lt;/dt&gt;
+    &lt;dd&gt;Includes tracking libraries such as NativeX and Appflood,
+      meant to track users and show them targeted ads.&lt;/dd&gt;
+
+    &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
+    &lt;dd&gt;Requests the &lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
+      permissions upon installation, meaning it has full access to
+      users' text messages.&lt;/dd&gt;
+
+    &lt;dt&gt;DroidVPN and TigerVPN&lt;/dt&gt;
+    &lt;dd&gt;Requests the &lt;code&gt;READ_LOGS&lt;/code&gt; permission to 
read logs
+      for other apps and also core system logs. TigerVPN developers
+      have confirmed this.&lt;/dd&gt;
+
+    &lt;dt&gt;HideMyAss&lt;/dt&gt;
+    &lt;dd&gt;Sends traffic to LinkedIn. Also, it stores detailed logs
+      and may turn them over to the UK government if
+      requested.&lt;/dd&gt;
+
+    &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
+    &lt;dd&gt;Injects JavaScript code into the HTML pages returned to the
+      users. The stated purpose of the JS injection is to display
+      ads. Uses roughly 5 tracking libraries. Also, it redirects the
+      user's traffic through valueclick.com (an advertising
+      website).&lt;/dd&gt;
+
+    &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
+    &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses
+      roughly 5 tracking libraries. Developers of this app have
+      confirmed that the non-premium version of the app does
+      JavaScript injection for tracking and display ads.&lt;/dd&gt;
+  &lt;/dl&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A 
study in 2015&lt;/a&gt; found that 90% of the top-ranked gratis
+  proprietary Android apps contained recognizable tracking libraries. For 
+  the paid proprietary apps, it was only 60%.&lt;/p&gt;
+
+  &lt;p&gt;The article confusingly describes gratis apps as &ldquo;free&rdquo;,
+  but most of them are not in fact
+  &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.
+  It also uses the ugly word &ldquo;monetize&rdquo;. A good replacement
+  for that word is &ldquo;exploit&rdquo;; nearly always that will fit
+  perfectly.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;</em></ins></span>
+  &lt;p&gt;A study found 234 Android apps that track users by
+       &lt;a 
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
+       to ultrasound from beacons placed in stores or played by TV 
programs&lt;/a&gt;.
+       &lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+               &lt;p&gt;Faceapp appears to do lots of surveillance, judging by 
+    &lt;a 
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+               how much access it demands to personal data in the 
device&lt;/a&gt;.
+               &lt;/p&gt;
+ &lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Pairs of Android apps can collude to transmit users' personal data
+       to servers. &lt;a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
+       tens of thousands of pairs that collude.&lt;/a&gt;&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Google Play intentionally sends app developers &lt;a
+href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
+the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not enough
+to legitimize actions like this.  At this point, most users have
+stopped reading the &ldquo;Terms and Conditions&rdquo; that spell out
+what they are &ldquo;consenting&rdquo; to.  Google should clearly
+and honestly identify the information it collects on users, instead
+of hiding it in an obscurely worded EULA.&lt;/p&gt;
+
+&lt;p&gt;However, to truly protect people's privacy, we must prevent Google
+and other companies from getting this personal information in the first
+place!&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Google Play (a component of Android) &lt;a
+  
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
+  tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;Even if you disable Google Maps and location tracking, you must
+  disable Google Play itself to completely stop the tracking.  This is
+  yet another example of nonfree software pretending to obey the user,
+  when it's actually doing something else.  Such a thing would be almost
+  unthinkable with free software.&lt;/p&gt;
+
+&lt;/li&gt;
+&lt;li&gt;
+   &lt;p&gt;Verizon &lt;a 
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
+        announced an opt-in proprietary search app that it will&lt;/a&gt;
+        pre-install on some of its phones. The app will give Verizon the same
+   information about the users' searches that Google normally gets when
+   they use its search engine.&lt;/p&gt;
+
+   &lt;p&gt;Currently, the app is &lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed on only one phone&lt;/a&gt;, and the
+    user must explicitly opt-in before the app takes effect. However, the
+    app remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
+    still spyware.&lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;&lt;p&gt;The Meitu photo-editing
+app &lt;a 
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;A half-blind security critique of a tracking app: it found that &lt;a
+href="http://www.consumerreports.org/mobile-security-software/glow-pregnancy-app-exposed-women-to-privacy-threats/"&gt;
+blatant flaws allowed anyone to snoop on a user's personal data&lt;/a&gt;.
+The critique fails entirely to express concern that the app sends the
+personal data to a server, where the &lt;em&gt;developer&lt;/em&gt; gets it 
all.
+This &ldquo;service&rdquo; is for suckers!&lt;/p&gt;
+
+&lt;p&gt;The server surely has a &ldquo;privacy policy,&rdquo; and surely it
+is worthless since nearly all of them are.&lt;/p&gt;
+&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apps that include 
+  &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+  Symphony surveillance software snoop on what radio and TV programs are 
+  playing nearby&lt;/a&gt;.  Also on what users post on various sites such as 
+  Facebook, Google+ and Twitter.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;More than 73% and 47% of mobile applications, both from 
Android and iOS
+  respectively &lt;a href="http://jots.pub/a/2015103001/index.php"&gt;share 
personal,
+  behavioral and location information&lt;/a&gt; of their users with third 
parties.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&ldquo;Cryptic communication,&rdquo; unrelated to the 
app's functionality,
+  was &lt;a 
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+  found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;The article should not have described these apps as
+  &ldquo;free&rdquo;&mdash;they are not free software.  The clear way to say
+  &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
+
+  &lt;p&gt;The article takes for granted that the usual analytics tools are
+  legitimate, but is that valid?  Software developers have no right to
+  analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools that 
snoop are
+  just as wrong as any other snooping.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li&gt;&lt;p&gt;Many proprietary apps for mobile devices report which 
other
   apps the user has
   installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-  is doing this in</em></ins></span> a way <span 
class="inserted"><ins><em>that at least is visible and
+  is doing this in a way that at least is visible and
   optional&lt;/a&gt;. Not as bad as what the others do.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -191,7 +346,7 @@
   command and users cannot stop them: &lt;a
   
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
   
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
-  (The US says it will eventually require all new portable 
phones</em></ins></span> to <span 
class="removed"><del><strong>crack</strong></del></span> <span 
class="inserted"><ins><em>have
+  (The US says it will eventually require all new portable phones to have
   GPS.)&lt;/p&gt;
   &lt;/li&gt;
 
@@ -201,18 +356,18 @@
 
   &lt;li&gt;&lt;p&gt;Spyware in Android phones (and Windows? laptops): The 
Wall Street
   Journal (in an article blocked from us by a paywall) reports that &lt;a
-  
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;</em></ins></span>
-  the <span class="removed"><del><strong>restriction). Fortunately, 
most</strong></del></span> <span class="inserted"><ins><em>FBI can remotely 
activate the GPS and microphone in</em></ins></span> Android <span 
class="removed"><del><strong>devices are not 
tyrants.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>phones
-  and laptops&lt;/a&gt;. (I suspect this means Windows laptops.) Here is &lt;a
+  
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
+  the FBI can remotely activate the GPS and microphone in Android phones
+  and <span class="inserted"><ins><em>in</em></ins></span> laptops&lt;/a&gt;. 
(I suspect this means Windows laptops.) Here is &lt;a
   href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Some Motorola phones modify Android to &lt;a
   href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-  send personal data to Motorola.&lt;/a&gt;&lt;/p&gt;</em></ins></span>
+  send personal data to Motorola.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;Some manufacturers add a 
&lt;a
+  &lt;li&gt;&lt;p&gt;Some manufacturers add a &lt;a
   
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
   hidden general surveillance package such as Carrier IQ.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
@@ -228,22 +383,53 @@
   &lt;/li&gt;
 &lt;/ul&gt;
 
+&lt;h3 id="drm"&gt;Mobile DRM&lt;/h3&gt;
+&lt;ul&gt;
+
+<span class="inserted"><ins><em>&lt;li id="android-apps-detect-rooting"&gt;
+&lt;p&gt;Google now allows Android apps to detect whether a device has been
+rooted, &lt;a 
href="http://www.androidpolice.com/2017/05/13/netflix-confirms-blocking-rootedunlocked-devices-app-still-working-now/"&gt;and
 refuse to install
+if so&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Update: Google &lt;i&gt;intentionally&lt;/i&gt; &lt;a 
href="https://torrentfreak.com/netflix-use-of-google-drm-means-rooted-android-devices-are-banned-170515/"&gt;
+changed Android so that apps can detect rooted devices and refuse to
+run on them&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;</em></ins></span>
+
+  &lt;li&gt;
+  &lt;p&gt;The iPhone 7 contains DRM specifically designed to &lt;a
+  
href="https://motherboard.vice.com/en_us/article/iphone-7-home-button-unreplaceable-repair-software-lock"&gt;
+  brick it if an &ldquo;unauthorized&rdquo; repair shop fixes it&lt;/a&gt;.
+  &ldquo;Unauthorized&rdquo; essentially means anyone besides Apple.&lt;/p&gt;
+
+  &lt;p&gt;The article uses the term &ldquo;lock&rdquo; to describe the DRM,
+  but we prefer to use the term &lt;a
+  href="https://gnu.org/philosophy/words-to-avoid.html#DigitalLocks"&gt;
+  digital handcuffs&lt;/a&gt;.&lt;/p&gt;
+ &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Android &lt;a 
href="https://developer.android.com/reference/android/drm/package-summary.html"&gt;contains
+        facilities specifically to support DRM&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
 &lt;h3 id="jails"&gt;Mobile Jails&lt;/h3&gt;
-&lt;ul&gt;</em></ins></span>
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/"&gt;
-  Mobile devices that come with Windows 8 are tyrants&lt;/a&gt;. &lt;a
-  
href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown"&gt;
-  Windows 8 on &ldquo;mobile devices&rdquo; is a jail.&lt;/a&gt;&lt;/p&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a
+  href="https://fsf.org/campaigns/secure-boot-vs-restricted-boot/"&gt;Mobile
+  devices that come with Windows 8 are tyrants&lt;/a&gt;. &lt;a
+  
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html"&gt;Windows
+  8 on &ldquo;mobile devices&rdquo; is a jail.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
-<span class="inserted"><ins><em>&lt;h3 id="tyrants"&gt;Mobile 
Tyrants&lt;/h3&gt;
+&lt;h3 id="tyrants"&gt;Mobile Tyrants&lt;/h3&gt;
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html"&gt;
   Some Android phones are tyrants&lt;/a&gt; (though someone found a way to 
crack
   the restriction). Fortunately, most Android devices are not 
tyrants.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;</em></ins></span>
+&lt;/ul&gt;
 &lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
 &lt;!--#include virtual="/server/footer.html" --&gt;
 &lt;div id="footer"&gt;
@@ -276,7 +462,7 @@
 
 &lt;!-- Regarding copyright, in general, standalone pages (as opposed to
      files generated as part of manuals) on the GNU web server should
-     be under CC BY-ND <span class="removed"><del><strong>3.0 
US.</strong></del></span> <span 
class="inserted"><ins><em>4.0.</em></ins></span>  Please do NOT change or 
remove this
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
      without talking with the webmasters or licensing team first.
      Please make sure the copyright date is consistent with the
      document.  For web pages, it is ok to list just the latest year the
@@ -291,18 +477,17 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; <span 
class="removed"><del><strong>2014</strong></del></span> <span 
class="inserted"><ins><em>2014, 2015</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, 
Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
-<span 
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/3.0/us/"&gt;Creative</strong></del></span>
-<span 
class="inserted"><ins><em>href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative</em></ins></span>
-Commons <span class="removed"><del><strong>Attribution-NoDerivs 3.0 United 
States</strong></del></span> <span 
class="inserted"><ins><em>Attribution-NoDerivatives 4.0 
International</em></ins></span> License&lt;/a&gt;.&lt;/p&gt;
+href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
+Commons Attribution-NoDerivatives 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
 
 &lt;!--#include virtual="/server/bottom-notes.html" --&gt;
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2015/06/29 08:28:53 $
+$Date: 2017/07/17 05:30:12 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-drm.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.de-diff.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- po/proprietary-drm.de-diff.html     22 Sep 2016 23:28:15 -0000      1.3
+++ po/proprietary-drm.de-diff.html     17 Jul 2017 05:30:12 -0000      1.4
@@ -11,7 +11,7 @@
 </style></head>
 <body><pre>
 &lt;!--#include virtual="/server/header.html" --&gt;
-&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.77</strong></del></span> <span 
class="inserted"><ins><em>1.79</em></ins></span> --&gt;
+&lt;!-- Parent-Version: 1.79 --&gt;
 &lt;title&gt;Proprietary DRM - GNU Project - Free Software 
Foundation&lt;/title&gt;
 &lt;!--#include virtual="/proprietary/po/proprietary-drm.translist" --&gt;
 &lt;!--#include virtual="/server/banner.html" --&gt;
@@ -19,12 +19,12 @@
 
 &lt;a href="/proprietary/proprietary.html"&gt;Other examples of proprietary 
malware&lt;/a&gt;
 
-<span class="inserted"><ins><em>&lt;p&gt;Nonfree (proprietary) software is 
very often malware (designed to
+&lt;p&gt;Nonfree (proprietary) software is very often malware (designed to
 mistreat the user). Nonfree software is controlled by its developers,
 which puts them in a position of power over the users; &lt;a
 href="/philosophy/free-software-even-more-important.html"&gt;that is the
 basic injustice&lt;/a&gt;. The developers often exercise that power to the
-detriment of the users they ought to serve.&lt;/p&gt;</em></ins></span>
+detriment of the users they ought to serve.&lt;/p&gt;
 
 &lt;p&gt;Here are examples of proprietary programs and systems that
 implement &lt;em&gt;digital restrictions management&lt;/em&gt; (DRM):
@@ -35,16 +35,48 @@
 &lt;p&gt;DRM is reinforced by
 &lt;a 
href="http://www.theguardian.com/technology/blog/2014/feb/05/digital-rights-management"&gt;
 censorship laws&lt;/a&gt; that ban software (and hardware) that can break
-the handcuffs.  Instead of these laws, DRM <span 
class="inserted"><ins><em>itself</em></ins></span> ought to be illegal.
+the handcuffs.  Instead of these laws, DRM itself ought to be illegal.
 Please support our campaign
 to &lt;a href="http://DefectiveByDesign.org/"&gt;abolish DRM&lt;/a&gt;.
 &lt;/p&gt;
 
 &lt;ul&gt;
-<span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;HP's firmware downgrade 
&lt;a 
href="https://www.theguardian.com/technology/2016/sep/20/hp-inkjet-printers-unofficial-cartridges-software-update"&gt;imposed
+
+<span class="inserted"><ins><em>&lt;li&gt;
+&lt;p&gt;Google now allows Android apps to detect whether a device has been
+rooted, &lt;a 
href="http://www.androidpolice.com/2017/05/13/netflix-confirms-blocking-rootedunlocked-devices-app-still-working-now/"&gt;and
 refuse to install
+if so&lt;/a&gt;. The Netflix app uses this ability to enforce DRM by refusing
+to install on rooted Android devices.&lt;/p&gt;
+
+&lt;p&gt;Update: Google &lt;i&gt;intentionally&lt;/i&gt; changed Android so 
that apps
+&lt;a 
href="https://torrentfreak.com/netflix-use-of-google-drm-means-rooted-android-devices-are-banned-170515/"&gt;can
 detect rooted devices and refuse to
+run on them&lt;/a&gt;. The Netflix app is proprietary malware, and one
+shouldn't use it. However, that does not make what Google has done
+any less wrong.&lt;/p&gt;
+&lt;/li&gt;</em></ins></span>
+
+&lt;li&gt;&lt;p&gt;Windows DRM
+files &lt;a 
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users"&gt;can
+be used to identify people browsing through Tor&lt;/a&gt;. The vulnerability
+exists only if you use Windows.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Chrome &lt;a 
href="http://boingboing.net/2017/01/30/google-quietly-makes-optiona.html"&gt;implements
+  DRM&lt;/a&gt;. So does Chromium, through nonfree software that is
+  effectively part of it.&lt;/p&gt;
+                                                                               
         
+  &lt;p&gt;&lt;a 
href="https://bugs.chromium.org/p/chromium/issues/detail?id=686430"&gt;More 
information&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;Android &lt;a 
href="https://developer.android.com/reference/android/drm/package-summary.html"&gt;contains
+facilities specifically to support DRM.&lt;/a&gt;&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;HP's firmware downgrade &lt;a 
href="https://www.theguardian.com/technology/2016/sep/20/hp-inkjet-printers-unofficial-cartridges-software-update"&gt;imposed
 DRM on some printers, which now refuse to function with third-party
 ink cartridges&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;</em></ins></span>
+&lt;/li&gt;
 
 &lt;li&gt;
 &lt;p&gt;Oculus Rift games
@@ -82,7 +114,7 @@
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;&lt;a 
href="http://science.opposingviews.com/kindle-drm-17841.html"&gt;
+&lt;p&gt;&lt;a 
href="http://techin.oureverydaylife.com/kindle-drm-17841.html"&gt;
 The Amazon Kindle has DRM&lt;/a&gt;.  That article is flawed in that it
 fails to treat DRM as an ethical question; it takes for granted that
 whatever Amazon might do to its users is legitimate.  It refers to DRM
@@ -211,7 +243,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2014, 2015, 2016 Free Software Foundation, 
Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, 
Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
@@ -221,7 +253,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2016/09/22 23:28:15 $
+$Date: 2017/07/17 05:30:12 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-google.de-diff.html
===================================================================
RCS file: po/malware-google.de-diff.html
diff -N po/malware-google.de-diff.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/malware-google.de-diff.html      17 Jul 2017 05:30:12 -0000      1.1
@@ -0,0 +1,301 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/proprietary/malware-google.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;!-- Parent-Version: 1.83 --&gt;
+&lt;title&gt;Google's Software Is Malware
+- GNU Project - Free Software Foundation&lt;/title&gt;
+ &lt;!--#include virtual="/proprietary/po/malware-google.translist" --&gt;
+&lt;!--#include virtual="/server/banner.html" --&gt;
+
+&lt;h2&gt;Google's Software is Malware&lt;/h2&gt;
+
+&lt;p&gt;&lt;a href="/proprietary/proprietary.html"&gt;Other examples of 
proprietary
+malware&lt;/a&gt;&lt;/p&gt;
+
+&lt;div class="highlight-para"&gt;
+&lt;p&gt;
+&lt;em&gt;Malware&lt;/em&gt; means software designed to function in ways that
+mistreat or harm the user.  (This does not include accidental errors.)
+This page explains how Google software is malware.
+&lt;/p&gt;
+
+&lt;p&gt;Malware and nonfree software are two different issues.  The
+difference between &lt;a href="/philosophy/free-sw.html"&gt;free
+software&lt;/a&gt; and nonfree software is in
+&lt;a href="/philosophy/free-software-even-more-important.html"&gt;
+whether the users have control of the program or vice versa&lt;/a&gt;.  It's
+not directly a question of what the program &lt;em&gt;does&lt;/em&gt; when it
+runs.  However, in practice nonfree software is often malware,
+because the developer's awareness that the users would be powerless to fix
+any malicious functionalities tempts the developer to impose some.
+&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;div class="summary" style="margin-top: 2em"&gt;
+    &lt;h3&gt;&lt;strong&gt;Type&nbsp;of malware&lt;/strong&gt;&lt;/h3&gt;
+    &lt;ul&gt;
+      &lt;li&gt;&lt;a href="#back-doors"&gt;Back doors&lt;/a&gt;&lt;/li&gt;
+      &lt;li&gt;&lt;a href="#censorship"&gt;Censorship&lt;/a&gt;&lt;/li&gt;
+      &lt;li&gt;&lt;a href="#insecurity"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;
+      &lt;!--&lt;li&gt;&lt;a 
href="#pressuring"&gt;Pressuring&lt;/a&gt;&lt;/li&gt;--&gt;
+      &lt;li&gt;&lt;a href="#sabotage"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
+      &lt;li&gt;&lt;a href="#surveillance"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
+      &lt;li&gt;&lt;a href="#drm"&gt;Digital restrictions
+         management&lt;/a&gt; or &ldquo;DRM&rdquo; means functionalities 
designed
+       to restrict what users can do with the data in their 
computers.&lt;/li&gt;
+      &lt;!--&lt;li&gt;&lt;a href="#jails"&gt;Jails&lt;/a&gt;&mdash;systems
+         that impose censorship on application programs.&lt;/li&gt;--&gt;
+      &lt;li&gt;&lt;a href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems
+       that reject any operating system not &ldquo;authorized&rdquo; by the
+       manufacturer.&lt;/li&gt;
+      &lt;!--&lt;li&gt;&lt;a 
href="#deception"&gt;Deception&lt;/a&gt;&lt;/li&gt;--&gt;
+    &lt;/ul&gt;
+&lt;/div&gt;
+
+&lt;h3 id="back-doors"&gt;Google Back Doors&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li id="back-door-dup1"&gt;&lt;p&gt;Chrome has a back door &lt;a 
href="https://consumerist.com/2017/01/18/why-is-google-blocking-this-ad-blocker-on-chrome/"&gt;for
+    remote erasure of add-ons&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;In Android, &lt;a 
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"&gt;
+       Google has a back door to remotely delete apps.&lt;/a&gt;  (It is in a 
program
+      called GTalkService).&lt;/p&gt;
+    
+    &lt;p&gt;Google can also
+      &lt;a 
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"&gt;
+       forcibly and remotely install apps&lt;/a&gt; through GTalkService (which
+      seems, since that article, to have been merged into Google Play).
+      This is not equivalent to a universal back door, but permits various
+      dirty tricks.&lt;/p&gt;
+    
+    &lt;p&gt;Although Google's &lt;em&gt;exercise&lt;/em&gt; of this power has 
not been
+      malicious so far, the point is that nobody should have such power,
+      which could also be used maliciously.  You might well decide to let a
+      security service remotely &lt;em&gt;deactivate&lt;/em&gt; programs that 
it
+      considers malicious.  But there is no excuse for allowing it
+      to &lt;em&gt;delete&lt;/em&gt; the programs, and you should have the 
right to
+      decide who (if anyone) to trust in this way.&lt;/p&gt;&lt;/li&gt;
+  
+&lt;/ul&gt;
+&lt;h3 id="censorship"&gt;Google Censorship&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Google Chrome, running on Windows, &lt;a
+  
href="https://thenextweb.com/google/2014/05/27/google-starts-blocking-extensions-chrome-web-store-windows-users-disables-installed-ones/"&gt;
+  is a jail&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+    
+  &lt;li&gt;&lt;p&gt;Google 
+      &lt;a 
href="http://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts"&gt;
+       offers censorship software&lt;/a&gt;, ostensibly for parents to put into
+      their children's computers.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Chrome is &lt;a href="#back-door-dup1"&gt;censored by a 
back door&lt;/a&gt;
+      described above.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/media/2016/feb/03/google-pulls-ad-blocking-app-for-samsung-phones"&gt;Google
+       censored installation of Samsung's ad-blocker,&lt;/a&gt; saying that
+      blocking ads is &ldquo;interference&rdquo; with the sites that
+      advertise (and surveil users through ads).&lt;/p&gt;
+    
+    &lt;p&gt;The ad-blocker is proprietary software, just like the program 
(Google
+      Play) that Google used to deny access to install it. Using a nonfree 
program
+      gives the owner power over you, and Google has exercised that 
power.&lt;/p&gt;
+    
+    &lt;p&gt;Google's censorship, unlike that of Apple and Microsoft, is not 
total:
+      Android allows users to install apps in other ways. You can install
+      free programs from f-droid.org.&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="insecurity"&gt;Google Insecurity&lt;/h3&gt;
+
+&lt;p&gt;These bugs are/were not intentional, so unlike the rest of the file
+  they do not count as malware. We mention them to refute the
+  supposition that prestigious proprietary software doesn't have grave
+  bugs.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
+      The NSA can tap data in smart phones, including iPhones, Android, and
+      BlackBerry&lt;/a&gt;.  While there is not much detail here, it seems that
+      this does not operate via the universal back door that we know nearly
+      all portable phones have.  It may involve exploiting various bugs.
+      There are &lt;a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
+      lots of bugs in the phones' radio 
software&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="sabotage"&gt;Google Sabotage&lt;/h3&gt;
+
+&lt;p&gt;The wrongs in this section are not precisely malware, since they do
+not involve making the program that runs in a way that hurts the user.
+But they are a lot like malware, since they are technical Google
+actions that harm to the users of specific Google software.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Google has long had &lt;a
+      
href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted"&gt;a
+      back door to remotely unlock an Android device&lt;/a&gt;, unless its
+      disk is encrypted (possible since Android 5.0 Lollipop, but
+      still not quite the default).&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="surveillance"&gt;Google Surveillance&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Google Chrome contains a key logger that
+      &lt;a 
href="http://www.favbrowser.com/google-chrome-spyware-confirmed/"&gt;
+       sends Google every URL typed in&lt;/a&gt;, one key at a time.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Google Chrome includes a module that
+      &lt;a 
href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/"&gt;
+       activates microphones and transmits audio to its 
servers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Spyware is present in some Android devices when they are 
sold.
+      Some Motorola phones modify Android to
+      &lt;a 
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+      send personal data to Motorola&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Spyware in Android phones (and Windows? laptops): The Wall
+      Street Journal (in an article blocked from us by a paywall)
+      reports that
+      &lt;a 
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
+      the FBI can remotely activate the GPS and microphone in Android
+      phones and laptops&lt;/a&gt;.
+      (I suspect this means Windows laptops.)  Here is
+      &lt;a href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Google's new voice messaging app &lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+      all conversations&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Nest</strong></del></span>
+  <span class="inserted"><ins><em>&lt;li id="nest-thermometers"&gt;
+    &lt;p&gt;Nest</em></ins></span> thermometers
+      send &lt;a 
href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
+      lot of data about the user&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Many web sites report all their visitors to Google by 
using
+      the Google Analytics service, which
+      &lt;a 
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/"&gt;
+      tells Google the IP address and the page that was 
visited.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Google Chrome makes it easy for an extension to do &lt;a
+    
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/"&gt;total
+    snooping on the user's browsing&lt;/a&gt;, and many of them do 
so.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="drm"&gt;Google DRM&lt;/h3&gt;
+&lt;ul&gt;
+
+&lt;li&gt;
+<span class="inserted"><ins><em>&lt;p&gt;Google now allows Android apps to 
detect whether a device has been
+rooted, &lt;a 
href="http://www.androidpolice.com/2017/05/13/netflix-confirms-blocking-rootedunlocked-devices-app-still-working-now/"&gt;and
 refuse to install
+if so&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Update: Google &lt;i&gt;intentionally&lt;/i&gt; changed Android so 
that apps
+&lt;a 
href="https://torrentfreak.com/netflix-use-of-google-drm-means-rooted-android-devices-are-banned-170515/"&gt;can
 detect rooted devices and refuse to
+run on them&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;</em></ins></span>
+  &lt;p&gt;Chrome &lt;a 
href="http://boingboing.net/2017/01/30/google-quietly-makes-optiona.html"&gt;implements
+  DRM&lt;/a&gt;. So does Chromium, through nonfree software that is
+  effectively part of it.&lt;/p&gt;
+                                                                               
         
+  &lt;p&gt;&lt;a 
href="https://bugs.chromium.org/p/chromium/issues/detail?id=686430"&gt;More 
information&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+  
+&lt;li&gt;&lt;p&gt;Android &lt;a 
href="https://developer.android.com/reference/android/drm/package-summary.html"&gt;contains
+facilities specifically to support DRM.&lt;/a&gt;&lt;/p&gt;
+&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="tyrants"&gt;Google Tyrants&lt;/h3&gt;
+&lt;ul&gt;
+ &lt;li&gt;
+&lt;p&gt;&lt;a 
href="http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html"&gt;
+Some Android phones made by Google are tyrants&lt;/a&gt; (though someone found 
a way to
+crack the restriction).  Fortunately, most Android devices are not tyrants.
+&lt;/p&gt;
+&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
+&lt;!--#include virtual="/server/footer.html" --&gt;
+&lt;div id="footer"&gt;
+&lt;div class="unprintable"&gt;
+
+&lt;p&gt;Please send general FSF &amp; GNU inquiries to
+&lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.
+There are also &lt;a href="/contact/"&gt;other ways to contact&lt;/a&gt;
+the FSF.  Broken links and other corrections or suggestions can be sent
+to &lt;a 
href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to &lt;a href="mailto:address@hidden"&gt;
+        &lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;For information on coordinating and submitting translations of
+        our web pages, see &lt;a
+        href="/server/standards/README.translations.html"&gt;Translations
+        README&lt;/a&gt;. --&gt;
+Please see the &lt;a
+href="/server/standards/README.translations.html"&gt;Translations
+README&lt;/a&gt; for information on coordinating and submitting translations
+of this article.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. --&gt;
+
+&lt;p&gt;Copyright &copy; 2017 Free Software Foundation, Inc.&lt;/p&gt;
+
+&lt;p&gt;This page is licensed under a &lt;a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
+Commons Attribution-NoDerivatives 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
+
+&lt;!--#include virtual="/server/bottom-notes.html" --&gt;
+
+&lt;p class="unprintable"&gt;Updated:
+&lt;!-- timestamp start --&gt;
+$Date: 2017/07/17 05:30:12 $
+&lt;!-- timestamp end --&gt;
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;
+&lt;/body&gt;
+&lt;/html&gt;
+</pre></body></html>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]