[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-amazon.it.html po/malwa...
From: |
GNUN |
Subject: |
www/proprietary malware-amazon.it.html po/malwa... |
Date: |
Wed, 22 Aug 2018 04:58:42 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 18/08/22 04:58:42
Modified files:
proprietary : malware-amazon.it.html
proprietary/po : malware-amazon.de.po malware-amazon.es.po
malware-amazon.fr.po
malware-amazon.it-diff.html
malware-amazon.it.po
malware-amazon.ja-diff.html
malware-amazon.ja.po malware-amazon.pot
malware-amazon.ru.po malware-google.de.po
malware-google.fr.po malware-google.pot
malware-google.ru.po
proprietary-surveillance.de.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-amazon.it.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.de.po?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.es.po?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.fr.po?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.it-diff.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.it.po?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.ja-diff.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.ja.po?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.pot?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.ru.po?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.de.po?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.fr.po?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.pot?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.ru.po?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.221&r2=1.222
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.298&r2=1.299
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.236&r2=1.237
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.74&r2=1.75
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.209&r2=1.210
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.158&r2=1.159
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.383&r2=1.384
Patches:
Index: malware-amazon.it.html
===================================================================
RCS file: /web/www/www/proprietary/malware-amazon.it.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- malware-amazon.it.html 21 Aug 2018 07:28:10 -0000 1.6
+++ malware-amazon.it.html 22 Aug 2018 08:58:41 -0000 1.7
@@ -3,7 +3,7 @@
https://www.gnu.org/proprietary/po/malware-amazon.it.po</a>'
--><!--#set var="ORIGINAL_FILE" value="/proprietary/malware-amazon.html"
--><!--#set var="DIFF_FILE"
value="/proprietary/po/malware-amazon.it-diff.html"
- --><!--#set var="OUTDATED_SINCE" value="2018-06-22" --><!--#set
var="ENGLISH_PAGE" value="/proprietary/malware-amazon.en.html" -->
+ --><!--#set var="OUTDATED_SINCE" value="2018-06-22" -->
<!--#include virtual="/server/header.it.html" -->
<!-- Parent-Version: 1.84 -->
@@ -228,7 +228,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2018/08/21 07:28:10 $
+$Date: 2018/08/22 08:58:41 $
<!-- timestamp end -->
</p>
Index: po/malware-amazon.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.de.po,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- po/malware-amazon.de.po 18 Aug 2018 12:29:07 -0000 1.9
+++ po/malware-amazon.de.po 22 Aug 2018 08:58:41 -0000 1.10
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-amazon.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-07-25 01:56+0000\n"
+"POT-Creation-Date: 2018-08-22 08:56+0000\n"
"PO-Revision-Date: 2017-09-26 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -97,28 +97,6 @@
"class=\"transnote\">[1]</a> und <a href=\"/philosophy/ebooks\">andere "
"schädliche Funktionen</a> verfügt."
-#. type: Content of: <div><h3>
-msgid "Type of malware"
-msgstr "Art der Schadsoftware"
-
-#. type: Content of: <div><ul><li>
-msgid "<a href=\"#back-doors\">Back doors</a>"
-msgstr "<a href=\"#back-doors\">Hintertüren</a>"
-
-#. type: Content of: <div><ul><li>
-msgid "<a href=\"#surveillance\">Surveillance</a>"
-msgstr "<a href=\"#surveillance\">Ãberwachung</a>"
-
-#. type: Content of: <div><ul><li>
-msgid ""
-"<a href=\"#drm\">Digital restrictions management</a> or “DRM” "
-"means functionalities designed to restrict what users can do with the data "
-"in their computers."
-msgstr ""
-"<a href=\"#drm\">Digitale Rechte-Minderung (DRM)</a><br />oder <em>Digitale "
-"Beschränkungsverwaltung</em><br />‑ Funktionen, entwickelt um zu "
-"beschränken, was Nutzer mit den Daten auf ihren Rechnern tun können."
-
#. type: Content of: <h3>
msgid "Amazon Kindle Swindle Back Doors"
msgstr "Amazon Sw(K)indle-Hintertüren"
@@ -247,6 +225,35 @@
"sicher sein, ob es nicht doch einen Weg gibt, aber es scheint klare "
"Anzeichen zu geben."
+#. type: Content of: <h3>
+# | Amazon [-Kindle Swindle-] {+Echo+} Surveillance
+#, fuzzy
+#| msgid "Amazon Kindle Swindle Surveillance"
+msgid "Amazon Echo Surveillance"
+msgstr "Amazon Sw(K)indle-Ãberwachung"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Crackers found a way to break the security of an Amazon device, and <a href="
+"\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it into a "
+"listening device</a> for them."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It was very difficult for them to do this. The job would be much easier for "
+"Amazon. And if some government such as China or the US told Amazon to do "
+"this, or cease to sell the product in that country, do you think Amazon "
+"would have the moral fiber to say no?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"These crackers are probably hackers too, but please <a href=\"https://"
+"stallman.org/articles/on-hacking.html\"> don't use “hacking” to "
+"mean “breaking security”</a>."
+msgstr ""
+
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# ! GNU should report facts briefly and crisply! Also resulting !
# ! consequences should not be swept away by an own opinion! !
@@ -345,6 +352,25 @@
msgid "Updated:"
msgstr "Letzte Ãnderung:"
+#~ msgid "Type of malware"
+#~ msgstr "Art der Schadsoftware"
+
+#~ msgid "<a href=\"#back-doors\">Back doors</a>"
+#~ msgstr "<a href=\"#back-doors\">Hintertüren</a>"
+
+#~ msgid "<a href=\"#surveillance\">Surveillance</a>"
+#~ msgstr "<a href=\"#surveillance\">Ãberwachung</a>"
+
+#~ msgid ""
+#~ "<a href=\"#drm\">Digital restrictions management</a> or “DRM” "
+#~ "means functionalities designed to restrict what users can do with the "
+#~ "data in their computers."
+#~ msgstr ""
+#~ "<a href=\"#drm\">Digitale Rechte-Minderung (DRM)</a><br />oder "
+#~ "<em>Digitale Beschränkungsverwaltung</em><br />‑ Funktionen, "
+#~ "entwickelt um zu beschränken, was Nutzer mit den Daten auf ihren Rechnern
"
+#~ "tun können."
+
#~ msgid ""
#~ "Copyright © 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
#~ msgstr "Copyright © 2014-2017 Free Software Foundation, Inc."
Index: po/malware-amazon.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.es.po,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- po/malware-amazon.es.po 27 Jul 2018 09:32:30 -0000 1.10
+++ po/malware-amazon.es.po 22 Aug 2018 08:58:41 -0000 1.11
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2018-07-25 01:56+0000\n"
+"POT-Creation-Date: 2018-08-22 08:56+0000\n"
"PO-Revision-Date: 2018-07-27 11:24+0200\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-08-22 08:56+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 1.8.11\n"
@@ -102,29 +103,6 @@
"\"Digital Restrictions Management\">DRM</abbr>)</a> y <a href=\"/philosophy/"
"ebooks.html\"> otras funcionalidades maliciosas</a>."
-#. type: Content of: <div><h3>
-msgid "Type of malware"
-msgstr "Tipo de <cite>malware</cite>:"
-
-#. type: Content of: <div><ul><li>
-msgid "<a href=\"#back-doors\">Back doors</a>"
-msgstr "<a href=\"#back-doors\">Puertas traseras</a>"
-
-#. type: Content of: <div><ul><li>
-msgid "<a href=\"#surveillance\">Surveillance</a>"
-msgstr "<a href=\"#surveillance\">Vigilancia</a>"
-
-#. type: Content of: <div><ul><li>
-msgid ""
-"<a href=\"#drm\">Digital restrictions management</a> or “DRM” "
-"means functionalities designed to restrict what users can do with the data "
-"in their computers."
-msgstr ""
-"<a href=\"#drm\">Gestión digital de restricciones («<abbr title=\"Digital "
-"Restrictions Management\">DRM</abbr>»)</a>: Son funcionalidades diseñadas "
-"para restringir lo que los usuarios pueden hacer con los datos en sus "
-"ordenadores."
-
#. type: Content of: <h3>
msgid "Amazon Kindle Swindle Back Doors"
msgstr "Puertas traseras en el <cite>Kindle Swindle</cite> de Amazon"
@@ -240,6 +218,35 @@
"no estamos completamente seguros de que no exista alguna, pero parece "
"bastante claro que no es asÃ. "
+#. type: Content of: <h3>
+# | Amazon [-Kindle Swindle-] {+Echo+} Surveillance
+#, fuzzy
+#| msgid "Amazon Kindle Swindle Surveillance"
+msgid "Amazon Echo Surveillance"
+msgstr "Vigilancia en el <cite>Kindle Swindle</cite> de Amazon"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Crackers found a way to break the security of an Amazon device, and <a href="
+"\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it into a "
+"listening device</a> for them."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It was very difficult for them to do this. The job would be much easier for "
+"Amazon. And if some government such as China or the US told Amazon to do "
+"this, or cease to sell the product in that country, do you think Amazon "
+"would have the moral fiber to say no?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"These crackers are probably hackers too, but please <a href=\"https://"
+"stallman.org/articles/on-hacking.html\"> don't use “hacking” to "
+"mean “breaking security”</a>."
+msgstr ""
+
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -316,6 +323,25 @@
msgid "Updated:"
msgstr "Ãltima actualización:"
+#~ msgid "Type of malware"
+#~ msgstr "Tipo de <cite>malware</cite>:"
+
+#~ msgid "<a href=\"#back-doors\">Back doors</a>"
+#~ msgstr "<a href=\"#back-doors\">Puertas traseras</a>"
+
+#~ msgid "<a href=\"#surveillance\">Surveillance</a>"
+#~ msgstr "<a href=\"#surveillance\">Vigilancia</a>"
+
+#~ msgid ""
+#~ "<a href=\"#drm\">Digital restrictions management</a> or “DRM” "
+#~ "means functionalities designed to restrict what users can do with the "
+#~ "data in their computers."
+#~ msgstr ""
+#~ "<a href=\"#drm\">Gestión digital de restricciones («<abbr
title=\"Digital "
+#~ "Restrictions Management\">DRM</abbr>»)</a>: Son funcionalidades
diseñadas "
+#~ "para restringir lo que los usuarios pueden hacer con los datos en sus "
+#~ "ordenadores."
+
#~ msgid ""
#~ "Copyright © 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
#~ msgstr ""
Index: po/malware-amazon.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.fr.po,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- po/malware-amazon.fr.po 18 Aug 2018 11:58:24 -0000 1.9
+++ po/malware-amazon.fr.po 22 Aug 2018 08:58:41 -0000 1.10
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2018-07-25 01:56+0000\n"
+"POT-Creation-Date: 2018-08-22 08:56+0000\n"
"PO-Revision-Date: 2018-08-18 13:52+0200\n"
"Last-Translator: Félicien Pillot <felicien AT gnu.org>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-08-22 08:56+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -100,29 +101,6 @@
"a> et <a href=\"/philosophy/ebooks.html\">d'autres fonctionnalités "
"malveillantes</a>."
-#. type: Content of: <div><h3>
-msgid "Type of malware"
-msgstr "Type de malveillance"
-
-#. type: Content of: <div><ul><li>
-msgid "<a href=\"#back-doors\">Back doors</a>"
-msgstr "<a href=\"#back-doors\">Portes dérobées</a>"
-
-#. type: Content of: <div><ul><li>
-msgid "<a href=\"#surveillance\">Surveillance</a>"
-msgstr "<a href=\"#surveillance\">Surveillance</a>"
-
-#. type: Content of: <div><ul><li>
-msgid ""
-"<a href=\"#drm\">Digital restrictions management</a> or “DRM” "
-"means functionalities designed to restrict what users can do with the data "
-"in their computers."
-msgstr ""
-"<a href=\"#drm\">Gestion numérique des restrictions</a>, ou <abbr title="
-"\"Digital Restrictions Management\">DRM</abbr> â fonctionnalités conçues
"
-"pour restreindre ce que les utilisateurs peuvent faire avec les données "
-"présentes sur leur ordinateur."
-
#. type: Content of: <h3>
msgid "Amazon Kindle Swindle Back Doors"
msgstr "Portes dérobées du Swindle"
@@ -236,6 +214,35 @@
"désactiver la modification à distance du logiciel, mais cela paraît assez "
"évident."
+#. type: Content of: <h3>
+# | Amazon [-Kindle Swindle-] {+Echo+} Surveillance
+#, fuzzy
+#| msgid "Amazon Kindle Swindle Surveillance"
+msgid "Amazon Echo Surveillance"
+msgstr "Surveillance par le Swindle"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Crackers found a way to break the security of an Amazon device, and <a href="
+"\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it into a "
+"listening device</a> for them."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It was very difficult for them to do this. The job would be much easier for "
+"Amazon. And if some government such as China or the US told Amazon to do "
+"this, or cease to sell the product in that country, do you think Amazon "
+"would have the moral fiber to say no?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"These crackers are probably hackers too, but please <a href=\"https://"
+"stallman.org/articles/on-hacking.html\"> don't use “hacking” to "
+"mean “breaking security”</a>."
+msgstr ""
+
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -311,3 +318,22 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid "Type of malware"
+#~ msgstr "Type de malveillance"
+
+#~ msgid "<a href=\"#back-doors\">Back doors</a>"
+#~ msgstr "<a href=\"#back-doors\">Portes dérobées</a>"
+
+#~ msgid "<a href=\"#surveillance\">Surveillance</a>"
+#~ msgstr "<a href=\"#surveillance\">Surveillance</a>"
+
+#~ msgid ""
+#~ "<a href=\"#drm\">Digital restrictions management</a> or “DRM” "
+#~ "means functionalities designed to restrict what users can do with the "
+#~ "data in their computers."
+#~ msgstr ""
+#~ "<a href=\"#drm\">Gestion numérique des restrictions</a>, ou <abbr title="
+#~ "\"Digital Restrictions Management\">DRM</abbr> â fonctionnalités
conçues "
+#~ "pour restreindre ce que les utilisateurs peuvent faire avec les données "
+#~ "présentes sur leur ordinateur."
Index: po/malware-amazon.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.it-diff.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- po/malware-amazon.it-diff.html 21 Aug 2018 07:28:11 -0000 1.5
+++ po/malware-amazon.it-diff.html 22 Aug 2018 08:58:41 -0000 1.6
@@ -67,7 +67,7 @@
management (DRM)</a> and <a href="/philosophy/ebooks.html">
other malicious functionalities</a>.</p>
-<div class="summary" style="margin-top: 1em">
+<span class="removed"><del><strong><div class="summary" style="margin-top:
1em">
<h3>Type of malware</h3>
<ul>
<li><a href="#back-doors">Back doors</a></li>
@@ -85,7 +85,7 @@
that reject any operating system not “authorized” by the
manufacturer.</li>-->
</ul>
-</div>
+</div></strong></del></span>
<h3 id="back-doors">Amazon Kindle Swindle Back Doors</h3>
<ul>
@@ -144,6 +144,24 @@
</li>
</ul>
+<span class="inserted"><ins><em><h3>Amazon Echo Surveillance</h3>
+<ul>
+ <li><p>Crackers found a way to break the security of an Amazon
device,
+ and <a
+ href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
+ turn it into a listening device</a> for them.</p>
+ <p>It was very difficult for them to do this. The job would be much
+ easier for Amazon. And if some government such as China or the
+ US told Amazon to do this, or cease to sell the product in that
+ country, do you think Amazon would have the moral fiber to say
+ no?</p>
+ <p>These crackers are probably hackers too, but please <a
+ href="https://stallman.org/articles/on-hacking.html">
+ don't use “hacking” to mean “breaking
+ security”</a>.</p>
+ </li>
+</ul></em></ins></span>
+
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
<div id="footer">
@@ -202,7 +220,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/08/21 07:28:11 $
+$Date: 2018/08/22 08:58:41 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-amazon.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.it.po,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- po/malware-amazon.it.po 25 Jul 2018 02:00:51 -0000 1.13
+++ po/malware-amazon.it.po 22 Aug 2018 08:58:41 -0000 1.14
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2018-07-25 01:56+0000\n"
+"POT-Creation-Date: 2018-08-22 08:56+0000\n"
"PO-Revision-Date: 2017-09-30 22:48+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -94,29 +94,6 @@
"\"gestione delle restrizioni digitali\")</a> ed <a href=\"/philosophy/ebooks."
"html\">altre funzionalità malevole</a>."
-#. type: Content of: <div><h3>
-msgid "Type of malware"
-msgstr "Tipo di malware"
-
-#. type: Content of: <div><ul><li>
-msgid "<a href=\"#back-doors\">Back doors</a>"
-msgstr "<a href=\"#back-doors\">Backdoor</a>"
-
-#. type: Content of: <div><ul><li>
-msgid "<a href=\"#surveillance\">Surveillance</a>"
-msgstr "<a href=\"#surveillance\">Sorveglianza</a>"
-
-#. type: Content of: <div><ul><li>
-msgid ""
-"<a href=\"#drm\">Digital restrictions management</a> or “DRM” "
-"means functionalities designed to restrict what users can do with the data "
-"in their computers."
-msgstr ""
-"<a href=\"#drm\">DRM</a> (che chiamiamo âDigital restrictions
managementâ, "
-"in italiano, âgestione digitale delle restrizioniâ) significa
funzionalità "
-"volte a limitare il controllo che gli utenti hanno sui dati contenuti nei "
-"propri computer."
-
#. type: Content of: <h3>
msgid "Amazon Kindle Swindle Back Doors"
msgstr "Backdoor di Amazon Kindle \"Swindle\""
@@ -231,6 +208,35 @@
"disattivare modifiche remote al software, quindi non possiamo essere "
"completamente certi, ma sembra chiaro che sia così."
+#. type: Content of: <h3>
+# | Amazon [-Kindle Swindle-] {+Echo+} Surveillance
+#, fuzzy
+#| msgid "Amazon Kindle Swindle Surveillance"
+msgid "Amazon Echo Surveillance"
+msgstr "Sorveglianza di Amazon Kindle \"Swindle\""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Crackers found a way to break the security of an Amazon device, and <a href="
+"\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it into a "
+"listening device</a> for them."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It was very difficult for them to do this. The job would be much easier for "
+"Amazon. And if some government such as China or the US told Amazon to do "
+"this, or cease to sell the product in that country, do you think Amazon "
+"would have the moral fiber to say no?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"These crackers are probably hackers too, but please <a href=\"https://"
+"stallman.org/articles/on-hacking.html\"> don't use “hacking” to "
+"mean “breaking security”</a>."
+msgstr ""
+
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -320,6 +326,25 @@
msgid "Updated:"
msgstr "Ultimo aggiornamento:"
+#~ msgid "Type of malware"
+#~ msgstr "Tipo di malware"
+
+#~ msgid "<a href=\"#back-doors\">Back doors</a>"
+#~ msgstr "<a href=\"#back-doors\">Backdoor</a>"
+
+#~ msgid "<a href=\"#surveillance\">Surveillance</a>"
+#~ msgstr "<a href=\"#surveillance\">Sorveglianza</a>"
+
+#~ msgid ""
+#~ "<a href=\"#drm\">Digital restrictions management</a> or “DRM” "
+#~ "means functionalities designed to restrict what users can do with the "
+#~ "data in their computers."
+#~ msgstr ""
+#~ "<a href=\"#drm\">DRM</a> (che chiamiamo âDigital restrictions "
+#~ "managementâ, in italiano, âgestione digitale delle restrizioniâ) "
+#~ "significa funzionalità volte a limitare il controllo che gli utenti hanno
"
+#~ "sui dati contenuti nei propri computer."
+
#~ msgid ""
#~ "Copyright © 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
#~ msgstr ""
Index: po/malware-amazon.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.ja-diff.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- po/malware-amazon.ja-diff.html 25 Jul 2018 02:00:51 -0000 1.4
+++ po/malware-amazon.ja-diff.html 22 Aug 2018 08:58:41 -0000 1.5
@@ -66,15 +66,30 @@
to present the specifics.</p></em></ins></span>
</div>
-<div <span
class="removed"><del><strong>class="toc"></strong></del></span> <span
class="inserted"><ins><em>class="toc c">
- <h3>Type of product:</h3>
+<div <span class="removed"><del><strong>class="toc">
+<div class="malfunctions"></strong></del></span> <span
class="inserted"><ins><em>class="toc c">
+ <h3>Type of product:</h3></em></ins></span>
<ul>
- <li><a href="#swindle">Kindle Swindle</a></li>
- <li><a href="#echo">Echo</a></li>
+<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
+ <li><a <span
class="removed"><del><strong>href="#back-doors">Back
doors</a></li>
+<!--<li><a
href="#censorship">Censorship</a></li>-->
+<!--<li><a
href="#insecurity">Insecurity</a></li>-->
+<!--<li><a href="#sabotage">Sabotage</a></li>-->
+<!--<li><a
href="#interference">Interference</a></li>--></strong></del></span>
<span
class="inserted"><ins><em>href="#swindle">Kindle Swindle</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="#surveillance">Surveillance</a></li>
+<li><a href="#drm">Digital restrictions
+ management</a> or “DRM” means functionalities designed
+ to restrict what users can do with the data in their computers.</li>
+<!--<li><a href="#jails">Jails</a>—systems
+ that impose censorship on application programs.</li>-->
+<!--<li><a href="#tyrants">Tyrants</a>—systems
+ that reject any operating system not “authorized” by the
+ manufacturer.</li>--></strong></del></span> <span
class="inserted"><ins><em>href="#echo">Echo</a></li></em></ins></span>
</ul>
</div>
+<span class="removed"><del><strong></div></strong></del></span>
-<h2 id="swindle">Malware in the Kindle Swindle</h2>
+<span class="inserted"><ins><em><h2 id="swindle">Malware in the Kindle
Swindle</h2>
<p>We refer to this product as the
<a href="/philosophy/why-call-it-the-swindle.html">Amazon
Swindle</a>
@@ -82,28 +97,6 @@
management (DRM)</a> and <a href="/philosophy/ebooks.html">
other malicious functionalities</a>.</p></em></ins></span>
-<div <span
class="removed"><del><strong>class="malfunctions"></strong></del></span>
<span class="inserted"><ins><em>class="summary" style="margin-top: 1em">
- <h3>Type of malware</h3></em></ins></span>
- <ul>
-<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
- <li><a href="#back-doors">Back doors</a></li>
- <!--<li><a
href="#censorship">Censorship</a></li>-->
- <!--<li><a
href="#insecurity">Insecurity</a></li>-->
- <!--<li><a
href="#sabotage">Sabotage</a></li>-->
- <!--<li><a
href="#interference">Interference</a></li>-->
- <li><a href="#surveillance">Surveillance</a></li>
- <li><a href="#drm">Digital restrictions
- management</a> or “DRM” means functionalities
designed
- to restrict what users can do with the data in their
computers.</li>
- <!--<li><a href="#jails">Jails</a>—systems
- that impose censorship on application programs.</li>-->
- <!--<li><a href="#tyrants">Tyrants</a>—systems
- that reject any operating system not “authorized” by the
- manufacturer.</li>-->
- </ul>
-</div>
-<span class="removed"><del><strong></div></strong></del></span>
-
<h3 id="back-doors">Amazon Kindle Swindle Back Doors</h3>
<ul>
<li>
@@ -159,6 +152,24 @@
disable remote changes to the software, so we are not completely sure
there isn't one, but it seems pretty clear.</p>
</li>
+</ul>
+
+<h3>Amazon Echo Surveillance</h3>
+<ul>
+ <li><p>Crackers found a way to break the security of an Amazon
device,
+ and <a
+ href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
+ turn it into a listening device</a> for them.</p>
+ <p>It was very difficult for them to do this. The job would be much
+ easier for Amazon. And if some government such as China or the
+ US told Amazon to do this, or cease to sell the product in that
+ country, do you think Amazon would have the moral fiber to say
+ no?</p>
+ <p>These crackers are probably hackers too, but please <a
+ href="https://stallman.org/articles/on-hacking.html">
+ don't use “hacking” to mean “breaking
+ security”</a>.</p>
+ </li>
</ul></em></ins></span>
</div><!-- for id="content", starts in the include above -->
@@ -219,7 +230,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/07/25 02:00:51 $
+$Date: 2018/08/22 08:58:41 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-amazon.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.ja.po,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- po/malware-amazon.ja.po 25 Jul 2018 02:00:51 -0000 1.5
+++ po/malware-amazon.ja.po 22 Aug 2018 08:58:41 -0000 1.6
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2018-07-25 01:56+0000\n"
+"POT-Creation-Date: 2018-08-22 08:56+0000\n"
"PO-Revision-Date: 2016-10-31 11:24+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -108,31 +108,6 @@
"proprietary-drm.html\">ãã£ã¸ã¿ã«å¶é管ç(DRM)</a>ã¨<a
href=\"/philosophy/"
"ebooks.html\">ã»ãã®æªæã®ããæ©è½</a>ãããããã§ãã"
-#. type: Content of: <div><h3>
-#, fuzzy
-#| msgid "<strong>Type of malware</strong>"
-msgid "Type of malware"
-msgstr "<strong>ãã«ã¦ã§ã¢ã®ã¿ã¤ã</strong>"
-
-#. type: Content of: <div><ul><li>
-#, fuzzy
-#| msgid "<a href=\"#back-doors\">Back doors</a>"
-msgid "<a href=\"#back-doors\">Back doors</a>"
-msgstr "<a href=\"#back-doors\">ããã¯ãã¢</a>"
-
-#. type: Content of: <div><ul><li>
-msgid "<a href=\"#surveillance\">Surveillance</a>"
-msgstr "<a href=\"#surveillance\">ç£è¦</a>"
-
-#. type: Content of: <div><ul><li>
-msgid ""
-"<a href=\"#drm\">Digital restrictions management</a> or “DRM” "
-"means functionalities designed to restrict what users can do with the data "
-"in their computers."
-msgstr ""
-"<a
href=\"#drm\">ãã£ã¸ã¿ã«æ¨©é管ç</a>ã¾ã㯓DRM”ã¯ã¦ã¼ã¶ããã®"
-"ã³ã³ãã¥ã¼ã¿ã®ãã¼ã¿ã«ã§ãããã¨ãå¶éããããã«è¨è¨ãããæ©è½ãæå³ãã¾ãã"
-
#. type: Content of: <h3>
msgid "Amazon Kindle Swindle Back Doors"
msgstr "ã¢ãã¾ã³ã®ãã³ãã«(ã¤ã³ããã³ãã«)ã®ããã¯ãã¢"
@@ -242,6 +217,34 @@
"one, but it seems pretty clear."
msgstr ""
+#. type: Content of: <h3>
+#, fuzzy
+#| msgid "Amazon Kindle Swindle Surveillance"
+msgid "Amazon Echo Surveillance"
+msgstr "ã¢ãã¾ã³ã»ãã³ãã«(ã¤ã³ããã³ãã«)ã®ç£è¦"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Crackers found a way to break the security of an Amazon device, and <a href="
+"\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it into a "
+"listening device</a> for them."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It was very difficult for them to do this. The job would be much easier for "
+"Amazon. And if some government such as China or the US told Amazon to do "
+"this, or cease to sell the product in that country, do you think Amazon "
+"would have the moral fiber to say no?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"These crackers are probably hackers too, but please <a href=\"https://"
+"stallman.org/articles/on-hacking.html\"> don't use “hacking” to "
+"mean “breaking security”</a>."
+msgstr ""
+
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -316,6 +319,28 @@
msgid "Updated:"
msgstr "æçµæ´æ°:"
+#, fuzzy
+#~| msgid "<strong>Type of malware</strong>"
+#~ msgid "Type of malware"
+#~ msgstr "<strong>ãã«ã¦ã§ã¢ã®ã¿ã¤ã</strong>"
+
+#, fuzzy
+#~| msgid "<a href=\"#back-doors\">Back doors</a>"
+#~ msgid "<a href=\"#back-doors\">Back doors</a>"
+#~ msgstr "<a href=\"#back-doors\">ããã¯ãã¢</a>"
+
+#~ msgid "<a href=\"#surveillance\">Surveillance</a>"
+#~ msgstr "<a href=\"#surveillance\">ç£è¦</a>"
+
+#~ msgid ""
+#~ "<a href=\"#drm\">Digital restrictions management</a> or “DRM” "
+#~ "means functionalities designed to restrict what users can do with the "
+#~ "data in their computers."
+#~ msgstr ""
+#~ "<a
href=\"#drm\">ãã£ã¸ã¿ã«æ¨©é管ç</a>ã¾ã㯓DRM”ã¯ã¦ã¼ã¶ãã"
+#~
"ã®ã³ã³ãã¥ã¼ã¿ã®ãã¼ã¿ã«ã§ãããã¨ãå¶éããããã«è¨è¨ãããæ©è½ãæå³ãã¾"
+#~ "ãã"
+
#~ msgid ""
#~ "Copyright © 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
#~ msgstr ""
Index: po/malware-amazon.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.pot,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- po/malware-amazon.pot 25 Jul 2018 02:00:51 -0000 1.5
+++ po/malware-amazon.pot 22 Aug 2018 08:58:41 -0000 1.6
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2018-07-25 01:56+0000\n"
+"POT-Creation-Date: 2018-08-22 08:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -78,25 +78,6 @@
"malicious functionalities</a>."
msgstr ""
-#. type: Content of: <div><h3>
-msgid "Type of malware"
-msgstr ""
-
-#. type: Content of: <div><ul><li>
-msgid "<a href=\"#back-doors\">Back doors</a>"
-msgstr ""
-
-#. type: Content of: <div><ul><li>
-msgid "<a href=\"#surveillance\">Surveillance</a>"
-msgstr ""
-
-#. type: Content of: <div><ul><li>
-msgid ""
-"<a href=\"#drm\">Digital restrictions management</a> or “DRM” "
-"means functionalities designed to restrict what users can do with the data "
-"in their computers."
-msgstr ""
-
#. type: Content of: <h3>
msgid "Amazon Kindle Swindle Back Doors"
msgstr ""
@@ -180,6 +161,32 @@
"one, but it seems pretty clear."
msgstr ""
+#. type: Content of: <h3>
+msgid "Amazon Echo Surveillance"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Crackers found a way to break the security of an Amazon device, and <a "
+"href=\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it "
+"into a listening device</a> for them."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It was very difficult for them to do this. The job would be much easier for "
+"Amazon. And if some government such as China or the US told Amazon to do "
+"this, or cease to sell the product in that country, do you think Amazon "
+"would have the moral fiber to say no?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"These crackers are probably hackers too, but please <a "
+"href=\"https://stallman.org/articles/on-hacking.html\"> don't use "
+"“hacking” to mean “breaking security”</a>."
+msgstr ""
+
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: po/malware-amazon.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.ru.po,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- po/malware-amazon.ru.po 25 Jul 2018 16:30:35 -0000 1.13
+++ po/malware-amazon.ru.po 22 Aug 2018 08:58:41 -0000 1.14
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2018-07-25 01:56+0000\n"
+"POT-Creation-Date: 2018-08-22 08:56+0000\n"
"PO-Revision-Date: 2018-06-22 08:54+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-08-22 08:56+0000\n"
#. type: Content of: <title>
msgid "Amazon's Software Is Malware - GNU Project - Free Software Foundation"
@@ -97,28 +98,6 @@
"\"/proprietary/proprietary-drm.html\">ÑиÑÑовое ÑпÑавление
огÑаниÑениÑми (DRM)"
"</a> и <a href=\"/philosophy/ebooks.html\"> дÑÑгие
вÑедоноÑнÑе ÑÑнкÑии</a>."
-#. type: Content of: <div><h3>
-msgid "Type of malware"
-msgstr "Ðид вÑеда"
-
-#. type: Content of: <div><ul><li>
-msgid "<a href=\"#back-doors\">Back doors</a>"
-msgstr "<a href=\"#back-doors\"> Ðазейки</a>"
-
-#. type: Content of: <div><ul><li>
-msgid "<a href=\"#surveillance\">Surveillance</a>"
-msgstr "<a href=\"#surveillance\">Слежка</a>"
-
-#. type: Content of: <div><ul><li>
-msgid ""
-"<a href=\"#drm\">Digital restrictions management</a> or “DRM” "
-"means functionalities designed to restrict what users can do with the data "
-"in their computers."
-msgstr ""
-"<a href=\"#drm\">ЦиÑÑовое ÑпÑавление
огÑаниÑениÑми</a>, или “"
-"DRM” ознаÑÐ°ÐµÑ ÑÑнкÑии, ÑпÑоекÑиÑованнÑе
Ð´Ð»Ñ Ð¾Ð³ÑаниÑÐµÐ½Ð¸Ñ Ñого, ÑÑо "
-"полÑзоваÑели могÑÑ Ð´ÐµÐ»Ð°ÑÑ Ñ Ð´Ð°Ð½Ð½Ñми на
ÑвоиÑ
компÑÑÑеÑаÑ
."
-
#. type: Content of: <h3>
msgid "Amazon Kindle Swindle Back Doors"
msgstr "Ðазейки в надÑваÑелÑÑÑве-Kindle"
@@ -235,6 +214,35 @@
"оÑклÑÑиÑÑ ÑдаленнÑе Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ Ð²
пÑогÑамме, Ñак ÑÑо Ð¼Ñ Ð½Ðµ полноÑÑÑÑ ÑвеÑенÑ, "
"ÑÑо Ñакого ÑпоÑоба неÑ, но ÑÑо, кажеÑÑÑ,
доволÑно-Ñаки ÑÑно."
+#. type: Content of: <h3>
+# | Amazon [-Kindle Swindle-] {+Echo+} Surveillance
+#, fuzzy
+#| msgid "Amazon Kindle Swindle Surveillance"
+msgid "Amazon Echo Surveillance"
+msgstr "Слежка"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Crackers found a way to break the security of an Amazon device, and <a href="
+"\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it into a "
+"listening device</a> for them."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It was very difficult for them to do this. The job would be much easier for "
+"Amazon. And if some government such as China or the US told Amazon to do "
+"this, or cease to sell the product in that country, do you think Amazon "
+"would have the moral fiber to say no?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"These crackers are probably hackers too, but please <a href=\"https://"
+"stallman.org/articles/on-hacking.html\"> don't use “hacking” to "
+"mean “breaking security”</a>."
+msgstr ""
+
# type: Content of: <div><div>
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
@@ -311,6 +319,24 @@
msgid "Updated:"
msgstr "Ðбновлено:"
+#~ msgid "Type of malware"
+#~ msgstr "Ðид вÑеда"
+
+#~ msgid "<a href=\"#back-doors\">Back doors</a>"
+#~ msgstr "<a href=\"#back-doors\"> Ðазейки</a>"
+
+#~ msgid "<a href=\"#surveillance\">Surveillance</a>"
+#~ msgstr "<a href=\"#surveillance\">Слежка</a>"
+
+#~ msgid ""
+#~ "<a href=\"#drm\">Digital restrictions management</a> or “DRM” "
+#~ "means functionalities designed to restrict what users can do with the "
+#~ "data in their computers."
+#~ msgstr ""
+#~ "<a href=\"#drm\">ЦиÑÑовое ÑпÑавление
огÑаниÑениÑми</a>, или “"
+#~ "DRM” ознаÑÐ°ÐµÑ ÑÑнкÑии,
ÑпÑоекÑиÑованнÑе Ð´Ð»Ñ Ð¾Ð³ÑаниÑÐµÐ½Ð¸Ñ Ñого, ÑÑо
"
+#~ "полÑзоваÑели могÑÑ Ð´ÐµÐ»Ð°ÑÑ Ñ Ð´Ð°Ð½Ð½Ñми на
ÑвоиÑ
компÑÑÑеÑаÑ
."
+
#~ msgid ""
#~ "Copyright © 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
#~ msgstr ""
Index: po/malware-google.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.de.po,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- po/malware-google.de.po 18 Aug 2018 12:29:08 -0000 1.24
+++ po/malware-google.de.po 22 Aug 2018 08:58:41 -0000 1.25
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-google.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-07-25 01:56+0000\n"
+"POT-Creation-Date: 2018-08-22 08:56+0000\n"
"PO-Revision-Date: 2018-05-07 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -367,6 +367,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some Google apps on Android <a href=\"https://www.theguardian.com/"
+"technology/2018/aug/13/google-location-tracking-android-iphone-mobile\"> "
+"record the user's location even when users disable “location "
+"tracking”</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"There are other ways to turn off the other kinds of location tracking, but "
+"most users will be tricked by the misleading control."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Tracking software in popular Android apps is pervasive and sometimes very "
"clever. Some trackers can <a href=\"https://theintercept.com/2017/11/24/"
"staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/\"> "
Index: po/malware-google.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.fr.po,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- po/malware-google.fr.po 18 Aug 2018 11:58:24 -0000 1.36
+++ po/malware-google.fr.po 22 Aug 2018 08:58:41 -0000 1.37
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2018-07-25 01:56+0000\n"
+"POT-Creation-Date: 2018-08-22 08:56+0000\n"
"PO-Revision-Date: 2018-08-18 13:52+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-08-22 08:56+0000\n"
#. type: Content of: <title>
msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
@@ -355,6 +356,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some Google apps on Android <a href=\"https://www.theguardian.com/"
+"technology/2018/aug/13/google-location-tracking-android-iphone-mobile\"> "
+"record the user's location even when users disable “location "
+"tracking”</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"There are other ways to turn off the other kinds of location tracking, but "
+"most users will be tricked by the misleading control."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Tracking software in popular Android apps is pervasive and sometimes very "
"clever. Some trackers can <a href=\"https://theintercept.com/2017/11/24/"
"staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/\"> "
Index: po/malware-google.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.pot,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- po/malware-google.pot 25 Jul 2018 02:00:51 -0000 1.23
+++ po/malware-google.pot 22 Aug 2018 08:58:41 -0000 1.24
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2018-07-25 01:56+0000\n"
+"POT-Creation-Date: 2018-08-22 08:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -253,6 +253,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some Google apps on Android <a "
+"href=\"https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile\">
"
+"record the user's location even when users disable “location "
+"tracking”</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"There are other ways to turn off the other kinds of location tracking, but "
+"most users will be tricked by the misleading control."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Tracking software in popular Android apps is pervasive and sometimes very "
"clever. Some trackers can <a "
"href=\"https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/\">
"
Index: po/malware-google.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.ru.po,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- po/malware-google.ru.po 25 Jul 2018 16:30:38 -0000 1.55
+++ po/malware-google.ru.po 22 Aug 2018 08:58:41 -0000 1.56
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2018-07-25 01:56+0000\n"
+"POT-Creation-Date: 2018-08-22 08:56+0000\n"
"PO-Revision-Date: 2018-06-22 09:03+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-08-22 08:56+0000\n"
#. type: Content of: <title>
msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
@@ -349,6 +350,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some Google apps on Android <a href=\"https://www.theguardian.com/"
+"technology/2018/aug/13/google-location-tracking-android-iphone-mobile\"> "
+"record the user's location even when users disable “location "
+"tracking”</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"There are other ways to turn off the other kinds of location tracking, but "
+"most users will be tricked by the misleading control."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Tracking software in popular Android apps is pervasive and sometimes very "
"clever. Some trackers can <a href=\"https://theintercept.com/2017/11/24/"
"staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/\"> "
Index: po/proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.221
retrieving revision 1.222
diff -u -b -r1.221 -r1.222
--- po/proprietary-surveillance.de.po 18 Aug 2018 12:29:08 -0000 1.221
+++ po/proprietary-surveillance.de.po 22 Aug 2018 08:58:41 -0000 1.222
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-08-02 07:27+0000\n"
+"POT-Creation-Date: 2018-08-22 08:56+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -713,6 +713,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some Google apps on Android <a href=\"https://www.theguardian.com/"
+"technology/2018/aug/13/google-location-tracking-android-iphone-mobile\"> "
+"record the user's location even when users disable “location "
+"tracking”</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"There are other ways to turn off the other kinds of location tracking, but "
+"most users will be tricked by the misleading control."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"More than <a href=\"https://www.theguardian.com/technology/2018/apr/16/child-"
"apps-games-android-us-google-play-store-data-sharing-law-privacy\">50% of "
"the 5,855 Android apps studied by researchers were found to snoop and "
@@ -2566,6 +2580,28 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Crackers found a way to break the security of an Amazon device, and <a href="
+"\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it into a "
+"listening device for them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It was very difficult for them to do this. The job would be much easier for "
+"Amazon. And if some government such as China or the US told Amazon to do "
+"this, or cease to sell the product in that country, do you think Amazon "
+"would have the moral fiber to say no?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"These crackers are probably hackers too, but please <a href=\"https://"
+"stallman.org/articles/on-hacking.html\"> don't use “hacking” to "
+"mean “breaking security”</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"A medical insurance company <a href=\"https://wolfstreet.com/2018/04/14/our-"
"dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-"
"what-happened-next\"> offers a gratis electronic toothbrush that snoops on "
Index: po/proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.298
retrieving revision 1.299
diff -u -b -r1.298 -r1.299
--- po/proprietary-surveillance.fr.po 18 Aug 2018 11:58:24 -0000 1.298
+++ po/proprietary-surveillance.fr.po 22 Aug 2018 08:58:41 -0000 1.299
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-08-02 07:27+0000\n"
+"POT-Creation-Date: 2018-08-22 08:56+0000\n"
"PO-Revision-Date: 2018-08-18 13:52+0200\n"
"Last-Translator: Félicien Pillot <felicien AT gnu.org>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-08-22 08:56+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -701,6 +702,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some Google apps on Android <a href=\"https://www.theguardian.com/"
+"technology/2018/aug/13/google-location-tracking-android-iphone-mobile\"> "
+"record the user's location even when users disable “location "
+"tracking”</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"There are other ways to turn off the other kinds of location tracking, but "
+"most users will be tricked by the misleading control."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"More than <a href=\"https://www.theguardian.com/technology/2018/apr/16/child-"
"apps-games-android-us-google-play-store-data-sharing-law-privacy\">50% of "
"the 5,855 Android apps studied by researchers were found to snoop and "
@@ -2456,6 +2471,28 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Crackers found a way to break the security of an Amazon device, and <a href="
+"\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it into a "
+"listening device for them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It was very difficult for them to do this. The job would be much easier for "
+"Amazon. And if some government such as China or the US told Amazon to do "
+"this, or cease to sell the product in that country, do you think Amazon "
+"would have the moral fiber to say no?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"These crackers are probably hackers too, but please <a href=\"https://"
+"stallman.org/articles/on-hacking.html\"> don't use “hacking” to "
+"mean “breaking security”</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"A medical insurance company <a href=\"https://wolfstreet.com/2018/04/14/our-"
"dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-"
"what-happened-next\"> offers a gratis electronic toothbrush that snoops on "
Index: po/proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- po/proprietary-surveillance.it-diff.html 2 Aug 2018 07:32:59 -0000
1.63
+++ po/proprietary-surveillance.it-diff.html 22 Aug 2018 08:58:41 -0000
1.64
@@ -362,34 +362,39 @@
<ul>
<li>
- <span class="removed"><del><strong><p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found that 90%</strong></del></span>
- <span class="inserted"><ins><em><p>More
- than <a
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%</em></ins></span>
- of the <span class="removed"><del><strong>top-ranked gratis
- proprietary</strong></del></span> <span
class="inserted"><ins><em>5,855</em></ins></span> Android apps <span
class="removed"><del><strong>contained recognizable tracking libraries. For
- the paid proprietary apps, it was only 60%.</p>
+ <span class="removed"><del><strong><p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found that 90% of the top-ranked gratis
+ proprietary Android</strong></del></span>
+ <span class="inserted"><ins><em><p>Some Google</em></ins></span> apps
<span class="removed"><del><strong>contained recognizable tracking libraries.
For</strong></del></span> <span class="inserted"><ins><em>on Android <a
+
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
+ record</em></ins></span> the <span class="removed"><del><strong>paid
proprietary apps, it was only 60%.</p>
<p>The article confusingly describes gratis apps as “free”,
- but most</strong></del></span> <span class="inserted"><ins><em>studied by
researchers were found to
- snoop and collect information about its users</a>.
40%</em></ins></span> of <span class="removed"><del><strong>them are not in fact
+ but most of them</strong></del></span> <span
class="inserted"><ins><em>user's location even when users disable
“location
+ tracking”</a>.</p>
+
+ <p>There</em></ins></span> are <span class="removed"><del><strong>not
in fact
<a href="/philosophy/free-sw.html">free software</a>.
- It also uses</strong></del></span> the <span
class="removed"><del><strong>ugly word “monetize”. A good
replacement
- for that word is “exploit”; nearly always that will fit
- perfectly.</p>
+ It also uses</strong></del></span> <span class="inserted"><ins><em>other
ways to turn off</em></ins></span> the <span class="removed"><del><strong>ugly
word “monetize”. A good replacement
+ for that word is “exploit”; nearly always
that</strong></del></span> <span class="inserted"><ins><em>other kinds of
location tracking,
+ but most users</em></ins></span> will <span
class="removed"><del><strong>fit
+ perfectly.</p></strong></del></span> <span
class="inserted"><ins><em>be tricked by the misleading
control.</p></em></ins></span>
</li>
<li>
- <p>Apps for BART
- <a
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop</strong></del></span>
- <span class="inserted"><ins><em>apps were found to insecurely
snitch</em></ins></span> on <span
class="removed"><del><strong>users</a>.</p>
- <p>With free software apps, users could <em>make sure</em>
that</strong></del></span> <span class="inserted"><ins><em>its users.
Furthermore,</em></ins></span>
- they <span class="removed"><del><strong>don't snoop.</p>
- <p>With proprietary apps, one can</strong></del></span> <span
class="inserted"><ins><em>could detect</em></ins></span> only <span
class="removed"><del><strong>hope that</strong></del></span> <span
class="inserted"><ins><em>some methods of snooping, in these
- proprietary apps whose source code</em></ins></span> they <span
class="removed"><del><strong>don't.</p>
+ <span class="removed"><del><strong><p>Apps for
BART</strong></del></span>
+ <span class="inserted"><ins><em><p>More
+ than</em></ins></span> <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
+ <p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
+ <p>With proprietary apps, one can only hope that they don't.</p>
</li>
<li>
- <p>A study found 234 Android</strong></del></span> <span
class="inserted"><ins><em>cannot look at. The other
+ <p>A study found 234</strong></del></span> <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
+ of the 5,855 Android apps studied by researchers were found to
+ snoop and collect information about its users</a>. 40% of the
+ apps were found to insecurely snitch on its users. Furthermore,
+ they could detect only some methods of snooping, in these
+ proprietary apps whose source code they cannot look at. The other
apps might be snooping in other ways.</p>
<p>This is evidence that proprietary apps generally work against
@@ -505,7 +510,7 @@
</li>
<li>
- <p>A study found 234 Android</em></ins></span> apps that track users by
+ <p>A study found 234</em></ins></span> Android apps that track users by
<a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
to ultrasound from beacons placed in stores or played by TV
programs</a>.
</p>
@@ -707,18 +712,7 @@
<li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
Several “features” of iOS seem to exist for no
possible purpose other than surveillance</a>. Here is the
- <a <span
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p>
- </li>
-</ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInTelephones">Spyware in Telephones</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInTelephones">#SpywareInTelephones</a>)</span>
-</div>
-
-<ul></strong></del></span> <span
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ <a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
Technical presentation</a>.</p>
</li>
</ul>
@@ -730,7 +724,7 @@
</div>
<ul>
- <li><p>Tracking software in popular Android apps is pervasive and
+ <span class="inserted"><ins><em><li><p>Tracking software in
popular Android apps is pervasive and
sometimes very clever. Some trackers can <a
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
follow a user's movements around a physical store by noticing WiFi
@@ -777,7 +771,7 @@
</li>
<li><p>Portable phones with GPS will send their GPS location on
- remote command and users cannot stop them:
+ remote command and users <span class="removed"><del><strong>cannot stop
them:</strong></del></span> <span class="inserted"><ins><em>cannot stop them:
<a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
(The US says it will eventually require all new portable phones
@@ -799,7 +793,7 @@
</div>
<ul>
- <span class="inserted"><ins><em><li><p>The Spanish football
streaming app
+ <li><p>The Spanish football streaming app
<a
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
the user's movements and listens through the
microphone</a>.</p>
@@ -825,8 +819,10 @@
<li>
<p>The moviepass app and dis-service spy on users even more than
users
- expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel before and after going to a movie</a>.
+ expected. It</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
+ (The US says it will eventually require all new portable
phones</strong></del></span> <span
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
+ where they travel before and after going</em></ins></span> to <span
class="removed"><del><strong>have GPS.)</p></strong></del></span> <span
class="inserted"><ins><em>a movie</a>.
</p>
<p>Don't be tracked — pay cash!</p>
@@ -834,23 +830,35 @@
<li><p>AI-powered driving apps can
<a
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
- track your every move</a>.</p>
+ track your every move</a>.</p></em></ins></span>
</li>
- <li><p>The Sarahah app
+ <li><p>The <span class="removed"><del><strong>nonfree Snapchat
app's principal purpose is</strong></del></span> <span
class="inserted"><ins><em>Sarahah app
<a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
uploads all phone numbers and email addresses</a> in user's address
- book to developer's server. Note that this article misuses the words
+ book</em></ins></span> to <span
class="removed"><del><strong>restrict</strong></del></span> <span
class="inserted"><ins><em>developer's server. Note that this article
misuses</em></ins></span> the <span class="removed"><del><strong>use of data
on</strong></del></span> <span class="inserted"><ins><em>words
“<a href="/philosophy/free-sw.html">free
software</a>”
referring to zero price.</p>
</li>
<li>
- <p>Facebook's app listens all the time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop
- on what people are listening to or watching</a>. In addition, it may
- be analyzing people's conversations to serve them with targeted
- advertisements.</p>
- </li></em></ins></span>
+ <p>Facebook's app listens all</em></ins></span> the <span
class="removed"><del><strong>user's computer, but it does surveillance
+ too:</strong></del></span> <span
class="inserted"><ins><em>time,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries</strong></del></span> <span
class="inserted"><ins><em>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop
+ on what people are listening</em></ins></span> to <span
class="removed"><del><strong>get the user's list of other</strong></del></span>
<span class="inserted"><ins><em>or watching</a>. In addition, it may
+ be analyzing</em></ins></span> people's <span
class="removed"><del><strong>phone
+ numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>conversations to serve them with targeted
+ advertisements.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong></ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInMobileApps">Spyware in Mobile Applications</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
+</div>
+
+<ul></strong></del></span>
<li>
<p>Faceapp appears to do lots of surveillance, judging by
@@ -963,52 +971,47 @@
<p>The FTC criticized this app because it asked the user to
approve sending personal data to the app developer but did not
ask about sending it to other companies. This shows the
- weakness of the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+ weakness of the reject-it-if-you-dislike-snooping
“solution” to surveillance: why should a flashlight
app send any information to anyone? A free software flashlight
app would not.</p>
</li>
</ul>
-
<div class="big-subsection">
- <h4 id="SpywareInGames">Spyware in Games</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
+ <h4 <span
class="removed"><del><strong>id="SpywareInGames">Spyware</strong></del></span>
<span
class="inserted"><ins><em>id="SpywareInToys">Spyware</em></ins></span> in
<span class="removed"><del><strong>Games</h4></strong></del></span> <span
class="inserted"><ins><em>Toys</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInGames">#SpywareInGames</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInToys">#SpywareInToys</a>)</span></em></ins></span>
</div>
<ul>
- <li><p>nVidia's proprietary GeForce Experience <a
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
- users identify themselves and then sends personal data about them to
- nVidia servers</a>.</p>
+ <span class="removed"><del><strong><li><p>nVidia's proprietary
GeForce Experience <a
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+ users identify themselves and then sends personal data about
them</strong></del></span>
+
+ <span class="inserted"><ins><em><li>
+ <p>A remote-control sex toy was found</em></ins></span> to
+ <span class="removed"><del><strong>nVidia servers</a>.</p>
</li>
- <li><p>Angry Birds
- <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies, and the NSA takes advantage</strong></del></span>
<span class="inserted"><ins><em>reject-it-if-you-dislike-snooping
- “solution”</em></ins></span> to <span
class="removed"><del><strong>spy through it too</a>.
- Here's</strong></del></span> <span
class="inserted"><ins><em>surveillance: why should a flashlight
- app send any</em></ins></span> information <span
class="removed"><del><strong>on
+ <li><p>Angry Birds</strong></del></span> <span
class="inserted"><ins><em>make</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies for companies, and</strong></del></span> <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings
+ of</em></ins></span> the <span class="removed"><del><strong>NSA takes
advantage to spy through it too</a>.
+ Here's information on
<a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
<p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA</strong></del></span> <span class="inserted"><ins><em>to
anyone? A free software flashlight</em></ins></span>
- app <span
class="removed"><del><strong>spying</a>.</p></strong></del></span>
<span class="inserted"><ins><em>would not.</p></em></ins></span>
+ More about NSA app spying</a>.</p></strong></del></span>
<span class="inserted"><ins><em>conversation between two
users</a>.</p></em></ins></span>
</li>
-</ul>
+<span class="removed"><del><strong></ul>
+
<div class="big-subsection">
<h4 id="SpywareInToys">Spyware in Toys</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
</div>
-<ul>
+<ul></strong></del></span>
<li>
- <span class="inserted"><ins><em><p>A remote-control sex toy was
found to make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings
- of the conversation between two users</a>.</p>
- </li>
-
- <li></em></ins></span>
<p>The “smart” toys My Friend Cayla and i-Que transmit
<a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,
a speech recognition company based in the U.S.</p>
@@ -1056,7 +1059,7 @@
Crackers</em></ins></span> found a way to access the data</a>
collected by the
manufacturer's snooping.</p>
- <p>That the manufacturer and the FBI could listen to these
conversations
+ <p>That the manufacturer and <span class="removed"><del><strong>the
FBI could listen</strong></del></span> <span class="inserted"><ins><em>the FBI
could listen to these conversations
was unacceptable by itself.</p></li>
<li><p>Barbie
@@ -1065,7 +1068,7 @@
</ul>
-<!-- <span class="inserted"><ins><em>#SpywareOnSmartWatches -->
+<!-- #SpywareOnSmartWatches -->
<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
<div class="big-section">
@@ -1079,20 +1082,23 @@
<li>
<p>An LG “smart” watch is designed
<a
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
- to report its location to someone else and to transmit
- conversations too</a>.</p>
+ to report its location to someone else and</em></ins></span> to <span
class="removed"><del><strong>these</strong></del></span> <span
class="inserted"><ins><em>transmit</em></ins></span>
+ conversations
+ <span class="removed"><del><strong>was unacceptable by
itself.</p></li>
+
+ <li><p>Barbie</strong></del></span> <span
class="inserted"><ins><em>too</a>.</p>
</li>
<li>
- <p>A very cheap “smart watch” comes with an Android app
- <a
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
- that connects to an unidentified site in China</a>.</p>
+ <p>A very cheap “smart watch” comes with an Android
app</em></ins></span>
+ <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span> <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
+ that connects</em></ins></span> to <span
class="removed"><del><strong>spy on children and
adults</a>.</p></strong></del></span> <span
class="inserted"><ins><em>an unidentified site in China</a>.</p>
<p>The article says this is a back door, but that could be a
misunderstanding. However, it is certainly surveillance, at
- least.</p>
+ least.</p></em></ins></span>
</li>
</ul>
-<!--</em></ins></span> #SpywareAtLowLevel -->
+<!-- #SpywareAtLowLevel -->
<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
<div class="big-section">
@@ -1281,7 +1287,25 @@
<div style="clear: left;"></div>
<ul>
- <span class="inserted"><ins><em><li><p>A medical insurance
+ <span class="inserted"><ins><em><li>
+ <p>Crackers found a way to break the security of an Amazon device,
+ and <a
+ href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
+ turn it into a listening device for them</a>.</p>
+
+ <p>It was very difficult for them to do this. The job would be much
+ easier for Amazon. And if some government such as China or the
+ US told Amazon to do this, or cease to sell the product in that
+ country, do you think Amazon would have the moral fiber to say
+ no?</p>
+
+ <p>These crackers are probably hackers too, but please <a
+ href="https://stallman.org/articles/on-hacking.html">
+ don't use “hacking” to mean “breaking
+ security”</a>.</p>
+ </li>
+
+ <li><p>A medical insurance
company <a
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
offers a gratis electronic toothbrush that snoops on its user
by sending usage data back over the Internet</a>.</p>
@@ -1793,7 +1817,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/08/02 07:32:59 $
+$Date: 2018/08/22 08:58:41 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.236
retrieving revision 1.237
diff -u -b -r1.236 -r1.237
--- po/proprietary-surveillance.it.po 2 Aug 2018 07:32:59 -0000 1.236
+++ po/proprietary-surveillance.it.po 22 Aug 2018 08:58:41 -0000 1.237
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-08-02 07:27+0000\n"
+"POT-Creation-Date: 2018-08-22 08:56+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -725,6 +725,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some Google apps on Android <a href=\"https://www.theguardian.com/"
+"technology/2018/aug/13/google-location-tracking-android-iphone-mobile\"> "
+"record the user's location even when users disable “location "
+"tracking”</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"There are other ways to turn off the other kinds of location tracking, but "
+"most users will be tricked by the misleading control."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"More than <a href=\"https://www.theguardian.com/technology/2018/apr/16/child-"
"apps-games-android-us-google-play-store-data-sharing-law-privacy\">50% of "
"the 5,855 Android apps studied by researchers were found to snoop and "
@@ -2395,6 +2409,28 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Crackers found a way to break the security of an Amazon device, and <a href="
+"\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it into a "
+"listening device for them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It was very difficult for them to do this. The job would be much easier for "
+"Amazon. And if some government such as China or the US told Amazon to do "
+"this, or cease to sell the product in that country, do you think Amazon "
+"would have the moral fiber to say no?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"These crackers are probably hackers too, but please <a href=\"https://"
+"stallman.org/articles/on-hacking.html\"> don't use “hacking” to "
+"mean “breaking security”</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"A medical insurance company <a href=\"https://wolfstreet.com/2018/04/14/our-"
"dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-"
"what-happened-next\"> offers a gratis electronic toothbrush that snoops on "
Index: po/proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.74
retrieving revision 1.75
diff -u -b -r1.74 -r1.75
--- po/proprietary-surveillance.ja-diff.html 2 Aug 2018 07:32:59 -0000
1.74
+++ po/proprietary-surveillance.ja-diff.html 22 Aug 2018 08:58:41 -0000
1.75
@@ -361,17 +361,25 @@
</div>
<ul>
- <span
class="removed"><del><strong><li><p>More</strong></del></span>
+ <span class="removed"><del><strong><li><p>More than 73% of the
most popular Android</strong></del></span>
<span class="inserted"><ins><em><li>
- <p>More</em></ins></span>
- than <span class="removed"><del><strong>73%</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%</em></ins></span>
- of the <span class="removed"><del><strong>most
popular</strong></del></span> <span
class="inserted"><ins><em>5,855</em></ins></span> Android apps
- <span class="removed"><del><strong><a
href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral</strong></del></span> <span class="inserted"><ins><em>studied by
researchers were found to
- snoop</em></ins></span> and <span class="removed"><del><strong>location
information</a></strong></del></span> <span
class="inserted"><ins><em>collect information about its users</a>.
40%</em></ins></span> of <span class="removed"><del><strong>their users with
third parties.</p>
- </li>
+ <p>Some Google</em></ins></span> apps <span
class="inserted"><ins><em>on Android</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
+ behavioral and</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
+ record the user's</em></ins></span> location <span
class="removed"><del><strong>information</a></strong></del></span> <span
class="inserted"><ins><em>even when users disable “location
+ tracking”</a>.</p>
+
+ <p>There are other ways to turn off the other kinds</em></ins></span>
of <span class="removed"><del><strong>their</strong></del></span> <span
class="inserted"><ins><em>location tracking,
+ but most</em></ins></span> users <span class="removed"><del><strong>with
third parties.</p></strong></del></span> <span
class="inserted"><ins><em>will be tricked by the misleading
control.</p></em></ins></span>
+</li>
+
+ <span class="removed"><del><strong><li><p>“Cryptic
communication,” unrelated</strong></del></span>
- <li><p>“Cryptic communication,” unrelated
to</strong></del></span> the <span class="removed"><del><strong>app's
functionality,
+<span class="inserted"><ins><em><li>
+ <p>More
+ than <a
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
+ of the 5,855 Android apps studied by researchers were
found</em></ins></span> to
+ <span class="inserted"><ins><em>snoop and collect information about its
users</a>. 40% of</em></ins></span> the <span
class="removed"><del><strong>app's functionality,
was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"></strong></del></span>
<span class="inserted"><ins><em>apps were</em></ins></span> found <span
class="inserted"><ins><em>to insecurely snitch on its users. Furthermore,
they could detect only some methods of snooping,</em></ins></span> in
<span class="removed"><del><strong>the 500 most popular gratis Android
apps</a>.</p>
@@ -379,101 +387,182 @@
<p>The article should not have described</strong></del></span> these
<span class="inserted"><ins><em>proprietary</em></ins></span> apps <span
class="removed"><del><strong>as
“free”—they are not free software.</strong></del></span>
<span class="inserted"><ins><em>whose source code they cannot look
at.</em></ins></span> The <span class="removed"><del><strong>clear way to say
- “zero price”</strong></del></span> <span
class="inserted"><ins><em>other
- apps might be snooping in other ways.</p>
+ “zero price” is “gratis.”</p>
- <p>This</em></ins></span> is <span
class="removed"><del><strong>“gratis.”</p>
+ <p>The article takes for granted that the usual analytics tools are
+ legitimate, but</strong></del></span> <span class="inserted"><ins><em>other
+ apps might be snooping in other ways.</p>
- <p>The article takes for granted</strong></del></span> <span
class="inserted"><ins><em>evidence</em></ins></span> that <span
class="inserted"><ins><em>proprietary apps generally work against
- their users. To protect their privacy and freedom, Android users need
- to get rid of</em></ins></span> the <span
class="removed"><del><strong>usual analytics tools are
- legitimate, but is that</strong></del></span> <span
class="inserted"><ins><em>proprietary software—both proprietary Android
+ <p>This</em></ins></span> is <span
class="inserted"><ins><em>evidence</em></ins></span> that <span
class="removed"><del><strong>valid? Software developers have no right to
+ analyze what</strong></del></span> <span
class="inserted"><ins><em>proprietary apps generally work against
+ their users. To protect their privacy and freedom,
Android</em></ins></span> users <span class="removed"><del><strong>are doing or
how. “Analytics” tools</strong></del></span> <span
class="inserted"><ins><em>need
+ to get rid of the proprietary software—both proprietary Android
by <a href="https://replicant.us">switching to Replicant</a>,
and
the proprietary apps by getting apps from the free software
- only <a href="https://f-droid.org/">F-Droid store</a>
- that <a href="https://f-droid.org/wiki/page/Antifeatures">
+ only <a href="https://f-droid.org/">F-Droid
store</a></em></ins></span>
+ that <span class="removed"><del><strong>snoop are
+ just as wrong as any other snooping.</p></strong></del></span> <span
class="inserted"><ins><em><a
href="https://f-droid.org/wiki/page/Antifeatures">
prominently warns the user if an app contains
- anti-features</a>.</p>
+ anti-features</a>.</p></em></ins></span>
</li>
+ <span
class="removed"><del><strong><li><p>Gratis</strong></del></span>
-<li>
- <p>20 dishonest Android apps
- recorded <a
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
- calls and sent them and text messages and emails to
+<span class="inserted"><ins><em><li>
+ <p>20 dishonest</em></ins></span> Android apps <span
class="removed"><del><strong>(but not <a
href="/philosophy/free-sw.html">free software</a>)
+ connect to 100</strong></del></span>
+ <span class="inserted"><ins><em>recorded</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
<span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
+ calls</em></ins></span> and <span
class="removed"><del><strong>advertising</a> URLs,</strong></del></span>
<span class="inserted"><ins><em>sent them and text messages and emails to
snoopers</a>.</p>
- <p>Google did not intend to make these apps spy; on the contrary, it
- worked in various ways to prevent that, and deleted these apps
- after discovering what they did. So we cannot blame Google
+ <p>Google did not intend to make these apps spy;</em></ins></span> on
the <span class="removed"><del><strong>average.</p>
+ </li>
+ <li><p>Spyware is present</strong></del></span> <span
class="inserted"><ins><em>contrary, it
+ worked</em></ins></span> in <span class="removed"><del><strong>some
Android devices when</strong></del></span> <span
class="inserted"><ins><em>various ways to prevent that, and deleted these apps
+ after discovering what</em></ins></span> they <span
class="inserted"><ins><em>did. So we cannot blame Google
specifically for the snooping of these apps.</p>
<p>On the other hand, Google redistributes nonfree Android apps, and
therefore shares in the responsibility for the injustice of their
being nonfree. It also distributes its own nonfree apps, such as
Google
- Play, <a
href="/philosophy/free-software-even-more-important.html">which
- are malicious</a>.</p>
+ Play, <a
href="/philosophy/free-software-even-more-important.html">which</em></ins></span>
+ are <span class="removed"><del><strong>sold.
+ Some Motorola phones modify</strong></del></span> <span
class="inserted"><ins><em>malicious</a>.</p>
<p>Could Google have done a better job of preventing apps from
- cheating? There is no systematic way for Google, or Android
- users, to inspect executable proprietary apps to see what they
+ cheating? There is no systematic way for Google, or</em></ins></span>
Android
+ <span class="inserted"><ins><em>users,</em></ins></span> to
+ <span class="removed"><del><strong><a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ send personal data</strong></del></span> <span
class="inserted"><ins><em>inspect executable proprietary apps</em></ins></span>
to <span class="removed"><del><strong>Motorola</a>.</p>
+ </li>
+
+ <li><p>Some manufacturers add</strong></del></span> <span
class="inserted"><ins><em>see what they
do.</p>
<p>Google could demand the source code for these apps, and study the
source code somehow to determine whether they mistreat users in
- various ways. If it did a good job of this, it could more or less
- prevent such snooping, except when the app developers are clever
- enough to outsmart the checking.</p>
+ various ways. If it did</em></ins></span> a
+ <span class="removed"><del><strong><a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general surveillance package</strong></del></span> <span
class="inserted"><ins><em>good job of this, it could more or less
+ prevent</em></ins></span> such <span class="removed"><del><strong>as
Carrier IQ.</a></p>
+ </li>
+
+ <li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
+ Samsung's back door</a> provides access</strong></del></span>
<span class="inserted"><ins><em>snooping, except when the app developers are
clever
+ enough</em></ins></span> to <span class="removed"><del><strong>any file
on</strong></del></span> <span
class="inserted"><ins><em>outsmart</em></ins></span> the <span
class="removed"><del><strong>system.</p>
+ </li>
+</ul>
+
+
+
+<!-- #SpywareOnMobiles -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>checking.</p>
<p>But since Google itself develops malicious apps, we cannot trust
- Google to protect us. We must demand release of source code to the
- public, so we can depend on each other.</p>
+ Google</em></ins></span> to <span class="removed"><del><strong>place new
items on top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareIniThings">Spyware in iThings</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
+</div>
+
+<ul>
+ <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
+ lots</strong></del></span> <span class="inserted"><ins><em>protect us.
We must demand release</em></ins></span> of <span
class="removed"><del><strong>personal data</strong></del></span> <span
class="inserted"><ins><em>source code</em></ins></span> to <span
class="removed"><del><strong>Apple's servers</a>. Big
Brother</strong></del></span> <span class="inserted"><ins><em>the
+ public, so we</em></ins></span> can
+ <span class="removed"><del><strong>get them from there.</p>
+ </li>
+
+ <li><p>The iMessage app</strong></del></span> <span
class="inserted"><ins><em>depend</em></ins></span> on <span
class="removed"><del><strong>iThings</strong></del></span> <span
class="inserted"><ins><em>each other.</p>
</li>
<li>
- <p>A
- <a
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
- research paper</a> that investigated the privacy and security
- of 283 Android VPN apps concluded that “in spite of the
- promises for privacy, security, and anonymity given by the
- majority of VPN apps—millions of users may be unawarely subject
- to poor security guarantees and abusive practices inflicted by
+ <p>A</em></ins></span>
+ <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every phone number</strong></del></span> <span
class="inserted"><ins><em>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
+ research paper</a></em></ins></span> that <span
class="inserted"><ins><em>investigated</em></ins></span> the <span
class="removed"><del><strong>user types into
it</a>;</strong></del></span> <span class="inserted"><ins><em>privacy and
security
+ of 283 Android VPN apps concluded that “in spite
of</em></ins></span> the <span class="removed"><del><strong>server records
these numbers</strong></del></span>
+ <span class="inserted"><ins><em>promises</em></ins></span> for <span
class="removed"><del><strong>at least 30
+ days.</p>
+ </li>
+
+ <li><p>Users cannot make an Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install even gratis apps)</a>
+ without giving a valid email address</strong></del></span> <span
class="inserted"><ins><em>privacy, security,</em></ins></span> and <span
class="removed"><del><strong>receiving</strong></del></span> <span
class="inserted"><ins><em>anonymity given by</em></ins></span> the <span
class="removed"><del><strong>code Apple
+ sends</strong></del></span>
+ <span class="inserted"><ins><em>majority of VPN apps—millions of
users may be unawarely subject</em></ins></span>
+ to <span class="removed"><del><strong>it.</p>
+ </li>
+
+ <li><p>Around 47%</strong></del></span> <span
class="inserted"><ins><em>poor security guarantees and abusive practices
inflicted by
VPN apps.”</p>
- <p>Following is a non-exhaustive list of proprietary VPN apps from
- the research paper that tracks and infringes the privacy of
- users:</p>
+ <p>Following is a non-exhaustive list</em></ins></span> of <span
class="removed"><del><strong>the most popular iOS</strong></del></span> <span
class="inserted"><ins><em>proprietary VPN</em></ins></span> apps
+ <span class="removed"><del><strong><a
href="http://jots.pub/a/2015103001/index.php">share personal,
+ behavioral</strong></del></span> <span class="inserted"><ins><em>from
+ the research paper that tracks</em></ins></span> and <span
class="removed"><del><strong>location
information</a></strong></del></span> <span
class="inserted"><ins><em>infringes the privacy</em></ins></span> of <span
class="removed"><del><strong>their</strong></del></span>
+ <span class="inserted"><ins><em>users:</p>
<dl>
<dt>SurfEasy</dt>
<dd>Includes tracking libraries such as NativeX and Appflood,
- meant to track users and show them targeted ads.</dd>
+ meant to track</em></ins></span> users <span
class="removed"><del><strong>with third parties.</p>
+ </li>
+
+ <li><p>iThings automatically upload</strong></del></span> <span
class="inserted"><ins><em>and show them targeted ads.</dd>
<dt>sFly Network Booster</dt>
<dd>Requests the <code>READ_SMS</code> and
<code>SEND_SMS</code>
- permissions upon installation, meaning it has full access to
- users' text messages.</dd>
+ permissions upon installation, meaning it has full
access</em></ins></span> to <span class="removed"><del><strong>Apple's servers
all</strong></del></span>
+ <span class="inserted"><ins><em>users' text messages.</dd>
<dt>DroidVPN and TigerVPN</dt>
- <dd>Requests the <code>READ_LOGS</code> permission to
read logs
- for other apps and also core system logs. TigerVPN developers
+ <dd>Requests</em></ins></span> the <span
class="removed"><del><strong>photos</strong></del></span> <span
class="inserted"><ins><em><code>READ_LOGS</code> permission to read
logs
+ for other apps</em></ins></span> and
+ <span class="removed"><del><strong>videos they make.</p>
+
+ <blockquote><p>
+ iCloud Photo Library</strong></del></span> <span
class="inserted"><ins><em>also core system logs. TigerVPN developers
have confirmed this.</dd>
<dt>HideMyAss</dt>
- <dd>Sends traffic to LinkedIn. Also, it stores detailed logs
- and may turn them over to the UK government if
+ <dd>Sends traffic to LinkedIn. Also, it</em></ins></span> stores
<span class="removed"><del><strong>every photo and video you
take,</strong></del></span> <span class="inserted"><ins><em>detailed
logs</em></ins></span>
+ and <span class="removed"><del><strong>keeps</strong></del></span> <span
class="inserted"><ins><em>may turn</em></ins></span> them <span
class="removed"><del><strong>up</strong></del></span> <span
class="inserted"><ins><em>over</em></ins></span> to <span
class="removed"><del><strong>date on all your devices.
+ Any edits you make are automatically updated everywhere. [...]
+ </p></blockquote>
+
+ <p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
+ information</a> as accessed on 24 Sep 2015.)</strong></del></span>
<span class="inserted"><ins><em>the UK government if
requested.</dd>
<dt>VPN Services HotspotShield</dt>
<dd>Injects JavaScript code into the HTML pages returned to the
- users. The stated purpose of the JS injection is to display
- ads. Uses roughly 5 tracking libraries. Also, it redirects the
+ users.</em></ins></span> The <span class="removed"><del><strong>iCloud
feature</strong></del></span> <span class="inserted"><ins><em>stated purpose of
the JS injection</em></ins></span> is
+ <span class="removed"><del><strong><a
href="https://support.apple.com/en-us/HT202033">activated by the
+ startup of iOS</a>. The term “cloud” means
+ “please don't ask where.”</p>
+
+ <p>There is a way</strong></del></span> to <span
class="removed"><del><strong><a
href="https://support.apple.com/en-us/HT201104">
+ deactivate iCloud</a>, but it's active by default
so</strong></del></span> <span class="inserted"><ins><em>display
+ ads. Uses roughly 5 tracking libraries. Also,</em></ins></span> it <span
class="removed"><del><strong>still counts as a
+ surveillance functionality.</p>
+
+ <p>Unknown people apparently took advantage</strong></del></span>
<span class="inserted"><ins><em>redirects the
user's traffic through valueclick.com (an advertising
website).</dd>
<dt>WiFi Protector VPN</dt>
<dd>Injects JavaScript code into HTML pages, and also uses
- roughly 5 tracking libraries. Developers of this app have
- confirmed that the non-premium version of the app does
+ roughly 5 tracking libraries. Developers</em></ins></span> of this <span
class="removed"><del><strong>to
+ <a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ nude photos</strong></del></span> <span class="inserted"><ins><em>app
have
+ confirmed that the non-premium version</em></ins></span> of <span
class="removed"><del><strong>many celebrities</a>. They needed to break
Apple's
+ security to get at them,</strong></del></span> <span
class="inserted"><ins><em>the app does
JavaScript injection for tracking and display ads.</dd>
</dl>
</li>
@@ -482,39 +571,63 @@
proprietary Android apps contained recognizable tracking libraries. For
the paid proprietary apps, it was only 60%.</p>
- <p>The article confusingly describes gratis apps as “free”,
- but most of them are not in fact
- <a href="/philosophy/free-sw.html">free software</a>.
- It also uses the ugly word “monetize”. A good replacement
- for that word is “exploit”; nearly always that will fit
+ <p>The article confusingly describes gratis apps as
“free”,</em></ins></span>
+ but <span class="removed"><del><strong>NSA can access
any</strong></del></span> <span
class="inserted"><ins><em>most</em></ins></span> of them <span
class="removed"><del><strong>through
+ <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
+ </p></li>
+
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>are not</em></ins></span> in <span
class="removed"><del><strong>iThings:
+ the</strong></del></span> <span
class="inserted"><ins><em>fact</em></ins></span>
+ <a <span
class="removed"><del><strong>href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ iBeacon</a> lets stores determine exactly where the iThing is,
+ and get other info too.</p>
+ </li>
+
+ <li><p>There is</strong></del></span> <span
class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>.
+ It</em></ins></span> also <span class="removed"><del><strong>a
feature</strong></del></span> <span class="inserted"><ins><em>uses the ugly
word “monetize”. A good replacement</em></ins></span>
+ for <span class="removed"><del><strong>web sites to track users,
which</strong></del></span> <span class="inserted"><ins><em>that
word</em></ins></span> is <span
class="inserted"><ins><em>“exploit”; nearly always that will fit
perfectly.</p>
</li>
<li>
- <p>Apps for BART
- <a
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
+ <p>Apps for BART</em></ins></span>
+ <a <span
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ enabled</strong></del></span> <span
class="inserted"><ins><em>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
<p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
<p>With proprietary apps, one can only hope that they don't.</p>
</li>
<li>
- <p>A study found 234 Android apps that track users by
- <a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed in stores or played by TV
programs</a>.
- </p>
+ <p>A study found 234 Android apps that track users</em></ins></span>
by <span class="removed"><del><strong>default</a>. (That article talks
about iOS 6, but it
+ is still true</strong></del></span>
+ <span class="inserted"><ins><em><a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
+ to ultrasound from beacons placed</em></ins></span> in <span
class="removed"><del><strong>iOS 7.)</p></strong></del></span> <span
class="inserted"><ins><em>stores or played by TV programs</a>.
+ </p></em></ins></span>
</li>
-<li>
+ <span class="removed"><del><strong><li><p>The iThing
also</strong></del></span>
+
+<span class="inserted"><ins><em><li>
<p>Pairs of Android apps can collude to transmit users' personal
- data to servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
- tens of thousands of pairs that collude</a>.</p>
+ data to servers.</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells Apple its geolocation</a> by default,
though</strong></del></span> <span
class="inserted"><ins><em>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
+ tens of thousands of pairs</em></ins></span> that <span
class="removed"><del><strong>can be
+ turned off.</p></strong></del></span> <span
class="inserted"><ins><em>collude</a>.</p></em></ins></span>
</li>
-<li>
-<p>Google Play intentionally sends app developers <a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
-the personal details of users that install the app</a>.</p>
+ <span class="removed"><del><strong><li><p>Apple can, and
regularly does,</strong></del></span>
+
+<span class="inserted"><ins><em><li>
+<p>Google Play intentionally sends app developers</em></ins></span>
<a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones for</strong></del></span>
+<span
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></em></ins></span>
+the <span class="removed"><del><strong>state</a>.</p>
+ </li>
+
+ <li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
+ Either Apple helps</strong></del></span> <span
class="inserted"><ins><em>personal details of users that install the
app</a>.</p>
<p>Merely asking the “consent” of users is not enough
to legitimize actions like this. At this point, most users have
@@ -555,7 +668,7 @@
“zero price” is “gratis.”</p>
<p>The article takes for granted that the usual analytics tools are
- legitimate, but is that</em></ins></span> valid? Software developers have
no right to
+ legitimate, but is that valid? Software developers have no right to
analyze what users are doing or how. “Analytics” tools that
snoop are
just as wrong as any other snooping.</p>
</li>
@@ -598,7 +711,7 @@
</div>
<ul>
- <span class="inserted"><ins><em><li><p>The DMCA and the EU
Copyright Directive make it <a
+ <li><p>The DMCA and the EU Copyright Directive make it <a
href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
illegal to study how iOS cr...apps spy on users</a>, because this
would require circumventing the iOS DRM.</p>
@@ -616,9 +729,9 @@
<a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
— which would mean no way to use it without having your
fingerprints
taken. Users would have no way to tell whether the phone is snooping on
- them.</p></li></em></ins></span>
+ them.</p></li>
- <li><p>iPhones <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send</strong></del></span>
<span
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send</em></ins></span>
+ <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
lots of personal data to Apple's servers</a>. Big Brother can
get them from there.</p>
</li>
@@ -628,15 +741,15 @@
days.</p>
</li>
- <li><p>Users cannot make an Apple ID <a <span
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary</strong></del></span>
-<span
class="inserted"><ins><em>href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">
- (necessary</em></ins></span> to install even gratis apps)</a>
+ <li><p>Users cannot make an Apple ID <a
+href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">
+ (necessary to install even gratis apps)</a>
without giving a valid email address and receiving the code Apple
sends to it.</p>
</li>
<li><p>Around 47% of the most popular iOS apps
- <a <span
class="inserted"><ins><em>class="not-a-duplicate"</em></ins></span>
+ <a class="not-a-duplicate"
href="http://jots.pub/a/2015103001/index.php">share personal,
behavioral and location information</a> of their users with third
parties.</p>
</li>
@@ -668,7 +781,7 @@
</p></li>
<li><p>Spyware in iThings:
- the <a <span
class="inserted"><ins><em>class="not-a-duplicate"</em></ins></span>
+ the <a class="not-a-duplicate"
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
iBeacon</a> lets stores determine exactly where the iThing is,
and get other info too.</p>
@@ -712,7 +825,7 @@
</div>
<ul>
- <span class="inserted"><ins><em><li><p>Tracking software in
popular Android apps is pervasive and
+ <li><p>Tracking software in popular Android apps is pervasive and
sometimes very clever. Some trackers can <a
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
follow a user's movements around a physical store by noticing WiFi
@@ -725,7 +838,7 @@
when the phone has no SIM card</a>.</p></li>
<li><p>Some portable phones <a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots of data to
China</a>.</p></li></em></ins></span>
+ sold with spyware sending lots of data to
China</a>.</p></li>
<li><p>According to Edward Snowden,
<a href="http://www.bbc.com/news/uk-34444233">agencies can take
over smartphones</a>
@@ -766,49 +879,62 @@
to have GPS.)</p>
</li>
- <li><p>The nonfree Snapchat app's principal purpose is to
restrict
- the use of data on the user's computer, but it does surveillance
+ <li><p>The nonfree Snapchat app's principal purpose is to
restrict</em></ins></span>
+ the <span class="removed"><del><strong>NSA snoop</strong></del></span>
<span class="inserted"><ins><em>use of data</em></ins></span> on <span
class="removed"><del><strong>all</strong></del></span> the <span
class="removed"><del><strong>data in an iThing,
+ or</strong></del></span> <span class="inserted"><ins><em>user's
computer, but</em></ins></span> it <span class="removed"><del><strong>is
totally incompetent.</a></p>
+ </li>
+
+ <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features” of iOS seem</strong></del></span> <span
class="inserted"><ins><em>does surveillance
too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries to get the <span class="removed"><del><strong>user's
list</strong></del></span> <span class="inserted"><ins><em>user's list of other
people's phone
- numbers.</a></p>
+ it tries</em></ins></span> to <span class="removed"><del><strong>exist
for no
+ possible purpose other than surveillance</a>. Here
is</strong></del></span> <span class="inserted"><ins><em>get</em></ins></span>
the
+ <span class="removed"><del><strong><a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p></strong></del></span> <span
class="inserted"><ins><em>user's list of other people's phone
+ numbers.</a></p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInMobileApps">Spyware in Mobile Applications</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
+ <h4 <span
class="removed"><del><strong>id="SpywareInTelephones">Spyware</strong></del></span>
<span
class="inserted"><ins><em>id="SpywareInMobileApps">Spyware</em></ins></span>
in <span
class="removed"><del><strong>Telephones</h4></strong></del></span> <span
class="inserted"><ins><em>Mobile Applications</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTelephones">#SpywareInTelephones</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span></em></ins></span>
</div>
<ul>
- <li><p>The Spanish football streaming app
- <a
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
+ <span class="removed"><del><strong><li><p>According to Edward
Snowden,</strong></del></span>
+ <span class="inserted"><ins><em><li><p>The Spanish football
streaming app</em></ins></span>
+ <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
+ by sending hidden text messages which enable</strong></del></span> <span
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
the user's movements and listens through the
microphone</a>.</p>
- <p>This makes them act as spies for licensing enforcement.</p>
+ <p>This makes</em></ins></span> them <span
class="inserted"><ins><em>act as spies for licensing enforcement.</p>
- <p>I expect it implements DRM, too—that there is no way to
- save a recording. But I can't be sure from the article.</p>
+ <p>I expect it implements DRM, too—that there is no
way</em></ins></span> to <span
class="removed"><del><strong>turn</strong></del></span>
+ <span class="inserted"><ins><em>save a recording. But I can't be sure
from</em></ins></span> the <span class="removed"><del><strong>phones
+ on and off, listen</strong></del></span> <span
class="inserted"><ins><em>article.</p>
- <p>If you learn to care much less about sports, you will benefit
+ <p>If you learn</em></ins></span> to <span
class="inserted"><ins><em>care much less about sports, you will benefit
in many ways. This is one more.</p>
</li>
<li><p>Grindr collects information about <a
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
- which users are HIV-positive, then provides the information to
+ which users are HIV-positive, then provides</em></ins></span> the <span
class="removed"><del><strong>microphone, retrieve geo-location data
from</strong></del></span> <span class="inserted"><ins><em>information to
companies</a>.</p>
<p>Grindr should not have so much information about its users.
It could be designed so that users communicate such info to each other
- but not to the server's database.</p>
+ but not to</em></ins></span> the
+ <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call, location</strong></del></span> <span
class="inserted"><ins><em>server's database.</p>
</li>
<li>
- <p>The moviepass app and dis-service spy on users even more than
users
+ <p>The moviepass app</em></ins></span> and <span
class="removed"><del><strong>web
+ browsing history,</strong></del></span> <span
class="inserted"><ins><em>dis-service spy on users even more than users
expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel before and after going to a movie</a>.
+ where they travel before</em></ins></span> and <span
class="removed"><del><strong>read</strong></del></span> <span
class="inserted"><ins><em>after going to a movie</a>.
</p>
<p>Don't be tracked — pay cash!</p>
@@ -822,7 +948,7 @@
<li><p>The Sarahah app
<a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
uploads all phone numbers and email addresses</a> in user's address
- book to developer's server. Note that this article misuses the words
+ book to developer's server. Note that this article
misuses</em></ins></span> the <span class="removed"><del><strong>contact list.
This malware is designed</strong></del></span> <span
class="inserted"><ins><em>words
“<a href="/philosophy/free-sw.html">free
software</a>”
referring to zero price.</p>
</li>
@@ -830,48 +956,79 @@
<li>
<p>Facebook's app listens all the time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop
on what people are listening to or watching</a>. In addition, it may
- be analyzing people's conversations to serve them with targeted
+ be analyzing people's conversations</em></ins></span> to
+ <span class="removed"><del><strong>disguise itself from
investigation.</p>
+ </li>
+
+ <li><p>Samsung phones come</strong></del></span> <span
class="inserted"><ins><em>serve them</em></ins></span> with <span
class="inserted"><ins><em>targeted
advertisements.</p>
</li>
<li>
- <p>Faceapp appears to do lots of surveillance, judging by
- <a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands to personal data in the
device</a>.
- </p>
+ <p>Faceapp appears to do lots of surveillance, judging
by</em></ins></span>
+ <a <span
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>,
+ and they send so</strong></del></span> <span
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how</em></ins></span> much <span
class="inserted"><ins><em>access it demands to personal</em></ins></span> data
<span class="removed"><del><strong>that their transmission is a
+ substantial expense for users. Said transmission, not wanted or
+ requested by the user, clearly must constitute spying of some
+ kind.</p></li>
+
+ <li><p>A Motorola phone
+ <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens for voice all</strong></del></span> <span
class="inserted"><ins><em>in</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>device</a>.
+ </p></em></ins></span>
</li>
- <li>
+ <span class="removed"><del><strong><li><p>Spyware in Android
phones (and Windows? laptops): The Wall
+ Street Journal (in</strong></del></span>
+
+ <span class="inserted"><ins><em><li>
<p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app that it will</a>
- pre-install on some of its phones. The app will give Verizon the same
- information about the users' searches that Google normally gets when
+ announced</em></ins></span> an <span
class="removed"><del><strong>article blocked from us by a paywall)
+ reports</strong></del></span> <span class="inserted"><ins><em>opt-in
proprietary search app</em></ins></span> that
+ <span class="removed"><del><strong><a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"></strong></del></span>
<span class="inserted"><ins><em>it will</a>
+ pre-install on some of its phones. The app will give
Verizon</em></ins></span> the <span class="removed"><del><strong>FBI can
remotely activate</strong></del></span> <span class="inserted"><ins><em>same
+ information about</em></ins></span> the <span
class="removed"><del><strong>GPS and microphone in Android
+ phones and laptops</a>.
+ (I suspect this means Windows laptops.) Here</strong></del></span>
<span class="inserted"><ins><em>users' searches that Google normally gets when
they use its search engine.</p>
- <p>Currently, the app is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed on only one phone</a>, and the
+ <p>Currently, the app</em></ins></span> is <a <span
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
+ </li>
+
+ <li><p>Portable phones with GPS will send their GPS
location</strong></del></span> <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed</em></ins></span> on
+ <span class="removed"><del><strong>remote command</strong></del></span>
<span class="inserted"><ins><em>only one phone</a>,</em></ins></span> and
<span class="removed"><del><strong>users cannot stop them:
+ <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
+ (The US says it will eventually require all new portable phones
+ to have GPS.)</p></strong></del></span> <span
class="inserted"><ins><em>the
user must explicitly opt-in before the app takes effect. However, the
- app remains spyware—an “optional”
piece</em></ins></span> of <span class="removed"><del><strong>other people's
phone
- numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>spyware is
+ app remains spyware—an “optional” piece of spyware is
still spyware.</p></em></ins></span>
</li>
-<span class="removed"><del><strong></ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInMobileApps">Spyware</strong></del></span>
-
- <span class="inserted"><ins><em><li><p>The Meitu photo-editing
+ <li><p>The <span class="removed"><del><strong>nonfree Snapchat
app's principal purpose is</strong></del></span> <span
class="inserted"><ins><em>Meitu photo-editing
app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data to a Chinese company</a>.</p></li>
+ user data</em></ins></span> to <span class="removed"><del><strong>restrict
+ the use</strong></del></span> <span class="inserted"><ins><em>a Chinese
company</a>.</p></li>
<li><p>A pregnancy test controller application not only
can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
- on many sorts of data</em></ins></span> in <span
class="removed"><del><strong>Mobile Applications</h4>
+ on many sorts</em></ins></span> of data <span
class="removed"><del><strong>on the user's computer, but it does surveillance
+ too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries to get</strong></del></span> <span
class="inserted"><ins><em>in</em></ins></span> the <span
class="removed"><del><strong>user's list of other people's phone
+ numbers.</a></p>
+ </li>
+</ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInMobileApps">Spyware</strong></del></span> <span
class="inserted"><ins><em>phone, and</em></ins></span> in <span
class="removed"><del><strong>Mobile Applications</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
</div>
-<ul></strong></del></span> <span class="inserted"><ins><em>the phone,
and in server accounts, it can
+<ul></strong></del></span> <span class="inserted"><ins><em>server
accounts, it can
alter them too</a>.
</p></li></em></ins></span>
@@ -963,104 +1120,99 @@
</ul>
<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInGames">Spyware</strong></del></span>
<span
class="inserted"><ins><em>id="SpywareInToys">Spyware</em></ins></span> in
<span class="removed"><del><strong>Games</h4></strong></del></span> <span
class="inserted"><ins><em>Toys</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInGames">#SpywareInGames</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInToys">#SpywareInToys</a>)</span></em></ins></span>
+ <h4 <span class="removed"><del><strong>id="SpywareInGames">Spyware in
Games</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
</div>
<ul>
- <span class="removed"><del><strong><li><p>nVidia's proprietary
GeForce Experience <a
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
- users identify themselves and then sends personal data about
them</strong></del></span>
-
- <span class="inserted"><ins><em><li>
- <p>A remote-control sex toy was found</em></ins></span> to
- <span class="removed"><del><strong>nVidia servers</a>.</p>
- </li>
-
- <li><p>Angry Birds</strong></del></span> <span
class="inserted"><ins><em>make</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies,</strong></del></span> <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings
- of the conversation between two users</a>.</p>
- </li>
-
- <li>
- <p>The “smart” toys My Friend Cayla</em></ins></span>
and <span class="inserted"><ins><em>i-Que transmit
- <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,
- a speech recognition company based in</em></ins></span> the <span
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span
class="inserted"><ins><em>U.S.</p>
-
- <p>Those toys also contain major security vulnerabilities; crackers
- can remotely control the toys with a mobile phone. This would
- enable crackers</em></ins></span> to <span
class="removed"><del><strong>spy through it too</a>.
- Here's information</strong></del></span> <span
class="inserted"><ins><em>listen in</em></ins></span> on <span
class="inserted"><ins><em>a child's speech, and even speak
- into the toys themselves.</p>
+ <li><p>nVidia's proprietary GeForce Experience <a
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+ users identify themselves and then sends personal data about them to
+ nVidia servers</a>.</p>
</li>
- <li>
- <p>A computerized vibrator</em></ins></span>
- <a <span
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ <li><p>Angry Birds
+ <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies for companies, and the NSA takes advantage to spy through it
too</a>.
+ Here's information on
+ <a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
<p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA</strong></del></span> <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on its users through the proprietary control
app</a>.</p>
-
- <p>The</em></ins></span> app <span
class="removed"><del><strong>spying</a>.</p>
+ More about NSA app spying</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInToys">Spyware in Toys</h4>
+ <h4</strong></del></span> id="SpywareInToys">Spyware in Toys</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
</div>
<ul>
- <li><p>A</strong></del></span> <span
class="inserted"><ins><em>was reporting the temperature of the vibrator minute
by
- minute (thus, indirectly, whether it was surrounded by a person's
- body), as well as the vibration frequency.</p>
+ <span class="removed"><del><strong><li><p>A company that makes
internet-controlled vibrators</strong></del></span>
+
+ <span class="inserted"><ins><em><li>
+ <p>A remote-control sex toy was found to make</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is
+ being sued for collecting lots</strong></del></span> <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings</em></ins></span>
+ of <span class="removed"><del><strong>personal information about how
+ people use it</a>.</p>
+
+ <p>The company's statement that it anonymizes the data may be
+ true, but it doesn't really matter. If it sells</strong></del></span>
the <span class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>conversation between two users</a>.</p>
+ </li>
+
+ <li>
+ <p>The “smart” toys My Friend Cayla and i-Que transmit
+ <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</em></ins></span> to <span class="inserted"><ins><em>Nuance
Communications</a>,</em></ins></span>
+ a
+ <span class="removed"><del><strong>data broker,</strong></del></span>
<span class="inserted"><ins><em>speech recognition company based
in</em></ins></span> the <span class="removed"><del><strong>data
broker</strong></del></span> <span class="inserted"><ins><em>U.S.</p>
+
+ <p>Those toys also contain major security vulnerabilities;
crackers</em></ins></span>
+ can <span class="removed"><del><strong>figure out
who</strong></del></span> <span class="inserted"><ins><em>remotely
control</em></ins></span> the <span class="removed"><del><strong>user
is.</p></strong></del></span> <span class="inserted"><ins><em>toys with a
mobile phone. This would
+ enable crackers to listen in on a child's speech, and even speak
+ into the toys themselves.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>A</strong></del></span>
+
+ <span class="inserted"><ins><em><li>
+ <p>A</em></ins></span> computerized vibrator
+ <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">snoops</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping</em></ins></span> on its users through the proprietary
control app</a>.</p>
+
+ <p>The app <span
class="removed"><del><strong>reports</strong></del></span> <span
class="inserted"><ins><em>was reporting</em></ins></span> the temperature of
the vibrator minute by
+ minute (thus, indirectly, whether it <span
class="removed"><del><strong>is</strong></del></span> <span
class="inserted"><ins><em>was</em></ins></span> surrounded by a person's
+ body), <span class="removed"><del><strong>and</strong></del></span>
<span class="inserted"><ins><em>as well as</em></ins></span> the vibration
frequency.</p>
<p>Note the totally inadequate proposed response: a labeling
standard with which manufacturers would make statements about
- their products, rather than free software which users could have
- checked and changed.</p>
+ their products, rather than free software which users <span
class="removed"><del><strong>can check</strong></del></span> <span
class="inserted"><ins><em>could have
+ checked</em></ins></span> and <span
class="removed"><del><strong>change.</p></strong></del></span> <span
class="inserted"><ins><em>changed.</p>
- <p>The</em></ins></span> company that <span
class="removed"><del><strong>makes internet-controlled
vibrators</strong></del></span> <span class="inserted"><ins><em>made the
vibrator</em></ins></span>
- <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is
- being</strong></del></span> <span
class="inserted"><ins><em>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was</em></ins></span> sued for collecting lots of personal information
about how
- people <span class="removed"><del><strong>use</strong></del></span>
<span class="inserted"><ins><em>used</em></ins></span> it</a>.</p>
-
- <p>The company's statement that it <span
class="removed"><del><strong>anonymizes</strong></del></span> <span
class="inserted"><ins><em>was anonymizing</em></ins></span> the data may be
- true, but it doesn't really matter. If it <span
class="removed"><del><strong>sells</strong></del></span> <span
class="inserted"><ins><em>had sold</em></ins></span> the data to a
- data broker, the data broker <span
class="removed"><del><strong>can</strong></del></span> <span
class="inserted"><ins><em>would have been able to</em></ins></span> figure out
- who the user <span class="removed"><del><strong>is.</p>
- </li>
-
- <li><p>A computerized
- vibrator <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">snoops
- on its users through the proprietary control app</a>.</p>
-
- <p>The app reports</strong></del></span> <span
class="inserted"><ins><em>was.</p>
+ <p>The company that made the vibrator
+ <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued for collecting lots of personal information about how
+ people used it</a>.</p>
+
+ <p>The company's statement that it was anonymizing the data may be
+ true, but it doesn't really matter. If it had sold the data to a
+ data broker, the data broker would have been able to figure out
+ who the user was.</p>
<p>Following this lawsuit,
- <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></em></ins></span>
- the <span
class="removed"><del><strong>temperature</strong></del></span> <span
class="inserted"><ins><em>company has been ordered to pay a
total</em></ins></span> of <span class="inserted"><ins><em>C$4m</a>
- to its customers.</p>
+ <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company has been ordered to pay a total of C$4m</a>
+ to its customers.</p></em></ins></span>
</li>
- <li><p> “CloudPets” toys with microphones <a
+ <span class="inserted"><ins><em><li><p> “CloudPets”
toys with microphones <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak childrens' conversations to</em></ins></span> the <span
class="removed"><del><strong>vibrator minute by
- minute (thus, indirectly, whether it is surrounded
by</strong></del></span> <span
class="inserted"><ins><em>manufacturer</a>. Guess what? <a
+ leak childrens' conversations to the manufacturer</a>. Guess what?
<a
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found</em></ins></span> a <span
class="removed"><del><strong>person's
- body), and</strong></del></span> <span class="inserted"><ins><em>way to
access</em></ins></span> the <span class="removed"><del><strong>vibration
frequency.</p>
+ Crackers found a way to access the data</a> collected by the
+ manufacturer's snooping.</p>
- <p>Note</strong></del></span> <span
class="inserted"><ins><em>data</a> collected by</em></ins></span> the
<span class="removed"><del><strong>totally inadequate proposed response: a
labeling
- standard with which manufacturers would make statements about
- their products, rather than free software which users can
check</strong></del></span>
- <span class="inserted"><ins><em>manufacturer's snooping.</p>
-
- <p>That the manufacturer</em></ins></span> and <span
class="removed"><del><strong>change.</p>
- </li></strong></del></span> <span class="inserted"><ins><em>the FBI
could listen to these conversations
+ <p>That the manufacturer and the FBI could listen to these
conversations
was unacceptable by itself.</p></li></em></ins></span>
<li><p>Barbie
@@ -1289,7 +1441,25 @@
<div style="clear: left;"></div>
<ul>
- <span class="inserted"><ins><em><li><p>A medical insurance
+ <span class="inserted"><ins><em><li>
+ <p>Crackers found a way to break the security of an Amazon device,
+ and <a
+ href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
+ turn it into a listening device for them</a>.</p>
+
+ <p>It was very difficult for them to do this. The job would be much
+ easier for Amazon. And if some government such as China or the
+ US told Amazon to do this, or cease to sell the product in that
+ country, do you think Amazon would have the moral fiber to say
+ no?</p>
+
+ <p>These crackers are probably hackers too, but please <a
+ href="https://stallman.org/articles/on-hacking.html">
+ don't use “hacking” to mean “breaking
+ security”</a>.</p>
+ </li>
+
+ <li><p>A medical insurance
company <a
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
offers a gratis electronic toothbrush that snoops on its user
by sending usage data back over the Internet</a>.</p>
@@ -1788,7 +1958,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/08/02 07:32:59 $
+$Date: 2018/08/22 08:58:41 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.209
retrieving revision 1.210
diff -u -b -r1.209 -r1.210
--- po/proprietary-surveillance.ja.po 2 Aug 2018 07:32:59 -0000 1.209
+++ po/proprietary-surveillance.ja.po 22 Aug 2018 08:58:41 -0000 1.210
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-08-02 07:27+0000\n"
+"POT-Creation-Date: 2018-08-22 08:56+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -665,6 +665,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some Google apps on Android <a href=\"https://www.theguardian.com/"
+"technology/2018/aug/13/google-location-tracking-android-iphone-mobile\"> "
+"record the user's location even when users disable “location "
+"tracking”</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"There are other ways to turn off the other kinds of location tracking, but "
+"most users will be tricked by the misleading control."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"More than <a href=\"https://www.theguardian.com/technology/2018/apr/16/child-"
"apps-games-android-us-google-play-store-data-sharing-law-privacy\">50% of "
"the 5,855 Android apps studied by researchers were found to snoop and "
@@ -2196,6 +2210,28 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Crackers found a way to break the security of an Amazon device, and <a href="
+"\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it into a "
+"listening device for them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It was very difficult for them to do this. The job would be much easier for "
+"Amazon. And if some government such as China or the US told Amazon to do "
+"this, or cease to sell the product in that country, do you think Amazon "
+"would have the moral fiber to say no?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"These crackers are probably hackers too, but please <a href=\"https://"
+"stallman.org/articles/on-hacking.html\"> don't use “hacking” to "
+"mean “breaking security”</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"A medical insurance company <a href=\"https://wolfstreet.com/2018/04/14/our-"
"dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-"
"what-happened-next\"> offers a gratis electronic toothbrush that snoops on "
Index: po/proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.158
retrieving revision 1.159
diff -u -b -r1.158 -r1.159
--- po/proprietary-surveillance.pot 2 Aug 2018 07:32:59 -0000 1.158
+++ po/proprietary-surveillance.pot 22 Aug 2018 08:58:41 -0000 1.159
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-08-02 07:27+0000\n"
+"POT-Creation-Date: 2018-08-22 08:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -527,6 +527,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some Google apps on Android <a "
+"href=\"https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile\">
"
+"record the user's location even when users disable “location "
+"tracking”</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"There are other ways to turn off the other kinds of location tracking, but "
+"most users will be tricked by the misleading control."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"More than <a "
"href=\"https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy\">50%
"
"of the 5,855 Android apps studied by researchers were found to snoop and "
@@ -1705,6 +1719,28 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Crackers found a way to break the security of an Amazon device, and <a "
+"href=\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it "
+"into a listening device for them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It was very difficult for them to do this. The job would be much easier for "
+"Amazon. And if some government such as China or the US told Amazon to do "
+"this, or cease to sell the product in that country, do you think Amazon "
+"would have the moral fiber to say no?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"These crackers are probably hackers too, but please <a "
+"href=\"https://stallman.org/articles/on-hacking.html\"> don't use "
+"“hacking” to mean “breaking security”</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"A medical insurance company <a "
"href=\"https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next\">
"
"offers a gratis electronic toothbrush that snoops on its user by sending "
Index: po/proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.383
retrieving revision 1.384
diff -u -b -r1.383 -r1.384
--- po/proprietary-surveillance.ru.po 2 Aug 2018 07:32:59 -0000 1.383
+++ po/proprietary-surveillance.ru.po 22 Aug 2018 08:58:41 -0000 1.384
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-08-02 07:27+0000\n"
+"POT-Creation-Date: 2018-08-22 08:56+0000\n"
"PO-Revision-Date: 2018-08-02 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-08-22 08:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -695,6 +696,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some Google apps on Android <a href=\"https://www.theguardian.com/"
+"technology/2018/aug/13/google-location-tracking-android-iphone-mobile\"> "
+"record the user's location even when users disable “location "
+"tracking”</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"There are other ways to turn off the other kinds of location tracking, but "
+"most users will be tricked by the misleading control."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"More than <a href=\"https://www.theguardian.com/technology/2018/apr/16/child-"
"apps-games-android-us-google-play-store-data-sharing-law-privacy\">50% of "
"the 5,855 Android apps studied by researchers were found to snoop and "
@@ -2430,6 +2445,28 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Crackers found a way to break the security of an Amazon device, and <a href="
+"\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it into a "
+"listening device for them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It was very difficult for them to do this. The job would be much easier for "
+"Amazon. And if some government such as China or the US told Amazon to do "
+"this, or cease to sell the product in that country, do you think Amazon "
+"would have the moral fiber to say no?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"These crackers are probably hackers too, but please <a href=\"https://"
+"stallman.org/articles/on-hacking.html\"> don't use “hacking” to "
+"mean “breaking security”</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"A medical insurance company <a href=\"https://wolfstreet.com/2018/04/14/our-"
"dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-"
"what-happened-next\"> offers a gratis electronic toothbrush that snoops on "
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary malware-amazon.it.html po/malwa...,
GNUN <=