www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www philosophy/basic-freedoms.html philosophy/s...


From: Therese Godefroy
Subject: www philosophy/basic-freedoms.html philosophy/s...
Date: Tue, 5 Jun 2018 11:33:15 -0400 (EDT)

CVSROOT:        /webcvs/www
Module name:    www
Changes by:     Therese Godefroy <th_g> 18/06/05 11:33:14

Modified files:
        philosophy     : basic-freedoms.html 
                         surveillance-vs-democracy.html 
                         who-does-that-server-really-serve.html 
                         words-to-avoid.html 
        proprietary    : malware-apple.html malware-appliances.html 
                         malware-games.html malware-microsoft.html 
                         malware-mobiles.html 
                         proprietary-insecurity.html 
                         proprietary-sabotage.html 
                         proprietary-surveillance.html 

Log message:
        Fix dead links and forward loops (linc report June 2).

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/basic-freedoms.html?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/surveillance-vs-democracy.html?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/who-does-that-server-really-serve.html?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/words-to-avoid.html?cvsroot=www&r1=1.248&r2=1.249
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.html?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.html?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-games.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.html?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.html?cvsroot=www&r1=1.78&r2=1.79
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.html?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.html?cvsroot=www&r1=1.184&r2=1.185

Patches:
Index: philosophy/basic-freedoms.html
===================================================================
RCS file: /webcvs/www/www/philosophy/basic-freedoms.html,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- philosophy/basic-freedoms.html      18 Nov 2016 06:31:39 -0000      1.43
+++ philosophy/basic-freedoms.html      5 Jun 2018 15:33:14 -0000       1.44
@@ -34,7 +34,7 @@
   </li>
 
   <li>
-    <a href="http://www.factnet.org/";>F.A.C.T.Net Inc.</a>
+    <a href="http://www.factnetglobal.org/";>F.A.C.T.Net Inc.</a>
     is a non-profit Internet digest, news service, library, dialogue
     center, and archive dedicated to the promotion and defense of
     international free thought, free speech, and privacy rights.
@@ -104,7 +104,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/11/18 06:31:39 $
+$Date: 2018/06/05 15:33:14 $
 <!-- timestamp end -->
 </p>
 </div>

Index: philosophy/surveillance-vs-democracy.html
===================================================================
RCS file: /webcvs/www/www/philosophy/surveillance-vs-democracy.html,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- philosophy/surveillance-vs-democracy.html   5 Apr 2018 09:30:35 -0000       
1.61
+++ philosophy/surveillance-vs-democracy.html   5 Jun 2018 15:33:14 -0000       
1.62
@@ -299,8 +299,8 @@
 <p>Nowadays, security cameras have become surveillance cameras: they
 are connected to the Internet so recordings can be collected in a data
 center and saved forever.  In Detroit, the cops pressure businesses to
-give
-them <a 
href="http://www.detroitnews.com/story/news/local/detroit-city/2018/01/23/detroit-green-light/109524794/";>unlimited
+give them <a
+href="https://eu.detroitnews.com/story/news/local/detroit-city/2018/01/23/detroit-green-light/109524794/";>unlimited
 access to their surveillance cameras</a> so that they can look through
 them at any and all times.  This is already dangerous, but it is going
 to get worse.  Advances in face recognition may bring the day when
@@ -308,8 +308,8 @@
 who they talk with.</p>
 
 <p>Internet-connected cameras often have lousy digital security
-themselves, which
-means <a 
href="http://www.networkworld.com/community/blog/cia-wants-spy-you-through-your-appliances";>anyone
+themselves, which means <a
+href="https://www.csoonline.com/article/2221934/microsoft-subnet/cia-wants-to-spy-on-you-through-your-appliances.html";>anyone
 can watch what those cameras see</a>.  This makes internet-connected
 cameras a major threat to security as well as privacy.  For privacy's
 sake, we should ban the use of Internet-connected cameras aimed where
@@ -507,7 +507,7 @@
 police have their own jargon term for perjury,
 &ldquo;<a 
href="https://en.wikipedia.org/w/index.php?title=Police_perjury&amp;oldid=552608302";>testilying</a>,&rdquo;
 since they do it so frequently, particularly about protesters
-and <a href="http://photographyisnotacrime.com/";>photographers</a>.)
+and <a href="https://www.themaven.net/pinacnews/";>photographers</a>.)
 One city in California that required police to wear video cameras all
 the time
 found <a 
href="http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition";>their
@@ -609,7 +609,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/04/05 09:30:35 $
+$Date: 2018/06/05 15:33:14 $
 <!-- timestamp end -->
 </p>
 </div>

Index: philosophy/who-does-that-server-really-serve.html
===================================================================
RCS file: /webcvs/www/www/philosophy/who-does-that-server-really-serve.html,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- philosophy/who-does-that-server-really-serve.html   31 Mar 2018 01:56:21 
-0000      1.65
+++ philosophy/who-does-that-server-really-serve.html   5 Jun 2018 15:33:14 
-0000       1.66
@@ -200,7 +200,7 @@
 &ldquo;open&rdquo; and &ldquo;free&rdquo;.  Source code that is open
 source <a href="/philosophy/free-open-overlap.html">is, nearly always,
 free</a>.  However, the idea of
-an <a href="http://opendefinition.org/software-service";>&ldquo;open
+an <a href="https://opendefinition.org/ossd/";>&ldquo;open
 software&rdquo; service</a>, meaning one whose server software is open
 source and/or free, fails to address the issue of SaaSS.</p>
 
@@ -464,7 +464,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/03/31 01:56:21 $
+$Date: 2018/06/05 15:33:14 $
 <!-- timestamp end -->
 </p>
 </div>

Index: philosophy/words-to-avoid.html
===================================================================
RCS file: /webcvs/www/www/philosophy/words-to-avoid.html,v
retrieving revision 1.248
retrieving revision 1.249
diff -u -b -r1.248 -r1.249
--- philosophy/words-to-avoid.html      21 Apr 2018 19:25:58 -0000      1.248
+++ philosophy/words-to-avoid.html      5 Jun 2018 15:33:14 -0000       1.249
@@ -292,7 +292,7 @@
 </p>
 
 <p>
-The <a href="http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf";>
+The <a href="https://csrc.nist.gov/publications/detail/sp/800-145/final";>
 NIST definition of "cloud computing"</a> mentions three scenarios that
 raise different ethical issues: Software as a Service, Platform as a
 Service, and Infrastructure as a Service.  However, that definition
@@ -1349,7 +1349,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/04/21 19:25:58 $
+$Date: 2018/06/05 15:33:14 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/malware-apple.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-apple.html,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- proprietary/malware-apple.html      3 May 2018 19:45:57 -0000       1.69
+++ proprietary/malware-apple.html      5 Jun 2018 15:33:14 -0000       1.70
@@ -150,7 +150,7 @@
 
   <li>
   <p>The iPhone 7 contains DRM specifically designed to <a
-  
href="https://motherboard.vice.com/en_us/article/iphone-7-home-button-unreplaceable-repair-software-lock";>
+  
href="https://motherboard.vice.com/en_us/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock";>
   brick it if an &ldquo;unauthorized&rdquo; repair shop fixes it</a>.
   &ldquo;Unauthorized&rdquo; essentially means anyone besides Apple.</p>
 
@@ -206,7 +206,7 @@
       taken. Users would have no way to tell whether the phone is snooping on
       them.</p></li>
 
-  <li><p>iPhones <a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says";>send
+  <li><p>iPhones <a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/";>send
       lots of personal data to Apple's servers</a>.  Big Brother can
         get them from there.</p>
   </li>
@@ -359,7 +359,7 @@
   </li>
 
   <li><p><a
-  
href="http://motherboard.vice.com/read/switzerland-wants-a-single-universal-phone-charger-by-2017";>
+  
href="https://motherboard.vice.com/en_us/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017";>
   Apple uses DRM software to prevent people from charging an iThing with a 
   generic USB cable</a>.</p></li>
   
@@ -585,7 +585,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/05/03 19:45:57 $
+$Date: 2018/06/05 15:33:14 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/malware-appliances.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-appliances.html,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- proprietary/malware-appliances.html 4 Mar 2018 13:14:15 -0000       1.42
+++ proprietary/malware-appliances.html 5 Jun 2018 15:33:14 -0000       1.43
@@ -108,9 +108,9 @@
 </li>
 
 <li>
-<p>When Miele's Internet of Stings hospital disinfectant dishwasher is
-<a 
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit";>connected
 to the Internet,
-its security is crap</a>.</p>
+<p>When Miele's Internet of Stings hospital disinfectant dishwasher is <a
+href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit";>
+connected to the Internet, its security is crap</a>.</p>
 <p>For example, a cracker can gain access to the dishwasher's filesystem,
  infect it with malware, and force the dishwasher to launch attacks on
  other devices in the network. Since these dishwashers are used in hospitals,
@@ -309,7 +309,7 @@
 <li>
 <p> &ldquo;Self-encrypting&rdquo; disk drives do the encryption with
 proprietary firmware so you can't trust it.  Western Digital's <a
-href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption";>
+href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption";>
 &ldquo;My Passport&rdquo; drives have a back door</a>.</p>
 </li>
 
@@ -549,7 +549,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/03/04 13:14:15 $
+$Date: 2018/06/05 15:33:14 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/malware-games.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-games.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- proprietary/malware-games.html      1 Jan 2018 06:22:13 -0000       1.9
+++ proprietary/malware-games.html      5 Jun 2018 15:33:14 -0000       1.10
@@ -60,8 +60,8 @@
 </li>
 
 <li>
-<p>Oculus Rift games now have
-<a href="http://motherboard.vice.com/read/new-oculus-drm-cross-platform";>
+<p>Oculus Rift games now have <a
+href="https://motherboard.vice.com/en_us/article/vv77ea/new-oculus-drm-cross-platform";>
 DRM meant to prevent running them on other systems</a>.</p>
 </li>
 
@@ -140,7 +140,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/01/01 06:22:13 $
+$Date: 2018/06/05 15:33:14 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/malware-microsoft.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-microsoft.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- proprietary/malware-microsoft.html  3 May 2018 18:54:24 -0000       1.73
+++ proprietary/malware-microsoft.html  5 Jun 2018 15:33:14 -0000       1.74
@@ -150,7 +150,7 @@
   <li>
     <p>Microsoft has made Windows 7 and 8 cease to function on certain
       new computers,
-      <a 
href="https://support.microsoft.com/en-us/help/4012982/discusses-an-issue-in-which-you-receive-a-your-pc-uses-a-processor-tha";>effectively
+      <a 
href="https://support.microsoft.com/en-us/help/4012982/the-processor-is-not-supported-together-with-the-windows-version-that";>effectively
       forcing their owners to switch to Windows 10</a>.</p>
   </li>
 
@@ -288,7 +288,7 @@
     by force setting the telemetry mode to &ldquo;Full&rdquo;</a>.</p>
 
 <p>The <a
-href="https://docs.microsoft.com/en-us/windows/configuration/configure-windows-telemetry-in-your-organization#full-level";>
+href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level";>
  &ldquo;Full&rdquo; telemetry mode</a> allows Microsoft Windows
  engineers to access, among other things, registry keys
  <a href="https://technet.microsoft.com/en-us/library/cc939702.aspx";>which
@@ -348,7 +348,7 @@
 
   <li>Spyware in Windows 8: <a 
href="https://web.archive.org/web/20160313105805/http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/";>
   Windows Update snoops on the user.</a>
-  <a 
href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175";>
+  <a 
href="https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html";>
   Windows 8.1 snoops on local searches.</a> And there's a
   <a href="http://www.marketoracle.co.uk/Article40836.html";>
   secret NSA key in Windows</a>, whose functions we don't know.</li>
@@ -505,7 +505,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/05/03 18:54:24 $
+$Date: 2018/06/05 15:33:14 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/malware-mobiles.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-mobiles.html,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- proprietary/malware-mobiles.html    25 Jan 2018 19:08:16 -0000      1.55
+++ proprietary/malware-mobiles.html    5 Jun 2018 15:33:14 -0000       1.56
@@ -441,7 +441,7 @@
 
   <li>
   <p>The iPhone 7 contains DRM specifically designed to <a
-  
href="https://motherboard.vice.com/en_us/article/iphone-7-home-button-unreplaceable-repair-software-lock";>
+  
href="https://motherboard.vice.com/en_us/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock";>
   brick it if an &ldquo;unauthorized&rdquo; repair shop fixes it</a>.
   &ldquo;Unauthorized&rdquo; essentially means anyone besides Apple.</p>
 
@@ -530,7 +530,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/01/25 19:08:16 $
+$Date: 2018/06/05 15:33:14 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/proprietary-insecurity.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-insecurity.html,v
retrieving revision 1.78
retrieving revision 1.79
diff -u -b -r1.78 -r1.79
--- proprietary/proprietary-insecurity.html     3 May 2018 14:59:04 -0000       
1.78
+++ proprietary/proprietary-insecurity.html     5 Jun 2018 15:33:14 -0000       
1.79
@@ -156,9 +156,9 @@
 </li>
 
 <li>
-<p>When Miele's Internet of Stings hospital disinfectant dishwasher is
-<a 
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit";>connected
 to the Internet,
-its security is crap</a>.</p>
+<p>When Miele's Internet of Stings hospital disinfectant dishwasher is <a
+href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit";>
+connected to the Internet, its security is crap</a>.</p>
 
 <p>For example, a cracker can gain access to the dishwasher's filesystem, 
 infect it with malware, and force the dishwasher to launch attacks on other
@@ -223,8 +223,9 @@
 </li>
 
 <li>
-<p>Ransomware <a 
href="https://www.pentestpartners.com/blog/thermostat-ransomware-a-lesson-in-iot-security/";>has
-been developed for a thermostat that uses proprietary software</a>.</p>
+<p>Ransomware <a
+href="https://www.pentestpartners.com/security-blog/thermostat-ransomware-a-lesson-in-iot-security/";>
+has been developed for a thermostat that uses proprietary software</a>.</p>
 </li>
 
 <li>
@@ -452,7 +453,8 @@
 It is possible to kill people by taking control of medical implants by
 radio</a>.  Here
 is <a href="http://www.bbc.co.uk/news/technology-17631838";>more
-information</a>.  And <a 
href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html";>here</a>.
+information</a>.  And <a
+href="https://web.archive.org/web/20180203130244/http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html";>here</a>.
 </p>
 </li>
 
@@ -570,7 +572,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/05/03 14:59:04 $
+$Date: 2018/06/05 15:33:14 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/proprietary-sabotage.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-sabotage.html,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- proprietary/proprietary-sabotage.html       2 Feb 2018 16:25:50 -0000       
1.53
+++ proprietary/proprietary-sabotage.html       5 Jun 2018 15:33:14 -0000       
1.54
@@ -86,7 +86,7 @@
 
   <li>
   <p>The iPhone 7 contains DRM specifically designed to <a
-  
href="https://motherboard.vice.com/en_us/article/iphone-7-home-button-unreplaceable-repair-software-lock";>
+  
href="https://motherboard.vice.com/en_us/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock";>
   brick it if an &ldquo;unauthorized&rdquo; repair shop fixes it</a>.
   &ldquo;Unauthorized&rdquo; essentially means anyone besides Apple.</p>
 
@@ -99,7 +99,7 @@
   <li>
     <p>Microsoft has made Windows 7 and 8 cease to
       function on certain new computers,
-      <a 
href="https://support.microsoft.com/en-us/help/4012982/discusses-an-issue-in-which-you-receive-a-your-pc-uses-a-processor-tha";>effectively
+      <a 
href="https://support.microsoft.com/en-us/help/4012982/the-processor-is-not-supported-together-with-the-windows-version-that";>effectively
       forcing their owners to switch to Windows 10</a>.</p>
   </li>
 
@@ -385,7 +385,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/02/02 16:25:50 $
+$Date: 2018/06/05 15:33:14 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/proprietary-surveillance.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-surveillance.html,v
retrieving revision 1.184
retrieving revision 1.185
diff -u -b -r1.184 -r1.185
--- proprietary/proprietary-surveillance.html   19 May 2018 02:47:50 -0000      
1.184
+++ proprietary/proprietary-surveillance.html   5 Jun 2018 15:33:14 -0000       
1.185
@@ -182,7 +182,7 @@
       by force setting the telemetry mode to &ldquo;Full&rdquo;</a>.</p>
 
 <p>The <a
-href="https://docs.microsoft.com/en-us/windows/configuration/configure-windows-telemetry-in-your-organization#full-level";>
+href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level";>
  &ldquo;Full&rdquo; telemetry mode</a> allows Microsoft Windows
  engineers to access, among other things, registry keys
  <a href="https://technet.microsoft.com/en-us/library/cc939702.aspx";>which
@@ -581,7 +581,7 @@
       taken. Users would have no way to tell whether the phone is snooping on
       them.</p></li>
 
-  <li><p>iPhones <a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says";>send
+  <li><p>iPhones <a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/";>send
       lots of personal data to Apple's servers</a>.  Big Brother can
         get them from there.</p>
   </li>
@@ -591,7 +591,9 @@
         days.</p>
   </li>
 
-  <li><p>Users cannot make an Apple ID <a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool";>(necessary
 to install even gratis apps)</a>
+  <li><p>Users cannot make an Apple ID <a
+href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id";>
+      (necessary to install even gratis apps)</a>
       without giving a valid email address and receiving the code Apple
       sends to it.</p>
   </li>
@@ -952,11 +954,12 @@
       to its customers.</p>
   </li>
   
-  <li><p> &ldquo;CloudPets&rdquo; toys with microphones
-      <a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults";>leak
 childrens' conversations to the
-       manufacturer</a>. Guess what?
-      <a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings";>Crackers
 found a way to access the data</a>
-      collected by the manufacturer's snooping.</p>
+  <li><p> &ldquo;CloudPets&rdquo; toys with microphones <a
+      
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults";>
+      leak childrens' conversations to the manufacturer</a>. Guess what? <a
+      
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings";>
+      Crackers found a way to access the data</a> collected by the
+      manufacturer's snooping.</p>
 
     <p>That the manufacturer and the FBI could listen to these conversations
       was unacceptable by itself.</p></li>
@@ -1447,8 +1450,8 @@
       Baidu's Japanese-input and Chinese-input apps spy on users.</a></p>
   </li>
 
-  <li><p>Pages that contain &ldquo;Like&rdquo; buttons
-      <a 
href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html";>
+  <li><p>Pages that contain &ldquo;Like&rdquo; buttons <a
+      
href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html";>
       enable Facebook to track visitors to those pages</a>&mdash;even
       users that don't have Facebook accounts.</p>
   </li>
@@ -1661,7 +1664,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/05/19 02:47:50 $
+$Date: 2018/06/05 15:33:14 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]