[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-cars.ru.html proprietar...
From: |
GNUN |
Subject: |
www/proprietary malware-cars.ru.html proprietar... |
Date: |
Sun, 30 Sep 2018 15:27:49 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 18/09/30 15:27:49
Modified files:
proprietary : malware-cars.ru.html
proprietary-deception.ru.html
proprietary-surveillance.ru.html
proprietary/po : malware-cars.ru-en.html malware-cars.ru.po
proprietary-deception.ru.po
proprietary-surveillance.ru-en.html
proprietary-surveillance.ru.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-cars.ru.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-deception.ru.html?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.ru.html?cvsroot=www&r1=1.132&r2=1.133
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.ru-en.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.ru.po?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.ru.po?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru-en.html?cvsroot=www&r1=1.125&r2=1.126
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.400&r2=1.401
Patches:
Index: malware-cars.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-cars.ru.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- malware-cars.ru.html 25 Jul 2018 16:30:35 -0000 1.3
+++ malware-cars.ru.html 30 Sep 2018 19:27:48 -0000 1.4
@@ -2,6 +2,11 @@
<!--#include virtual="/server/header.ru.html" -->
<!-- Parent-Version: 1.84 -->
+<!--
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ Generated from propr-blurbs.rec. Please do not edit this file manually !
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
<!-- This file is automatically generated by GNUnited Nations! -->
<title>ÐÑедоноÑнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð² авÑомобилÑÑ
-
ÐÑÐ¾ÐµÐºÑ GNU - Фонд Ñвободного
@@ -23,136 +28,167 @@
<p>ÐÐ¾Ñ Ð¿ÑимеÑÑ Ð²ÑедоноÑнÑÑ
пÑогÑамм в
авÑомобилÑÑ
.</p>
-<ul>
-<li>
-<p>ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Tesla иÑполÑзовала ÑнивеÑÑалÑнÑÑ
Ð»Ð°Ð·ÐµÐ¹ÐºÑ Ð² ÑвоиÑ
пÑогÑаммаÑ
, ÑÑобÑ
-полÑзоваÑели в некоÑоÑÑÑ
маÑинаÑ
<a
+<ul class="blurbs">
+ <li id="M201711230">
+ <p>ÐÑогÑÐ°Ð¼Ð¼Ñ Ñ Ð¸ÑкÑÑÑÑвеннÑм
инÑеллекÑом, огÑаниÑиваÑÑие полÑзование
ÑелеÑоном
+во вÑÐµÐ¼Ñ Ð²Ð¾Ð¶Ð´ÐµÐ½Ð¸Ñ, могÑÑ <a
+href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
+оÑÑлеживаÑÑ ÐºÐ°Ð¶Ð´Ð¾Ðµ ваÑе движение</a>.</p>
+ </li>
+
+ <li id="M201709290">
+ <p>ÐлоÑ
Ð°Ñ Ð·Ð°ÑиÑа в некоÑоÑÑÑ
авÑомобилÑÑ
позволÑÐµÑ <a
+href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937">
+задейÑÑвоваÑÑ Ð¿Ð¾Ð´ÑÑки безопаÑноÑÑи по
ÑеÑи</a>.</p>
+ </li>
+
+ <li id="M201709091">
+ <p>ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Tesla пÑогÑаммÑ, ÑÑобÑ
огÑаниÑиÑÑ ÐµÐ¼ÐºÐ¾ÑÑÑ Ð°ÐºÐºÑмÑлÑÑоÑов, коÑоÑÑÑ
+могли иÑполÑзоваÑÑ ÐºÐ»Ð¸ÐµÐ½ÑÑ, и <a
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/">
-могли задейÑÑвоваÑÑ ÑолÑко ÑаÑÑÑ
аккÑмÑлÑÑоÑов</a>.</p>
+ÑнивеÑÑалÑнÑй ÑеÑнÑй Ñ
од в пÑогÑаммаÑ
</a>
Ð´Ð»Ñ Ñого, ÑÑÐ¾Ð±Ñ Ð²Ñеменно
+ÑвелиÑиваÑÑ ÑÑÐ¾Ñ Ð¿Ñедел.</p>
-<p>ÐгÑаниÑение, коÑоÑое вводилоÑÑ Ð¿Ð¾ ÑеÑи
на емкоÑÑÑ Ð°ÐºÐºÑмÑлÑÑоÑов, коÑоÑÑÑ
+ <p>ÐгÑаниÑение, коÑоÑое вводилоÑÑ Ð¿Ð¾ ÑеÑи
на емкоÑÑÑ Ð°ÐºÐºÑмÑлÑÑоÑов, коÑоÑÑÑ
“владелÑÑÑ” маÑин могли
задейÑÑвоваÑÑ, не пÑиÑинило им никакого
вÑеда, но Ñа же лазейка позволила бÑ
компании (возможно, по пÑиказÑ
какого-Ñо гоÑÑдаÑÑÑва) по ÑеÑи запÑеÑиÑÑ
маÑине задейÑÑвоваÑÑ Ð°ÐºÐºÑмÑлÑÑоÑÑ
вообÑе. Ðли, Ñкажем, довезÑи паÑÑажиÑа до
камеÑÑ Ð¿ÑÑок.</p>
-</li>
+ </li>
-<li>
-<a
+ <li id="M201702170">
+ <p>ÐобилÑнÑе пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð´Ð»Ñ ÑвÑзи <a
+href="https://www.bleepingcomputer.com/news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/">ÑмнÑми,
+но дÑÑаÑкими авÑомобилÑми оÑлиÑаÑÑÑÑ
оÑÐµÐ½Ñ Ñлабой безопаÑноÑÑÑÑ</a>.</p>
+
+ <p>ÐÑо дополнÑÐµÑ ÑÐ¾Ñ ÑакÑ, ÑÑо авÑомобилÑ
ÑодеÑÐ¶Ð¸Ñ Ð¼Ð¾Ð´ÐµÐ¼ ÑоÑовой ÑвÑзи, коÑоÑÑй
+вÑе вÑÐµÐ¼Ñ ÑаÑÑказÑваеÑ, где он наÑ
одиÑÑÑ,
СÑаÑÑÐµÐ¼Ñ ÐÑаÑÑ. ÐÑли Ð²Ñ Ð²Ð»Ð°Ð´ÐµÐµÑе
+Ñаким авÑомобилем, бÑло Ð±Ñ Ð¼ÑдÑÑм
оÑÑоединиÑÑ Ð¼Ð¾Ð´ÐµÐ¼, ÑÑÐ¾Ð±Ñ Ð²ÑклÑÑиÑÑ
ÑлежкÑ.</p>
+ </li>
+
+ <li id="M201611060">
+ <p><a
href="http://jalopnik.com/america-figured-out-a-new-way-audi-cheated-on-emissions-1788630969">
РнеÑвободнÑÑ
пÑогÑаммаÑ
Audi пÑименÑлÑÑ
пÑоÑÑой меÑод обмана ÑеÑÑов
вÑÑ
лопнÑÑ
газов</a>: до пеÑвого ÑазвоÑоÑа
авÑÐ¾Ð¼Ð¾Ð±Ð¸Ð»Ñ ÑабоÑал в ÑпеÑиалÑном
-Ñежиме Ñ Ð¿Ð¾Ð½Ð¸Ð¶ÐµÐ½Ð½Ñм вÑÑ
лопом.
-</li>
+Ñежиме Ñ Ð¿Ð¾Ð½Ð¸Ð¶ÐµÐ½Ð½Ñм вÑÑ
лопом.</p>
+ </li>
-<li>
-<p>ÐвÑомобили Caterpillar поÑÑавлÑÑÑÑÑ Ñ <a
-href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">ÑеÑнÑм
-Ñ
одом Ð´Ð»Ñ Ñдаленного оÑклÑÑениÑ
двигаÑелÑ</a>.</p>
-</li>
+ <li id="M201608110">
+ <p>СлабоÑÑÑ Ð·Ð°ÑиÑÑ <a
+href="http://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844">позволÑеÑ
+легко оÑкÑÑваÑÑ Ð´Ð²ÐµÑи 100 миллионов
авÑомобилей, ÑобÑаннÑÑ
компанией
+“ФолÑкÑваген”</a>.</p>
+ </li>
-<li>
-<p><a
-href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions">Ð
-ФолÑкÑваген запÑогÑаммиÑовали компÑÑÑеÑÑ
в двигаÑелÑÑ
ÑвоиÑ
авÑомобилей на
-обнаÑÑжение ÑеÑÑов вÑÑ
лопнÑÑ
газов,
пÑоводимÑÑ
ÐгенÑÑÑвом по оÑ
Ñане
-окÑÑжаÑÑей ÑÑедÑ</a> СШÐ, и загÑÑзнÑÑÑ
воздÑÑ
вÑе оÑÑалÑное вÑемÑ.</p>
-
-<p>РнаÑÑоÑÑей ÑабоÑе загÑÑÐ·Ð½ÐµÐ½Ð¸Ñ Ð²ÑÑ
лопов
могли пÑевоÑÑ
одиÑÑ Ð´Ð¾Ð¿ÑÑÑимÑе ноÑмÑ
-в 35 Ñаз.</p>
-
-<p>ÐÑименение ÑвободнÑÑ
пÑогÑамм не
помеÑало Ð±Ñ Ð¤Ð¾Ð»ÑкÑвагенÑ
запÑогÑаммиÑоваÑÑ
-компÑÑÑÐµÑ Ñаким обÑазом, но ÑÑо бÑло бÑ
ÑÑÑднее ÑкÑÑÑÑ.</p>
-</li>
-
-<li>
-<p><a
-href="https://www.eff.org/deeplinks/2013/11/drm-cars-will-drive-consumers-crazy">ЦиÑÑовое
-ÑпÑавление огÑаниÑениÑми в авÑомобилÑÑ
бÑÐ´ÐµÑ Ð¿ÑиводиÑÑ Ð¿Ð¾ÑÑебиÑелей в
-беÑенÑÑво</a>.</p>
-</li>
+ <li id="M201607160">
+ <p>ÐомпÑÑÑеÑизованнÑе авÑомобили Ñ
неÑвободнÑми пÑогÑаммами ÑвлÑÑÑÑÑ <a
+href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
+ÑпионÑÑими ÑÑÑÑойÑÑвами</a>.</p>
+ </li>
-<li>
-<p>
-Ð Nissan Leaf еÑÑÑ Ð²ÑÑÑоеннÑй ÑелеÑоннÑй модем,
позволÑÑÑий ÑакÑиÑеÑки комÑ
+ <li id="M201602240">
+ <p id="nissan-modem">Ð Nissan Leaf еÑÑÑ Ð²ÑÑÑоеннÑй
ÑелеÑоннÑй модем, позволÑÑÑий ÑакÑиÑеÑки
комÑ
Ñгодно <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">полÑÑаÑÑ
ÑдаленнÑй доÑÑÑп к компÑÑÑеÑам и вноÑиÑÑ
Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ Ð² ÑазлиÑнÑе
наÑÑÑойки</a>.</p>
-<p>ÐÑо неÑÑÑдно поÑомÑ, ÑÑо в ÑиÑÑеме неÑ
пÑовеÑки подлинноÑÑи полÑзоваÑÐµÐ»Ñ Ð¿Ñи
+ <p>ÐÑо неÑÑÑдно поÑомÑ, ÑÑо в ÑиÑÑеме неÑ
пÑовеÑки подлинноÑÑи полÑзоваÑÐµÐ»Ñ Ð¿Ñи
доÑÑÑпе по модемÑ. Ðднако даже еÑли бÑ
модем пÑоводил пÑовеÑкÑ, нелÑÐ·Ñ Ð±Ñло
Ð±Ñ Ð±ÑÑÑ ÑвеÑеннÑми, ÑÑо Ñ Nissan Ð½ÐµÑ Ð´Ð¾ÑÑÑпа.
ÐÑогÑÐ°Ð¼Ð¼Ñ Ð² авÑомобиле
неÑвободнÑ, <a
href="/philosophy/free-software-even-more-important.html">ÑÑо
знаÑиÑ, они ÑÑебÑÑÑ Ð¾Ñ Ð¿Ð¾Ð»ÑзоваÑелей
Ñлепой веÑÑ</a>.</p>
-<p>Ðаже еÑли никÑо не подклÑÑаеÑÑÑ Ðº
авÑÐ¾Ð¼Ð¾Ð±Ð¸Ð»Ñ Ð½Ð° ÑаÑÑÑоÑнии, модем ÑоÑовой
+ <p>Ðаже еÑли никÑо не подклÑÑаеÑÑÑ Ðº
авÑÐ¾Ð¼Ð¾Ð±Ð¸Ð»Ñ Ð½Ð° ÑаÑÑÑоÑнии, модем ÑоÑовой
ÑвÑзи позволÑÐµÑ ÑелеÑонной компании
поÑÑоÑнно оÑÑлеживаÑÑ Ð¿ÐµÑемеÑениÑ
авÑомобилÑ; Ñ
оÑÑ Ð¼Ð¾Ð¶Ð½Ð¾ ÑизиÑеÑки ÑдалиÑÑ
модем ÑоÑовой ÑвÑзи.</p>
-</li>
+ </li>
-<li>
-<p>СпеÑиалиÑÑÑ Ð¿Ð¾ безопаÑноÑÑи обнаÑÑжили <a
+ <li id="M201511194">
+ <p>ÐвÑомобили Caterpillar поÑÑавлÑÑÑÑÑ Ñ <a
+href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">ÑеÑнÑм
+Ñ
одом Ð´Ð»Ñ Ñдаленного оÑклÑÑениÑ
двигаÑелÑ</a>.</p>
+ </li>
+
+ <li id="M201509210">
+ <p>РФолÑкÑвагене запÑогÑаммиÑовали
компÑÑÑеÑÑ Ð² двигаÑелÑÑ
ÑвоиÑ
авÑомобилей
+на <a
+href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions">обнаÑÑжение
+ÑеÑÑов вÑÑ
лопнÑÑ
газов, пÑоводимÑÑ
ÐгенÑÑÑвом по оÑ
Ñане окÑÑжаÑÑей ÑÑедÑ</a>
+СШÐ, и загÑÑзнÑÑÑ Ð²Ð¾Ð·Ð´ÑÑ
вÑе оÑÑалÑное
вÑемÑ. ÐÑи движении в ÑеалÑнÑÑ
+ÑÑловиÑÑ
авÑомобили пÑевÑÑали ноÑÐ¼Ñ Ð²ÑÑ
лопа в 35 Ñаз.</p>
+
+ <p>ÐÑименение ÑвободнÑÑ
пÑогÑамм не
помеÑало Ð±Ñ Ð¤Ð¾Ð»ÑкÑвагенÑ
запÑогÑаммиÑоваÑÑ
+компÑÑÑÐµÑ Ñаким обÑазом, но ÑÑо бÑло бÑ
ÑÑÑднее ÑкÑÑÑÑ, и Ñ Ð¿Ð¾Ð»ÑзоваÑелей
+бÑла Ð±Ñ Ð²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾ÑÑÑ Ð¸ÑпÑавиÑÑ Ð¾Ð±Ð¼Ð°Ð½.</p>
+ </li>
+
+ <li id="M201508120">
+ <p>СпеÑиалиÑÑÑ Ð¿Ð¾ безопаÑноÑÑи
обнаÑÑжили <a
href="http://www.theguardian.com/technology/2015/aug/12/hack-car-brakes-sms-text">
ÑÑзвимоÑÑÑ Ð² диагноÑÑиÑеÑкиÑ
ÑÑÑÑойÑÑваÑ
,
пÑименÑемÑÑ
Ð´Ð»Ñ ÑÑÑаÑ
Ð¾Ð²Ð°Ð½Ð¸Ñ Ð¸
оÑÑÐ»ÐµÐ¶Ð¸Ð²Ð°Ð½Ð¸Ñ Ð¼Ð°ÑÑÑÑÑов</a>, коÑоÑаÑ
позволÑла им полÑÑиÑÑ ÑдаленнÑй конÑÑолÑ
над авÑомобилÑми поÑÑедÑÑвом SMS.</p>
-</li>
+ </li>
-<li>
-<p>ÐзломÑикам ÑдалоÑÑ <a
+ <li id="M201507214">
+ <p>ÐзломÑикам ÑдалоÑÑ <a
href="http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/">
-полÑÑиÑÑ ÑдаленнÑй конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´ джипом</a>
“Ñ Ñоединением”.</p>
-
-<p>Ðни могли ÑледиÑÑ Ð·Ð° авÑомобилем,
запÑÑкаÑÑ Ð¸ оÑÑанавливаÑÑ Ð´Ð²Ð¸Ð³Ð°ÑелÑ,
-вклÑÑаÑÑ Ð¸ вÑклÑÑаÑÑ ÑоÑмоз, а Ñакже
многое дÑÑгое.</p>
+полÑÑиÑÑ ÑдаленнÑй конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´ джипом</a>
“Ñ Ñоединением”. Ðни
+могли оÑÑлеживаÑÑ Ð°Ð²ÑомобилÑ, вклÑÑаÑÑ Ð¸
вÑклÑÑаÑÑ Ð´Ð²Ð¸Ð³Ð°ÑелÑ, задейÑÑвоваÑÑ
+и оÑпÑÑкаÑÑ ÑоÑмоза и Ñ.д.</p>
-<p>Я дÑмаÑ, ÑÑо ÐÑайÑÐ»ÐµÑ Ð¸ ÐÐÐ Ñоже ÑÑо
могÑÑ.</p>
+ <p>Я дÑмаÑ, ÑÑо ÐÑайÑÐ»ÐµÑ Ð¸ ÐÐÐ Ñоже ÑÑо
могÑÑ.</p>
-<p>ÐÑли Ñ Ð¼ÐµÐ½Ñ ÐºÐ¾Ð³Ð´Ð°-нибÑÐ´Ñ Ð±ÑÐ´ÐµÑ Ð¼Ð°Ñина и в
ней бÑÐ´ÐµÑ Ð¼Ð¾Ð±Ð¸Ð»ÑнÑй ÑелеÑон, Ñ ÐµÐ³Ð¾
+ <p>ÐÑли Ñ Ð¼ÐµÐ½Ñ ÐºÐ¾Ð³Ð´Ð°-нибÑÐ´Ñ Ð±ÑÐ´ÐµÑ Ð¼Ð°Ñина и
в ней бÑÐ´ÐµÑ Ð¼Ð¾Ð±Ð¸Ð»ÑнÑй ÑелеÑон, Ñ ÐµÐ³Ð¾
вÑклÑÑÑ.</p>
-</li>
+ </li>
-<li>
-<p><a
-href="http://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/">
-Ðад некоÑоÑÑми авÑомобилÑнÑми
компÑÑÑеÑÑми можно полÑÑиÑÑ ÐºÐ¾Ð½ÑÑÐ¾Ð»Ñ Ñ
помоÑÑÑ
-вÑедоноÑнÑÑ
пÑогÑамм в ÑайлаÑ
Ñ Ð¼ÑзÑкой</a>.
Ð Ñакже <a
-href="http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0">по
-Ñадио</a>. ÐÑÑгие ÑÐ²ÐµÐ´ÐµÐ½Ð¸Ñ Ð¼Ð¾Ð¶Ð½Ð¾ найÑи <a
-href="http://www.autosec.org/faq.html">на ÑайÑе ЦенÑÑа
авÑомобилÑной
-безопаÑноÑÑи и конÑиденÑиалÑноÑÑи</a>.</p>
-</li>
+ <li id="M201311130">
+ <p><a
+href="https://www.eff.org/deeplinks/2013/11/drm-cars-will-drive-consumers-crazy">ЦиÑÑовое
+ÑпÑавление огÑаниÑениÑми в авÑомобилÑÑ
бÑÐ´ÐµÑ Ð¿ÑиводиÑÑ Ð¿Ð¾ÑÑебиÑелей в
+беÑенÑÑво</a>.</p>
+ </li>
-<li><p>ÐомпÑÑÑеÑизованнÑе авÑомобили Ñ
неÑвободнÑми пÑогÑаммами ÑвлÑÑÑÑÑ <a
-href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
-ÑпионÑÑими ÑÑÑÑойÑÑвами</a>.</p>
-</li>
+ <li id="M201306140">
+ <p>ÐвÑомобили Tesla позволÑÑÑ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ð¸
полÑÑаÑÑ Ð´Ð°Ð½Ð½Ñе на ÑаÑÑÑоÑнии, а Ñакже
+опÑеделÑÑÑ Ð¼ÐµÑÑоположение авÑÐ¾Ð¼Ð¾Ð±Ð¸Ð»Ñ Ð²
лÑбой Ð¼Ð¾Ð¼ÐµÐ½Ñ (Ñм. паÑагÑаÑÑ b и c
+Ñаздела 2 <a
+href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+в Ñведомлении о конÑиденÑиалÑноÑÑи</a>).
ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ ÑÑвеÑждаеÑ, ÑÑо она не
+Ñ
ÑÐ°Ð½Ð¸Ñ ÑÑиÑ
Ñведений, но еÑли гоÑÑдаÑÑÑво
пÑиказÑÐ²Ð°ÐµÑ ÑобиÑаÑÑ Ð¸ пеÑедаваÑÑ
+ÑÑи даннÑе, Ñо оно Ð¼Ð¾Ð¶ÐµÑ Ð¸Ñ
ÑоÑ
ÑанÑÑÑ.</p>
+ </li>
-<li>
-<p>ÐеÑвободнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð² авÑомобилÑÑ
<a
+ <li id="M201303250">
+ <p id="records-drivers">ÐеÑвободнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð²
авÑомобилÑÑ
<a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">запиÑÑваÑÑ
ÑÐ²ÐµÐ´ÐµÐ½Ð¸Ñ Ð¾ движениÑÑ
водиÑелей</a>, а заÑем
пеÑедаÑÑ Ð¸Ñ
пÑоизводиÑелÑм
авÑомобилÑ, ÑÑÑаÑ
овÑм компаниÑм и
пÑоÑим.</p>
-<p>СлÑÑай Ñ ÑиÑÑемой ÑбоÑа плаÑежей,
ÑпомÑнÑÑÑй в ÑÑой ÑÑаÑÑе, в
+ <p>СлÑÑай Ñ ÑиÑÑемой ÑбоÑа плаÑежей,
ÑпомÑнÑÑÑй в ÑÑой ÑÑаÑÑе, в
дейÑÑвиÑелÑноÑÑи не Ð¸Ð¼ÐµÐµÑ Ð¾ÑноÑÐµÐ½Ð¸Ñ Ðº
Ñлежке неÑвободнÑми пÑогÑаммами. ÐÑи
ÑиÑÑÐµÐ¼Ñ Ð¿ÑедÑÑавлÑÑÑ Ð½ÐµÐ´Ð¾Ð¿ÑÑÑимое
вÑоÑжение в лиÑнÑÑ Ð¶Ð¸Ð·Ð½Ñ Ð¸ Ð´Ð¾Ð»Ð¶Ð½Ñ Ð±ÑÑÑ
Ð·Ð°Ð¼ÐµÐ½ÐµÐ½Ñ Ð½Ð° ÑиÑÑÐµÐ¼Ñ Ð°Ð½Ð¾Ð½Ð¸Ð¼Ð½ÑÑ
плаÑежей, но
вÑоÑжение оÑÑÑеÑÑвлÑÑÑ Ð½Ðµ
вÑедоноÑнÑе пÑогÑаммÑ. РдÑÑгиÑ
ÑлÑÑаÑÑ
,
ÑпомÑнÑÑÑÑ
в ÑÑаÑÑе, Ð¼Ñ Ð¸Ð¼ÐµÐµÐ¼ дело
Ñ Ð²ÑедоноÑнÑми неÑвободнÑми пÑогÑаммами в
авÑомобиле.</p>
-</li>
+ </li>
-<li>
-<p>ÐвÑомобили Tesla позволÑÑÑ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ð¸
полÑÑаÑÑ Ð´Ð°Ð½Ð½Ñе на ÑаÑÑÑоÑнии, а Ñакже
-опÑеделÑÑÑ Ð¼ÐµÑÑоположение авÑÐ¾Ð¼Ð¾Ð±Ð¸Ð»Ñ Ð²
лÑбой Ð¼Ð¾Ð¼ÐµÐ½Ñ (Ñм.<a
-href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
-паÑагÑаÑÑ b и c Ñаздела 2</a>). ÐомпаниÑ
ÑÑвеÑждаеÑ, ÑÑо она не Ñ
ÑаниÑ
-ÑÑиÑ
Ñведений, но еÑли гоÑÑдаÑÑÑво
пÑиказÑÐ²Ð°ÐµÑ ÑобиÑаÑÑ Ð¸ пеÑедаваÑÑ ÑÑи
-даннÑе, Ñо оно Ð¼Ð¾Ð¶ÐµÑ Ð¸Ñ
ÑоÑ
ÑанÑÑÑ.</p>
-</li>
+ <li id="M201103110">
+ <p><a
+href="http://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/">
+Ðад некоÑоÑÑми авÑомобилÑнÑми
компÑÑÑеÑÑми можно полÑÑиÑÑ ÐºÐ¾Ð½ÑÑÐ¾Ð»Ñ Ñ
помоÑÑÑ
+вÑедоноÑнÑÑ
пÑогÑамм в ÑайлаÑ
Ñ Ð¼ÑзÑкой</a>.
Ð Ñакже <a
+href="http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0">по
+Ñадио</a>. ÐÑÑгие ÑÐ²ÐµÐ´ÐµÐ½Ð¸Ñ Ð¼Ð¾Ð¶Ð½Ð¾ найÑи <a
+href="http://www.autosec.org/faq.html">на ÑайÑе ЦенÑÑа
авÑомобилÑной
+безопаÑноÑÑи и конÑиденÑиалÑноÑÑи</a>.</p>
+ </li>
</ul>
+
<div class="translators-notes">
<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
@@ -229,7 +265,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/07/25 16:30:35 $
+$Date: 2018/09/30 19:27:48 $
<!-- timestamp end -->
</p>
Index: proprietary-deception.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-deception.ru.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- proprietary-deception.ru.html 27 Sep 2018 15:57:42 -0000 1.14
+++ proprietary-deception.ru.html 30 Sep 2018 19:27:48 -0000 1.15
@@ -66,8 +66,8 @@
</li>
<li id="M201509210">
- <p>РФолÑкÑваген запÑогÑаммиÑовали
компÑÑÑеÑÑ Ð² двигаÑелÑÑ
ÑвоиÑ
авÑомобилей
на
-<a
+ <p>РФолÑкÑвагене запÑогÑаммиÑовали
компÑÑÑеÑÑ Ð² двигаÑелÑÑ
ÑвоиÑ
авÑомобилей
+на <a
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions">обнаÑÑжение
ÑеÑÑов вÑÑ
лопнÑÑ
газов</a>, пÑоводимÑÑ
ÐгенÑÑÑвом по оÑ
Ñане окÑÑжаÑÑей ÑÑедÑ
СШÐ, и загÑÑзнÑÑÑ Ð²Ð¾Ð·Ð´ÑÑ
вÑе оÑÑалÑное
вÑемÑ. ÐÑи движении в ÑеалÑнÑÑ
@@ -167,7 +167,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/09/27 15:57:42 $
+$Date: 2018/09/30 19:27:48 $
<!-- timestamp end -->
</p>
Index: proprietary-surveillance.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.ru.html,v
retrieving revision 1.132
retrieving revision 1.133
diff -u -b -r1.132 -r1.133
--- proprietary-surveillance.ru.html 12 Sep 2018 13:57:56 -0000 1.132
+++ proprietary-surveillance.ru.html 30 Sep 2018 19:27:48 -0000 1.133
@@ -63,70 +63,61 @@
</div>
<div class="toc">
- <h3 id="TableOfContents">СодеÑжание</h3>
- <ul>
+<h3 id="TableOfContents">СодеÑжание</h3>
+<ul>
<li><a href="#Introduction">Ðведение</a></li>
- <li><a href="#OSSpyware">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð²
опеÑаÑионнÑÑ
ÑиÑÑемаÑ
</a>
- <ul>
- <li><a href="#SpywareInWindows">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð²
Windows</a></li>
- <li><a href="#SpywareInMacOS">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð²
MacOS</a></li>
- <li><a href="#SpywareInAndroid">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð²
Android</a></li>
- </ul>
- </li>
- <li><a href="#SpywareOnMobiles">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð²
мобилÑнÑÑ
ÑÑÑÑойÑÑваÑ
</a>
+ <li><a href="#OSSpyware">ÐеÑеноÑнÑе и наÑÑолÑнÑе
компÑÑÑеÑÑ</a>
<ul>
- <li><a href="#SpywareIniThings">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð²
ай-ÑÑÑÑкаÑ
</a></li>
- <li><a href="#SpywareInTelephones">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð²
ÑелеÑонаÑ
</a></li>
- <li><a href="#SpywareInMobileApps">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð²
мобилÑнÑÑ
пÑиложениÑÑ
</a></li>
- <li><a href="#SpywareInToys">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð²
игÑÑÑкаÑ
</a></li>
+ <li><a href="#SpywareInWindows">Windows</a></li>
+ <li><a href="#SpywareInMacOS">MacOS</a></li>
+ <li><a href="#SpywareInBIOS">BIOS</a></li>
</ul>
</li>
- <li><a href="#SpywareOnWearables">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð½Ð°
лÑдÑÑ
</a>
+ <li><a href="#SpywareOnMobiles">ÐобилÑнÑе ÑÑÑÑойÑÑва</a>
<ul>
- <li><a
href="#SpywareOnSmartWatches">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð² ÑаÑаÑ
</a></li>
+ <li><a href="#SpywareInTelephones">СмаÑÑÑонÑ</a></li>
+ <li><a href="#SpywareIniThings">Ðй-ÑÑÑÑки</a></li>
+ <li><a href="#SpywareInAndroid">ТелеÑÐ¾Ð½Ñ Ñ Android</a></li>
+ <li><a href="#SpywareInElectronicReaders">ÐлекÑÑоннÑе
книги</a></li>
</ul>
</li>
- <li><a href="#SpywareAtLowLevel">ÐÑогÑаммÑ-ÑпионÑ
низкого ÑÑовнÑ</a>
+ <li><a href="#SpywareInMobileApps">ÐÑикладнÑе
пÑогÑаммÑ</a>
<ul>
- <li><a href="#SpywareInBIOS">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð²
BIOS</a></li>
+ <li><a href="#SpywareInMobileApps">ÐобилÑнÑе
пÑиложениÑ</a></li>
+ <li><a href="#SpywareInSkype">Skype</a></li>
+ <li><a href="#SpywareInGames">ÐгÑÑ</a></li>
</ul>
</li>
- <li><a href="#SpywareAtWork">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð½Ð°
ÑабоÑе</a>
+ <li><a href="#SpywareInEquipment">СеÑевое обоÑÑдование</a>
<ul>
- <li><a href="#SpywareInSkype">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð²
Skype</a></li>
- </ul>
- </li>
- <li><a href="#SpywareOnTheRoad">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð²
доÑоге</a>
+ <li><a href="#SpywareInTVSets">ТелевизоÑÑ</a></li>
+ <li><a href="#SpywareInCameras">ÐидеокамеÑÑ</a></li>
+ <li><a href="#SpywareInToys">ÐгÑÑÑки</a></li>
+ <li><a href="#SpywareInDrones">ÐеÑпилоÑники</a></li>
+ <li><a href="#SpywareAtHome">ÐÑÑгие ÑÑÑÑойÑÑва</a></li>
+ <li><a href="#SpywareOnWearables">Ðа лÑдÑÑ
</a>
<ul>
- <li><a href="#SpywareInCameras">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð²
видеокамеÑаÑ
</a></li>
- <li><a
href="#SpywareInElectronicReaders">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð²
ÑлекÑÑоннÑÑ
-книгаÑ
</a></li>
- <li><a href="#SpywareInVehicles">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð²
авÑомобилÑÑ
</a></li>
+ <li><a href="#SpywareOnSmartWatches">ЧаÑÑ</a></li>
</ul>
</li>
- <li><a href="#SpywareAtHome">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð´Ð¾Ð¼Ð°</a>
- <ul>
- <li><a href="#SpywareInTVSets">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð²
ÑелевизоÑаÑ
</a></li>
+ <li><a href="#SpywareInVehicles">ÐвÑомобили</a></li>
+ <li><a href="#SpywareInVR">ÐиÑÑÑалÑнаÑ
ÑеалÑноÑÑÑ</a></li>
</ul>
</li>
- <li><a href="#SpywareInGames">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð² игÑаÑ
</a></li>
- <li><a href="#SpywareInRecreation">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð½Ð°
оÑдÑÑ
е</a></li>
- <li><a href="#SpywareOnTheWeb">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð²
ÐнÑеÑнеÑе</a>
+ <li><a href="#SpywareOnTheWeb">ÐнÑеÑнеÑ</a>
<ul>
- <li><a href="#SpywareInChrome">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð²
Chrome</a></li>
- <li><a href="#SpywareInFlash">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð²
JavaScript и Flash</a></li>
+ <li><a href="#SpywareInChrome">Chrome</a></li>
+ <li><a href="#SpywareInJavaScript">JavaScript</a></li>
+ <li><a href="#SpywareInFlash">Flash</a></li>
</ul>
</li>
- <li><a href="#SpywareInDrones">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð²
беÑпилоÑникаÑ
</a></li>
- <li><a href="#SpywareEverywhere">ÐÑогÑаммÑ-ÑпионÑ
повÑÑдÑ</a></li>
- <li><a href="#SpywareInVR">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð²
виÑÑÑалÑной ÑеалÑноÑÑи</a></li>
- </ul>
+ <li><a href="#SpywareInNetworks">СеÑи</a></li>
+</ul>
</div>
+<div style="clear: left;"></div>
</div>
-<div style="clear: left;"></div>
-<!-- #Introduction -->
<div class="big-section">
<h3 id="Introduction">Ðведение</h3>
</div>
@@ -142,7 +133,7 @@
ÑÑÑемиÑелÑно пеÑеÑла Ð¾Ñ ÐºÐ»Ð°Ð²Ð¸Ð°ÑÑÑÑ Ð½Ð°
мобилÑнÑе ÑÑÑÑойÑÑва, на ÑабоÑÑ, в
дом, на ÑÑанÑпоÑÑ Ð¸ в ÑколÑ.</p>
-<h3 id="AggregateInfoCollection">ÐбобÑеннÑе или
анонимизиÑованнÑе даннÑе</h3>
+<h4 id="AggregateInfoCollection">ÐбобÑеннÑе или
анонимизиÑованнÑе даннÑе</h4>
<p>Ðногие компании в Ñвоей полиÑике
конÑидениÑалÑноÑÑи пÑиÑÑÑ, ÑÑо они
обмениваÑÑÑÑ Ð¾Ð±Ð¾Ð±Ñенной инÑоÑмаÑией, не
иденÑиÑиÑиÑÑÑÑей оÑделÑнÑе лиÑноÑÑи,
@@ -164,28 +155,34 @@
компаний о Ñом, ÑÑо они ÑÑанÑÑ <em>делаÑÑ</em>
Ñ Ð´Ð°Ð½Ð½Ñми, коÑоÑÑе они
ÑобиÑаÑÑ. ÐлоÑ
о Ñже Ñо, ÑÑо они вообÑе
ÑобиÑаÑÑ Ð¸Ñ
.</p>
-<h3 id="LatestAdditions">ÐоÑледние добавлениÑ</h3>
+<h4 id="LatestAdditions">ÐоÑледние добавлениÑ</h4>
<p>ÐоÑледние Ð´Ð¾Ð±Ð°Ð²Ð»ÐµÐ½Ð¸Ñ Ð½Ð°Ñ
одÑÑÑÑ Ð² наÑале
каждого Ñаздела.</p>
-<!-- #OSSpyware -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
+
+
<div class="big-section">
- <h3 id="OSSpyware">Spyware in Operating Systems</h3>
+ <h3 id="OSSpyware">ÐеÑеноÑнÑе и наÑÑолÑнÑе
компÑÑÑеÑÑ</h3>
<span class="anchor-reference-id">(<a
href="#OSSpyware">#OSSpyware</a>)</span>
</div>
<div style="clear: left;"></div>
-
<div class="big-subsection">
- <h4 id="SpywareInWindows">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð² Windows</h4>
+ <h4 id="SpywareInWindows">Windows</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInWindows">#SpywareInWindows</a>)</span>
</div>
-<ul>
- <li><p>ÐÑогÑамма ÑелемеÑÑии Windows 10 поÑÑлаеÑ
в Microsoft инÑоÑмаÑÐ¸Ñ Ð¾ компÑÑÑеÑе
+<ul class="blurbs">
+ <li id="M201712110">
+ <p>Ð ÑоÑÑав неÑвободной опеÑаÑионной
ÑиÑÑÐµÐ¼Ñ HP <a
+href="http://www.bbc.com/news/technology-42309371">вÑ
одиÑ
неÑвободнÑй
+дÑÐ°Ð¹Ð²ÐµÑ ÐºÐ»Ð°Ð²Ð¸Ð°ÑÑÑÑ, коÑоÑÑй запиÑÑваеÑ
вÑе нажаÑÐ¸Ñ Ð½Ð° клавиÑи</a>.</p>
+ </li>
+
+ <li id="M201710134">
+ <p>ÐÑогÑамма ÑелемеÑÑии Windows 10 поÑÑÐ»Ð°ÐµÑ Ð²
Microsoft инÑоÑмаÑÐ¸Ñ Ð¾ компÑÑÑеÑе
полÑзоваÑÐµÐ»Ñ Ð¸ о Ñом, как иÑполÑзÑеÑÑÑ
компÑÑÑеÑ.</p>
<p>Ðолее Ñого, еÑли полÑзоваÑели
ÑÑÑанавливали ÑеÑвеÑÑÑÑ ÑÑабилÑнÑÑ ÑбоÑкÑ
@@ -195,70 +192,99 @@
пÑинÑдиÑелÑной ÑÑÑановкой
ÑелемеÑÑиÑеÑкого Ñежима до
“Ðолного”</a>.</p>
-<p><a
+ <p><a
href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level">“ÐолнÑй”
Ñежим ÑелемеÑÑии</a> позволÑÐµÑ Ð¸Ð½Ð¶ÐµÐ½ÐµÑам
Microsoft Windows полÑÑиÑÑ Ð´Ð¾ÑÑÑп,
кÑоме пÑоÑего, к клÑÑам ÑееÑÑÑа, <a
href="https://technet.microsoft.com/en-us/library/cc939702.aspx">коÑоÑÑе
могÑÑ ÑодеÑжаÑÑ ÑакÑÑ ÐºÐ¾Ð½ÑиденÑиалÑнÑÑ
инÑоÑмаÑиÑ, как паÑÐ¾Ð»Ñ ÑÑеÑной запиÑи
-админиÑÑÑаÑоÑа</a>.</p></li>
+админиÑÑÑаÑоÑа</a>.</p>
+ </li>
- <li><p>Ð¤Ð°Ð¹Ð»Ñ ÑиÑÑового ÑпÑавлениÑ
огÑаниÑениÑми Windows <a
+ <li id="M201702020">
+ <p>Ð¤Ð°Ð¹Ð»Ñ Ñ ÑиÑÑовÑм ÑпÑавлением
огÑаниÑениÑми <a
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users">можно
пÑименÑÑÑ Ð´Ð»Ñ Ð¸Ð´ÐµÐ½ÑиÑикаÑии лÑдей,
полÑзÑÑÑиÑ
ÑÑ Tor</a>. УÑзвимоÑÑÑ
-ÑÑÑеÑÑвÑеÑ, ÑолÑко еÑли Ð²Ñ Ð¿Ð¾Ð»ÑзÑеÑеÑÑ
Windows.
- </p></li>
+ÑÑÑеÑÑвÑеÑ, ÑолÑко еÑли Ð²Ñ Ð¿Ð¾Ð»ÑзÑеÑеÑÑ
Windows.</p>
+ </li>
- <li><p>Ðо ÑмолÑÐ°Ð½Ð¸Ñ Windows 10 <a
+ <li id="M201611240">
+ <p>Ðо ÑмолÑÐ°Ð½Ð¸Ñ Windows 10 <a
href="http://betanews.com/2016/11/24/microsoft-shares-windows-10-telemetry-data-with-third-parties">оÑпÑавлÑеÑ
оÑладоÑнÑе даннÑе в Microsoft, в Ñом ÑиÑле
Ð´Ð°Ð¼Ð¿Ñ Ð¿Ð°Ð¼ÑÑи</a>. РнаÑÑоÑÑее
-вÑÐµÐ¼Ñ Microsoft пеÑÐµÐ´Ð°ÐµÑ Ð¸Ñ
дÑÑгой
компании.</p></li>
+вÑÐµÐ¼Ñ Microsoft пеÑÐµÐ´Ð°ÐµÑ Ð¸Ñ
дÑÑгой компании.</p>
+ </li>
-<li>Ð ÑелÑÑ
наÑаÑÐ¸Ð²Ð°Ð½Ð¸Ñ Ð¿Ð¾Ð»ÑзоваÑелÑÑкой
Ð±Ð°Ð·Ñ Windows 10 Microsoft <a
+ <li id="M201608171">
+ <p>Ð ÑелÑÑ
наÑаÑÐ¸Ð²Ð°Ð½Ð¸Ñ Ð¿Ð¾Ð»ÑзоваÑелÑÑкой
Ð±Ð°Ð·Ñ Windows 10 Microsoft <a
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
-допÑÑÐºÐ°ÐµÑ Ð²Ð¾Ð¿Ð¸ÑÑие наÑÑÑÐµÐ½Ð¸Ñ Ð²ÑбоÑа
полÑзоваÑелей и иÑ
пÑиваÑноÑÑи</a>.
-</li>
+допÑÑÐºÐ°ÐµÑ Ð²Ð¾Ð¿Ð¸ÑÑие наÑÑÑÐµÐ½Ð¸Ñ Ð²ÑбоÑа
полÑзоваÑелей и иÑ
пÑиваÑноÑÑи</a>.</p>
+ </li>
- <li><p><a
+ <li id="M201603170">
+ <p><a
href="https://duo.com/blog/bring-your-own-dilemma-oem-laptops-and-windows-10-security">
Windows 10 поÑÑавлÑеÑÑÑ Ñ 13 ÑкÑанами наÑÑÑоек
Ñлежки</a>, вÑе из коÑоÑÑÑ
в
иÑÑ
одном положении вклÑÑенÑ, а вÑклÑÑиÑÑ
иÑ
Ð´Ð»Ñ Ð±Ð¾Ð»ÑÑинÑÑва полÑзоваÑелей
-бÑло Ð±Ñ Ð½ÐµÐ»ÐµÐ³ÐºÐ¾.</p></li>
+бÑло Ð±Ñ Ð½ÐµÐ»ÐµÐ³ÐºÐ¾.</p>
+ </li>
+
+ <li id="M201601050">
+ <p>ÐказÑваеÑÑÑ, <a
+href="http://www.ghacks.net/2016/01/05/microsoft-may-be-collecting-more-data-than-initially-thought/">
+Windows 10 поÑÑÐ»Ð°ÐµÑ Ð² Microsoft ÑÐ²ÐµÐ´ÐµÐ½Ð¸Ñ Ð¾
запÑÑеннÑÑ
пÑиложениÑÑ
</a>.</p>
+ </li>
- <li><p><a
+ <li id="M201512280">
+ <p>ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Microsoft <a
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/">
-ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Microsoft Ñже поÑÑавила Ð»Ð°Ð·ÐµÐ¹ÐºÑ Ð²
Ñвое ÑиÑÑование диÑка</a>.</p></li>
+поÑÑавила Ð»Ð°Ð·ÐµÐ¹ÐºÑ Ð² Ñвое ÑиÑÑование
диÑка</a>.</p>
+ </li>
- <li>ÐказÑваеÑÑÑ, <a
-href="http://www.ghacks.net/2016/01/05/microsoft-may-be-collecting-more-data-than-initially-thought/">
-Windows 10 поÑÑÐ»Ð°ÐµÑ Ð² Microsoft ÑÐ²ÐµÐ´ÐµÐ½Ð¸Ñ Ð¾
запÑÑеннÑÑ
пÑиложениÑÑ
</a>.</li>
- <li><p>ÐеÑеÑ
од к Ñ
ÑдÑей веÑÑии веÑÑии Windows 10
Ñдалил пÑиложениÑ, обнаÑÑживаÑÑие
+ <li id="M201511264">
+ <p>ÐеÑеÑ
од к Ñ
ÑдÑей веÑÑии веÑÑии Windows 10
Ñдалил пÑиложениÑ, обнаÑÑживаÑÑие
ÑлежкÑ. ÐаÑем дÑÑгой пеÑеÑ
од вÑÑавил
пÑогÑÐ°Ð¼Ð¼Ñ Ð¾Ð±Ñей Ñлежки. ÐолÑзоваÑели
замеÑили ÑÑо и ÑÑали жаловаÑÑÑÑ, Ñак ÑÑо
Microsoft пеÑеименовала ÑÑо, <a
-href="https://web.archive.org/web/20160407082751/http://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/">
+href="https://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/">
ÑÑÐ¾Ð±Ñ ÑоздаÑÑ Ñ Ð¿Ð¾Ð»ÑзоваÑелей
впеÑаÑление, ÑÑо ÑÑого болÑÑе неÑ</a>.</p>
+
<p>ÐолÑзоваÑÑÑÑ Ð½ÐµÑвободнÑми
пÑогÑаммами знаÑÐ¸Ñ Ð½Ð°Ð¿ÑаÑиваÑÑÑÑ Ð½Ð° Ñакое
обÑаÑение.</p>
</li>
- <li><p>
- Windows 10 <a
-href="https://web.archive.org/web/20151001035410/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/">
+
+ <li id="M201508180">
+ <p><a
+href="https://web.archive.org/web/20150905163414/http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping">
+УÑÑÑойÑÑва Intel ÑмогÑÑ Ð¿ÑоÑлÑÑиваÑÑ ÑеÑÑ
вÑегда, даже когда они
+“вÑклÑÑенє</a>.</p>
+ </li>
+
+ <li id="M201508130">
+ <p><a
+href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/">
+Windows 10 оÑÑÑÐ»Ð°ÐµÑ Ð² Microsoft иденÑиÑиÑиÑÑемÑе
даннÑе</a>, даже когда
+полÑзоваÑÐµÐ»Ñ Ð²ÑклÑÑÐ°ÐµÑ ÑÑнкÑии Cortana и
поиÑка Bing и вклÑÑÐ°ÐµÑ ÑÑÑановки
+заÑиÑÑ ÐºÐ¾Ð½ÑиденÑиалÑноÑÑи.</p>
+ </li>
+
+ <li id="M201507300">
+ <p>Windows 10 <a
+href="https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/">
поÑÑавлÑеÑÑÑ Ñ Ð¿ÑедÑÑÑановленнÑми
наÑÑÑойками, коÑоÑÑе ниÑколÑко не ÑважаÑÑ
конÑиденÑиалÑноÑÑÑ Ð¿Ð¾Ð»ÑзоваÑелей</a>,
Ð´Ð°Ð²Ð°Ñ Microsoft “пÑаво”
заглÑдÑваÑÑ Ð² ÑÐ°Ð¹Ð»Ñ Ð¿Ð¾Ð»ÑзоваÑелей,
вводимÑе ими ÑекÑÑовÑе и голоÑовÑе
даннÑе, ÑÐ²ÐµÐ´ÐµÐ½Ð¸Ñ Ð¾ меÑÑоположении,
конÑакÑÑ, запиÑи в календаÑе, иÑÑоÑиÑ
пÑоÑмоÑÑа ÐÑемиÑной паÑÑинÑ, а Ñакже
авÑомаÑиÑеÑки подклÑÑаÑÑ Ð¼Ð°ÑÐ¸Ð½Ñ Ðº
-оÑкÑÑÑÑм ÑоÑкам доÑÑÑпа и показÑваÑÑ
ÑелевÑÑ ÑекламÑ.</p></li>
+оÑкÑÑÑÑм ÑоÑкам доÑÑÑпа и показÑваÑÑ
ÑелевÑÑ ÑекламÑ.</p>
- <li><p>
- <a
-href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/">
-Windows 10 оÑÑÑÐ»Ð°ÐµÑ Ð² Microsoft иденÑиÑиÑиÑÑемÑе
даннÑе</a>, даже когда
-полÑзоваÑÐµÐ»Ñ Ð²ÑклÑÑÐ°ÐµÑ ÑÑнкÑии Cortana и
поиÑка Bing и вклÑÑÐ°ÐµÑ ÑÑÑановки
-заÑиÑÑ ÐºÐ¾Ð½ÑиденÑиалÑноÑÑи.</p></li>
+ <p>ÐÑ Ð¼Ð¾Ð¶ÐµÐ¼ полагаÑÑ, ÑÑо Microsoft
заглÑдÑÐ²Ð°ÐµÑ Ð² ÑÐ°Ð¹Ð»Ñ Ð¿Ð¾Ð»ÑзоваÑелей по
+ÑÑÐµÐ±Ð¾Ð²Ð°Ð½Ð¸Ñ Ð¿ÑавÑÑего Ñежима СШÐ, Ñ
оÑÑ
“полиÑика
+конÑиденÑиалÑноÑÑи” Ñвно ÑÑого не
говоÑиÑ. СÑÐ°Ð½ÐµÑ Ð»Ð¸ компаниÑ
+заглÑдÑваÑÑ Ð² ÑÐ°Ð¹Ð»Ñ Ð¿Ð¾Ð»ÑзоваÑелей по
ÑÑÐµÐ±Ð¾Ð²Ð°Ð½Ð¸Ñ Ð¿ÑавÑÑего Ñежима ÐиÑаÑ?</p>
+ </li>
- <li><p>
- Microsoft полÑзÑеÑÑÑ “полиÑикой
конÑиденÑиалÑноÑÑи” Windows 10,
+ <li id="M201506170">
+ <p>Microsoft полÑзÑеÑÑÑ “полиÑикой
конÑиденÑиалÑноÑÑи” Windows 10,
ÑÑÐ¾Ð±Ñ Ð¾ÑкÑÑÑо навÑзÑваÑÑ “пÑаво”
заглÑдÑваÑÑ Ð² лÑбое вÑÐµÐ¼Ñ Ð²
ÑÐ°Ð¹Ð»Ñ Ð¿Ð¾Ð»ÑзоваÑелÑ. Ðолное ÑиÑÑование
диÑка Windows 10 <a
href="https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/">
@@ -278,56 +304,56 @@
<p>Microsoft как бÑдÑо пÑеднамеÑенно ÑеÑила
ÑделаÑÑ Windows 10 макÑималÑно
вÑедной по вÑем паÑамеÑÑам, заÑ
ваÑиÑÑ
полнÑÑ Ð²Ð»Ð°ÑÑÑ Ð½Ð°Ð´ вÑÑким, кÑо не
-оÑбÑоÑÐ¸Ñ Windows ÑейÑÐ°Ñ Ð¶Ðµ.</p></li>
+оÑбÑоÑÐ¸Ñ Windows ÑейÑÐ°Ñ Ð¶Ðµ.</p>
+ </li>
- <li><p>Со вÑеменем ÑÑо ÑолÑко ÑÑ
ÑдÑаеÑÑÑ. <a
+ <li id="M201410040">
+ <p>Со вÑеменем ÑÑо ÑолÑко ÑÑ
ÑдÑаеÑÑÑ. <a
href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html">
Windows 10 ÑÑебÑеÑ, ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð»ÑзоваÑели давали
ÑазÑеÑение заглÑдÑваÑÑ
абÑолÑÑно везде</a>, в Ñом ÑиÑле в иÑ
ÑайлÑ,
во вводимÑй ими ÑекÑÑ Ð¸ в
ÑÐ¸Ð³Ð½Ð°Ð»Ñ Ñ Ð¼Ð¸ÐºÑоÑонов.</p>
</li>
- <li><p><a
-href="http://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html">Windows
-8.1 подглÑдÑÐ²Ð°ÐµÑ Ð·Ð° поиÑком по
компÑÑÑеÑÑ</a>.</p>
+ <li id="M201401150">
+ <p id="baidu-ime"><a
+href="https://www.techrepublic.com/blog/asian-technology/japanese-government-warns-baidu-ime-is-spying-on-users/">
+ÐÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð´Ð»Ñ Ð²Ð²Ð¾Ð´Ð° ÑпонÑкого и
киÑайÑкого ÑекÑÑа Baidu ÑпионÑÑ Ð·Ð° Ñвоими
+полÑзоваÑелÑми</a>.</p>
</li>
- <li><p>РеÑе <a href="http://www.marketoracle.co.uk/Article40836.html">
в Windows
-еÑÑÑ ÑекÑеÑнÑй клÑÑ ÐÐÐ</a>, ÑÑнкÑии
коÑоÑого нам не извеÑÑнÑ.</p>
+ <li id="M201307080">
+ <p>ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð² Windows: <a
+href="https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/">
+Windows Update подглÑдÑÐ²Ð°ÐµÑ Ð·Ð° полÑзоваÑелем</a>. <a
+href="https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html">Windows
+8.1 подглÑдÑÐ²Ð°ÐµÑ Ð·Ð° поиÑком по
компÑÑÑеÑÑ</a>. РеÑе <a
+href="http://www.marketoracle.co.uk/Article40836.html"> в Windows еÑÑÑ
+ÑекÑеÑнÑй клÑÑ NSA</a>, ÑÑнкÑии коÑоÑого нам
неизвеÑÑнÑ.</p>
</li>
-
- <li>Ð ÑоÑÑав неÑвободной опеÑаÑионной
ÑиÑÑÐµÐ¼Ñ HP <a
-href="http://www.bbc.com/news/technology-42309371">вÑ
одиÑ
неÑвободнÑй
-дÑÐ°Ð¹Ð²ÐµÑ ÐºÐ»Ð°Ð²Ð¸Ð°ÑÑÑÑ, коÑоÑÑй запиÑÑваеÑ
вÑе нажаÑÐ¸Ñ Ð½Ð° клавиÑи</a>.</li>
</ul>
+
<p>Слежка Microsoft за полÑзоваÑелÑми наÑалаÑÑ
не Ñ Windows 10. <a
href="/proprietary/malware-microsoft.html">ÐÑедоноÑнÑÑ
пÑогÑамм
Microsoft</a> множеÑÑво.</p>
<div class="big-subsection">
- <h4 id="SpywareInMacOS">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð² MacOS</h4>
+ <h4 id="SpywareInMacOS">MacOS</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInMacOS">#SpywareInMacOS</a>)</span>
</div>
-<ul>
- <li><p>Adware Doctor, блокиÑовÑик ÑÐµÐºÐ»Ð°Ð¼Ñ Ð´Ð»Ñ MacOS, <a
+<ul class="blurbs">
+ <li id="M201809070">
+ <p>Adware Doctor, блокиÑовÑик ÑÐµÐºÐ»Ð°Ð¼Ñ Ð´Ð»Ñ MacOS, <a
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history">докладÑваеÑ
об иÑÑоÑии поÑеÑений ÑайÑов
полÑзоваÑелем</a>.</p>
</li>
- <li><p><a
-href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/">
-MacOS авÑомаÑиÑеÑки вÑÑÑÐ»Ð°ÐµÑ Ð½Ð° ÑеÑвеÑÑ Apple
неÑоÑ
ÑаненнÑе докÑменÑÑ Ð²Ð¾
-вÑÐµÐ¼Ñ ÑедакÑиÑованиÑ</a>. <a
-href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&utm_medium=twitter/">
-То, ÑÑо Ð²Ñ Ð¿Ð¾ÐºÐ° не ÑеÑили ÑоÑ
ÑанÑÑÑ, еÑе
более конÑиденÑиалÑно, Ñем Ñо, ÑÑо
-Ð²Ñ ÑоÑ
Ñанили в ÑайлаÑ
</a>.</p>
- </li>
-
- <li><p>Apple Ñделала Ñак, ÑÑÐ¾Ð±Ñ ÑазлиÑнÑе <a
+ <li id="M201411040">
+ <p>Apple Ñделала Ñак, ÑÑÐ¾Ð±Ñ ÑазлиÑнÑе <a
href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud">
пÑогÑÐ°Ð¼Ð¼Ñ MacOS вÑÑÑлали на ÑеÑвеÑÑ Apple
ÑайлÑ, не ÑпÑаÑиваÑ
ÑазÑеÑениÑ</a>. ÐлагодаÑÑ ÑÑÐ¾Ð¼Ñ ÑÐ°Ð¹Ð»Ñ Ð¼Ð¾Ð¶ÐµÑ
подÑмаÑÑиваÑÑ Ð¡ÑаÑÑий ÐÑаÑ, а
@@ -340,466 +366,409 @@
полÑзоваÑели ÑдалиÑÑ ÐµÐµ не могÑÑ.</p>
</li>
- <li><p>ÐÑи ÑазлиÑнÑÑ
опеÑаÑиÑÑ
<a
-href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540">
-поÑледнÑÑ Ð²ÐµÑÑÐ¸Ñ MacOS вÑÑÑÐ»Ð°ÐµÑ Ð¾ÑÑеÑÑ
ÑеÑвеÑам Apple</a>.</p>
+ <li id="M201410300">
+ <p> MacOS авÑомаÑиÑеÑки <a
+href="https://web.archive.org/web/20170831144456/https://www.washingtonpost.com/news/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/">
+вÑÑÑÐ»Ð°ÐµÑ Ð½Ð° ÑеÑвеÑÑ Apple неÑоÑ
ÑаненнÑе
докÑменÑÑ Ð²Ð¾ вÑемÑ
+ÑедакÑиÑованиÑ</a>. То, ÑÑо Ð²Ñ Ð¿Ð¾ÐºÐ° не ÑеÑили
ÑоÑ
ÑанÑÑÑ, <a
+href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&utm_medium=twitter/">еÑе
+более конÑиденÑиалÑно</a>, Ñем Ñо, ÑÑо Ð²Ñ ÑоÑ
Ñанили в ÑайлаÑ
.</p>
</li>
- <li><p>Apple не оÑÑиÑÐ°ÐµÑ Ñого, ÑÑо <a
+ <li id="M201410220">
+ <p>Apple не оÑÑиÑÐ°ÐµÑ Ñого, ÑÑо <a
href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/">
ÑÑедÑÑво поиÑка ÑпиониÑ</a>, но <a
href="https://github.com/fix-macosx/yosemite-phone-home">Apple не
ÑпоминаеÑ
о подглÑдÑвании во многом дÑÑгом</a>.</p>
</li>
- <li><p><a
+ <li id="M201410200">
+ <p>ÐÑи ÑазлиÑнÑÑ
опеÑаÑиÑÑ
<a
+href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540">
+поÑледнÑÑ Ð²ÐµÑÑÐ¸Ñ MacOS вÑÑÑÐ»Ð°ÐµÑ Ð¾ÑÑеÑÑ
ÑеÑвеÑам Apple</a>.</p>
+ </li>
+
+ <li id="M201401101">
+ <p><a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">СÑедÑÑво
поиÑка Spotlight</a> вÑÑÑÐ»Ð°ÐµÑ Ð·Ð°Ð¿ÑоÑÑ
полÑзоваÑÐµÐ»Ñ Ð² Apple.</p>
</li>
</ul>
+
<p>ÐÑе еÑÑÑ Ð¼Ð½Ð¾Ð³Ð¾ <a
href="#SpywareIniThings">пÑогÑамм-Ñпионов в ай-ÑÑÑÑкаÑ
</a>
и <a href="/proprietary/malware-apple.html">вÑедоноÑнÑÑ
пÑогÑамм Apple</a>.</p>
<div class="big-subsection">
- <h4 id="SpywareInAndroid">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð² Android</h4>
+ <a id="SpywareAtLowLevel"></a>
+ <h4 id="SpywareInBIOS">BIOS</h4>
<span class="anchor-reference-id">(<a
-href="#SpywareInAndroid">#SpywareInAndroid</a>)</span>
+href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
</div>
-<ul>
-<li>
- <p>ÐекоÑоÑÑе пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Google в ÑиÑÑеме Android
<a
-href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
-запиÑÑваÑÑ Ð¼ÐµÑÑоположение полÑзоваÑелÑ,
даже когда полÑзоваÑели оÑклÑÑаÑÑ
-“оÑÑлеживание меÑÑоположениє</a>.</p>
+<ul class="blurbs">
+ <li id="M201509220">
+ <p><a
+href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo ÑкÑÑÑно ÑÑÑанавливала
пÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð¸ дÑÑгой мÑÑÐ¾Ñ ÑеÑез BIOS</a>
+повеÑÑ
Windows. ÐбÑаÑиÑе внимание, ÑÑо ÑÑоÑ
конкÑеÑнÑй меÑод ÑабоÑажа,
+пÑимененнÑй Lenovo, не коÑнÑлÑÑ GNU/Linux; кÑоме
Ñого, “ÑиÑÑає
+ÑÑÑановка Windows на Ñамом деле не ÑиÑÑа,
поÑколÑÐºÑ <a
+href="/proprietary/malware-microsoft.html">Microsoft закладÑваеÑ
Ñвои
+ÑобÑÑвеннÑе вÑедоноÑнÑе пÑогÑаммÑ</a>.</p>
+ </li>
+</ul>
- <p>ÐÑÑÑ Ð´ÑÑгие ÑпоÑÐ¾Ð±Ñ Ð¾ÑклÑÑиÑÑ Ð´ÑÑгие
меÑÐ¾Ð´Ñ Ð¾ÑÑÐ»ÐµÐ¶Ð¸Ð²Ð°Ð½Ð¸Ñ Ð¼ÐµÑÑоположениÑ, но
-болÑÑинÑÑво полÑзоваÑелей бÑÐ´ÐµÑ Ð¾Ð±Ð¼Ð°Ð½ÑÑо
вводÑÑим в заблÑждение пÑнкÑом
-наÑÑÑоек.</p>
-</li>
-<li>
- <p>ÐÑÑледоваÑели обнаÑÑжили, ÑÑо <a
-href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
-из 5855 пÑовеÑеннÑÑ
пÑиложений Android
подглÑдÑваÑÑ Ð¸ ÑобиÑаÑÑ Ð¸Ð½ÑоÑмаÑÐ¸Ñ Ð¾
-ÑвоиÑ
полÑзоваÑелÑÑ
</a>. ÐбнаÑÑжилоÑÑ, ÑÑо
40% из ÑÑиÑ
пÑиложений
-ÑплеÑниÑаÑÑ Ð¾ ÑвоиÑ
полÑзоваÑелÑÑ
по
незаÑиÑеннÑм каналам. ÐбÑаÑиÑе
-внимание, ÑÑо иÑÑледоваÑели могли
ÑаÑкÑÑÑÑ ÑолÑко некоÑоÑÑе меÑÐ¾Ð´Ñ Ñлежки в
-ÑÑиÑ
неÑвободнÑÑ
пÑиложениÑÑ
, на иÑÑ
однÑй
ÑекÑÑ ÐºÐ¾ÑоÑÑÑ
они не имели
-возможноÑÑи взглÑнÑÑÑ. ÐÑÑалÑнÑе
пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð¼Ð¾Ð³Ð»Ð¸ Ð±Ñ Ð¿Ð¾Ð´Ð³Ð»ÑдÑваÑÑ Ð´ÑÑгими
-ÑпоÑобами.</p>
- <p>ÐÑо ÑвидеÑелÑÑÑвÑÐµÑ Ð¾ Ñом, ÑÑо
неÑвободнÑе пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð² обÑем ÑабоÑаÑÑ
-пÑоÑив ÑвоиÑ
полÑзоваÑелей. ÐÐ»Ñ Ð·Ð°ÑиÑÑ
Ñвоей лиÑной жизни и ÑвободÑ
-полÑзоваÑелÑм Android нÑжно избавиÑÑÑÑ Ð¾Ñ
неÑвободнÑÑ
пÑогÑамм —
-как Ð¾Ñ Ð½ÐµÑвободной ÑиÑÑÐµÐ¼Ñ Aydroid, пеÑÐµÐ¹Ð´Ñ Ð½Ð°
<a
-href="https://replicant.us">Replicant</a>, Ñак и оÑ
неÑвободнÑÑ
пÑиложений,
-полÑÑÐ°Ñ Ð¸Ñ
из <a href="https://f-droid.org/">магазина
F-Droid</a>, в коÑоÑом
-ÑазмеÑаÑÑÑÑ ÑолÑко ÑвободнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð¸
коÑоÑÑй <a
-href="https://f-droid.org/wiki/page/Antifeatures"> ÑвÑÑвенно
пÑедÑпÑеждаеÑ
-полÑзоваÑелÑ, еÑли в пÑиложении еÑÑÑ
анÑиÑÑнкÑии</a>.</p>
-</li>
+<div class="big-section">
+ <h3 id="SpywareOnMobiles">ÐобилÑнÑе ÑÑÑÑойÑÑва</h3>
+ <span class="anchor-reference-id">(<a
+href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
+</div>
+<div style="clear: left;"></div>
-<li>
- <p>20 неÑеÑÑнÑÑ
пÑиложений Android <a
-href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">запиÑÑвали
-ÑелеÑоннÑе звонки и оÑпÑавлÑли иÑ
в виде
ÑекÑÑовÑÑ
ÑообÑений и ÑлекÑÑонной
-поÑÑÑ Ñем, кÑо ÑÐ»ÐµÐ´Ð¸Ñ Ð·Ð°
полÑзоваÑелÑми</a>.</p>
+<div class="big-subsection">
+ <h4 id="SpywareInTelephones">СмаÑÑÑонÑ</h4>
+ <span class="anchor-reference-id">(<a
+href="#SpywareInTelephones">#SpywareInTelephones</a>)</span>
+</div>
- <p>ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Google не наÑоÑно Ñделала, ÑÑобÑ
ÑÑи пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ñпионили; напÑоÑив,
-она пÑинимала ÑазлиÑнÑе меÑÑ, ÑÑобÑ
пÑедоÑвÑаÑиÑÑ ÑÑо, и Ñдалила ÑÑи
-пÑиложениÑ, когда вÑÑÑнилоÑÑ, ÑÑо они
делаÑÑ. Так ÑÑо Ð¼Ñ Ð½Ðµ можем обвинÑÑÑ
-Google в Ñом, ÑÑо ÑÑи пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ñпионили.</p>
+<ul class="blurbs">
+ <li id="M201601110">
+ <p>ÐÑÑеÑÑвенное пÑодолжение надзоÑа за
лÑдÑми пÑи поÑÑедÑÑве “иÑ
”
+ÑелеÑонов — <a
+href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
+неÑÐ²Ð¾Ð±Ð¾Ð´Ð½Ð°Ñ Ð¿ÑогÑамма Ð´Ð»Ñ Ð¿ÑовеÑки Ñого,
ÑÑо они не “обведÑÑ”
+надзиÑаÑелей “вокÑÑг палÑÑа”</a>.</p>
+ </li>
- <p>С дÑÑгой ÑÑоÑонÑ, Google
пеÑеÑаÑпÑоÑÑÑанÑÐµÑ Ð½ÐµÑвободнÑе
пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Android,
-а ÑÑало бÑÑÑ, ÑазделÑÐµÑ Ð¾ÑвеÑÑÑвенноÑÑÑ Ð·Ð°
неÑпÑаведливоÑÑÑ, ÑоÑÑоÑÑÑÑ Ð²
-Ñом, ÑÑо они неÑвободнÑ. ÐомпаниÑ
ÑаÑпÑоÑÑÑанÑÐµÑ Ñакже Ñвои ÑобÑÑвеннÑе
-неÑвободнÑе пÑиложениÑ, Ñакие как Google Play, <a
-href="/philosophy/free-software-even-more-important.html">коÑоÑÑе
-злонамеÑеннÑ</a>.</p>
+ <li id="M201510050">
+ <p>СоглаÑно ÐдваÑÐ´Ñ Ð¡Ð½Ð¾ÑденÑ, <a
+href="http://www.bbc.com/news/uk-34444233">агенÑÑÑва могÑÑ
бÑаÑÑ Ð¿Ð¾Ð´
+конÑÑÐ¾Ð»Ñ ÑмаÑÑÑонÑ</a>, поÑÑÐ»Ð°Ñ ÑкÑÑÑÑе
ÑекÑÑовÑе ÑообÑениÑ, коÑоÑÑе
+позволÑÑÑ Ð²ÐºÐ»ÑÑаÑÑ Ð¸ вÑклÑÑаÑÑ ÑелеÑонÑ,
пÑоÑлÑÑиваÑÑ Ð¿Ð¾ микÑоÑонÑ,
+извлекаÑÑ Ð´Ð°Ð½Ð½Ñе о меÑÑоположении из GPS,
ÑоÑогÑаÑиÑоваÑÑ, ÑиÑаÑÑ ÑекÑÑовÑе
+ÑообÑениÑ, иÑÑоÑÐ¸Ñ Ð·Ð²Ð¾Ð½ÐºÐ¾Ð², пеÑедвижений,
а Ñакже пÑоÑмоÑÑа ÐÑемиÑной
+паÑÑинÑ, и ÑиÑаÑÑ ÑпиÑок конÑакÑов. ÐÑи
вÑедоноÑнÑе пÑогÑÐ°Ð¼Ð¼Ñ ÑпÑоекÑиÑованÑ
+Ñак, ÑÑÐ¾Ð±Ñ Ð½Ðµ позволÑÑÑ ÑебÑ
обнаÑÑживаÑÑ.</p>
+ </li>
- <p>Ðогла ли ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Google пÑедоÑвÑаÑаÑÑ
жÑлÑниÑеÑÑво Ñо ÑÑоÑÐ¾Ð½Ñ Ð¿Ñиложений
-более ÑÑаÑелÑно? Ðи Ð´Ð»Ñ Google, ни длÑ
полÑзоваÑелей Android не ÑÑÑеÑÑвÑеÑ
-ÑиÑÑемаÑиÑеÑкого ÑпоÑоба инÑпекÑиÑоваÑÑ
иÑполнÑемÑе ÑÐ°Ð¹Ð»Ñ Ð½ÐµÑвободнÑÑ
-пÑиложений, ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð½ÑÑÑ, ÑÑо они делаÑÑ.</p>
+ <li id="M201311120">
+ <p><a
+href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
+ÐÐÐ Ð¼Ð¾Ð¶ÐµÑ Ð·Ð°Ð³Ð»ÑдÑваÑÑ Ð² даннÑе на
ÑмаÑÑÑонаÑ
, в Ñом ÑиÑле на iPhone, Android
+и BlackBerry</a>. ХоÑÑ Ð¿Ð¾Ð´ÑобноÑÑи здеÑÑ Ð½Ðµ
пÑиводÑÑÑÑ, поÑ
оже, ÑÑо ÑабоÑаеÑ
+не как ÑнивеÑÑалÑнÑй ÑеÑнÑй Ñ
од, коÑоÑÑй,
как Ð¼Ñ Ð·Ð½Ð°ÐµÐ¼, еÑÑÑ Ð¿Ð¾ÑÑи во вÑеÑ
+мобилÑнÑÑ
ÑелеÑонаÑ
. ÐÑо Ð¼Ð¾Ð¶ÐµÑ Ð±ÑÑÑ
ÑвÑзано Ñ ÑкÑплÑаÑаÑией ÑазлиÑнÑÑ
+оÑибок. <a
+href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
+РпÑогÑаммаÑ
ÑадиоаппаÑаÑÑÑÑ ÑелеÑонов
еÑÑÑ Ð¼Ð½Ð¾Ð¶ÐµÑÑво оÑибок</a>.</p>
+ </li>
+
+ <li id="M201307000">
+ <p>СоÑовÑе ÑелеÑÐ¾Ð½Ñ Ñ GPS <a
+href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">вÑÑÑлаÑÑ
+Ñвои ÑпÑÑниковÑе меÑÑоопÑÐµÐ´ÐµÐ»ÐµÐ½Ð¸Ñ Ð¿Ð¾
Ñдаленной команде, и полÑзоваÑели не
+могÑÑ Ð¾ÑÑановиÑÑ ÑÑо</a>. (СШРпланиÑÑÑÑ
ввеÑÑи когда-нибÑÐ´Ñ ÑÑебование, по
+коÑоÑÐ¾Ð¼Ñ Ð²Ð¾ вÑеÑ
новÑÑ
мобилÑнÑÑ
ÑелеÑонаÑ
должен бÑÑÑ Ð¼Ð¾Ð´ÑÐ»Ñ GPS).</p>
+ </li>
+</ul>
- <p>Ð Google могли Ð±Ñ ÑÑебоваÑÑ Ð¸ÑÑ
однÑй ÑекÑÑ
ÑÑиÑ
пÑиложений и изÑÑаÑÑ
-каким-Ñо обÑазом иÑÑ
однÑй ÑекÑÑ, ÑÑобÑ
опÑеделÑÑÑ, не делаÑÑ Ð»Ð¸ они
-полÑзоваÑелÑм ÑÑо-Ñо плоÑ
ое. ÐÑли бÑ
ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Ð´ÐµÐ»Ð°Ð»Ð° ÑÑо Ñ
оÑоÑо, она могла
-Ð±Ñ Ð±Ð¾Ð»ÐµÐµ или менее пÑедоÑвÑаÑаÑÑ Ñакое
подглÑдÑвание, кÑоме ÑлÑÑаев, когда
-ÑазÑабоÑÑики пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð´Ð¾ÑÑаÑоÑно ÑмнÑ,
ÑÑÐ¾Ð±Ñ Ð¿ÐµÑеÑ
иÑÑиÑÑ Ð¿ÑовеÑкÑ.</p>
- <p>Ðо поÑколÑÐºÑ Google Ñама ÑазÑабаÑÑваеÑ
злонамеÑеннÑе пÑиложениÑ, Ð¼Ñ Ð½Ðµ можем
-довеÑÑÑÑ Google наÑÑ Ð·Ð°ÑиÑÑ. ÐÑ Ð´Ð¾Ð»Ð¶Ð½Ñ
ÑÑебоваÑÑ Ð²ÑпÑÑка иÑÑ
одного ÑекÑÑа
-Ð´Ð»Ñ Ð¿Ñблики, ÑÑÐ¾Ð±Ñ Ð¼Ñ Ð¼Ð¾Ð³Ð»Ð¸ заÑиÑаÑÑ Ð´ÑÑг
дÑÑга.</p>
-</li>
-<li>
- <p>Ð ÑÑаÑÑе Ñ Ð¸ÑÑледованием пÑиваÑноÑÑи и
заÑиÑенноÑÑи 283 пÑиложений Android
-Ð´Ð»Ñ VPN Ñделан вÑвод, ÑÑо “неÑмоÑÑÑ Ð½Ð°
обеÑÐ°Ð½Ð¸Ñ Ð¿ÑиваÑноÑÑи,
-заÑиÑенноÑÑи и анонимноÑÑи, коÑоÑое даÑÑ
болÑÑинÑÑво пÑиложений Ð´Ð»Ñ VPN, <a
-href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
-Ð¼Ð¸Ð»Ð»Ð¸Ð¾Ð½Ñ Ð¿Ð¾Ð»ÑзоваÑелей ÑиÑкÑÑÑ ÑÑаÑÑ
жеÑÑвами беÑпоÑвеннÑÑ
гаÑанÑий
-безопаÑноÑÑи, а Ñакже злоÑпоÑÑеблений Ñо
ÑÑоÑÐ¾Ð½Ñ Ð¿Ñиложений длÑ
-VPN</a>”.</p>
+<div class="big-subsection">
+ <h4 id="SpywareIniThings">Ðй-ÑÑÑÑки</h4>
+ <span class="anchor-reference-id">(<a
+href="#SpywareIniThings">#SpywareIniThings</a>)</span>
+</div>
- <p>Ðалее ÑледÑÐµÑ Ð½ÐµÐ¸ÑÑеÑпÑваÑÑий ÑпиÑок
неÑвободнÑÑ
пÑиложений Ð´Ð»Ñ VPN, коÑоÑÑе
-ÑледÑÑ Ð·Ð° полÑзоваÑелÑми и вÑоÑгаÑÑÑÑ Ð² иÑ
лиÑнÑÑ Ð¶Ð¸Ð·Ð½Ñ:</p>
+<ul class="blurbs">
+ <li id="M201711250">
+ <p>DMCA и ÐиÑекÑива об авÑоÑком пÑаве
ÐвÑоÑоÑза делаÑÑ <a
+href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+незаконнÑм изÑÑение Ñого, как пÑиложениÑ
iOS ÑпионÑÑ Ð·Ð° полÑзоваÑелÑми</a>,
+поÑÐ¾Ð¼Ñ ÑÑо ÑÑо ÑÑебÑÐµÑ Ð¾Ð±Ñ
ода ÑиÑÑового
ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð¾Ð³ÑаниÑениÑми в iOS.</p>
+ </li>
- <dl>
- <dt>SurfEasy</dt>
- <dd>ÐÑполÑзÑÐµÑ Ð±Ð¸Ð±Ð»Ð¸Ð¾Ñеки Ñлежки, Ñакие
как NativeX и Appflood, пÑедназнаÑеннÑе
-Ð´Ð»Ñ Ð¾ÑÑÐ»ÐµÐ¶Ð¸Ð²Ð°Ð½Ð¸Ñ Ð¿Ð¾Ð»ÑзоваÑелей и показа
им напÑавленной ÑекламÑ.</dd>
+ <li id="M201709210">
+ <p>РпоÑледней ÑиÑÑеме ай-ÑÑÑÑек
“вÑклÑÑение” WiFi и Bluetooth
+оÑевиднÑм ÑпоÑобом <a
+href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">на
+Ñамом деле не вÑклÑÑÐ°ÐµÑ Ð¸Ñ
</a>.
Ðо-наÑÑоÑÑемÑ-Ñо иÑ
вÑклÑÑиÑÑ Ð±Ð¾Ð»ÐµÐµ
+замÑÑловаÑÑм ÑпоÑобом можно — ÑолÑко
до пÑÑи ÑаÑов ÑÑÑа. ÐÐ¾Ñ Ð²Ð°Ð¼
+Apple: “Ð¼Ñ Ð·Ð½Ð°ÐµÐ¼, Ð²Ñ Ñ
оÑиÑе, ÑÑÐ¾Ð±Ñ Ð·Ð° вами
Ñпионили”.</p>
+ </li>
- <dt>sFly Network Booster</dt>
- <dd>ÐапÑаÑÐ¸Ð²Ð°ÐµÑ Ð¿Ñи ÑÑÑановке ÑазÑеÑениÑ
на ÑÑение и оÑпÑÐ°Ð²ÐºÑ SMS, ÑÑо ознаÑаеÑ
-полнÑй доÑÑÑп к ÑекÑÑовÑм ÑообÑениÑм
полÑзоваÑелей.</dd>
+ <li id="M201702150">
+ <p>Apple пÑÐµÐ´Ð»Ð°Ð³Ð°ÐµÑ Ð²Ð²ÐµÑÑи <a
+href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">
+ÑенÑоÑнÑй ÑкÑан, ÑканиÑÑÑÑий оÑпеÑаÑки
палÑÑев</a>. ÐÑо знаÑиÑ, ÑÑо им
+невозможно бÑло Ð±Ñ Ð¿Ð¾Ð»ÑзоваÑÑÑÑ, не ÑдаваÑ
оÑпеÑаÑков ÑвоиÑ
палÑÑев. У
+полÑзоваÑелей не бÑло Ð±Ñ Ð½Ð¸ÐºÐ°ÐºÐ¾Ð¹
возможноÑÑи ÑзнаÑÑ, не ÑÐ¿Ð¸Ð¾Ð½Ð¸Ñ Ð»Ð¸ ÑелеÑон
+за ними.</p>
+ </li>
- <dt>DroidVPN and TigerVPN</dt>
- <dd>ÐапÑаÑиваÑÑ ÑазÑеÑение на ÑÑение
жÑÑналов дÑÑгиÑ
пÑиложений, а Ñакже
-ÑиÑÑемнÑÑ
жÑÑналов. РазÑабоÑÑики TigerVPN ÑÑо
подÑвеÑдили.</dd>
+ <li id="M201611170">
+ <p>iPhone <a
+href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">оÑÑÑлаÑÑ
+маÑÑÑ Ð¿ÐµÑÑоналÑнÑÑ
даннÑÑ
на ÑеÑвеÑÑ
Apple</a>. СÑаÑÑий ÐÑÐ°Ñ Ð¼Ð¾Ð¶ÐµÑ Ð¿Ð¾Ð»ÑÑаÑÑ
+иÑ
оÑÑÑда.</p>
+ </li>
- <dt>HideMyAss</dt>
- <dd>ÐоÑÑÐ»Ð°ÐµÑ Ð´Ð°Ð½Ð½Ñе в LinkedIn. ÐÑоме Ñого, ÑоÑ
ÑанÑÐµÑ Ð¿Ð¾Ð´ÑобнÑй жÑÑнал и можеÑ
-по ÑÑÐµÐ±Ð¾Ð²Ð°Ð½Ð¸Ñ Ð¿ÐµÑедаваÑÑ ÐµÐ³Ð¾
гоÑÑдаÑÑÑвеннÑм оÑганам ÐеликобÑиÑании.</dd>
+ <li id="M201609280">
+ <p>ÐÑиложение iMessage Ð´Ð»Ñ iThings <a
+href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">докладÑваеÑ
+ÑеÑвеÑÑ Ð¾ каждом номеÑе ÑелеÑона, коÑоÑÑй
вводиÑÑÑ Ð² него полÑзоваÑелем</a>;
+ÑеÑÐ²ÐµÑ Ð·Ð°Ð¿Ð¾Ð¼Ð¸Ð½Ð°ÐµÑ ÑÑи номеÑа по менÑÑей
меÑе на 30 ÑÑÑок.</p>
+ </li>
- <dt>VPN Services HotspotShield</dt>
- <dd>ÐÑÑавлÑÐµÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð° JavaScript в
ÑÑÑаниÑÑ HTML, пеÑедаваемÑе
-полÑзоваÑелÑм. ÐаÑвленное назнаÑение ÑÑой
вÑÑавки — показ
-ÑекламÑ. ÐÑполÑзÑÐµÑ Ð¾ÐºÐ¾Ð»Ð¾ 5 библиоÑек
Ñлежки. ÐÑоме Ñого, пÑопÑÑÐºÐ°ÐµÑ Ð¿Ð¾Ñок
-даннÑÑ
полÑзоваÑÐµÐ»Ñ ÑеÑез valueclick.com (ÑайÑ
ÑекламÑ).</dd>
+ <li id="M201509240">
+ <p>Ðй-ÑÑÑÑки авÑомаÑиÑеÑки оÑгÑÑжаÑÑ Ð½Ð°
ÑеÑвеÑÑ Apple вÑе видеозапиÑи и и
+ÑоÑогÑаÑии, коÑоÑÑе они делаÑÑ.</p>
- <dt>WiFi Protector VPN</dt>
- <dd>ÐÑÑавлÑÐµÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð° JavaScript в
ÑÑÑаниÑÑ HTML, а Ñакже иÑполÑзÑÐµÑ Ð¾ÐºÐ¾Ð»Ð¾
-5 библиоÑек Ñлежки. РазÑабоÑÑики
пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð¿Ð¾Ð´ÑвеÑдили, ÑÑо деÑевÑе веÑÑии
-пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð´ÐµÐ¹ÑÑвиÑелÑно вÑÑавлÑÑÑ JavaScript
Ð´Ð»Ñ Ñлежки и показа ÑекламÑ.</dd>
- </dl>
-</li>
-<li>
- <p><a
-href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">ÐÑÑледование
-2015 года</a> показало, ÑÑо 90% ÑамÑÑ
попÑлÑÑнÑÑ
беÑплаÑнÑÑ
неÑвободнÑÑ
-пÑиложений под Android ÑодеÑжало библиоÑеки,
коÑоÑÑе можно ÑÑиÑаÑÑ
-библиоÑеками Ñлежки. ÐÐ»Ñ Ð¿Ð»Ð°ÑнÑÑ
неÑовбоднÑÑ
пÑиложений ÑÑа велиÑина
-ÑоÑÑавлÑла ÑолÑко 60%.</p>
+ <blockquote><p> ФоÑобиблиоÑека iCloud Ñ
ÑÐ°Ð½Ð¸Ñ Ð²Ñе
видеозапиÑи и ÑоÑогÑаÑии, коÑоÑÑе вÑ
+делаеÑе, и обновлÑÐµÑ Ð¸Ñ
на вÑеÑ
ваÑиÑ
ÑÑÑÑойÑÑваÑ
. ÐÑбÑе пÑавки, коÑоÑÑе вÑ
+вноÑиÑе, авÑомаÑиÑеÑки обновлÑÑÑÑÑ Ð²ÐµÐ·Ð´Ðµ.
[...] </p></blockquote>
- <p>СÑаÑÑÑ Ð²Ð½Ð¾ÑÐ¸Ñ Ð¿ÑÑаниÑÑ, опиÑÑваÑ
беÑплаÑнÑе пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ ÐºÐ°Ðº
-“ÑвободнÑе”, но болÑÑинÑÑво из ниÑ
на
Ñамом-Ñо деле не ÑвлÑÑÑÑÑ
-<a href="/philosophy/free-sw.html">ÑвободнÑми
пÑогÑаммами</a>. Ð ÑÑаÑÑе
-Ñакже ÑпоÑÑеблÑеÑÑÑ Ð±ÐµÐ·Ð¾Ð±Ñазное Ñлово
“монеÑизиÑоваÑÑ”. ÐÐ»Ñ ÑÑой
-ÑиÑÑаÑии Ñ
оÑоÑо подÑ
Ð¾Ð´Ð¸Ñ Ñлово
“ÑкÑплÑаÑиÑоваÑÑ”; поÑÑи вÑегда
-оно в ÑоÑноÑÑи оÑÑÐ°Ð¶Ð°ÐµÑ ÑмÑÑл.</p>
-</li>
+ <p>(Ðз <a
href="https://www.apple.com/icloud/photos/">ÐнÑоÑмаÑии об Apple's
+iCloud</a> на 24 ÑенÑÑбÑÑ 2015 года.) ФÑнкÑиÑ
iCloud <a
+href="https://support.apple.com/en-us/HT202033">акÑивизиÑÑеÑÑÑ
пÑи загÑÑзке
+iOS</a>. Слово “<span lang="en" xml:lang="en">cloud</span>
+(облако)” ознаÑÐ°ÐµÑ “пожалÑйÑÑа, не
ÑпÑаÑивайÑе, где ÑÑо”.</p>
-<li>
- <p><a
-href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">ÐÑиложениÑ
-Ð´Ð»Ñ BART ÑледÑÑ Ð·Ð° полÑзоваÑелÑми</a>.</p>
- <p>ÐÑли пÑогÑаммнÑе пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ ÑвободнÑ,
полÑзоваÑели могÑÑ
-<em>гаÑанÑиÑоваÑÑ</em>, ÑÑо они не ÑледÑÑ.</p>
- <p>Ðогда пÑиложение неÑвободно, можно
ÑолÑко надеÑÑÑÑÑ, ÑÑо оно не ÑледиÑ.</p>
-</li>
+ <p>ÐÑÑÑ ÑпоÑоб <a
href="https://support.apple.com/en-us/HT201104"> оÑклÑÑиÑÑ
+iCloud</a>, но по ÑмолÑÐ°Ð½Ð¸Ñ ÑÑа ÑÑнкÑÐ¸Ñ Ð°ÐºÑивна,
Ñак ÑÑо ÑÑо можно ÑÑиÑаÑÑ
+ÑÑнкÑией Ñлежки.</p>
-<li>
- <p>Ðо ÑезÑлÑÑаÑам одного иÑÑледованиÑ, 234
пÑиложений Android оÑÑлеживаÑÑ
-полÑзоваÑелей, <a
-href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">пÑоÑлÑÑиваÑ
-ÑлÑÑÑазвÑк Ð¾Ñ Ð¼Ð°ÑÑков, ÑазмеÑеннÑÑ
в
магазинаÑ
, или из ÑелевизионнÑÑ
-пеÑедаÑ</a>.
- </p>
+ <p>ÐеизвеÑÑнÑе, оÑевидно,
воÑполÑзовалиÑÑ ÑÑим, ÑÑÐ¾Ð±Ñ <a
+href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">полÑÑиÑÑ
+ÑоÑогÑаÑии многиÑ
обнаженнÑÑ
знамениÑоÑÑей</a>. ÐÐ»Ñ Ñого, ÑÑÐ¾Ð±Ñ Ð´Ð¾Ð±ÑаÑÑÑÑ
до
+ниÑ
, нÑжно бÑло взломаÑÑ Ð·Ð°ÑиÑÑ Apple, но NSA
Ð¼Ð¾Ð¶ÐµÑ Ð¿Ð¾Ð»ÑÑаÑÑ Ð»ÑбÑе из ниÑ
по
+<a href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p>
+ </li>
-</li>
+ <li id="M201409220">
+ <p>Apple Ð¼Ð¾Ð¶ÐµÑ <a
+href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">извлекаÑÑ
+даннÑе Ñ ÑдаленнÑÑ
iPhone Ð´Ð»Ñ Ð³Ð¾ÑÑдаÑÑÑва</a> и
ÑегÑлÑÑно Ð´ÐµÐ»Ð°ÐµÑ ÑÑо.</p>
-<li>
- <p>ÐаÑÑ Ð¿Ñиложений Android могÑÑ <a
-href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">ÑговоÑиÑÑÑÑ,
-ÑÑÐ¾Ð±Ñ Ð¿ÐµÑедаваÑÑ Ð»Ð¸ÑнÑе даннÑе
полÑзоваÑÐµÐ»Ñ Ð½Ð° ÑеÑвеÑÑ</a>. ÐÑÑледоваÑели
-обнаÑÑжили деÑÑÑки ÑÑÑÑÑ Ð¿Ð°Ñ ÑакиÑ
пÑиложений.</p>
-</li>
-
-<li>
-<p>Google Play пÑеднамеÑенно <a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
-вÑÑÐ»Ð°ÐµÑ ÑазÑабоÑÑикам пÑиложениÑ
пеÑÑоналÑнÑе даннÑе полÑзоваÑелей</a>,
-коÑоÑÑе ÑÑÑанавливаÑÑ Ð¿Ñиложение.</p>
-
-<p>ÐÑоÑÑо пÑоÑиÑÑ “ÑоглаÑиє
полÑзоваÑелей не доÑÑаÑоÑно Ð´Ð»Ñ Ñого,
-ÑÑÐ¾Ð±Ñ ÑзакониÑÑ Ñакие дейÑÑвиÑ.
ÐолÑÑинÑÑво полÑзоваÑелей не доÑиÑÑваеÑ
-“УÑÐ»Ð¾Ð²Ð¸Ñ Ð¸ÑполÑзованиє до Ñого
меÑÑа, где говоÑиÑÑÑ, на ÑÑо они
-“ÑоглаÑаÑÑÑÑ”. ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Google должна
ÑÑно и ÑеÑÑно
-иденÑиÑиÑиÑоваÑÑ Ð¸Ð½ÑоÑмаÑÐ¸Ñ Ð¾
полÑзоваÑелÑÑ
, коÑоÑÑÑ Ð¾Ð½Ð° ÑобиÑаеÑ, вмеÑÑо
-Ñого ÑÑÐ¾Ð±Ñ Ð¿ÑÑÑаÑÑ ÑÑо в головоломнÑÑ
ÑоÑмÑлиÑовкаÑ
ÑоглаÑÐµÐ½Ð¸Ñ Ñ
-полÑзоваÑелÑми.</p>
-
-<p>Ðднако ÑÑÐ¾Ð±Ñ Ð¿Ð¾-наÑÑоÑÑÐµÐ¼Ñ Ð·Ð°ÑиÑиÑÑ
ÑаÑÑнÑÑ Ð¶Ð¸Ð·Ð½Ñ Ð»Ñдей, Ð¼Ñ Ð²Ð¾Ð¾Ð±Ñе Ð´Ð¾Ð»Ð¶Ð½Ñ Ð½Ðµ
-даваÑÑ Google и дÑÑгим компаниÑм Ñвои
пеÑÑоналÑнÑе даннÑе!</p>
-</li>
-
- <li>
- <p>Google Play (ÐºÐ¾Ð¼Ð¿Ð¾Ð½ÐµÐ½Ñ ÑиÑÑÐµÐ¼Ñ Android) <a
-href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
-оÑÑÐ»ÐµÐ¶Ð¸Ð²Ð°ÐµÑ Ð¿ÐµÑемеÑÐµÐ½Ð¸Ñ Ð¿Ð¾Ð»ÑзоваÑелей
без иÑ
ÑазÑеÑениÑ</a>.</p>
-
- <p>Ðаже еÑли Ð²Ñ Ð¾ÑклÑÑиÑе Google Maps и
оÑÑлеживание меÑÑоположениÑ, Ð²Ñ Ð´Ð¾Ð»Ð¶Ð½Ñ
-оÑклÑÑиÑÑ Ñам Google Play, ÑÑÐ¾Ð±Ñ Ð¾ÑÑлеживание
полноÑÑÑÑ Ð¿ÑекÑаÑилоÑÑ. ÐÑо
-еÑе один пÑÐ¸Ð¼ÐµÑ Ñого, как неÑвободнÑе
пÑогÑÐ°Ð¼Ð¼Ñ Ð¿ÑиÑвоÑÑÑÑÑÑ, ÑÑо
-подÑинÑÑÑÑÑ Ð¿Ð¾Ð»ÑзоваÑелÑ, Ð´ÐµÐ»Ð°Ñ Ð²
дейÑÑвиÑелÑноÑÑи ÑÑо-Ñо дÑÑгое. Ð
-ÑвободнÑÑ
пÑогÑаммаÑ
Ñакое поÑÑи
немÑÑлимо.</p>
+ <p>Ðозможно, ÑиÑÑаÑÐ¸Ñ ÑлÑÑÑилаÑÑ Ð¿Ð¾Ñле <a
+href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
+ÑлÑÑÑений в безопаÑноÑÑи iOS 8</a>; но <a
+href="https://firstlook.org/theintercept/2014/09/22/apple-data/"> не Ñак
+ÑилÑно, как ÑÑвеÑÐ¶Ð´Ð°ÐµÑ Apple</a>.</p>
+ </li>
+ <li id="M201407230">
+ <p><a
+href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ÐеÑколÑко “ÑÑнкÑий” iOS, видимо, не
ÑÑÑеÑÑвÑÑÑ Ð½Ð¸ Ð´Ð»Ñ Ñего,
+кÑоме Ñлежки</a>. См. <a
+href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ÑеÑ
ниÑеÑкий доклад</a>.</p>
</li>
- <li><p>Ðолее 73% ÑамÑÑ
попÑлÑÑнÑÑ
пÑиложений
Android <a
-href="http://jots.pub/a/2015103001/index.php"> пÑедоÑÑавлÑÑÑ
лиÑнÑÑ,
-поведенÑеÑкÑÑ Ð¸ меÑÑоопÑеделиÑелÑнÑÑ
инÑоÑмаÑиÑ</a> ÑвоиÑ
полÑзоваÑелей
-ÑÑеÑÑим ÑÑоÑонам.</p>
+ <li id="M201401100">
+ <p><a
+href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">iBeacon</a>
+позволÑÐµÑ Ð¼Ð°Ð³Ð°Ð·Ð¸Ð½Ð°Ð¼ ÑоÑно опÑеделÑÑÑ, где
наÑ
одиÑÑÑ Ð°Ð¹-ÑÑÑÑка, а Ñакже
+полÑÑаÑÑ Ð¸ дÑÑгие ÑведениÑ.</p>
</li>
- <li><p>“СкÑÑÑнÑе ÑообÑениє, не
ÑвÑзаннÑе Ñ ÑÑнкÑионалÑноÑÑÑÑ
-пÑиложениÑ, <a
-href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
-Ð½Ð°Ð¹Ð´ÐµÐ½Ñ Ð² 500 ÑамÑÑ
попÑлÑÑнÑÑ
беÑплаÑнÑÑ
пÑиложениÑÑ
Android</a>.</p>
-
- <p>Ð ÑÑаÑÑе не Ñледовало опиÑÑваÑÑ ÑÑи
пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ ÐºÐ°Ðº “<span lang="en"
-xml:lang="en">free</span>) (ÑвободнÑе)”, они не
ÑвободнÑ. ЯÑное Ñлово
-Ð´Ð»Ñ Ð²ÑÑÐ°Ð¶ÐµÐ½Ð¸Ñ Ð½Ñлевой ÑÐµÐ½Ñ —
“беÑплаÑнÑй”.</p>
-
- <p>Ð ÑÑаÑÑе пÑинимаеÑÑÑ ÐºÐ°Ðº Ñамо Ñобой
ÑазÑмеÑÑееÑÑ, ÑÑо обÑÑнÑй аналиÑиÑеÑкий
-инÑÑÑÑменÑаÑий пÑавомеÑен, но веÑно ли
ÑÑо? У ÑазÑабоÑÑиков пÑогÑамм неÑ
-пÑава анализиÑоваÑÑ, ÑÑо и как делаÑÑ
-полÑзоваÑели. “ÐналиÑиÑеÑкие”
инÑÑÑÑменÑÑ, коÑоÑÑе подглÑдÑваÑÑ,
-ниÑем не лÑÑÑе лÑбого дÑÑгого
подглÑдÑваниÑ.</p>
- </li>
- <li><p>ÐеÑплаÑнÑе (но не <a
-href="/philosophy/free-sw.html">ÑвободнÑе</a>)пÑиложениÑ
Android <a
-href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">подклÑÑаÑÑÑÑ
-к 100 URL Ñлежки и ÑекламÑ</a> (в ÑÑеднем).</p>
+ <li id="M201312300">
+ <p><a
+href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
+Ðибо Apple Ð¿Ð¾Ð¼Ð¾Ð³Ð°ÐµÑ ÐÐРзаглÑдÑваÑÑ Ð²Ð¾ вÑе
даннÑе на ай-ÑÑÑÑкаÑ
, либо
+ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ ÑовеÑÑенно некомпеÑенÑна</a>.</p>
</li>
- <li><p>ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð¿ÑиÑÑÑÑÑвÑÑÑ Ð½Ð°
некоÑоÑÑÑ
ÑÑÑÑойÑÑваÑ
Android, когда они
-пÑодаÑÑÑÑ. РнекоÑоÑÑÑ
ÑелеÑонаÑ
Motorola
ÑиÑÑема Android изменена Ð´Ð»Ñ <a
-href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
-оÑпÑавки лиÑнÑÑ
даннÑÑ
в Motorola</a>.</p>
+
+ <li id="M201308080">
+ <p>Ðй-ÑÑÑÑки Ñакже <a
+href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">докладÑваÑÑ
+по ÑмолÑÐ°Ð½Ð¸Ñ Ð² Apple о Ñвоем
меÑÑоположении</a>, Ñ
оÑÑ ÑÑо можно
вÑклÑÑиÑÑ.</p>
</li>
- <li><p>ÐекоÑоÑÑе пÑоизводиÑели добавлÑÑÑ <a
-href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
-ÑкÑÑÑÑй Ð¿Ð°ÐºÐµÑ Ñлежки, Ñакой как Carrier IQ</a>.</p>
+ <li id="M201210170">
+ <p>ÐÑÑÑ Ñакже ÑÑнкÑÐ¸Ñ Ð´Ð»Ñ Ñлежки за
полÑзоваÑелÑми Ñо ÑÑоÑÐ¾Ð½Ñ ÑайÑов, <a
+href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+вклÑÑÐµÐ½Ð½Ð°Ñ Ð¿Ð¾ ÑмолÑаниÑ</a> (в ÑÑаÑÑе
говоÑиÑÑÑ Ð¾Ð± iOS 6, но ÑÑо веÑно и
+Ð´Ð»Ñ iOS 7).</p>
</li>
- <li><p><a href="/proprietary/proprietary-back-doors.html#samsung">
ЧеÑнÑй Ñ
од
-Samsung</a> пÑедоÑÑавлÑÐµÑ Ð´Ð¾ÑÑÑп к лÑÐ±Ð¾Ð¼Ñ ÑайлÑ
в ÑиÑÑеме.</p>
+ <li id="M201204280">
+ <p>ÐолÑзоваÑели не могÑÑ ÑоздаÑÑ <a
+href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">иденÑиÑикаÑоÑ
+Apple, необÑ
одимÑй Ð´Ð»Ñ ÑÑÑановки даже
беÑплаÑнÑÑ
пÑиложений</a>, без Ñого,
+ÑÑÐ¾Ð±Ñ Ð¿ÐµÑедаÑÑ Ð´ÐµÐ¹ÑÑвиÑелÑнÑй адÑеÑ
ÑлекÑÑонной поÑÑÑ Ð¸ полÑÑиÑÑ ÐºÐ¾Ð´,
+коÑоÑÑй им поÑÑÐ»Ð°ÐµÑ Apple.</p>
</li>
</ul>
-<!-- #SpywareOnMobiles -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
-<div class="big-section">
- <h3 id="SpywareOnMobiles">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð²
мобилÑнÑÑ
ÑÑÑÑойÑÑваÑ
</h3>
- <span class="anchor-reference-id">(<a
-href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
<div class="big-subsection">
- <h4 id="SpywareIniThings">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð²
ай-ÑÑÑÑкаÑ
</h4>
+ <h4 id="SpywareInAndroid">Android в ÑелеÑонаÑ
</h4>
<span class="anchor-reference-id">(<a
-href="#SpywareIniThings">#SpywareIniThings</a>)</span>
+href="#SpywareInAndroid">#SpywareInAndroid</a>)</span>
</div>
-<ul>
- <li><p>DMCA и ÐиÑекÑива об авÑоÑком пÑаве
ÐвÑоÑоÑза делаÑÑ <a
-href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
-незаконнÑм изÑÑение Ñого, как пÑиложениÑ
iOS ÑпионÑÑ Ð·Ð° полÑзоваÑелÑми</a>,
-поÑÐ¾Ð¼Ñ ÑÑо ÑÑо ÑÑебÑÐµÑ Ð¾Ð±Ñ
ода ÑиÑÑового
ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð¾Ð³ÑаниÑениÑми в iOS.</p>
+<ul class="blurbs">
+ <li id="M201711210">
+ <p>Android оÑÑÐ»ÐµÐ¶Ð¸Ð²Ð°ÐµÑ Ð¿ÐµÑемеÑÐµÐ½Ð¸Ñ Ð´Ð»Ñ Google, <a
+href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">даже
+когда “ÑлÑÐ¶Ð±Ñ Ð¼ÐµÑÑоположениє
вÑклÑÑенÑ, даже когда в ÑелеÑоне
+Ð½ÐµÑ SIM-каÑÑÑ</a>.</p>
</li>
- <li><p>РпоÑледней ÑиÑÑеме ай-ÑÑÑÑек
“вÑклÑÑение” WiFi и Bluetooth
-оÑевиднÑм ÑпоÑобом <a
-href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">на
-Ñамом деле не вÑклÑÑÐ°ÐµÑ Ð¸Ñ
</a>.
Ðо-наÑÑоÑÑемÑ-Ñо иÑ
вÑклÑÑиÑÑ Ð±Ð¾Ð»ÐµÐµ
-замÑÑловаÑÑм ÑпоÑобом можно — ÑолÑко
до пÑÑи ÑаÑов ÑÑÑа. ÐÐ¾Ñ Ð²Ð°Ð¼
-Apple: “Ð¼Ñ Ð·Ð½Ð°ÐµÐ¼, Ð²Ñ Ñ
оÑиÑе, ÑÑÐ¾Ð±Ñ Ð·Ð° вами
Ñпионили”.</p>
+ <li id="M201611150">
+ <p>ÐекоÑоÑÑе мобилÑнÑе ÑелеÑÐ¾Ð½Ñ <a
+href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">пÑодаÑÑÑÑ
+Ñ Ð¿ÑогÑаммами-Ñпионами, оÑÑÑлаÑÑими маÑÑÑ
даннÑÑ
в ÐиÑай</a>.</p>
</li>
- <li><p>Apple пÑÐµÐ´Ð»Ð°Ð³Ð°ÐµÑ Ð²Ð²ÐµÑÑи <a
-href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">
-ÑенÑоÑнÑй ÑкÑан, ÑканиÑÑÑÑий оÑпеÑаÑки
палÑÑев</a>. ÐÑо знаÑиÑ, ÑÑо им
-невозможно бÑло Ð±Ñ Ð¿Ð¾Ð»ÑзоваÑÑÑÑ, не ÑдаваÑ
оÑпеÑаÑков ÑвоиÑ
палÑÑев. У
-полÑзоваÑелей не бÑло Ð±Ñ Ð½Ð¸ÐºÐ°ÐºÐ¾Ð¹
возможноÑÑи ÑзнаÑÑ, не ÑÐ¿Ð¸Ð¾Ð½Ð¸Ñ Ð»Ð¸ ÑелеÑон
-за ними.</p></li>
+ <li id="M201609140">
+ <p>Google Play (ÐºÐ¾Ð¼Ð¿Ð¾Ð½ÐµÐ½Ñ ÑиÑÑÐµÐ¼Ñ Android) <a
+href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+оÑÑÐ»ÐµÐ¶Ð¸Ð²Ð°ÐµÑ Ð¿ÐµÑемеÑÐµÐ½Ð¸Ñ Ð¿Ð¾Ð»ÑзоваÑелей
без иÑ
ÑазÑеÑениÑ</a>.</p>
- <li><p>iPhone <a
-href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">оÑÑÑлаÑÑ
-маÑÑÑ Ð¿ÐµÑÑоналÑнÑÑ
даннÑÑ
на ÑеÑвеÑÑ
Apple</a>. СÑаÑÑий ÐÑÐ°Ñ Ð¼Ð¾Ð¶ÐµÑ Ð¿Ð¾Ð»ÑÑаÑÑ
-иÑ
оÑÑÑда.</p>
+ <p>Ðаже еÑли Ð²Ñ Ð¾ÑклÑÑиÑе Google Maps и
оÑÑлеживание меÑÑоположениÑ, Ð²Ñ Ð´Ð¾Ð»Ð¶Ð½Ñ
+оÑклÑÑиÑÑ Ñам Google Play, ÑÑÐ¾Ð±Ñ Ð¾ÑÑлеживание
полноÑÑÑÑ Ð¿ÑекÑаÑилоÑÑ. ÐÑо
+еÑе один пÑÐ¸Ð¼ÐµÑ Ñого, как неÑвободнÑе
пÑогÑÐ°Ð¼Ð¼Ñ Ð¿ÑиÑвоÑÑÑÑÑÑ, ÑÑо
+подÑинÑÑÑÑÑ Ð¿Ð¾Ð»ÑзоваÑелÑ, Ð´ÐµÐ»Ð°Ñ Ð²
дейÑÑвиÑелÑноÑÑи ÑÑо-Ñо дÑÑгое. Ð
+ÑвободнÑÑ
пÑогÑаммаÑ
Ñакое поÑÑи
немÑÑлимо.</p>
</li>
- <li><p>ÐÑиложение iMessage Ð´Ð»Ñ iThings <a
-href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">докладÑваеÑ
-ÑеÑвеÑÑ Ð¾ каждом номеÑе ÑелеÑона, коÑоÑÑй
вводиÑÑÑ Ð² него полÑзоваÑелем</a>;
-ÑеÑÐ²ÐµÑ Ð·Ð°Ð¿Ð¾Ð¼Ð¸Ð½Ð°ÐµÑ ÑÑи номеÑа по менÑÑей
меÑе на 30 ÑÑÑок.</p>
+ <li id="M201507030">
+ <p>ТелеÑÐ¾Ð½Ñ Samsung пÑодаÑÑ <a
+href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">
+Ñ Ð¿ÑиложениÑми, коÑоÑÑе не могÑÑ Ð±ÑÑÑ
ÑÐ´Ð°Ð»ÐµÐ½Ñ Ð¿Ð¾Ð»ÑзоваÑелÑми</a> и коÑоÑÑе
+оÑпÑавлÑÑÑ ÑÑолÑко даннÑÑ
, ÑÑо пеÑедаÑа
обÑ
одиÑÑÑ Ð¿Ð¾Ð»ÑзоваÑелÑм доволÑно
+доÑого. Ð£ÐºÐ°Ð·Ð°Ð½Ð½Ð°Ñ Ð¿ÐµÑедаÑа, нежелаÑелÑнаÑ
Ð´Ð»Ñ Ð¿Ð¾Ð»ÑзоваÑелей и не
+воÑÑÑÐµÐ±Ð¾Ð²Ð°Ð½Ð½Ð°Ñ Ð¸Ð¼Ð¸, опÑеделенно должна
пÑедÑÑавлÑÑÑ Ñого или иного Ñода
+ÑлежкÑ.</p>
</li>
- <li><p><a
-href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">ÐолÑзоваÑели
-не могÑÑ ÑоздаÑÑ Ð¸Ð´ÐµÐ½ÑиÑикаÑÐ¾Ñ Apple</a> (необÑ
одимÑй Ð´Ð»Ñ ÑÑÑановки даже
-беÑплаÑнÑÑ
пÑиложений) без Ñого, ÑÑобÑ
пеÑедаÑÑ Ð´ÐµÐ¹ÑÑвиÑелÑнÑй адÑеÑ
-ÑлекÑÑонной поÑÑÑ Ð¸ полÑÑиÑÑ ÐºÐ¾Ð´, коÑоÑÑй
им поÑÑÐ»Ð°ÐµÑ Apple.</p>
+ <li id="M201403120">
+ <p><a href="/proprietary/proprietary-back-doors.html#samsung">
ЧеÑнÑй Ñ
од
+Samsung</a> пÑедоÑÑавлÑÐµÑ Ð´Ð¾ÑÑÑп к лÑÐ±Ð¾Ð¼Ñ ÑайлÑ
в ÑиÑÑеме.</p>
</li>
- <li><p>Ðколо 47% ÑамÑÑ
попÑлÑÑнÑÑ
пÑиложений
iOS <a
-href="http://jots.pub/a/2015103001/index.php"> пÑедоÑÑавлÑÑÑ
лиÑнÑÑ,
-поведенÑеÑкÑÑ Ð¸ меÑÑоопÑеделиÑелÑнÑÑ
инÑоÑмаÑиÑ</a> ÑвоиÑ
полÑзоваÑелей
-ÑÑеÑÑим ÑÑоÑонам.</p>
+ <li id="M201308010">
+ <p>ШпионÑкие пÑогÑÐ°Ð¼Ð¼Ñ Ð² ÑелеÑонаÑ
Android (и
поÑÑаÑивнÑÑ
компÑÑÑеÑаÑ
[Ñ
+Windows?]): “Уолл-ÑÑÑÐ¸Ñ Ð´Ð¶Ð¾Ñнел” (в ÑÑаÑÑе,
закÑÑÑой Ð¾Ñ Ð½Ð°Ñ
+баÑÑеÑом плаÑежа) ÑообÑаеÑ, ÑÑо <a
+href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">ФÐÐ
+Ð¼Ð¾Ð¶ÐµÑ Ñдаленной командой вклÑÑаÑÑ
пÑиемник GPS и микÑоÑон в ÑелеÑонаÑ
Ñ
+Android и поÑÑаÑивнÑÑ
компÑÑÑеÑаÑ
</a>. (Я
подозÑеваÑ, ÑÑо ÑеÑÑ Ð¸Ð´ÐµÑ Ð¾
+компÑÑÑеÑаÑ
Ñ Windows.) <a
+href="http://cryptome.org/2013/08/fbi-hackers.htm">ÐÑÑгие
подÑобноÑÑи</a>.</p>
</li>
- <li><p>Ðй-ÑÑÑÑки авÑомаÑиÑеÑки оÑгÑÑжаÑÑ Ð½Ð°
ÑеÑвеÑÑ Apple вÑе видеозапиÑи и и
-ÑоÑогÑаÑии, коÑоÑÑе они делаÑÑ.</p>
-
- <blockquote><p>
- ФоÑобиблиоÑека iCloud Ñ
ÑÐ°Ð½Ð¸Ñ Ð²Ñе
видеозапиÑи и ÑоÑогÑаÑии, коÑоÑÑе вÑ
-делаеÑе, и обновлÑÐµÑ Ð¸Ñ
на вÑеÑ
ваÑиÑ
ÑÑÑÑойÑÑваÑ
. ÐÑбÑе пÑавки, коÑоÑÑе вÑ
-вноÑиÑе, авÑомаÑиÑеÑки обновлÑÑÑÑÑ Ð²ÐµÐ·Ð´Ðµ.
[...]
- </p></blockquote>
-
- <p>(Ðз <a
href="https://www.apple.com/icloud/photos/">ÐнÑоÑмаÑии об Apple's
-iCloud</a> на 24 ÑенÑÑбÑÑ 2015 года.) ФÑнкÑиÑ
iCloud <a
-href="https://support.apple.com/en-us/HT202033">акÑивизиÑÑеÑÑÑ
пÑи загÑÑзке
-iOS</a>. Слово “<span lang="en" xml:lang="en">cloud</span>
-(облако)” ознаÑÐ°ÐµÑ “пожалÑйÑÑа, не
ÑпÑаÑивайÑе, где ÑÑо”.</p>
-
- <p>ÐÑÑÑ ÑпоÑоб <a
href="https://support.apple.com/en-us/HT201104"> оÑклÑÑиÑÑ
-iCloud</a>, но по ÑмолÑÐ°Ð½Ð¸Ñ ÑÑа ÑÑнкÑÐ¸Ñ Ð°ÐºÑивна,
Ñак ÑÑо ÑÑо можно ÑÑиÑаÑÑ
-ÑÑнкÑией Ñлежки.</p>
-
- <p>ÐеизвеÑÑнÑе, оÑевидно,
воÑполÑзовалиÑÑ ÑÑим, ÑÑÐ¾Ð±Ñ <a
-href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">полÑÑиÑÑ
-ÑоÑогÑаÑии многиÑ
обнаженнÑÑ
знамениÑоÑÑей</a>. ÐÐ»Ñ Ñого, ÑÑÐ¾Ð±Ñ Ð´Ð¾Ð±ÑаÑÑÑÑ
до
-ниÑ
, нÑжно бÑло взломаÑÑ Ð·Ð°ÑиÑÑ Apple, но NSA
Ð¼Ð¾Ð¶ÐµÑ Ð¿Ð¾Ð»ÑÑаÑÑ Ð»ÑбÑе из ниÑ
по
-<a href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
- </p></li>
-
- <li><p>ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð² ай-ÑÑÑÑкаÑ
: <a
-href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">iBeacon</a>
-позволÑÐµÑ Ð¼Ð°Ð³Ð°Ð·Ð¸Ð½Ð°Ð¼ ÑоÑно опÑеделÑÑÑ, где
наÑ
одиÑÑÑ Ð°Ð¹-ÑÑÑÑка, а Ñакже
-полÑÑаÑÑ Ð¸ дÑÑгие ÑведениÑ.</p>
+ <li id="M201307280">
+ <p>ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð¿ÑиÑÑÑÑÑвÑÑÑ Ð½Ð°
некоÑоÑÑÑ
ÑÑÑÑойÑÑваÑ
Android, когда они
+пÑодаÑÑÑÑ. РнекоÑоÑÑÑ
ÑелеÑонаÑ
Motorola
ÑиÑÑема Android изменена Ð´Ð»Ñ <a
+href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+оÑпÑавки лиÑнÑÑ
даннÑÑ
в Motorola</a>.</p>
</li>
- <li><p>ÐÑÑÑ Ñакже ÑÑнкÑÐ¸Ñ Ð´Ð»Ñ Ñлежки за
полÑзоваÑелÑми Ñо ÑÑоÑÐ¾Ð½Ñ ÑайÑов, <a
-href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
-вклÑÑÐµÐ½Ð½Ð°Ñ Ð¿Ð¾ ÑмолÑаниÑ</a> (в ÑÑаÑÑе
говоÑиÑÑÑ Ð¾Ð± iOS 6, но ÑÑо веÑно и
-Ð´Ð»Ñ iOS 7).</p>
+ <li id="M201307250">
+ <p>ТелеÑон компании Motorola <a
+href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+вÑе вÑÐµÐ¼Ñ Ð¿ÑоÑлÑÑÐ¸Ð²Ð°ÐµÑ Ð³Ð¾Ð»Ð¾Ñ</a>.</p>
</li>
- <li><p>Ðй-ÑÑÑÑки Ñакже <a
-href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">докладÑваÑÑ
-по ÑмолÑÐ°Ð½Ð¸Ñ Ð² Apple о Ñвоем
меÑÑоположении</a>, Ñ
оÑÑ ÑÑо можно
вÑклÑÑиÑÑ.</p>
- </li>
+ <li id="M201302150">
+ <p>Google Play пÑеднамеÑенно <a
+href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
+вÑÑÐ»Ð°ÐµÑ ÑазÑабоÑÑикам пÑиложениÑ
пеÑÑоналÑнÑе даннÑе полÑзоваÑелей</a>,
+коÑоÑÑе ÑÑÑанавливаÑÑ Ð¿Ñиложение.</p>
- <li><p>Apple Ð¼Ð¾Ð¶ÐµÑ <a
-href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">извлекаÑÑ
-даннÑе Ñ ÑдаленнÑÑ
iPhone Ð´Ð»Ñ Ð³Ð¾ÑÑдаÑÑÑва</a> и
ÑегÑлÑÑно Ð´ÐµÐ»Ð°ÐµÑ ÑÑо.</p>
- </li>
+ <p>ÐÑоÑÑо пÑоÑиÑÑ “ÑоглаÑиє
полÑзоваÑелей не доÑÑаÑоÑно Ð´Ð»Ñ Ñого,
+ÑÑÐ¾Ð±Ñ ÑзакониÑÑ Ñакие дейÑÑвиÑ.
ÐолÑÑинÑÑво полÑзоваÑелей не доÑиÑÑваеÑ
+“УÑÐ»Ð¾Ð²Ð¸Ñ Ð¸ÑполÑзованиє до Ñого
меÑÑа, где говоÑиÑÑÑ, на ÑÑо они
+“ÑоглаÑаÑÑÑÑ”. ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Google должна
ÑÑно и ÑеÑÑно
+иденÑиÑиÑиÑоваÑÑ Ð¸Ð½ÑоÑмаÑÐ¸Ñ Ð¾
полÑзоваÑелÑÑ
, коÑоÑÑÑ Ð¾Ð½Ð° ÑобиÑаеÑ, вмеÑÑо
+Ñого ÑÑÐ¾Ð±Ñ Ð¿ÑÑÑаÑÑ ÑÑо в головоломнÑÑ
ÑоÑмÑлиÑовкаÑ
ÑоглаÑÐµÐ½Ð¸Ñ Ñ
+полÑзоваÑелÑми.</p>
- <li><p><a
-href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
-Ðибо Apple Ð¿Ð¾Ð¼Ð¾Ð³Ð°ÐµÑ ÐÐРзаглÑдÑваÑÑ Ð²Ð¾ вÑе
даннÑе на ай-ÑÑÑÑкаÑ
, либо
-ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ ÑовеÑÑенно некомпеÑенÑна</a>.</p>
+ <p>Ðднако ÑÑÐ¾Ð±Ñ Ð¿Ð¾-наÑÑоÑÑÐµÐ¼Ñ Ð·Ð°ÑиÑиÑÑ
ÑаÑÑнÑÑ Ð¶Ð¸Ð·Ð½Ñ Ð»Ñдей, Ð¼Ñ Ð²Ð¾Ð¾Ð±Ñе Ð´Ð¾Ð»Ð¶Ð½Ñ Ð½Ðµ
+даваÑÑ Google и дÑÑгим компаниÑм Ñвои
пеÑÑоналÑнÑе даннÑе!</p>
</li>
- <li><p><a
-href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
-ÐеÑколÑко “ÑÑнкÑий” iOS, видимо, не
ÑÑÑеÑÑвÑÑÑ Ð½Ð¸ Ð´Ð»Ñ Ñего,
-кÑоме Ñлежки</a>. См. <a
-href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
-ÑеÑ
ниÑеÑкий доклад</a>.</p>
+ <li id="M201111170">
+ <p>ÐекоÑоÑÑе пÑоизводиÑели добавлÑÑÑ <a
+href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ÑкÑÑÑÑй Ð¿Ð°ÐºÐµÑ Ñлежки, Ñакой как Carrier IQ</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInTelephones">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð²
ÑелеÑонаÑ
</h4>
+ <h4 id="SpywareInElectronicReaders">ÐлекÑÑоннÑе книги</h4>
<span class="anchor-reference-id">(<a
-href="#SpywareInTelephones">#SpywareInTelephones</a>)</span>
+href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
</div>
-<ul>
- <li><p>СледÑÑие пÑогÑÐ°Ð¼Ð¼Ñ Ð² попÑлÑÑнÑÑ
пÑиложениÑÑ
Android ÑиÑоко ÑаÑпÑоÑÑÑÐ°Ð½ÐµÐ½Ñ Ð¸
-поÑой оÑÐµÐ½Ñ Ñ
иÑÑоÑмнÑ. ÐекоÑоÑÑе
пÑогÑÐ°Ð¼Ð¼Ñ Ñлежки могÑÑ <a
-href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
-наблÑдаÑÑ Ð·Ð° ÑизиÑеÑкими пеÑемеÑениÑми
полÑзоваÑÐµÐ»Ñ Ð¿Ð¾ магазинÑ, оÑмеÑаÑ
-ÑеÑи WiFi</a>.</p>
-</li>
-
- <li><p>Android оÑÑÐ»ÐµÐ¶Ð¸Ð²Ð°ÐµÑ Ð¿ÐµÑемеÑÐµÐ½Ð¸Ñ Ð´Ð»Ñ Google,
<a
-href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">даже
-когда “ÑлÑÐ¶Ð±Ñ Ð¼ÐµÑÑоположениє
вÑклÑÑенÑ, даже когда в ÑелеÑоне
-Ð½ÐµÑ SIM-каÑÑÑ</a>.</p></li>
-
- <li><p>ÐекоÑоÑÑе мобилÑнÑе ÑелеÑÐ¾Ð½Ñ <a
-href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">пÑодаÑÑÑÑ
-Ñ Ð¿ÑогÑаммами-Ñпионами, оÑÑÑлаÑÑими маÑÑÑ
даннÑÑ
в ÐиÑай</a>.</p></li>
-
- <li><p>СоглаÑно ÐдваÑÐ´Ñ Ð¡Ð½Ð¾ÑденÑ, <a
-href="http://www.bbc.com/news/uk-34444233">агенÑÑÑва могÑÑ
бÑаÑÑ Ð¿Ð¾Ð´
-конÑÑÐ¾Ð»Ñ ÑмаÑÑÑонÑ</a>, поÑÑÐ»Ð°Ñ ÑкÑÑÑÑе
ÑекÑÑовÑе ÑообÑениÑ, коÑоÑÑе
-позволÑÑÑ Ð²ÐºÐ»ÑÑаÑÑ Ð¸ вÑклÑÑаÑÑ ÑелеÑонÑ,
пÑоÑлÑÑиваÑÑ Ð¿Ð¾ микÑоÑонÑ,
-извлекаÑÑ Ð´Ð°Ð½Ð½Ñе о меÑÑоположении из GPS,
ÑоÑогÑаÑиÑоваÑÑ, ÑиÑаÑÑ ÑекÑÑовÑе
-ÑообÑениÑ, иÑÑоÑÐ¸Ñ Ð·Ð²Ð¾Ð½ÐºÐ¾Ð², пеÑедвижений,
а Ñакже пÑоÑмоÑÑа ÐÑемиÑной
-паÑÑинÑ, и ÑиÑаÑÑ ÑпиÑок конÑакÑов. ÐÑи
вÑедоноÑнÑе пÑогÑÐ°Ð¼Ð¼Ñ ÑпÑоекÑиÑованÑ
-Ñак, ÑÑÐ¾Ð±Ñ Ð½Ðµ позволÑÑÑ ÑебÑ
обнаÑÑживаÑÑ.</p>
- </li>
-
- <li><p>ТелеÑÐ¾Ð½Ñ Samsung пÑодаÑÑ <a
-href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">
-Ñ Ð¿ÑиложениÑми, коÑоÑÑе не могÑÑ Ð±ÑÑÑ
ÑÐ´Ð°Ð»ÐµÐ½Ñ Ð¿Ð¾Ð»ÑзоваÑелÑми</a> и коÑоÑÑе
-оÑпÑавлÑÑÑ ÑÑолÑко даннÑÑ
, ÑÑо пеÑедаÑа
обÑ
одиÑÑÑ Ð¿Ð¾Ð»ÑзоваÑелÑм доволÑно
-доÑого. Ð£ÐºÐ°Ð·Ð°Ð½Ð½Ð°Ñ Ð¿ÐµÑедаÑа, нежелаÑелÑнаÑ
Ð´Ð»Ñ Ð¿Ð¾Ð»ÑзоваÑелей и не
-воÑÑÑÐµÐ±Ð¾Ð²Ð°Ð½Ð½Ð°Ñ Ð¸Ð¼Ð¸, опÑеделенно должна
пÑедÑÑавлÑÑÑ Ñого или иного Ñода
-ÑлежкÑ.</p></li>
-
- <li><p>ТелеÑон компании Motorola <a
-href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
-вÑе вÑÐµÐ¼Ñ Ð¿ÑоÑлÑÑÐ¸Ð²Ð°ÐµÑ Ð³Ð¾Ð»Ð¾Ñ</a>.</p>
+<ul class="blurbs">
+ <li id="M201603080">
+ <p>Ð ÑлекÑÑоннÑÑ
книгаÑ
могÑÑ
ÑодеÑжаÑÑÑÑ <a
+href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">пÑогÑаммÑ
+на JavaScript, коÑоÑÑе иногда подглÑдÑваÑÑ Ð·Ð°
ÑиÑаÑелÑми</a>.</p>
</li>
- <li><p>ШпионÑкие пÑогÑÐ°Ð¼Ð¼Ñ Ð² ÑелеÑонаÑ
Android
(и поÑÑаÑивнÑÑ
компÑÑÑеÑаÑ
[Ñ
-Windows?]): “Уолл-ÑÑÑÐ¸Ñ Ð´Ð¶Ð¾Ñнел” (в ÑÑаÑÑе,
закÑÑÑой Ð¾Ñ Ð½Ð°Ñ
-баÑÑеÑом плаÑежа) ÑообÑаеÑ, ÑÑо <a
-href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">ФÐÐ
-Ð¼Ð¾Ð¶ÐµÑ Ñдаленной командой вклÑÑаÑÑ
пÑиемник GPS и микÑоÑон в ÑелеÑонаÑ
Ñ
-Android и поÑÑаÑивнÑÑ
компÑÑÑеÑаÑ
</a>. (Я
подозÑеваÑ, ÑÑо ÑеÑÑ Ð¸Ð´ÐµÑ Ð¾
-компÑÑÑеÑаÑ
Ñ Windows.) <a
-href="http://cryptome.org/2013/08/fbi-hackers.htm">ÐÑÑгие
подÑобноÑÑи</a>.</p>
+ <li id="M201410080">
+ <p>ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Adobe Ñделала Ñак, ÑÑобÑ
“ЦиÑÑÐ¾Ð²Ð°Ñ ÑедакÑиє, пÑогÑамма
+ÑÑениÑ, пÑименÑÐµÐ¼Ð°Ñ Ð² болÑÑинÑÑве
библиоÑек СШÐ, <a
+href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+вÑÑÑлала маÑÑÑ Ð´Ð°Ð½Ð½ÑÑ
в Adobe</a>.
“ÐпÑавдание”
+Adobe — “ÑÑо нÑжно Ð´Ð»Ñ ÐºÐ¾Ð½ÑÑолÑ
ÑиÑÑового ÑпÑавлениÑ
+огÑаниÑениÑми!”</p>
</li>
- <li><p>СоÑовÑе ÑелеÑÐ¾Ð½Ñ Ñ GPS вÑÑÑлаÑÑ Ñвои
ÑпÑÑниковÑе меÑÑоопÑÐµÐ´ÐµÐ»ÐµÐ½Ð¸Ñ Ð¿Ð¾
-Ñдаленной команде, и полÑзоваÑели не могÑÑ
оÑÑановиÑÑ ÑÑо: <a
-href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
-http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>
-(СШРпланиÑÑÑÑ Ð²Ð²ÐµÑÑи когда-нибÑдÑ
ÑÑебование, по коÑоÑÐ¾Ð¼Ñ Ð²Ð¾ вÑеÑ
новÑÑ
-мобилÑнÑÑ
ÑелеÑонаÑ
должен бÑÑÑ Ð¼Ð¾Ð´ÑлÑ
GPS).</p>
+ <li id="M201212031">
+ <p>Фонд ÑлекÑÑоннÑÑ
ÑÑбежей обÑледовал и
наÑел <a
+href="https://www.eff.org/pages/reader-privacy-chart-2012"> Ñазного
Ñода
+ÑÐ»ÐµÐ¶ÐºÑ Ð² Swindle и дÑÑгиÑ
ÑÑÑÑойÑÑваÑ
ÑÑениÑ
ÑлекÑÑоннÑÑ
книг</a>.</p>
</li>
- <li><p>ÐÑновное назнаÑение неÑвободной
пÑогÑÐ°Ð¼Ð¼Ñ Snapchat — огÑаниÑиваÑÑ
-иÑполÑзование даннÑÑ
на компÑÑÑеÑе
полÑзоваÑелÑ, но она пÑÐ¾Ð²Ð¾Ð´Ð¸Ñ Ð¸ ÑлежкÑ:
-<a
-href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
-она пÑÑаеÑÑÑ Ð¿Ð¾Ð»ÑÑиÑÑ ÑпиÑок номеÑов
ÑелеÑонов лÑдей из адÑеÑной книжки
-полÑзоваÑелÑ</a>.</p>
+ <li id="M201212030">
+ <p>ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð²Ð¾ многиÑ
ÑÑÑÑойÑÑваÑ
ÑÑÐµÐ½Ð¸Ñ ÑлекÑÑоннÑÑ
книг —
+не ÑолÑко в Kindle: <a
+href="https://www.eff.org/pages/reader-privacy-chart-2012"> они
докладÑваÑÑ
+даже о Ñом, какие ÑÑÑаниÑÑ Ð¸ когда ÑиÑаеÑ
полÑзоваÑелÑ</a>.</p>
</li>
</ul>
+
+<div class="big-section">
+ <h3 id="SpywareInApplications">ÐÑикладнÑе пÑогÑаммÑ</h3>
+ <span class="anchor-reference-id">(<a
+href="#SpywareInApplications">#SpywareInApplications</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
<div class="big-subsection">
- <h4 id="SpywareInMobileApps">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð²
мобилÑнÑÑ
пÑиложениÑÑ
</h4>
+ <h4 id="SpywareInMobileApps">ÐобилÑнÑе пÑиложениÑ</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
</div>
-<ul>
- <li><p>ÐÑпанÑкое пÑиложение ÑÑанÑлÑÑий
ÑÑÑбола <a
+<ul class="blurbs">
+ <li id="M201808030">
+ <p>ÐекоÑоÑÑе пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Google в ÑиÑÑеме
Android <a
+href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
+запиÑÑваÑÑ Ð¼ÐµÑÑоположение полÑзоваÑелÑ,
даже когда полÑзоваÑели оÑклÑÑаÑÑ
+“оÑÑлеживание меÑÑоположениє</a>.</p>
+
+ <p>ÐÑÑÑ Ð´ÑÑгие ÑпоÑÐ¾Ð±Ñ Ð¾ÑклÑÑиÑÑ Ð´ÑÑгие
меÑÐ¾Ð´Ñ Ð¾ÑÑÐ»ÐµÐ¶Ð¸Ð²Ð°Ð½Ð¸Ñ Ð¼ÐµÑÑоположениÑ, но
+болÑÑинÑÑво полÑзоваÑелей бÑÐ´ÐµÑ Ð¾Ð±Ð¼Ð°Ð½ÑÑо
вводÑÑим в заблÑждение пÑнкÑом
+наÑÑÑоек.</p>
+ </li>
+
+ <li id="M201806110">
+ <p>ÐÑпанÑкое пÑиложение ÑÑанÑлÑÑий
ÑÑÑбола <a
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">
оÑÑÐ»ÐµÐ¶Ð¸Ð²Ð°ÐµÑ Ð¿ÐµÑемеÑÐµÐ½Ð¸Ñ Ð¿Ð¾Ð»ÑзоваÑÐµÐ»Ñ Ð¸
подÑлÑÑÐ¸Ð²Ð°ÐµÑ ÑеÑез микÑоÑон</a>.</p>
@@ -813,33 +782,58 @@
вÑигÑаеÑе. Ð ÑаÑÑноÑÑи, в ÑÑом.</p>
</li>
- <li><p>Grindr ÑобиÑÐ°ÐµÑ ÑÐ²ÐµÐ´ÐµÐ½Ð¸Ñ Ð¾ Ñом, <a
-href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
-Ñ ÐºÐ°ÐºÐ¸Ñ
полÑзоваÑелей ÑезÑлÑÑаÑÑ ÑеÑÑа на
СÐÐРположиÑелÑнÑ, и пеÑÐµÐ´Ð°ÐµÑ ÑÑи
-даннÑе компаниÑм</a>.</p>
+ <li id="M201804160">
+ <p>ÐÑÑледоваÑели обнаÑÑжили, ÑÑо <a
+href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
+из 5855 пÑовеÑеннÑÑ
пÑиложений Android
подглÑдÑваÑÑ Ð¸ ÑобиÑаÑÑ Ð¸Ð½ÑоÑмаÑÐ¸Ñ Ð¾
+ÑвоиÑ
полÑзоваÑелÑÑ
</a>. ÐбнаÑÑжилоÑÑ, ÑÑо
40% из ÑÑиÑ
пÑиложений
+ÑплеÑниÑаÑÑ Ð¾ ÑвоиÑ
полÑзоваÑелÑÑ
по
незаÑиÑеннÑм каналам. ÐбÑаÑиÑе
+внимание, ÑÑо иÑÑледоваÑели могли
ÑаÑкÑÑÑÑ ÑолÑко некоÑоÑÑе меÑÐ¾Ð´Ñ Ñлежки в
+ÑÑиÑ
неÑвободнÑÑ
пÑиложениÑÑ
, на иÑÑ
однÑй
ÑекÑÑ ÐºÐ¾ÑоÑÑÑ
они не имели
+возможноÑÑи взглÑнÑÑÑ. ÐÑÑалÑнÑе
пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð¼Ð¾Ð³Ð»Ð¸ Ð±Ñ Ð¿Ð¾Ð´Ð³Ð»ÑдÑваÑÑ Ð´ÑÑгими
+ÑпоÑобами.</p>
+
+ <p>ÐÑо ÑвидеÑелÑÑÑвÑÐµÑ Ð¾ Ñом, ÑÑо
неÑвободнÑе пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð² обÑем ÑабоÑаÑÑ
+пÑоÑив ÑвоиÑ
полÑзоваÑелей. ÐÐ»Ñ Ð·Ð°ÑиÑÑ
Ñвоей лиÑной жизни и ÑвободÑ
+полÑзоваÑелÑм Android нÑжно избавиÑÑÑÑ Ð¾Ñ
неÑвободнÑÑ
пÑогÑамм —
+как Ð¾Ñ Ð½ÐµÑвободной ÑиÑÑÐµÐ¼Ñ Aydroid, пеÑÐµÐ¹Ð´Ñ Ð½Ð°
<a
+href="https://replicant.us">Replicant</a>, Ñак и оÑ
неÑвободнÑÑ
пÑиложений,
+полÑÑÐ°Ñ Ð¸Ñ
из <a href="https://f-droid.org/">магазина
F-Droid</a>, в коÑоÑом
+ÑазмеÑаÑÑÑÑ ÑолÑко ÑвободнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð¸
коÑоÑÑй <a
+href="https://f-droid.org/wiki/page/Antifeatures"> ÑвÑÑвенно
пÑедÑпÑеждаеÑ
+полÑзоваÑелÑ, еÑли в пÑиложении еÑÑÑ
анÑиÑÑнкÑии</a>.</p>
+ </li>
+
+ <li id="M201804020">
+ <p>Grindr ÑобиÑÐ°ÐµÑ ÑÐ²ÐµÐ´ÐµÐ½Ð¸Ñ Ð¾ Ñом, <a
+href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
+Ñ ÐºÐ°ÐºÐ¸Ñ
полÑзоваÑелей ÑезÑлÑÑаÑÑ ÑеÑÑа на
СÐÐРположиÑелÑнÑ, и пеÑÐµÐ´Ð°ÐµÑ ÑÑи
+даннÑе компаниÑм</a>.</p>
<p>У Grindr не должно бÑÑÑ ÑÑолÑко Ñведений о
его полÑзоваÑелÑÑ
. Ðн мог Ð±Ñ Ð±ÑÑÑ
ÑпÑоекÑиÑован Ñак, ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð»ÑзоваÑели
пеÑедавали Ñакие ÑÐ²ÐµÐ´ÐµÐ½Ð¸Ñ Ð´ÑÑг дÑÑгÑ,
но не в Ð±Ð°Ð·Ñ Ð´Ð°Ð½Ð½ÑÑ
ÑеÑвеÑа.</p>
</li>
- <li>
+ <li id="M201803050">
<p>ÐÑиложение и медвежÑÑ ÑÑлÑга moviepass
ÑÐ¿Ð¸Ð¾Ð½Ð¸Ñ Ð·Ð° полÑзоваÑелÑми даже
болÑÑе, Ñем они ожидали. Ðно <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">
-запиÑÑваеÑ, где они пÑÑеÑеÑÑвÑÑÑ Ð´Ð¾ и
поÑле Ñого, как пойдÑÑ Ð² кино</a>.
- </p>
+запиÑÑваеÑ, где они пÑÑеÑеÑÑвÑÑÑ Ð´Ð¾ и
поÑле Ñого, как пойдÑÑ Ð² кино</a>.</p>
<p>Ðе подвеÑгайÑеÑÑ Ñлежке —
плаÑиÑе налиÑнÑми!</p>
</li>
- <li><p>ÐÑогÑÐ°Ð¼Ð¼Ñ Ñ Ð¸ÑкÑÑÑÑвеннÑм
инÑеллекÑом, огÑаниÑиваÑÑие полÑзование
ÑелеÑоном
-во вÑÐµÐ¼Ñ Ð²Ð¾Ð¶Ð´ÐµÐ½Ð¸Ñ, могÑÑ <a
-href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
-оÑÑлеживаÑÑ ÐºÐ°Ð¶Ð´Ð¾Ðµ ваÑе движение</a>.</p>
+ <li id="M201711240">
+ <p>СледÑÑие пÑогÑÐ°Ð¼Ð¼Ñ Ð² попÑлÑÑнÑÑ
пÑиложениÑÑ
Android ÑиÑоко ÑаÑпÑоÑÑÑÐ°Ð½ÐµÐ½Ñ Ð¸
+поÑой оÑÐµÐ½Ñ Ñ
иÑÑоÑмнÑ. ÐекоÑоÑÑе
пÑогÑÐ°Ð¼Ð¼Ñ Ñлежки могÑÑ <a
+href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
+наблÑдаÑÑ Ð·Ð° ÑизиÑеÑкими пеÑемеÑениÑми
полÑзоваÑÐµÐ»Ñ Ð¿Ð¾ магазинÑ, оÑмеÑаÑ
+ÑеÑи WiFi</a>.</p>
</li>
- <li><p>ÐÑиложение Sarahah <a
+ <li id="M201708270">
+ <p>ÐÑиложение Sarahah <a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
вÑгÑÑÐ¶Ð°ÐµÑ Ð²Ñе номеÑа ÑелеÑонов и адÑеÑа
ÑлекÑÑонной поÑÑÑ</a> в запиÑной
книжке полÑзоваÑÐµÐ»Ñ Ð½Ð° ÑеÑвеÑ
ÑазÑабоÑÑика. ÐбÑаÑаем ваÑе внимание, ÑÑо в
@@ -848,21 +842,87 @@
Ð´Ð»Ñ Ð¾Ð±Ð¾Ð·Ð½Ð°ÑÐµÐ½Ð¸Ñ Ð±ÐµÑплаÑнÑÑ
пÑогÑамм.</p>
</li>
- <li>
- <p>Ðо многиÑ
моделÑÑ
Ð²Ð¸Ð´ÐµÐ¾ÐºÐ°Ð¼ÐµÑ Ñ
подклÑÑением к ÐнÑеÑнеÑÑ ÐµÑÑÑ ÑÑдовиÑнаÑ
-лазейка — Ñ Ð½Ð¸Ñ
еÑÑÑ ÑÑеÑÐ½Ð°Ñ Ð·Ð°Ð¿Ð¸ÑÑ Ñ
неизменÑемÑм паÑолем, и <a
-href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">
-ÑÑи ÑÑеÑнÑе запиÑи к ÑÐ¾Ð¼Ñ Ð¶Ðµ невозможно
ÑдалиÑÑ</a>.</p>
+ <li id="M201707270">
+ <p>20 неÑеÑÑнÑÑ
пÑиложений Android <a
+href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">запиÑÑвали
+ÑелеÑоннÑе звонки и оÑпÑавлÑли иÑ
в виде
ÑекÑÑовÑÑ
ÑообÑений и ÑлекÑÑонной
+поÑÑÑ Ñем, кÑо ÑÐ»ÐµÐ´Ð¸Ñ Ð·Ð°
полÑзоваÑелÑми</a>.</p>
+
+ <p>ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Google не наÑоÑно Ñделала, ÑÑобÑ
ÑÑи пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ñпионили; напÑоÑив,
+она пÑинимала ÑазлиÑнÑе меÑÑ, ÑÑобÑ
пÑедоÑвÑаÑиÑÑ ÑÑо, и Ñдалила ÑÑи
+пÑиложениÑ, когда вÑÑÑнилоÑÑ, ÑÑо они
делаÑÑ. Так ÑÑо Ð¼Ñ Ð½Ðµ можем обвинÑÑÑ
+Google в Ñом, ÑÑо ÑÑи пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ñпионили.</p>
+
+ <p>С дÑÑгой ÑÑоÑонÑ, Google
пеÑеÑаÑпÑоÑÑÑанÑÐµÑ Ð½ÐµÑвободнÑе
пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Android,
+а ÑÑало бÑÑÑ, ÑазделÑÐµÑ Ð¾ÑвеÑÑÑвенноÑÑÑ Ð·Ð°
неÑпÑаведливоÑÑÑ, ÑоÑÑоÑÑÑÑ Ð²
+Ñом, ÑÑо они неÑвободнÑ. ÐомпаниÑ
ÑаÑпÑоÑÑÑанÑÐµÑ Ñакже Ñвои ÑобÑÑвеннÑе
+неÑвободнÑе пÑиложениÑ, Ñакие как Google Play, <a
+href="/philosophy/free-software-even-more-important.html">коÑоÑÑе
+злонамеÑеннÑ</a>.</p>
+
+ <p>Ðогла ли ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Google пÑедоÑвÑаÑаÑÑ
жÑлÑниÑеÑÑво Ñо ÑÑоÑÐ¾Ð½Ñ Ð¿Ñиложений
+более ÑÑаÑелÑно? Ðи Ð´Ð»Ñ Google, ни длÑ
полÑзоваÑелей Android не ÑÑÑеÑÑвÑеÑ
+ÑиÑÑемаÑиÑеÑкого ÑпоÑоба инÑпекÑиÑоваÑÑ
иÑполнÑемÑе ÑÐ°Ð¹Ð»Ñ Ð½ÐµÑвободнÑÑ
+пÑиложений, ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð½ÑÑÑ, ÑÑо они делаÑÑ.</p>
+
+ <p>Ð Google могли Ð±Ñ ÑÑебоваÑÑ Ð¸ÑÑ
однÑй
ÑекÑÑ ÑÑиÑ
пÑиложений и изÑÑаÑÑ
+каким-Ñо обÑазом иÑÑ
однÑй ÑекÑÑ, ÑÑобÑ
опÑеделÑÑÑ, не делаÑÑ Ð»Ð¸ они
+полÑзоваÑелÑм ÑÑо-Ñо плоÑ
ое. ÐÑли бÑ
ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Ð´ÐµÐ»Ð°Ð»Ð° ÑÑо Ñ
оÑоÑо, она могла
+Ð±Ñ Ð±Ð¾Ð»ÐµÐµ или менее пÑедоÑвÑаÑаÑÑ Ñакое
подглÑдÑвание, кÑоме ÑлÑÑаев, когда
+ÑазÑабоÑÑики пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð´Ð¾ÑÑаÑоÑно ÑмнÑ,
ÑÑÐ¾Ð±Ñ Ð¿ÐµÑеÑ
иÑÑиÑÑ Ð¿ÑовеÑкÑ.</p>
+
+ <p>Ðо поÑколÑÐºÑ Google Ñама ÑазÑабаÑÑваеÑ
злонамеÑеннÑе пÑиложениÑ, Ð¼Ñ Ð½Ðµ можем
+довеÑÑÑÑ Google наÑÑ Ð·Ð°ÑиÑÑ. ÐÑ Ð´Ð¾Ð»Ð¶Ð½Ñ
ÑÑебоваÑÑ Ð²ÑпÑÑка иÑÑ
одного ÑекÑÑа
+Ð´Ð»Ñ Ð¿Ñблики, ÑÑÐ¾Ð±Ñ Ð¼Ñ Ð¼Ð¾Ð³Ð»Ð¸ заÑиÑаÑÑ Ð´ÑÑг
дÑÑга.</p>
+ </li>
+
+ <li id="M201705230">
+ <p><a
+href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">ÐÑиложениÑ
+Ð´Ð»Ñ BART ÑледÑÑ Ð·Ð° полÑзоваÑелÑми</a>.</p>
+
+ <p>ÐÑли пÑогÑаммнÑе пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ ÑвободнÑ,
полÑзоваÑели могÑÑ
+<em>гаÑанÑиÑоваÑÑ</em>, ÑÑо они не ÑледÑÑ.</p>
+
+ <p>Ðогда пÑиложение неÑвободно, можно
ÑолÑко надеÑÑÑÑÑ, ÑÑо оно не ÑледиÑ.</p>
</li>
- <li>
+ <li id="M201705040">
+ <p>Ðо ÑезÑлÑÑаÑам одного иÑÑледованиÑ, 234
пÑиложений Android оÑÑлеживаÑÑ
+полÑзоваÑелей, <a
+href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">пÑоÑлÑÑиваÑ
+ÑлÑÑÑазвÑк Ð¾Ñ Ð¼Ð°ÑÑков, ÑазмеÑеннÑÑ
в
магазинаÑ
, или из ÑелевизионнÑÑ
+пеÑедаÑ</a>.</p>
+ </li>
+
+ <li id="M201704260">
<p>ÐказÑваеÑÑÑ, Faceapp Ð²ÐµÐ´ÐµÑ Ð¼Ð°ÑÑÑ
Ñлежки, ÑÑÐ´Ñ Ð¿Ð¾ ÑомÑ, <a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
-как много доÑÑÑпа к пеÑÑоналÑнÑм даннÑм
ÑÑебÑÐµÑ ÑÑа пÑогÑамма</a>.
- </p>
+как много доÑÑÑпа к пеÑÑоналÑнÑм даннÑм
ÑÑебÑÐµÑ ÑÑа пÑогÑамма</a>.</p>
+ </li>
+
+ <li id="M201704190">
+ <p>ÐолÑзоваÑели ÑÑдÑÑÑÑ Ñ Bose за <a
+href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
+ÑаÑпÑоÑÑÑанение ÑпионÑкой пÑогÑÐ°Ð¼Ð¼Ñ Ð²
наÑÑникаÑ
</a>. ÐонкÑеÑно, пÑиложение
+запиÑÑÐ²Ð°ÐµÑ Ð¸Ð¼ÐµÐ½Ð° звÑковÑÑ
Ñайлов, коÑоÑÑе
пÑоÑлÑÑиваÑÑ Ð¿Ð¾Ð»ÑзоваÑели, а Ñакже
+ÑникалÑнÑй ÑеÑийнÑй Ð½Ð¾Ð¼ÐµÑ Ð½Ð°ÑÑников.</p>
+
+ <p>Ð ÑÑде пÑедÑÑвлено обвинение, ÑÑо ÑÑо
делаеÑÑÑ Ð±ÐµÐ· ÑоглаÑиÑ
+полÑзоваÑелÑ. ÐÑли Ð±Ñ Ð¿Ñиложение пиÑало
мелким ÑÑиÑÑом, ÑÑо полÑзоваÑели на
+ÑÑо ÑоглаÑаÑÑÑÑ, бÑло ли Ð±Ñ ÑÑо пÑиемлемо?
Ðи в коем ÑлÑÑае! Ðакон должен
+однознаÑно <a href="/philosophy/surveillance-vs-democracy.html">
запÑеÑаÑÑ
+закладÑваÑÑ Ð² пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð»ÑбÑÑ ÑлежкÑ</a>.</p>
+ </li>
+
+ <li id="M201704074">
+ <p>ÐаÑÑ Ð¿Ñиложений Android могÑÑ <a
+href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">ÑговоÑиÑÑÑÑ,
+ÑÑÐ¾Ð±Ñ Ð¿ÐµÑедаваÑÑ Ð»Ð¸ÑнÑе даннÑе
полÑзоваÑÐµÐ»Ñ Ð½Ð° ÑеÑвеÑÑ</a>. ÐÑÑледоваÑели
+обнаÑÑжили деÑÑÑки ÑÑÑÑÑ Ð¿Ð°Ñ ÑакиÑ
пÑиложений.</p>
</li>
- <li>
+ <li id="M201703300">
<p>ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
обÑÑвила об ÑÑÑановке по вÑбоÑÑ
неÑвободной пÑогÑÐ°Ð¼Ð¼Ñ Ð¿Ð¾Ð¸Ñка</a>,
@@ -878,17 +938,14 @@
она “необÑзаÑелÑна”.</p>
</li>
- <li><p>ÐÑогÑамма ÑедакÑиÑÐ¾Ð²Ð°Ð½Ð¸Ñ ÑоÑогÑаÑий
Meitu <a
+ <li id="M201701210">
+ <p>ÐÑогÑамма ÑедакÑиÑÐ¾Ð²Ð°Ð½Ð¸Ñ ÑоÑогÑаÑий
Meitu <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">оÑÑÑлаеÑ
-даннÑе полÑзоваÑÐµÐ»Ñ Ð² киÑайÑкÑÑ
компаниÑ</a>.</p></li>
-
- <li><p>ÐÑиложение конÑÑоллеÑа ÑеÑÑа на
беÑеменноÑÑÑ Ð¼Ð¾Ð¶ÐµÑ Ð½Ðµ ÑолÑко <a
-href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">ÑпиониÑÑ
-за вÑевозможнÑми даннÑми в ÑелеÑоне и в
ÑÑеÑнÑÑ
запиÑÑÑ
ÑеÑвеÑа, оно Ð¼Ð¾Ð¶ÐµÑ Ð¸
-подменÑÑÑ Ð¸Ñ
</a>.
- </p></li>
+даннÑе полÑзоваÑÐµÐ»Ñ Ð² киÑайÑкÑÑ
компаниÑ</a>.</p>
+ </li>
- <li><p>ÐÑиложение Uber <a
+ <li id="M201611280">
+ <p>ÐÑиложение Uber <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">оÑÑлеживаеÑ
пеÑемеÑÐµÐ½Ð¸Ñ ÐºÐ»Ð¸ÐµÐ½Ñа до и поÑле
поездки</a>.</p>
@@ -896,20 +953,58 @@
полÑзоваÑелє на ÑÐ»ÐµÐ¶ÐºÑ Ð½Ðµ даеÑ
адекваÑной заÑиÑÑ Ð¾Ñ Ð¼Ð°ÑÑовой Ñлежки.</p>
</li>
- <li><p>Ðовое пÑиложение голоÑовÑÑ
ÑообÑений
Google <a
-href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">ведеÑ
-пÑоÑокол вÑеÑ
пеÑеговоÑов</a>.</p>
+ <li id="M201611160">
+ <p>Ð ÑÑаÑÑе Ñ Ð¸ÑÑледованием пÑиваÑноÑÑи и
заÑиÑенноÑÑи 283 пÑиложений Android
+Ð´Ð»Ñ VPN Ñделан вÑвод, ÑÑо “неÑмоÑÑÑ Ð½Ð°
обеÑÐ°Ð½Ð¸Ñ Ð¿ÑиваÑноÑÑи,
+заÑиÑенноÑÑи и анонимноÑÑи, коÑоÑое даÑÑ
болÑÑинÑÑво пÑиложений Ð´Ð»Ñ VPN, <a
+href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
+Ð¼Ð¸Ð»Ð»Ð¸Ð¾Ð½Ñ Ð¿Ð¾Ð»ÑзоваÑелей ÑиÑкÑÑÑ ÑÑаÑÑ
жеÑÑвами беÑпоÑвеннÑÑ
гаÑанÑий
+безопаÑноÑÑи, а Ñакже злоÑпоÑÑеблений Ñо
ÑÑоÑÐ¾Ð½Ñ Ð¿Ñиложений длÑ
+VPN</a>”.</p>
+
+ <p>Ðалее ÑледÑÐµÑ Ð½ÐµÐ¸ÑÑеÑпÑваÑÑий ÑпиÑок
неÑвободнÑÑ
пÑиложений Ð´Ð»Ñ VPN, коÑоÑÑе
+ÑледÑÑ Ð·Ð° полÑзоваÑелÑми и вÑоÑгаÑÑÑÑ Ð² иÑ
лиÑнÑÑ Ð¶Ð¸Ð·Ð½Ñ:</p>
+
+ <dl>
+ <dt>SurfEasy</dt>
+ <dd>ÐÑполÑзÑÐµÑ Ð±Ð¸Ð±Ð»Ð¸Ð¾Ñеки Ñлежки, Ñакие
как NativeX и Appflood, пÑедназнаÑеннÑе
+Ð´Ð»Ñ Ð¾ÑÑÐ»ÐµÐ¶Ð¸Ð²Ð°Ð½Ð¸Ñ Ð¿Ð¾Ð»ÑзоваÑелей и показа
им напÑавленной ÑекламÑ.</dd>
+
+ <dt>sFly Network Booster</dt>
+ <dd>ÐапÑаÑÐ¸Ð²Ð°ÐµÑ Ð¿Ñи ÑÑÑановке
ÑазÑеÑÐµÐ½Ð¸Ñ Ð½Ð° ÑÑение и оÑпÑÐ°Ð²ÐºÑ SMS, ÑÑо
ознаÑаеÑ
+полнÑй доÑÑÑп к ÑекÑÑовÑм ÑообÑениÑм
полÑзоваÑелей.</dd>
+
+ <dt>DroidVPN and TigerVPN</dt>
+ <dd>ÐапÑаÑиваÑÑ ÑазÑеÑение на ÑÑение
жÑÑналов дÑÑгиÑ
пÑиложений, а Ñакже
+ÑиÑÑемнÑÑ
жÑÑналов. РазÑабоÑÑики TigerVPN ÑÑо
подÑвеÑдили.</dd>
+
+ <dt>HideMyAss</dt>
+ <dd>ÐоÑÑÐ»Ð°ÐµÑ Ð´Ð°Ð½Ð½Ñе в LinkedIn. ÐÑоме Ñого,
ÑоÑ
ÑанÑÐµÑ Ð¿Ð¾Ð´ÑобнÑй жÑÑнал и можеÑ
+по ÑÑÐµÐ±Ð¾Ð²Ð°Ð½Ð¸Ñ Ð¿ÐµÑедаваÑÑ ÐµÐ³Ð¾
гоÑÑдаÑÑÑвеннÑм оÑганам ÐеликобÑиÑании.</dd>
+
+ <dt>VPN Services HotspotShield</dt>
+ <dd>ÐÑÑавлÑÐµÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð° JavaScript в
ÑÑÑаниÑÑ HTML, пеÑедаваемÑе
+полÑзоваÑелÑм. ÐаÑвленное назнаÑение ÑÑой
вÑÑавки — показ
+ÑекламÑ. ÐÑполÑзÑÐµÑ Ð¾ÐºÐ¾Ð»Ð¾ пÑÑÑ Ð±Ð¸Ð±Ð»Ð¸Ð¾Ñек
Ñлежки. ÐÑоме Ñого, пÑопÑÑкаеÑ
+поÑок даннÑÑ
полÑзоваÑÐµÐ»Ñ ÑеÑез valueclick.com
(ÑÐ°Ð¹Ñ ÑекламÑ).</dd>
+
+ <dt>WiFi Protector VPN</dt>
+ <dd>ÐÑÑавлÑÐµÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð° JavaScript в
ÑÑÑаниÑÑ HTML, а Ñакже иÑполÑзÑÐµÑ Ð¾ÐºÐ¾Ð»Ð¾
+пÑÑи библиоÑек Ñлежки. РазÑабоÑÑики
пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð¿Ð¾Ð´ÑвеÑдили, ÑÑо деÑевÑе
+веÑÑии пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð´ÐµÐ¹ÑÑвиÑелÑно
вÑÑавлÑÑÑ JavaScript Ð´Ð»Ñ Ñлежки и показа
+ÑекламÑ.</dd>
+ </dl>
</li>
- <li><p>Такие пÑиложениÑ, как <a
-href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
-пÑогÑамма Ñлежки Symphony, подÑлÑÑиваÑÑ, какие
Ñадио- и ÑелепеÑедаÑи
-пÑоигÑÑваÑÑÑÑ Ð¿Ð¾Ð±Ð»Ð¸Ð·Ð¾ÑÑи</a>. Ð Ñакже
подÑмаÑÑиваÑÑ, ÑÑо полÑзоваÑели пиÑÑÑ
-на ÑакиÑ
ÑайÑаÑ
как Facebook, Google+ и Twitter.</p>
+ <li id="M201609210">
+ <p>Ðовое пÑиложение голоÑовÑÑ
ÑообÑений
Google <a
+href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">ведеÑ
+пÑоÑокол вÑеÑ
пеÑеговоÑов</a>.</p>
</li>
- <li><p>Ðовое пÑиложение Facebook, Magic Photo, <a
-href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+ <li id="M201606050">
+ <p>Ðовое пÑиложение Facebook, Magic Photo, <a
+href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
ÑканиÑÑÐµÑ ÑоÑоколлекÑии знакомÑÑ
Ð»Ð¸Ñ Ð½Ð°
ваÑиÑ
ÑелеÑонаÑ
</a> и пÑÐµÐ´Ð»Ð°Ð³Ð°ÐµÑ Ð²Ð°Ð¼
обмениваÑÑÑÑ ÑнÑÑÑм вами изобÑажением в
ÑооÑвеÑÑÑвии Ñ Ñем, кÑо наÑ
одиÑÑÑ Ð²
кадÑе.</p>
@@ -923,7 +1018,54 @@
ÑлÑжбÑ.</p>
</li>
- <li><p>Ðак болÑÑинÑÑво медвежÑиÑ
ÑÑлÑг по
“мÑзÑкалÑÐ½Ð¾Ð¼Ñ Ð¿Ð¾ÑоковомÑ
+ <li id="M201605310">
+ <p>Ðо многиÑ
моделÑÑ
Ð²Ð¸Ð´ÐµÐ¾ÐºÐ°Ð¼ÐµÑ Ñ
подклÑÑением к ÐнÑеÑнеÑÑ ÐµÑÑÑ ÑÑдовиÑнаÑ
+лазейка — Ñ Ð½Ð¸Ñ
еÑÑÑ ÑÑеÑÐ½Ð°Ñ Ð·Ð°Ð¿Ð¸ÑÑ Ñ
неизменÑемÑм паÑолем, и <a
+href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">
+ÑÑи ÑÑеÑнÑе запиÑи к ÑÐ¾Ð¼Ñ Ð¶Ðµ невозможно
ÑдалиÑÑ</a>.</p>
+ </li>
+
+ <li id="M201604250">
+ <p>ÐÑиложение конÑÑоллеÑа ÑеÑÑа на
беÑеменноÑÑÑ Ð¼Ð¾Ð¶ÐµÑ Ð½Ðµ ÑолÑко <a
+href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">ÑпиониÑÑ
+за вÑевозможнÑми даннÑми в ÑелеÑоне и в
ÑÑеÑнÑÑ
запиÑÑÑ
ÑеÑвеÑа, оно Ð¼Ð¾Ð¶ÐµÑ Ð¸
+подменÑÑÑ Ð¸Ñ
</a>.</p>
+ </li>
+
+ <li id="M201601130">
+ <p>Такие пÑиложениÑ, как <a
+href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+пÑогÑамма Ñлежки Symphony, подÑлÑÑиваÑÑ, какие
Ñадио- и ÑелепеÑедаÑи
+пÑоигÑÑваÑÑÑÑ Ð¿Ð¾Ð±Ð»Ð¸Ð·Ð¾ÑÑи</a>. Ð Ñакже
подÑмаÑÑиваÑÑ, ÑÑо полÑзоваÑели пиÑÑÑ
+на ÑакиÑ
ÑайÑаÑ
как Facebook, Google+ и Twitter.</p>
+ </li>
+
+ <li id="M201511190">
+ <p>“СкÑÑÑнÑе ÑообÑениє, не
ÑвÑзаннÑе Ñ ÑÑнкÑионалÑноÑÑÑÑ
+пÑиложениÑ, <a
+href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+Ð½Ð°Ð¹Ð´ÐµÐ½Ñ Ð² 500 ÑамÑÑ
попÑлÑÑнÑÑ
беÑплаÑнÑÑ
пÑиложениÑÑ
Android</a>.</p>
+
+ <p>Ð ÑÑаÑÑе не Ñледовало опиÑÑваÑÑ ÑÑи
пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ ÐºÐ°Ðº “<span lang="en"
+xml:lang="en">free</span>) (ÑвободнÑе)”, они не
ÑвободнÑ. ЯÑное Ñлово
+Ð´Ð»Ñ Ð²ÑÑÐ°Ð¶ÐµÐ½Ð¸Ñ Ð½Ñлевой ÑÐµÐ½Ñ —
“беÑплаÑнÑй”.</p>
+
+ <p>Ð ÑÑаÑÑе пÑинимаеÑÑÑ ÐºÐ°Ðº Ñамо Ñобой
ÑазÑмеÑÑееÑÑ, ÑÑо обÑÑнÑй аналиÑиÑеÑкий
+инÑÑÑÑменÑаÑий пÑавомеÑен, но веÑно ли
ÑÑо? У ÑазÑабоÑÑиков пÑогÑамм неÑ
+пÑава анализиÑоваÑÑ, ÑÑо и как делаÑÑ
+полÑзоваÑели. “ÐналиÑиÑеÑкие”
инÑÑÑÑменÑÑ, коÑоÑÑе подглÑдÑваÑÑ,
+ниÑем не лÑÑÑе лÑбого дÑÑгого
подглÑдÑваниÑ.</p>
+ </li>
+
+ <li id="M201510300">
+ <p>Ðолее 73% и 47% ÑамÑÑ
попÑлÑÑнÑÑ
пÑиложений Android и iOS ÑооÑвеÑÑÑвенно <a
+href="https://techscience.org/a/2015103001/"> пÑедоÑÑавлÑÑÑ
лиÑнÑÑ,
+поведенÑеÑкÑÑ Ð¸ меÑÑоопÑеделиÑелÑнÑÑ
инÑоÑмаÑиÑ</a> ÑвоиÑ
полÑзоваÑелей
+ÑÑеÑÑим ÑÑоÑонам.</p>
+ </li>
+
+ <li id="M201508210">
+ <p>Ðак болÑÑинÑÑво медвежÑиÑ
ÑÑлÑг по
“мÑзÑкалÑÐ½Ð¾Ð¼Ñ Ð¿Ð¾ÑоковомÑ
веÑаниє, Spotify оÑнован на неÑвободнÑÑ
вÑедоноÑнÑÑ
пÑогÑаммаÑ
(Ñ
ÑиÑÑовÑм ÑпÑавлением огÑаниÑениÑми и
подглÑдванием). РавгÑÑÑе
2015 года он <a
@@ -932,7 +1074,7 @@
некоÑоÑÑе наÑинаÑÑ Ð¾ÑознаваÑÑ, ÑÑо ÑÑо
ÑквеÑно.</p>
<p>СледÑÑÑÐ°Ñ ÑÑаÑÑÑ Ð´Ð°ÐµÑ Ð¾Ð±ÑазÑик <a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
извÑаÑÐµÐ½Ð¸Ñ ÑакÑов, коÑоÑÑми они
пÑедÑÑавлÑÑÑ ÑÐ»ÐµÐ¶ÐºÑ ÐºÐ°Ðº ÑпоÑоб лÑÑÑе
“обÑлÑживаÑÑ”
полÑзоваÑелей</a> — незавиÑимо Ð¾Ñ Ñого,
Ñ
оÑÑÑ Ð»Ð¸ Ñе ÑÑого. ÐÑо ÑипиÑнÑй пÑимеÑ
оÑноÑÐµÐ½Ð¸Ñ Ð¸Ð½Ð´ÑÑÑÑии неÑвободнÑÑ
@@ -940,20 +1082,32 @@
<p>ÐÑоÑÑ, пÑоÑÑ, пÑоклÑÑÑй Spotify!</p>
</li>
- <li><p>Ðногие неÑвободнÑе пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð´Ð»Ñ
мобилÑнÑÑ
ÑÑÑÑойÑÑв оÑÑÑлаÑÑ Ð¾ÑÑеÑÑ Ð¾ Ñом,
-какие пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ ÑÑÑановил полÑзоваÑелÑ. <a
-href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter Ñ
оÑÑ
бÑ
-Ð´ÐµÐ»Ð°ÐµÑ ÑÑо Ñак, ÑÑо ÑÑо видно и ÑÑо можно
оÑклÑÑиÑÑ</a>. Ðе Ñак плоÑ
о, как
-Ñо, ÑÑо делаÑÑ Ð´ÑÑгие.</p>
+
+ <li id="M201506264">
+ <p><a
+href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">ÐÑÑледование
+2015 года</a> показало, ÑÑо 90% ÑамÑÑ
попÑлÑÑнÑÑ
беÑплаÑнÑÑ
неÑвободнÑÑ
+пÑиложений под Android ÑодеÑжало библиоÑеки,
коÑоÑÑе можно ÑÑиÑаÑÑ
+библиоÑеками Ñлежки. ÐÐ»Ñ Ð¿Ð»Ð°ÑнÑÑ
неÑовбоднÑÑ
пÑиложений ÑÑа велиÑина
+ÑоÑÑавлÑла ÑолÑко 60%.</p>
+
+ <p>СÑаÑÑÑ Ð²Ð½Ð¾ÑÐ¸Ñ Ð¿ÑÑаниÑÑ, опиÑÑваÑ
беÑплаÑнÑе пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ ÐºÐ°Ðº
+“ÑвободнÑе”, но болÑÑинÑÑво из ниÑ
на
Ñамом-Ñо деле не ÑвлÑÑÑÑÑ
+<a href="/philosophy/free-sw.html">ÑвободнÑми
пÑогÑаммами</a>. Ð ÑÑаÑÑе
+Ñакже ÑпоÑÑеблÑеÑÑÑ Ð±ÐµÐ·Ð¾Ð±Ñазное Ñлово
“монеÑизиÑоваÑÑ”. ÐÐ»Ñ ÑÑой
+ÑиÑÑаÑии Ñ
оÑоÑо подÑ
Ð¾Ð´Ð¸Ñ Ñлово
“ÑкÑплÑаÑиÑоваÑÑ”; поÑÑи вÑегда
+оно в ÑоÑноÑÑи оÑÑÐ°Ð¶Ð°ÐµÑ ÑмÑÑл.</p>
</li>
- <li><p>Ðо Ñловам ФедеÑалÑной комиÑÑии по
ÑоÑговле, болÑÑинÑÑво мобилÑнÑÑ
пÑиложений
-Ð´Ð»Ñ Ð´ÐµÑей не ÑоблÑдаеÑ
конÑиденÑиалÑноÑÑи: <a
-href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
+ <li id="M201505060">
+ <p>ÐеÑплаÑнÑе (но не <a
+href="/philosophy/free-sw.html">ÑвободнÑе</a>)пÑиложениÑ
Android <a
+href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">подклÑÑаÑÑÑÑ
+к 100 URL Ñлежки и ÑекламÑ</a> (в ÑÑеднем).</p>
</li>
- <li><p>ÐопÑлÑÑнÑй <a
+ <li id="M201504060">
+ <p>ÐопÑлÑÑнÑй <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">
неÑвободнÑй ÑÐºÐ°Ð½ÐµÑ Ð¼Ð°ÑÑиÑного кода
подÑмаÑÑÐ¸Ð²Ð°ÐµÑ Ð·Ð° полÑзоваÑелем</a>. ÐÑо в
дополнение к Ñлежке, коÑоÑÑÑ Ð²ÐµÐ´ÐµÑ
ÑелеÑÐ¾Ð½Ð½Ð°Ñ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ, а Ð¼Ð¾Ð¶ÐµÑ Ð±ÑÑÑ, и
@@ -963,7 +1117,30 @@
полÑзоваÑелÑ. ÐÑо не извинÑÐµÑ Ð²ÑедоноÑнÑÑ
пÑогÑаммÑ.</p>
</li>
- <li><p>Brightest Flashlight, пÑогÑамма Ð´Ð»Ñ Android, <a
+ <li id="M201411260">
+ <p>Ðногие неÑвободнÑе пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð´Ð»Ñ
мобилÑнÑÑ
ÑÑÑÑойÑÑв оÑÑÑлаÑÑ Ð¾ÑÑеÑÑ Ð¾ Ñом,
+какие пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ ÑÑÑановил полÑзоваÑелÑ. <a
+href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter Ñ
оÑÑ
бÑ
+Ð´ÐµÐ»Ð°ÐµÑ ÑÑо Ñак, ÑÑо ÑÑо видно и ÑÑо можно
оÑклÑÑиÑÑ</a>. Ðе Ñак плоÑ
о, как
+Ñо, ÑÑо делаÑÑ Ð´ÑÑгие.</p>
+ </li>
+
+ <li id="M201401151">
+ <p>ÐлавиаÑÑÑа Simeji — ÑмаÑÑÑоннаÑ
веÑÑÐ¸Ñ <a
+href="/proprietary/#baidu-ime">ÑпионÑÑего меÑода
ввода</a> Baidu.</p>
+ </li>
+
+ <li id="M201312270">
+ <p>ÐÑновное назнаÑение неÑвободной
пÑогÑÐ°Ð¼Ð¼Ñ Snapchat — огÑаниÑиваÑÑ
+иÑполÑзование даннÑÑ
на компÑÑÑеÑе
полÑзоваÑелÑ, но она пÑÐ¾Ð²Ð¾Ð´Ð¸Ñ Ð¸ ÑлежкÑ:
+<a
+href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+она пÑÑаеÑÑÑ Ð¿Ð¾Ð»ÑÑиÑÑ ÑпиÑок номеÑов
ÑелеÑонов лÑдей из адÑеÑной книжки
+полÑзоваÑелÑ</a>.</p>
+ </li>
+
+ <li id="M201312060">
+ <p>Brightest Flashlight, пÑогÑамма Ð´Ð»Ñ Android, <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
вÑÑÑÐ»Ð°ÐµÑ Ð´Ð°Ð½Ð½Ñе полÑзоваÑелÑ, в Ñом ÑиÑле
меÑÑоположение, Ð´Ð»Ñ Ð¸ÑполÑзованиÑ
компаниÑми</a>.</p>
@@ -975,314 +1152,445 @@
как “ÑеÑениє пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ñлежки: заÑем
пÑогÑамме-ÑонаÑÐ¸ÐºÑ Ð¾ÑÑÑлаÑÑ
комÑ-Ñо какие-Ñо ÑведениÑ? СвободнаÑ
пÑогÑамма-ÑонаÑик ÑÑого Ð±Ñ Ð½Ðµ делала.</p>
</li>
+
+ <li id="M201212100">
+ <p>Ðо Ñловам ФедеÑалÑной комиÑÑии по
ÑоÑговле, болÑÑинÑÑво мобилÑнÑÑ
пÑиложений
+Ð´Ð»Ñ Ð´ÐµÑей не ÑоблÑдаеÑ
конÑиденÑиалÑноÑÑи: <a
+href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
+ </li>
</ul>
+
<div class="big-subsection">
- <h4 id="SpywareInToys">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð² игÑÑÑкаÑ
</h4>
+ <h4 id="SpywareInSkype">Skype</h4>
<span class="anchor-reference-id">(<a
-href="#SpywareInToys">#SpywareInToys</a>)</span>
+href="#SpywareInSkype">#SpywareInSkype</a>)</span>
</div>
-<ul>
+<ul class="blurbs">
+ <li id="M201307110">
+ <p><a
+href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">Skype
+ÑодеÑÐ¶Ð¸Ñ Ð¿ÑогÑаммÑ-ÑпионÑ</a>. Ð Microsoft
изменили Skype <a
+href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ÑпеÑиалÑно Ð´Ð»Ñ Ñого, ÑÑÐ¾Ð±Ñ ÑпиониÑÑ</a>.</p>
+ </li>
+</ul>
- <li>
- <p>ÐÑÑÑнилоÑÑ, ÑÑо игÑÑÑка Ð´Ð»Ñ Ð²Ð·ÑоÑлÑÑ
Ñ
диÑÑанÑионнÑм ÑпÑавлением пÑÐ¾Ð²Ð¾Ð´Ð¸Ñ <a
-href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">звÑкозапиÑÑ
-ÑазговоÑа Ð¼ÐµÐ¶Ð´Ñ Ð´Ð²ÑÐ¼Ñ Ð¿Ð¾Ð»ÑзоваÑелÑми</a>.</p>
+
+<div class="big-subsection">
+ <h4 id="SpywareInGames">ÐгÑÑ</h4>
+ <span class="anchor-reference-id">(<a
+href="#SpywareInGames">#SpywareInGames</a>)</span>
+</div>
+
+<ul class="blurbs">
+ <li id="M201806240">
+ <p>Red Shell — пÑогÑамма-Ñпион,
Ð·Ð°Ð»Ð¾Ð¶ÐµÐ½Ð½Ð°Ñ Ð²Ð¾ многиÑ
неÑвободнÑÑ
+игÑаÑ
. Ðна <a
+href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
+оÑÑÐ»ÐµÐ¶Ð¸Ð²Ð°ÐµÑ Ð´Ð°Ð½Ð½Ñе на компÑÑÑеÑаÑ
полÑзоваÑелей и оÑÑÑÐ»Ð°ÐµÑ Ð¸Ñ
ÑÑеÑÑим
+ÑÑоÑонам</a>.</p>
</li>
- <li>
- <p>“УмнÑе” игÑÑÑки “Ðой дÑÑг
Ðейла” и i-Que <a
-href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">пеÑедаÑÑ
-ÑазговоÑÑ Ð´ÐµÑей в Nuance Communications</a>, компании
ÑÐ°Ð·Ð¿Ð¾Ð·Ð½Ð°Ð²Ð°Ð½Ð¸Ñ ÑеÑи,
-ÑаÑположенной в СШÐ.</p>
+ <li id="M201804144">
+ <p>ArenaNet Ñайком ÑÑÑанавливала ÑпионÑкÑÑ
пÑогÑÐ°Ð¼Ð¼Ñ Ð²Ð¼ÐµÑÑе Ñ Ð¾Ð±Ð½Ð¾Ð²Ð»ÐµÐ½Ð¸ÐµÐ¼ длÑ
+игÑÑ Ñ Ð±Ð¾Ð»ÑÑим колиÑеÑÑвом игÑоков Guild
War 2. ÐÑа ÑпионÑÐºÐ°Ñ Ð¿ÑогÑамма
+позволÑла Arpanet <a
+href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave">
+подглÑдÑваÑÑ Ð·Ð° вÑеми оÑкÑÑÑÑми
пÑоÑеÑÑами, ÑабоÑаÑÑими на компÑÑÑеÑе
+полÑзоваÑелÑ</a>.</p>
+ </li>
- <p>Ð ÑÑиÑ
игÑÑÑкаÑ
еÑÑÑ Ñакже ÑеÑÑезнÑе
бÑеÑи в безопаÑноÑÑи; взломÑики могÑÑ
-конÑÑолиÑоваÑÑ Ð¸Ñ
на ÑаÑÑÑоÑнии Ñ
ÑоÑового ÑелеÑона. ÐÑо позволÑÐµÑ Ð¸Ð¼
-пÑоÑлÑÑиваÑÑ ÑеÑÑ Ñебенка и даже говоÑиÑÑ
голоÑом ÑамиÑ
игÑÑÑек.</p>
+ <li id="M201711070">
+ <p>ÐÑÐ°Ð¹Ð²ÐµÑ Ð¾Ð¿Ñеделенной игÑовой
клавиаÑÑÑÑ <a
+href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">оÑÑÑлаеÑ
+ÑÐ²ÐµÐ´ÐµÐ½Ð¸Ñ Ð² ÐиÑай</a>.</p>
</li>
- <li>
- <p><a
-href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">ÐомпÑÑÑеÑизованнÑй
-вибÑаÑÐ¾Ñ Ð¿Ð¾Ð´Ð³Ð»ÑдÑвал за полÑзоваÑелÑми</a>
поÑÑедÑÑвом неÑвободного
-ÑпÑавлÑÑÑего пÑиложениÑ.</p>
+ <li id="M201611070">
+ <p>ÐеÑÐ²Ð¾Ð±Ð¾Ð´Ð½Ð°Ñ Ð¿ÑогÑамма nVidia GeForce Experience <a
+href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">
+заÑÑавлÑÐµÑ Ð¿Ð¾Ð»ÑзоваÑелей ÑказÑваÑÑ ÑебÑ,
а заÑем вÑÑÑÐ»Ð°ÐµÑ Ð¸Ñ
пеÑÑоналÑнÑе
+даннÑе на ÑеÑвеÑÑ nVidia</a>.</p>
+ </li>
- <p>ÐÑиложение поминÑÑно ÑообÑало
ÑемпеÑаÑÑÑÑ Ð²Ð¸Ð±ÑаÑоÑа (Ñаким обÑазом,
коÑвенно
-докладÑвал о Ñом, окÑÑжен ли вибÑаÑоÑ
ÑеловеÑеÑким Ñелом) и ÑаÑÑоÑÑ
-вибÑаÑий.</p>
+ <li id="M201512290">
+ <p>Ðногие <a
+href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
+игÑовÑе видеопÑиÑÑавки подглÑдÑваÑÑ Ð·Ð°
Ñвоими полÑзоваÑелÑми, поÑÑÐ»Ð°Ñ Ð¾ÑÑеÑÑ
+в ÐнÑеÑнеÑ</a> — даже о Ñом, ÑколÑко иÑ
полÑзоваÑели веÑÑÑ.</p>
- <p>ÐбÑаÑиÑе внимание на Ñо, наÑколÑко
неадекваÑное пÑедлагаеÑÑÑ ÑеÑение:
-ÑÑандаÑÑ Ð¼Ð°ÑкиÑовки, Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ ÐºÐ¾ÑоÑой
изгоÑовиÑели делали Ð±Ñ ÑÐ²ÐµÐ´Ð¾Ð¼Ð»ÐµÐ½Ð¸Ñ Ð¾
-ÑвоиÑ
пÑодÑкÑаÑ
— вмеÑÑо ÑвободнÑÑ
пÑогÑамм, коÑоÑÑе могли бÑ
-пÑовеÑÑÑÑÑÑ Ð¸ модиÑиÑиÑоваÑÑÑÑ
полÑзоваÑелÑми.</p>
+ <p>ÐгÑÐ¾Ð²Ð°Ñ Ð¿ÑиÑÑавка — ÑÑо
компÑÑÑеÑ, а компÑÑÑеÑÑ Ñ Ð½ÐµÑвободной
+опеÑаÑионной ÑиÑÑемой довеÑÑÑÑ Ð½ÐµÐ»ÑзÑ.</p>
+ </li>
- <p>Ðа компаниÑ-пÑоизводиÑÐµÐ»Ñ Ð²Ð¸Ð±ÑаÑоÑов <a
-href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">подали
-в ÑÑд за ÑÐ±Ð¾Ñ Ð¼Ð°ÑÑÑ Ð¿ÐµÑÑоналÑнÑÑ
даннÑÑ
о
Ñом, как полÑзоваÑели пÑименÑÑÑ Ð¸Ñ
-изделиÑ</a>.</p>
+ <li id="M201509160">
+ <p>СовÑеменнÑе беÑплаÑнÑе игÑÑ <a
+href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
+ÑобиÑаÑÑ ÑиÑокий ÑпекÑÑ Ð´Ð°Ð½Ð½ÑÑ
о ÑвоиÑ
полÑзоваÑелÑÑ
, а Ñакже иÑ
дÑÑзÑÑÑ
и
+знакомÑÑ
</a>.</p>
- <p>Ðозможно, даннÑе дейÑÑвиÑелÑно
анонимизиÑовалиÑÑ, как заÑвлÑла компаниÑ,
но
-дело не в ÑÑом. ÐÑли она пÑодавала даннÑе
бÑокеÑÑ, Ñо бÑÐ¾ÐºÐµÑ Ð¼Ð¾Ð³ вÑÑиÑлÑÑÑ,
-ÑÑи именно ÑÑо даннÑе.</p>
+ <p>Ð¥Ñже Ñого — они делаÑÑ ÑÑо по
ÑекламнÑм ÑеÑÑм, коÑоÑÑе обÑединÑÑÑ
+даннÑе, ÑобÑаннÑе ÑазлиÑнÑми пÑогÑаммами
и ÑайÑами Ñакого Ñода, ÑделаннÑми
+ÑазнÑми компаниÑми.</p>
- <p>Ðо ÑеÑÐµÐ½Ð¸Ñ ÑÑда ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ <a
-href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
-вÑплаÑила в обÑей ÑложноÑÑи 4 миллиона
доллаÑов пени</a> Ñвоим клиенÑам.</p>
+ <p>Ðни пÑименÑÑÑ ÑÑи даннÑе, ÑÑобÑ
навÑзÑваÑÑ Ð»ÑдÑм покÑпки; они оÑ
оÑÑÑÑÑ Ð½Ð°
+“киÑов”, коÑоÑÑÑ
можно заÑÑавиÑÑ
ÑÑаÑиÑÑ Ð¼Ð½Ð¾Ð³Ð¾ денег. Ðни
+полÑзÑÑÑÑÑ Ñакже ÑеÑнÑм Ñ
одом, ÑÑобÑ
подÑаÑовÑваÑÑ Ð¸Ð³ÑÑ Ð² полÑÐ·Ñ ÐºÐ¾Ð½ÐºÑеÑнÑÑ
+игÑоков.</p>
+
+ <p>ХоÑÑ ÑÑаÑÑÑ Ð¾Ð¿Ð¸ÑÑÐ²Ð°ÐµÑ Ð±ÐµÑплаÑнÑе игÑÑ,
ÑÐ°ÐºÐ°Ñ Ð¶Ðµ ÑакÑика Ð¼Ð¾Ð¶ÐµÑ Ð¿ÑименÑÑÑÑÑ Ð¸
+в плаÑнÑÑ
игÑаÑ
.</p>
</li>
- <li><p> ÐгÑÑÑки Ñ Ð¼Ð¸ÐºÑоÑонами “CloudPets” <a
-href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
-ÑаÑкÑÑваÑÑ ÑазговоÑÑ Ð´ÐµÑей
изгоÑовиÑелÑ</a>. РзнаеÑе ÑÑо? <a
-href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">ÐзломÑики
-наÑли ÑпоÑоб полÑÑаÑÑ Ð´Ð°Ð½Ð½Ñе</a>,
ÑобиÑаемÑе пÑи подÑлÑÑивании
-изгоÑовиÑелем.</p>
+ <li id="M201401280">
+ <p>Angry Birds <a
+href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ÑÐ¿Ð¸Ð¾Ð½Ð¸Ñ Ð² полÑÐ·Ñ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ð¹, и ÐÐÐ Ñоже
полÑзÑеÑÑÑ ÑÑой возможноÑÑÑÑ
+поÑпиониÑÑ</a>. Рблоге ÐжейÑона Ðонга
опиÑÐ°Ð½Ñ <a
+href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+дÑÑгие пÑогÑаммÑ-ÑпионÑ</a>.</p>
- <p>ÐедопÑÑÑимо Ñже Ñо, ÑÑо изгоÑовиÑÐµÐ»Ñ Ð¸
ФÐРмогли пÑоÑлÑÑиваÑÑ ÑÑи ÑазговоÑÑ.</p></li>
+ <p><a
+href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
+ÐодÑобнее о Ñпионаже ÐÐРпоÑÑедÑÑвом
пÑогÑамм</a>.</p>
+ </li>
- <li><p>ÐаÑби <a
-href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">ÑобиÑаеÑÑÑ
-ÑпиониÑÑ Ð·Ð° деÑÑми и взÑоÑлÑми</a>.</p>
+ <li id="M200510200">
+ <p>Blizzard Warden — ÑкÑÑÑÐ°Ñ Ð¿ÑогÑамма
“пÑедоÑвÑаÑениÑ
+обмана”, коÑоÑÐ°Ñ <a
+href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
+ÑÐ¿Ð¸Ð¾Ð½Ð¸Ñ Ð·Ð° каждÑм пÑоÑеÑÑом, ÑабоÑаÑÑем на
компÑÑÑеÑе игÑока, и вÑдаеÑ
+изÑÑдное колиÑеÑÑво лиÑнÑÑ
даннÑÑ
</a>,
вклÑÑÐ°Ñ Ð¼Ð°ÑÑÑ Ð´ÐµÐ¹ÑÑвий, никак не
+ÑвÑзаннÑÑ
Ñ Ð¾Ð±Ð¼Ð°Ð½Ð¾Ð¼.</p>
</li>
</ul>
-<!-- #SpywareOnWearables -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
+
+
<div class="big-section">
- <h3 id="SpywareOnWearables">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð½Ð° лÑдÑÑ
</h3>
+ <h3 id="SpywareInEquipment">СеÑевое обоÑÑдование</h3>
<span class="anchor-reference-id">(<a
-href="#SpywareOnWearables">#SpywareOnWearables</a>)</span>
+href="#SpywareInEquipment">#SpywareInEquipment</a>)</span>
</div>
<div style="clear: left;"></div>
-<ul>
- <li><p>Ðдежда Томми ÐилÑингеÑа <a
-href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">оÑÑлеживаеÑ,
-как ÑаÑÑо лÑди ее надеваÑÑ</a>.</p>
+<ul class="blurbs">
+ <li id="M201708280">
+ <p>ÐÑвÑаÑиÑелÑÐ½Ð°Ñ Ð±ÐµÐ·Ð¾Ð¿Ð°ÑноÑÑÑ Ð²Ð¾ многиÑ
ÑÑÑÑойÑÑваÑ
ÐнÑеÑнеÑа клеÑей позволÑеÑ
+<a
+href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">опеÑаÑоÑам
+ÑвÑзи подглÑдÑваÑÑ Ð·Ð° лÑдÑми, коÑоÑÑе ими
полÑзÑÑÑÑÑ</a>.</p>
- <p>ÐÑо пÑиÑÑÐ°ÐµÑ Ð¿Ð°ÑÑÐ²Ñ Ðº ÑомÑ, ÑÑо
компании оÑÑлеживаÑÑ ÐºÐ°Ð¶Ð´Ñй аÑÐ¿ÐµÐºÑ Ñого,
ÑÑо
-она делаеÑ.</p>
+ <p>Ðе подвеÑгайÑеÑÑ Ñлежке —
плаÑиÑе налиÑнÑми!</p>
+
+ <p>ÐÑÐµÐ½Ñ Ð¶Ð°Ð»Ñ, ÑÑо в ÑÑаÑÑе ÑпоÑÑеблÑеÑÑÑ
Ñлово <a
+href="/philosophy/words-to-avoid.html#Monetize">
+“монеÑизиÑоваÑÑ”</a>.</p>
</li>
</ul>
+
<div class="big-subsection">
- <h3 id="SpywareOnSmartWatches">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð²
“инÑеллекÑÑалÑнÑÑ
” ÑаÑаÑ
</h3>
- <span class="anchor-reference-id"> (<a
-href="#SpywareOnSmartWatches">#SpywareOnSmartWatches</a>)</span>
+ <h4 id="SpywareInTVSets">ТелевизоÑÑ</h4>
+ <span class="anchor-reference-id">(<a
+href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
</div>
-<ul>
- <li>
- <p>“ÐнÑеллекÑÑалÑнÑе” ÑаÑÑ LG
ÑпÑоекÑиÑованÑ, <a
-href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
-ÑÑÐ¾Ð±Ñ Ð´Ð¾ÐºÐ»Ð°Ð´ÑваÑÑ Ð¾ Ñвоем меÑÑоположении
комÑ-Ñо дÑÑгомÑ, а Ñакже пеÑедаваÑÑ
-и ÑазговоÑÑ</a>.</p>
+<p>Ðмо Ð¤Ð¸Ð»Ð¸Ð¿Ñ Ð¿Ð¾ÑÑÑил: “Ðа дÑÑгой Ð´ÐµÐ½Ñ ÐºÐ¾
мне подоÑла женÑина и ÑпÑоÑила:
+‘Я не видела Ð²Ð°Ñ Ð¿Ð¾ ÑелевизоÑÑ?’ Я
оÑвеÑил: ‘Ðе знаÑ. С
+Ñой ÑÑоÑÐ¾Ð½Ñ Ð½Ðµ видно’”. ÐÑевидно, ÑÑо
бÑло до
+“ÑмнÑÑ
” ÑелевизоÑов Amazon.</p>
+
+<ul class="blurbs">
+ <li id="M201804010">
+ <p>ÐекоÑоÑÑе “инÑеллекÑÑалÑнÑе”
ÑелевизоÑÑ Ð°Ð²ÑомаÑиÑеÑки <a
+href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">загÑÑжаÑÑ
+ÑÑÑаÑение, коÑоÑое ÑÑÑанавливаеÑ
пÑиложение Ñлежки</a>.</p>
+
+ <p>ÐÑ ÑÑÑлаемÑÑ Ð½Ð° ÑÑаÑÑÑ Ð² подÑвеÑждение
ÑакÑов, коÑоÑÑе в ней пÑедÑÑавленÑ. Ð
+ÑожалениÑ, она заканÑиваеÑÑÑ ÑлабоÑ
аÑакÑеÑной ÑекомендаÑией ÑÑÑÑпиÑÑ
+Netflix. ÐÑиложение <a
+href="/proprietary/malware-google.html#netflix-app-geolocation-drm">Netflix
+Ñоже вÑедоноÑно</a>.</p>
</li>
- <li>
- <p>ÐÑÐµÐ½Ñ Ð´ÐµÑевÑе “инÑеллекÑÑалÑнÑе
ÑаÑÑ” вÑ
одÑÑ Ð² ÑоÑÑав пÑиложениÑ
-Android, коÑоÑое <a
-href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">подклÑÑаеÑÑÑ
-к Ð½ÐµÐ¾Ð¿Ð¾Ð·Ð½Ð°Ð½Ð½Ð¾Ð¼Ñ ÑайÑÑ Ð² ÐиÑае</a>.</p>
- <p>Ð ÑÑаÑÑе говоÑиÑÑÑ, ÑÑо ÑÑо лазейка, но
Ð¼Ð¾Ð¶ÐµÑ Ð±ÑÑÑ, ÑÑо оÑибка. Ðднако ÑÑо
-как минимÑм Ñлежка.</p>
+
+ <li id="M201702060">
+ <p>“ÐнÑеллекÑÑалÑнÑе” <a
+href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">ÑелевизоÑÑ
+Visio докладÑваÑÑ Ð¾Ð±Ð¾ вÑем, ÑÑо на ниÑ
пÑоÑмаÑÑиваеÑÑÑ, а не ÑолÑко о Ñом,
+ÑÑо доÑÑавлено по ÑÑиÑÑ Ð¸Ð»Ð¸ по кабелÑ</a>.
Ðаже еÑли изобÑажение поÑÑÑпило
+из ÑобÑÑвенного компÑÑÑеÑа полÑзоваÑелÑ,
ÑÐµÐ»ÐµÐ²Ð¸Ð·Ð¾Ñ Ð¾ нем
+докладÑваеÑ. СÑÑеÑÑвование ÑпоÑоба
оÑклÑÑиÑÑ ÑлежкÑ, даже еÑли Ð±Ñ Ð¾Ð½ не бÑл
+ÑкÑÑÑ, как в ÑÑиÑ
ÑелевизоÑаÑ
, не можеÑ
опÑавдÑваÑÑ ÑÑÑ ÑлежкÑ.</p>
</li>
-</ul>
-<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
-<div class="big-section">
- <h3 id="SpywareAtLowLevel">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð½Ð¸Ð·ÐºÐ¾Ð³Ð¾
ÑÑовнÑ</h3>
- <span class="anchor-reference-id">(<a
-href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
-</div>
-<div style="clear: left;"></div>
+ <li id="M201511130">
+ <p>ÐекоÑоÑÑе ÑекламнÑе обÑÑÐ²Ð»ÐµÐ½Ð¸Ñ Ð²
ÐнÑеÑнеÑе и на Ñелевидении пеÑедаÑÑ
+неÑлÑÑнÑе звÑки Ð´Ð»Ñ Ð¿Ñиема неÑвободнÑми
вÑедоноÑнÑми пÑогÑаммами,
+ÑабоÑаÑÑими ÑÑдом на дÑÑгиÑ
ÑÑÑÑойÑÑваÑ
,
ÑÑÐ¾Ð±Ñ Ð¾Ð¿ÑеделÑÑÑ, ÑÑо они
+неподалекÑ. Ðогда подклÑÑеннÑе к
ÐнÑеÑнеÑÑ ÑÑÑÑойÑÑва ÑвÑÐ·Ð°Ð½Ñ Ñ
ÑелевизоÑом,
+ÑекламодаÑели могÑÑ ÑÑаÑиÑÑиÑеÑки
оÑениваÑÑ ÑвÑÐ·Ñ ÑÐµÐºÐ»Ð°Ð¼Ñ Ñ Ð°ÐºÑивноÑÑÑÑ Ð²
+ÐнÑеÑнеÑе, а Ñакже пÑоводиÑÑ Ð´ÑÑгÑÑ <a
+href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">ÑлежкÑ
+на ÑвÑзаннÑÑ
ÑÑÑÑойÑÑваÑ
</a>.</p>
+ </li>
+ <li id="M201511060">
+ <p>Vizio Ð¸Ð´ÐµÑ Ð½Ð° Ñаг далÑÑе дÑÑгиÑ
пÑоизводиÑелей ÑелевизоÑов, ÑÐ¿Ð¸Ð¾Ð½Ñ Ð·Ð°
Ñвоими
+полÑзоваÑелÑми: иÑ
<a
+href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+“инÑеллекÑÑалÑнÑе” ÑелевизоÑÑ
подÑобно анализиÑÑÑÑ Ð²Ð°Ñи пÑивÑÑки
+пÑоÑмоÑÑа и ÑвÑзÑваÑÑ Ð¸Ñ
Ñ Ð²Ð°Ñим адÑеÑом
IP</a>, ÑÑÐ¾Ð±Ñ ÑекламодаÑели могли
+оÑÑлеживаÑÑ Ð²Ð°Ñ Ð½Ð° ÑазлиÑнÑÑ
ÑÑÑÑойÑÑваÑ
.</p>
-<div class="big-subsection">
- <h4 id="SpywareInBIOS">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð² BIOS</h4>
- <span class="anchor-reference-id">(<a
-href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
-</div>
+ <p>ÐÑо можно вÑклÑÑиÑÑ, но неÑпÑаведливо
Ñже Ñо, ÑÑо по ÑмолÑÐ°Ð½Ð¸Ñ ÑÑо вклÑÑено.</p>
+ </li>
-<ul>
-<li><p>
-<a
-href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo ÑкÑÑÑно ÑÑÑанавливала
пÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð¸ дÑÑгой мÑÑÐ¾Ñ ÑеÑез BIOS</a>
-повеÑÑ
Windows. ÐбÑаÑиÑе внимание, ÑÑо ÑÑоÑ
конкÑеÑнÑй меÑод ÑабоÑажа,
-пÑимененнÑй Lenovo, не коÑнÑлÑÑ GNU/Linux; кÑоме
Ñого, “ÑиÑÑає
-ÑÑÑановка Windows на Ñамом деле не ÑиÑÑа,
поÑколÑÐºÑ <a
-href="/proprietary/malware-microsoft.html">Microsoft закладÑваеÑ
Ñвои
-ÑобÑÑвеннÑе вÑедоноÑнÑе пÑогÑаммÑ</a>.
-</p></li>
-</ul>
+ <li id="M201511020">
+ <p>ÐÐ¾Ð³Ð¾Ð²Ð¾Ñ Tivo Ñ Viacom добавлÑÐµÑ 2,3 миллиона
кваÑÑÐ¸Ñ Ðº 600 миллионам
+пÑоÑилей ÑоÑиалÑнÑÑ
ÑеÑей, за коÑоÑÑми ÑÑа
ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Ñже наблÑдаеÑ. ÐлиенÑÑ
+Tivo не знаÑÑ, ÑÑо на ниÑ
ÑмоÑÑÑÑ
ÑекламодаÑели. ÐомбиниÑÑÑ Ð¸Ð½ÑоÑмаÑÐ¸Ñ Ð¾
+пÑоÑмоÑÑе ÑелепеÑÐµÐ´Ð°Ñ Ñ ÑÑаÑÑием в
ÑоÑиалÑнÑÑ
ÑеÑÑÑ
, Tivo Ð¼Ð¾Ð¶ÐµÑ ÑепеÑÑ <a
+href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">ÑвÑзÑваÑÑ
+ÑелеÑÐµÐºÐ»Ð°Ð¼Ñ Ñ Ð¿Ð¾ÐºÑпками, ÑовеÑÑаемÑми по
ÑеÑи</a>, подÑÑавлÑÑ Ð¿Ð¾ ÑмолÑаниÑ
+вÑеÑ
полÑзоваÑелей под новÑй
комбиниÑованнÑй вид Ñлежки.</p>
+ </li>
-<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
-<div class="big-section">
- <h3 id="SpywareAtWork">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð½Ð° ÑабоÑе</h3>
- <span class="anchor-reference-id">(<a
-href="#SpywareAtWork">#SpywareAtWork</a>)</span>
-</div>
-<div style="clear: left;"></div>
+ <li id="M201507240">
+ <p>“УмнÑе” ÑелевизоÑÑ Vizio
ÑаÑпознаÑÑ Ð¸ <a
+href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">оÑÑлеживаÑÑ
+Ñо, ÑÑо ÑмоÑÑÑÑ Ð»Ñди</a>, даже еÑли ÑÑо не
ÑÐµÐ»ÐµÐ²Ð¸Ð·Ð¸Ð¾Ð½Ð½Ð°Ñ Ð¿ÐµÑедаÑа.</p>
+ </li>
+
+ <li id="M201505290">
+ <p>ÐабелÑное Ñелевидение Verizon <a
+href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">подглÑдÑваеÑ
+за Ñем, какие ÑилÑÐ¼Ñ Ð»Ñди ÑмоÑÑÑÑ Ð¸ даже
какие они заÑ
оÑели запиÑаÑÑ</a>.</p>
+ </li>
+
+ <li id="M201504300">
+ <p>Vizio <a
+href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
+воÑполÑзовалаÑÑ “обновлением”
пÑогÑамм в ÑÑÑÑойÑÑваÑ
, ÑÑобÑ
+заÑÑавиÑÑ ÑелевизоÑÑ Ð¿Ð¾Ð´Ð³Ð»ÑдÑваÑÑ Ð·Ð° Ñем,
ÑÑо ÑмоÑÑÑÑ
+полÑзоваÑели</a>. Ðогда ÑелевизоÑÑ
пÑодавали, они ÑÑого еÑе не делали.</p>
+ </li>
+
+ <li id="M201502090">
+ <p>“УмнÑе” ÑелевизоÑÑ Samsung <a
+href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">пеÑедаÑÑ
+по ÐнÑеÑнеÑÑ ÑеÑÑ Ð¿Ð¾Ð»ÑзоваÑелей в дÑÑгÑÑ
компаниÑ, Nuance</a>. Nuance можеÑ
+ее ÑоÑ
ÑанÑÑÑ, а заÑем компании пÑиÑ
одиÑÑÑ
пеÑедаваÑÑ ÐµÐµ в гоÑÑдаÑÑÑвеннÑе
+оÑÐ³Ð°Ð½Ñ Ð¡Ð¨Ð Ð¸Ð»Ð¸ дÑÑгой ÑÑÑанÑ.</p>
+
+ <p>РаÑÐ¿Ð¾Ð·Ð½Ð°Ð²Ð°Ð½Ð¸Ñ ÑеÑи не ÑледÑеÑ
довеÑÑÑÑ, еÑли ÑолÑко оно не пÑоводиÑÑÑ
+ÑвободнÑми пÑогÑаммами на ваÑем
ÑобÑÑвенном компÑÑÑеÑе.</p>
+
+ <p>Ð Ñвоей полиÑике пÑиваÑноÑÑи Samsung
ÑвнÑм обÑазом подÑвеÑждаеÑ, ÑÑо <a
+href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">голоÑовÑе
+даннÑе, ÑодеÑжаÑие конÑиденÑиалÑнÑÑ
инÑоÑмаÑиÑ, бÑдÑÑ Ð¿ÐµÑедаваÑÑÑÑ ÑÑеÑÑим
+ÑÑоÑонам</a>.</p>
+ </li>
+
+ <li id="M201411090">
+ <p>“УмнÑй” ÑÐµÐ»ÐµÐ²Ð¸Ð·Ð¾Ñ Amazon <a
+href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
+ÑÐ¿Ð¸Ð¾Ð½Ð¸Ñ Ð²Ñе вÑемÑ</a>.</p>
+ </li>
-<ul>
- <li><p>РаÑÑледование показÑваеÑ, ÑÑо <a
-href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">ЦенÑÑ
-пÑавиÑелÑÑÑвенной ÑвÑзи ÐеликобÑиÑании
полÑзÑеÑÑÑ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñми СШРи ÐÐРдлÑ
-обÑ
ода огÑаниÑений по Ñлежке внÑÑÑи
ÑÑÑанÑ</a>.</p>
+ <li id="M201409290">
+ <p>Ðолее или менее вÑе “ÑмнÑе”
ÑелевизоÑÑ <a
+href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">ÑпионÑÑ
+за Ñвоими полÑзоваÑелÑми</a>.</p>
- <p>ÐонкÑеÑно, ÑпеÑÑлÑжба Ð¼Ð¾Ð¶ÐµÑ Ñаким
обÑазом ÑобиÑаÑÑ ÑлекÑÑоннÑÑ Ð¿Ð¾ÑÑÑ Ñленов
-паÑламенÑа, поÑÐ¾Ð¼Ñ ÑÑо она пÑоÑ
Ð¾Ð´Ð¸Ñ ÑеÑез
Microsoft.</p></li>
+ <p>ÐÑо ÑообÑение 2014 года, но Ð¼Ñ Ð½Ðµ ожидаем,
ÑÑо положение ÑлÑÑÑилоÑÑ.</p>
- <li><p>ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð² ÑеÑевÑÑ
ÑелеÑонаÑ
TNP Cisco: <a
-href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a>.</p>
+ <p>ÐÑо показÑваеÑ, ÑÑо когда законÑ
ÑÑебÑÑÑ, ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð»ÑзоваÑели пÑодÑкÑов
+ÑоÑмалÑно давали ÑоглаÑие на ÑбоÑ
пеÑÑоналÑнÑÑ
даннÑÑ
, ÑÑого ÑовеÑÑенно не
+доÑÑаÑоÑно. Ð ÑÑо пÑоиÑÑ
одиÑ, когда
полÑзоваÑÐµÐ»Ñ Ð½Ðµ Ð´Ð°ÐµÑ ÑоглаÑиÑ? ÐавеÑное,
+ÑÐµÐ»ÐµÐ²Ð¸Ð·Ð¾Ñ Ð¾ÑвеÑиÑ: “Ðез ваÑего ÑоглаÑиÑ
на ÑÐ»ÐµÐ¶ÐºÑ ÑÐµÐ»ÐµÐ²Ð¸Ð·Ð¾Ñ Ð½Ðµ бÑдеÑ
+ÑабоÑаÑÑ”.</p>
+
+ <p>РадекваÑнÑÑ
законаÑ
говоÑилоÑÑ Ð±Ñ,
ÑÑо ÑелевизоÑÑ Ð½Ðµ Ð´Ð¾Ð»Ð¶Ð½Ñ ÑообÑаÑÑ Ð¾ Ñом,
+ÑÑо пÑоÑмаÑÑÐ¸Ð²Ð°ÐµÑ Ð¿Ð¾Ð»ÑзоваÑÐµÐ»Ñ —
безо вÑÑкиÑ
иÑклÑÑений!</p>
</li>
-</ul>
+ <li id="M201405200">
+ <p>ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð² “ÑмнÑÑ
”
ÑелевизоÑаÑ
LG <a
+href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+докладÑваÑÑ Ð¾ Ñом, ÑÑо ÑмоÑÑиÑ
полÑзоваÑелÑ, незавиÑимо Ð¾Ñ Ñого, ÑазÑеÑено
+ли ÑÑо в наÑÑÑойкаÑ
ÑелевизоÑа</a> (даже
когда ÑеÑÐ²ÐµÑ Ð¾ÑвеÑÐ°ÐµÑ ÐºÐ²Ð¸ÑанÑией
+“ÑÑÑаниÑа не найдена” на вÑÑланнÑе
даннÑе, ÑÑо ниÑего не знаÑиÑ;
+ÑÑи даннÑе вÑе Ñавно могÑÑ ÑоÑ
ÑанÑÑÑÑÑ Ð½Ð°
ÑеÑвеÑе LG).</p>
-<div class="big-subsection">
- <h4 id="SpywareInSkype">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð² Skype</h4>
- <span class="anchor-reference-id">(<a
-href="#SpywareInSkype">#SpywareInSkype</a>)</span>
-</div>
+ <p>Ð¥Ñже Ñого: <a
+href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ÑÐµÐ»ÐµÐ²Ð¸Ð·Ð¾Ñ Ð¿Ð¾Ð´ÑмаÑÑÐ¸Ð²Ð°ÐµÑ Ð·Ð° дÑÑгими
ÑÑÑÑойÑÑвами</a> по локалÑной ÑеÑи
+полÑзоваÑелÑ.</p>
-<ul>
- <li><p>ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð² Skype: <a
-href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
-Ð Microsoft <a
-href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
-изменили Skype ÑпеÑиалÑно Ð´Ð»Ñ Ñого, ÑÑобÑ
ÑпиониÑÑ</a>.</p>
+ <p>ÐпоÑледÑÑвии LG заÑвила, ÑÑо обновила
пÑогÑаммÑ, ÑÑÐ¾Ð±Ñ Ð¿ÑекÑаÑиÑÑ ÑÑо, но
+ÑпиониÑÑ Ñаким обÑазом Ð¼Ð¾Ð¶ÐµÑ Ð»Ñбой
пÑодÑкÑ.</p>
+
+ <p>ÐÐµÐ¶Ð´Ñ Ñем <a
+href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
+ÑелевизоÑÑ LG вÑе Ñавно помногÑ
ÑпионÑÑ</a>.</p>
+ </li>
+
+ <li id="M201212170">
+ <p id="break-security-smarttv"><a
+href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
+ÐзломÑики наÑли ÑпоÑоб вÑкÑÑÑÑ Ð·Ð°ÑиÑÑ Ð²
“инÑеллекÑÑалÑном”
+ÑелевизоÑе</a> и воÑполÑзоваÑÑÑÑ ÐµÐ³Ð¾
видеокамеÑой, ÑÑÐ¾Ð±Ñ ÑмоÑÑеÑÑ Ð½Ð° лÑдей,
+коÑоÑÑе ÑмоÑÑÑÑ ÑелевизоÑ.</p>
</li>
</ul>
-<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
-<div class="big-section">
- <h3 id="SpywareOnTheRoad">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð²
доÑоге</h3>
- <span class="anchor-reference-id">(<a
-href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
-</div>
-<div style="clear: left;"></div>
<div class="big-subsection">
- <h4 id="SpywareInCameras">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð²
видеокамеÑаÑ
</h4>
+ <h4 id="SpywareInCameras">ÐидеокамеÑÑ</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
</div>
-<ul>
- <li>
+<ul class="blurbs">
+ <li id="M201710040">
<p>ÐÐ°Ð¶Ð´Ð°Ñ ÐºÐ°Ð¼ÐµÑа “домаÑней
безопаÑноÑÑи”, еÑли ее изгоÑовиÑелÑ
Ð¼Ð¾Ð¶ÐµÑ Ñ Ð½ÐµÐ¹ ÑвÑзÑваÑÑÑÑ, пÑедÑÑавлÑеÑ
ÑÑÑÑойÑÑво Ñлежки. <a
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
ÐапÑимеÑ, камеÑа Canary</a>.</p>
+
<p>СÑаÑÑÑ Ð¾Ð¿Ð¸ÑÑÐ²Ð°ÐµÑ Ð·Ð»Ð¾Ð´ÐµÑние Ñо ÑÑоÑонÑ
изгоÑовиÑелÑ, обÑаÑÐ°Ñ Ð²Ð½Ð¸Ð¼Ð°Ð½Ð¸Ðµ на ÑоÑ
ÑакÑ, ÑÑо ÑÑÑÑойÑÑво пÑивÑзано к ÑеÑвеÑÑ.</p>
+
<p><a href="/proprietary/proprietary-tethers.html">ÐÑÑгие
ÑÐ²ÐµÐ´ÐµÐ½Ð¸Ñ Ð¾ пÑивÑзке в
неÑвободнÑÑ
пÑогÑаммаÑ
</a>.</p>
+
<p>Ðднако ÑÑо показÑÐ²Ð°ÐµÑ Ñакже, ÑÑо
ÑÑÑÑойÑÑво Ð´Ð°ÐµÑ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ð¸ возможноÑÑÑ
Ñлежки.</p>
</li>
- <li>
+ <li id="M201603220">
+ <p>РкамеÑаÑ
наблÑÐ´ÐµÐ½Ð¸Ñ Ð±Ð¾Ð»ÐµÐµ 70 маÑок
обнаÑÑÐ¶ÐµÐ½Ñ <a
+href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">недоÑеÑÑ
+безопаÑноÑÑи, позволÑÑÑие ÐºÐ¾Ð¼Ñ Ñгодно
подглÑдÑваÑÑ ÑеÑез ниÑ
</a>.</p>
+ </li>
+
+ <li id="M201511250">
<p>“ÐнÑеллекÑÑалÑнає камеÑа Nest Cam <a
href="http://www.bbc.com/news/technology-34922712">ÑмоÑÑиÑ
вÑегда</a>, даже
когда “владелеє еe
“вÑклÑÑаеє.</p>
+
<p>“ÐнÑеллекÑÑалÑное” ÑÑÑÑойÑÑво
ознаÑаеÑ, ÑÑо пÑоизводиÑелÑ
полÑзÑеÑÑÑ Ð¸Ð¼, ÑÑÐ¾Ð±Ñ Ð¸Ð½ÑеллекÑÑалÑно ваÑ
надÑÑÑ.</p>
</li>
</ul>
+
<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð²
ÑлекÑÑоннÑÑ
книгаÑ
</h4>
+ <h4 id="SpywareInToys">ÐгÑÑÑки</h4>
<span class="anchor-reference-id">(<a
-href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
+href="#SpywareInToys">#SpywareInToys</a>)</span>
</div>
-<ul>
- <li><p>Ð ÑлекÑÑоннÑÑ
книгаÑ
могÑÑ
ÑодеÑжаÑÑÑÑ <a
-href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">пÑогÑаммÑ
-на JavaScript, коÑоÑÑе иногда подглÑдÑваÑÑ Ð·Ð°
ÑиÑаÑелÑми</a>.</p>
+<ul class="blurbs">
+ <li id="M201711244">
+ <p>Ð Furby Connect еÑÑÑ <a
+href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
+ÑнивеÑÑалÑнÑй ÑеÑнÑй Ñ
од</a>. ÐÑли пÑодÑÐºÑ Ð²
Ñом виде, в каком он
+поÑÑавлÑеÑÑÑ, не дейÑÑвÑÐµÑ ÐºÐ°Ðº
подÑлÑÑиваÑÑее ÑÑÑÑойÑÑво, Ñо изменение
+пÑогÑÐ°Ð¼Ð¼Ñ Ð¿Ð¾ ÑеÑи навеÑнÑка можеÑ
пÑевÑаÑиÑÑ ÐµÐ³Ð¾ в Ñакое ÑÑÑÑойÑÑво.</p>
</li>
- <li><p>ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð²Ð¾ многиÑ
ÑÑÑÑойÑÑваÑ
ÑÑÐµÐ½Ð¸Ñ ÑлекÑÑоннÑÑ
книг —
-не ÑолÑко в Kindle: <a
-href="https://www.eff.org/pages/reader-privacy-chart-2012"> они
докладÑваÑÑ
-даже о Ñом, какие ÑÑÑаниÑÑ Ð¸ когда ÑиÑаеÑ
полÑзоваÑелÑ</a>.</p>
+ <li id="M201711100">
+ <p>ÐÑÑÑнилоÑÑ, ÑÑо игÑÑÑка Ð´Ð»Ñ Ð²Ð·ÑоÑлÑÑ
Ñ
диÑÑанÑионнÑм ÑпÑавлением пÑÐ¾Ð²Ð¾Ð´Ð¸Ñ <a
+href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">звÑкозапиÑÑ
+ÑазговоÑа Ð¼ÐµÐ¶Ð´Ñ Ð´Ð²ÑÐ¼Ñ Ð¿Ð¾Ð»ÑзоваÑелÑми</a>.</p>
</li>
- <li><p>ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Adobe Ñделала Ñак, ÑÑобÑ
“ЦиÑÑÐ¾Ð²Ð°Ñ ÑедакÑиє, пÑогÑамма
-ÑÑениÑ, пÑименÑÐµÐ¼Ð°Ñ Ð² болÑÑинÑÑве
библиоÑек СШÐ, <a
-href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
-вÑÑÑлала маÑÑÑ Ð´Ð°Ð½Ð½ÑÑ
в Adobe</a>.
“ÐпÑавдание”
-Adobe — “ÑÑо нÑжно Ð´Ð»Ñ ÐºÐ¾Ð½ÑÑолÑ
ÑиÑÑового ÑпÑавлениÑ
-огÑаниÑениÑми!”</p>
+ <li id="M201703140">
+ <p><a
+href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">ÐомпÑÑÑеÑизованнÑй
+вибÑаÑÐ¾Ñ Ð¿Ð¾Ð´Ð³Ð»ÑдÑвал за полÑзоваÑелÑми</a>
поÑÑедÑÑвом неÑвободного
+ÑпÑавлÑÑÑего пÑиложениÑ.</p>
+
+ <p>ÐÑиложение поминÑÑно ÑообÑало
ÑемпеÑаÑÑÑÑ Ð²Ð¸Ð±ÑаÑоÑа (Ñаким обÑазом,
коÑвенно
+докладÑвал о Ñом, окÑÑжен ли вибÑаÑоÑ
ÑеловеÑеÑким Ñелом) и ÑаÑÑоÑÑ
+вибÑаÑий.</p>
+
+ <p>ÐбÑаÑиÑе внимание на Ñо, наÑколÑко
неадекваÑное пÑедлагаеÑÑÑ ÑеÑение:
+ÑÑандаÑÑ Ð¼Ð°ÑкиÑовки, Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ ÐºÐ¾ÑоÑой
изгоÑовиÑели делали Ð±Ñ ÑÐ²ÐµÐ´Ð¾Ð¼Ð»ÐµÐ½Ð¸Ñ Ð¾
+ÑвоиÑ
пÑодÑкÑаÑ
— вмеÑÑо ÑвободнÑÑ
пÑогÑамм, коÑоÑÑе могли бÑ
+пÑовеÑÑÑÑÑÑ Ð¸ модиÑиÑиÑоваÑÑÑÑ
полÑзоваÑелÑми.</p>
+
+ <p>Ðа компаниÑ-пÑоизводиÑÐµÐ»Ñ Ð²Ð¸Ð±ÑаÑоÑов <a
+href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">подали
+в ÑÑд за ÑÐ±Ð¾Ñ Ð¼Ð°ÑÑÑ Ð¿ÐµÑÑоналÑнÑÑ
даннÑÑ
о
Ñом, как полÑзоваÑели пÑименÑÑÑ Ð¸Ñ
+изделиÑ</a>.</p>
+
+ <p>Ðозможно, даннÑе дейÑÑвиÑелÑно
анонимизиÑовалиÑÑ, как заÑвлÑла компаниÑ,
но
+дело не в ÑÑом. ÐÑли она пÑодавала даннÑе
бÑокеÑÑ, Ñо бÑÐ¾ÐºÐµÑ Ð¼Ð¾Ð³ вÑÑиÑлÑÑÑ,
+ÑÑи именно ÑÑо даннÑе.</p>
+
+ <p>Ðо ÑеÑÐµÐ½Ð¸Ñ ÑÑда ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ <a
+href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+вÑплаÑила в обÑей ÑложноÑÑи 4 миллиона
доллаÑов пени</a> Ñвоим клиенÑам.</p>
</li>
-</ul>
-<div class="big-subsection">
- <h4 id="SpywareInVehicles">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð²
авÑомобилÑÑ
</h4>
- <span class="anchor-reference-id">(<a
-href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
-</div>
+ <li id="M201702280">
+ <p>ÐгÑÑÑки Ñ Ð¼Ð¸ÐºÑоÑонами “CloudPets” <a
+href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
+ÑаÑкÑÑваÑÑ ÑазговоÑÑ Ð´ÐµÑей
изгоÑовиÑелÑ</a>. РзнаеÑе ÑÑо? <a
+href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">ÐзломÑики
+наÑли ÑпоÑоб полÑÑаÑÑ Ð´Ð°Ð½Ð½Ñе</a>,
ÑобиÑаемÑе пÑи подÑлÑÑивании
+изгоÑовиÑелем.</p>
-<ul>
-<li><p>ÐомпÑÑÑеÑизованнÑе авÑомобили Ñ
неÑвободнÑми пÑогÑаммами ÑвлÑÑÑÑÑ <a
-href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
-ÑпионÑÑими ÑÑÑÑойÑÑвами</a>.</p>
+ <p>ÐедопÑÑÑимо Ñже Ñо, ÑÑо изгоÑовиÑÐµÐ»Ñ Ð¸
ФÐРмогли пÑоÑлÑÑиваÑÑ ÑÑи ÑазговоÑÑ.</p>
</li>
- <li id="nissan-modem"><p>Ð Nissan Leaf еÑÑÑ Ð²ÑÑÑоеннÑй
ÑелеÑоннÑй модем, позволÑÑÑий ÑакÑиÑеÑки
комÑ
-Ñгодно <a
-href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">полÑÑаÑÑ
-ÑдаленнÑй доÑÑÑп к компÑÑÑеÑам и вноÑиÑÑ
Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ Ð² ÑазлиÑнÑе
-наÑÑÑойки</a>.</p>
+ <li id="M201612060">
+ <p>“УмнÑе” игÑÑÑки “Ðой дÑÑг
Ðейла” и i-Que <a
+href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">пеÑедаÑÑ
+ÑазговоÑÑ Ð´ÐµÑей в Nuance Communications</a>, компании
ÑÐ°Ð·Ð¿Ð¾Ð·Ð½Ð°Ð²Ð°Ð½Ð¸Ñ ÑеÑи,
+ÑаÑположенной в СШÐ.</p>
- <p>ÐÑо неÑÑÑдно поÑомÑ, ÑÑо в ÑиÑÑеме неÑ
пÑовеÑки подлинноÑÑи полÑзоваÑÐµÐ»Ñ Ð¿Ñи
-доÑÑÑпе по модемÑ. Ðднако даже еÑли бÑ
модем пÑоводил пÑовеÑкÑ, нелÑÐ·Ñ Ð±Ñло
-Ð±Ñ Ð±ÑÑÑ ÑвеÑеннÑми, ÑÑо Ñ Nissan Ð½ÐµÑ Ð´Ð¾ÑÑÑпа.
ÐÑогÑÐ°Ð¼Ð¼Ñ Ð² авÑомобиле
-неÑвободнÑ, <a
href="/philosophy/free-software-even-more-important.html">ÑÑо
-знаÑиÑ, они ÑÑебÑÑÑ Ð¾Ñ Ð¿Ð¾Ð»ÑзоваÑелей
Ñлепой веÑÑ</a>.</p>
+ <p>Ð ÑÑиÑ
игÑÑÑкаÑ
еÑÑÑ Ñакже ÑеÑÑезнÑе
бÑеÑи в безопаÑноÑÑи; взломÑики могÑÑ
+конÑÑолиÑоваÑÑ Ð¸Ñ
на ÑаÑÑÑоÑнии Ñ
ÑоÑового ÑелеÑона. ÐÑо позволÑÐµÑ Ð¸Ð¼
+пÑоÑлÑÑиваÑÑ ÑеÑÑ Ñебенка и даже говоÑиÑÑ
голоÑом ÑамиÑ
игÑÑÑек.</p>
+ </li>
- <p>Ðаже еÑли никÑо не подклÑÑаеÑÑÑ Ðº
авÑÐ¾Ð¼Ð¾Ð±Ð¸Ð»Ñ Ð½Ð° ÑаÑÑÑоÑнии, модем ÑоÑовой
-ÑвÑзи позволÑÐµÑ ÑелеÑонной компании
поÑÑоÑнно оÑÑлеживаÑÑ Ð¿ÐµÑемеÑениÑ
-авÑомобилÑ; Ñ
оÑÑ Ð¼Ð¾Ð¶Ð½Ð¾ ÑизиÑеÑки ÑдалиÑÑ
модем ÑоÑовой ÑвÑзи.</p>
+ <li id="M201502180">
+ <p>ÐаÑби <a
+href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">ÑобиÑаеÑÑÑ
+ÑпиониÑÑ Ð·Ð° деÑÑми и взÑоÑлÑми</a>.</p>
</li>
+</ul>
- <li id="records-drivers"><p>ÐеÑвободнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð²
авÑомобилÑÑ
<a
-href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">запиÑÑваÑÑ
-ÑÐ²ÐµÐ´ÐµÐ½Ð¸Ñ Ð¾ движениÑÑ
водиÑелей</a>, а заÑем
пеÑедаÑÑ Ð¸Ñ
пÑоизводиÑелÑм
-авÑомобилÑ, ÑÑÑаÑ
овÑм компаниÑм и
пÑоÑим.</p>
- <p>СлÑÑай Ñ ÑиÑÑемой ÑбоÑа плаÑежей,
ÑпомÑнÑÑÑй в ÑÑой ÑÑаÑÑе, в
-дейÑÑвиÑелÑноÑÑи не Ð¸Ð¼ÐµÐµÑ Ð¾ÑноÑÐµÐ½Ð¸Ñ Ðº
Ñлежке неÑвободнÑми пÑогÑаммами. ÐÑи
-ÑиÑÑÐµÐ¼Ñ Ð¿ÑедÑÑавлÑÑÑ Ð½ÐµÐ´Ð¾Ð¿ÑÑÑимое
вÑоÑжение в лиÑнÑÑ Ð¶Ð¸Ð·Ð½Ñ Ð¸ Ð´Ð¾Ð»Ð¶Ð½Ñ Ð±ÑÑÑ
-Ð·Ð°Ð¼ÐµÐ½ÐµÐ½Ñ Ð½Ð° ÑиÑÑÐµÐ¼Ñ Ð°Ð½Ð¾Ð½Ð¸Ð¼Ð½ÑÑ
плаÑежей, но
вÑоÑжение оÑÑÑеÑÑвлÑÑÑ Ð½Ðµ
-вÑедоноÑнÑе пÑогÑаммÑ. РдÑÑгиÑ
ÑлÑÑаÑÑ
,
ÑпомÑнÑÑÑÑ
в ÑÑаÑÑе, Ð¼Ñ Ð¸Ð¼ÐµÐµÐ¼ дело
-Ñ Ð²ÑедоноÑнÑми неÑвободнÑми пÑогÑаммами в
авÑомобиле.</p></li>
+<div class="big-subsection">
+ <h4 id="SpywareInDrones">ÐеÑпилоÑники</h4>
+ <span class="anchor-reference-id">(<a
+href="#SpywareInDrones">#SpywareInDrones</a>)</span>
+</div>
- <li><p>ÐвÑомобили Tesla позволÑÑÑ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ð¸
полÑÑаÑÑ Ð´Ð°Ð½Ð½Ñе на ÑаÑÑÑоÑнии, а Ñакже
-опÑеделÑÑÑ Ð¼ÐµÑÑоположение авÑÐ¾Ð¼Ð¾Ð±Ð¸Ð»Ñ Ð²
лÑбой Ð¼Ð¾Ð¼ÐµÐ½Ñ (Ñм.<a
-href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
-паÑагÑаÑÑ b и c Ñаздела 2</a>). ÐомпаниÑ
ÑÑвеÑждаеÑ, ÑÑо она не Ñ
ÑаниÑ
-ÑÑиÑ
Ñведений, но еÑли гоÑÑдаÑÑÑво
пÑиказÑÐ²Ð°ÐµÑ ÑобиÑаÑÑ Ð¸ пеÑедаваÑÑ ÑÑи
-даннÑе, Ñо оно Ð¼Ð¾Ð¶ÐµÑ Ð¸Ñ
ÑоÑ
ÑанÑÑÑ.</p>
+<ul class="blurbs">
+ <li id="M201708040">
+ <p>Ðока Ð²Ñ Ð¿Ð¾Ð»ÑзÑеÑеÑÑ Ð±ÐµÑпилоÑником DJI,
ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð´Ð³Ð»ÑдÑваÑÑ Ð·Ð° дÑÑгими, <a
+href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">DJI
+во многиÑ
ÑлÑÑаÑÑ
подглÑдÑÐ²Ð°ÐµÑ Ð·Ð°
вами</a>.</p>
</li>
</ul>
-<!-- #SpywareAtHome -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
-<div class="big-section">
- <h3 id="SpywareAtHome">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð´Ð¾Ð¼Ð°</h3>
- <span class="anchor-reference-id">(<a
+
+<div class="big-subsection">
+ <h4 id="SpywareAtHome">ÐÑÑгие ÑÑÑÑойÑÑва</h4><span
class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
</div>
-<div style="clear: left;"></div>
-<ul>
- <li>
+<ul class="blurbs">
+ <li id="M201808120">
<p>ÐзломÑики наÑли ÑпоÑоб пÑобиÑÑ Ð·Ð°ÑиÑÑ
ÑÑÑÑойÑÑва Amazon и <a
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
пÑевÑаÑиÑÑ
его в ÑÑÑÑойÑÑво, подÑлÑÑиваÑÑее</a> Ð´Ð»Ñ Ð½Ð¸Ñ
.</p>
@@ -1297,269 +1605,167 @@
“Ñ
акеÑÑÑво” в знаÑении “взлом
заÑиÑÑ”</a>.</p>
</li>
- <li><p>ÐедиÑинÑÐºÐ°Ñ ÑÑÑаÑ
Ð¾Ð²Ð°Ñ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ <a
+ <li id="M201804140">
+ <p>ÐедиÑинÑÐºÐ°Ñ ÑÑÑаÑ
Ð¾Ð²Ð°Ñ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ <a
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
пÑÐµÐ´Ð»Ð°Ð³Ð°ÐµÑ Ð±ÐµÑплаÑнÑÑ ÑлекÑÑоннÑÑ Ð·ÑбнÑÑ
ÑеÑкÑ, коÑоÑÐ°Ñ Ð¿Ð¾Ð´Ð³Ð»ÑдÑÐ²Ð°ÐµÑ Ð·Ð°
полÑзоваÑелем, вÑÑÑÐ»Ð°Ñ ÑÐ²ÐµÐ´ÐµÐ½Ð¸Ñ Ð¾
полÑзовании по ÐнÑеÑнеÑÑ</a>.</p>
</li>
- <li><p>ÐножеÑÑво “инÑеллекÑÑалÑнÑÑ
”
пÑодÑкÑов ÑпÑоекÑиÑованÑ, <a
+ <li id="M201706204">
+ <p>ÐножеÑÑво “инÑеллекÑÑалÑнÑÑ
”
пÑодÑкÑов ÑпÑоекÑиÑованÑ, <a
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">
ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð´ÑлÑÑиваÑÑ Ð·Ð° вÑеми в доме,
непÑеÑÑвно</a>.</p>
<p>ÐÑнеÑнÑÑ ÑеÑ
ниÑеÑÐºÐ°Ñ Ð¿ÑакÑика не
пÑедоÑÑавлÑÐµÑ Ð½Ð¸ одного ÑпоÑоба ÑоздаÑÑ
ÑÑÑÑойÑÑво, коÑоÑое подÑинÑлоÑÑ Ð±Ñ Ð²Ð°Ñим
голоÑовÑм командам, не ÑпионÑ
-поÑенÑиалÑно за вами. Ðаже еÑли ÑÑÑÑойÑÑво
не подклÑÑено к ÑеÑи, оно можеÑ
-ÑоÑ
ÑанÑÑÑ Ð·Ð°Ð¿Ð¸Ñи о Ð²Ð°Ñ Ð´Ð»Ñ Ð¿Ð¾ÑледÑÑÑего
изÑÑÑиÑ.</p>
- </li>
-
- <li><p>ТеÑмомеÑÑÑ Nest <a
-href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">вÑÑÑлаÑÑ
много
-даннÑÑ
о полÑзоваÑеле</a>.</p>
- </li>
-
- <li><p><a
-href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
-ÐомпÑÑÑеÑÑ Ð±Ñли запÑогÑаммиÑованÑ
ÑпиониÑÑ Ð·Ð° Ñеми, кÑо бÑал иÑ
напÑÐ¾ÐºÐ°Ñ Ñ
-возможноÑÑÑÑ Ð¿Ð¾ÑледÑÑÑей покÑпки</a>.</p>
- </li>
-</ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInTVSets">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð²
ÑелевизоÑаÑ
</h4>
- <span class="anchor-reference-id">(<a
-href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
-</div>
-
-<p>Ðмо Ð¤Ð¸Ð»Ð¸Ð¿Ñ Ð¿Ð¾ÑÑÑил: “Ðа дÑÑгой Ð´ÐµÐ½Ñ ÐºÐ¾
мне подоÑла женÑина и ÑпÑоÑила:
-‘Я не видела Ð²Ð°Ñ Ð¿Ð¾ ÑелевизоÑÑ?’ Я
оÑвеÑил: ‘Ðе знаÑ. С
-Ñой ÑÑоÑÐ¾Ð½Ñ Ð½Ðµ видно’”. ÐÑевидно, ÑÑо
бÑло до
-“ÑмнÑÑ
” ÑелевизоÑов Amazon.</p>
-
-<ul>
- <li><p>ÐекоÑоÑÑе “инÑеллекÑÑалÑнÑе”
ÑелевизоÑÑ Ð°Ð²ÑомаÑиÑеÑки <a
-href="https://news.ycombinator.com/item?id=16727319">загÑÑжаÑÑ
ÑÑÑаÑение,
-коÑоÑое ÑÑÑÐ°Ð½Ð°Ð²Ð»Ð¸Ð²Ð°ÐµÑ Ð¿Ñиложение
Ñлежки</a>.</p>
-
- <p>ÐÑ ÑÑÑлаемÑÑ Ð½Ð° ÑÑаÑÑÑ Ð² подÑвеÑждение
ÑакÑов, коÑоÑÑе в ней пÑедÑÑавленÑ. Ð
-ÑожалениÑ, она заканÑиваеÑÑÑ ÑлабоÑ
аÑакÑеÑной ÑекомендаÑией ÑÑÑÑпиÑÑ
-Netflix. ÐÑиложение <a
-href="/proprietary/malware-google.html#netflix-app-geolocation-drm">Netflix
-Ñоже вÑедоноÑно</a>.</p>
- </li>
-
- <li>
- <p>“ÐнÑеллекÑÑалÑнÑе” <a
-href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">ÑелевизоÑÑ
-Visio докладÑваÑÑ Ð¾Ð±Ð¾ вÑем, ÑÑо на ниÑ
пÑоÑмаÑÑиваеÑÑÑ, а не ÑолÑко о Ñом,
-ÑÑо доÑÑавлено по ÑÑиÑÑ Ð¸Ð»Ð¸ по кабелÑ</a>.
Ðаже еÑли изобÑажение поÑÑÑпило
-из ÑобÑÑвенного компÑÑÑеÑа полÑзоваÑелÑ,
ÑÐµÐ»ÐµÐ²Ð¸Ð·Ð¾Ñ Ð¾ нем
-докладÑваеÑ. СÑÑеÑÑвование ÑпоÑоба
оÑклÑÑиÑÑ ÑлежкÑ, даже еÑли Ð±Ñ Ð¾Ð½ не бÑл
-ÑкÑÑÑ, как в ÑÑиÑ
ÑелевизоÑаÑ
, не можеÑ
опÑавдÑваÑÑ ÑÑÑ ÑлежкÑ.</p>
- </li>
-
- <li><p>Ðолее или менее вÑе “ÑмнÑе”
ÑелевизоÑÑ <a
-href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">ÑпионÑÑ
-за Ñвоими полÑзоваÑелÑми</a>.</p>
-
- <p>ÐÑо ÑообÑение 2014 года, но Ð¼Ñ Ð½Ðµ ожидаем,
ÑÑо положение ÑлÑÑÑилоÑÑ.</p>
-
- <p>ÐÑо показÑваеÑ, ÑÑо когда законÑ
ÑÑебÑÑÑ, ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð»ÑзоваÑели пÑодÑкÑов
-ÑоÑмалÑно давали ÑоглаÑие на ÑбоÑ
пеÑÑоналÑнÑÑ
даннÑÑ
, ÑÑого ÑовеÑÑенно не
-доÑÑаÑоÑно. Ð ÑÑо пÑоиÑÑ
одиÑ, когда
полÑзоваÑÐµÐ»Ñ Ð½Ðµ Ð´Ð°ÐµÑ ÑоглаÑиÑ? ÐавеÑное,
-ÑÐµÐ»ÐµÐ²Ð¸Ð·Ð¾Ñ Ð¾ÑвеÑиÑ: “Ðез ваÑего ÑоглаÑиÑ
на ÑÐ»ÐµÐ¶ÐºÑ ÑÐµÐ»ÐµÐ²Ð¸Ð·Ð¾Ñ Ð½Ðµ бÑдеÑ
-ÑабоÑаÑÑ”.</p>
-
- <p>РадекваÑнÑÑ
законаÑ
говоÑилоÑÑ Ð±Ñ,
ÑÑо ÑелевизоÑÑ Ð½Ðµ Ð´Ð¾Ð»Ð¶Ð½Ñ ÑообÑаÑÑ Ð¾ Ñом,
-ÑÑо пÑоÑмаÑÑÐ¸Ð²Ð°ÐµÑ Ð¿Ð¾Ð»ÑзоваÑÐµÐ»Ñ —
безо вÑÑкиÑ
иÑклÑÑений!</p>
- </li>
- <li><p>Vizio Ð¸Ð´ÐµÑ Ð½Ð° Ñаг далÑÑе дÑÑгиÑ
пÑоизводиÑелей ÑелевизоÑов, ÑÐ¿Ð¸Ð¾Ð½Ñ Ð·Ð°
Ñвоими
-полÑзоваÑелÑми: иÑ
<a
-href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
-“инÑеллекÑÑалÑнÑе” ÑелевизоÑÑ
подÑобно анализиÑÑÑÑ Ð²Ð°Ñи пÑивÑÑки
-пÑоÑмоÑÑа и ÑвÑзÑваÑÑ Ð¸Ñ
Ñ Ð²Ð°Ñим адÑеÑом
IP</a>, ÑÑÐ¾Ð±Ñ ÑекламодаÑели могли
-оÑÑлеживаÑÑ Ð²Ð°Ñ Ð½Ð° ÑазлиÑнÑÑ
ÑÑÑÑойÑÑваÑ
.</p>
-
- <p>ÐÑо можно вÑклÑÑиÑÑ, но неÑпÑаведливо
Ñже Ñо, ÑÑо по ÑмолÑÐ°Ð½Ð¸Ñ ÑÑо вклÑÑено.</p>
- </li>
-
- <li><p>ÐÐ¾Ð³Ð¾Ð²Ð¾Ñ Tivo Ñ Viacom добавлÑÐµÑ 2,3 миллиона
кваÑÑÐ¸Ñ Ðº 600 миллионам
-пÑоÑилей ÑоÑиалÑнÑÑ
ÑеÑей, за коÑоÑÑми ÑÑа
ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Ñже наблÑдаеÑ. ÐлиенÑÑ
-Tivo не знаÑÑ, ÑÑо на ниÑ
ÑмоÑÑÑÑ
ÑекламодаÑели. ÐомбиниÑÑÑ Ð¸Ð½ÑоÑмаÑÐ¸Ñ Ð¾
-пÑоÑмоÑÑе ÑелепеÑÐµÐ´Ð°Ñ Ñ ÑÑаÑÑием в
ÑоÑиалÑнÑÑ
ÑеÑÑÑ
, Tivo Ð¼Ð¾Ð¶ÐµÑ ÑепеÑÑ <a
-href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">ÑвÑзÑваÑÑ
-ÑелеÑÐµÐºÐ»Ð°Ð¼Ñ Ñ Ð¿Ð¾ÐºÑпками, ÑовеÑÑаемÑми по
ÑеÑи</a>, подÑÑавлÑÑ Ð¿Ð¾ ÑмолÑаниÑ
-вÑеÑ
полÑзоваÑелей под новÑй
комбиниÑованнÑй вид Ñлежки.</p></li>
- <li><p>ÐекоÑоÑÑе ÑекламнÑе обÑÑÐ²Ð»ÐµÐ½Ð¸Ñ Ð²
ÐнÑеÑнеÑе и на Ñелевидении пеÑедаÑÑ
-неÑлÑÑнÑе звÑки Ð´Ð»Ñ Ð¿Ñиема неÑвободнÑми
вÑедоноÑнÑми пÑогÑаммами,
-ÑабоÑаÑÑими ÑÑдом на дÑÑгиÑ
ÑÑÑÑойÑÑваÑ
,
ÑÑÐ¾Ð±Ñ Ð¾Ð¿ÑеделÑÑÑ, ÑÑо они
-неподалекÑ. Ðогда подклÑÑеннÑе к
ÐнÑеÑнеÑÑ ÑÑÑÑойÑÑва ÑвÑÐ·Ð°Ð½Ñ Ñ
ÑелевизоÑом,
-ÑекламодаÑели могÑÑ ÑÑаÑиÑÑиÑеÑки
оÑениваÑÑ ÑвÑÐ·Ñ ÑÐµÐºÐ»Ð°Ð¼Ñ Ñ Ð°ÐºÑивноÑÑÑÑ Ð²
-ÐнÑеÑнеÑе, а Ñакже пÑоводиÑÑ Ð´ÑÑгÑÑ <a
-href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">ÑлежкÑ
-на ÑвÑзаннÑÑ
ÑÑÑÑойÑÑваÑ
</a>.</p>
- </li>
- <li><p>“УмнÑе” ÑелевизоÑÑ Vizio
ÑаÑпознаÑÑ Ð¸ <a
-href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">оÑÑлеживаÑÑ
-Ñо, ÑÑо ÑмоÑÑÑÑ Ð»Ñди</a>, даже еÑли ÑÑо не
ÑÐµÐ»ÐµÐ²Ð¸Ð·Ð¸Ð¾Ð½Ð½Ð°Ñ Ð¿ÐµÑедаÑа.</p>
- </li>
- <li><p>“УмнÑй” ÑÐµÐ»ÐµÐ²Ð¸Ð·Ð¾Ñ Amazon <a
-href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
-ÑÐ¿Ð¸Ð¾Ð½Ð¸Ñ Ð²Ñе вÑемÑ</a>.</p>
- </li>
- <li><p>“УмнÑе” ÑелевизоÑÑ Samsung <a
-href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">пеÑедаÑÑ
-по ÐнÑеÑнеÑÑ ÑеÑÑ Ð¿Ð¾Ð»ÑзоваÑелей в дÑÑгÑÑ
компаниÑ, Nuance</a>. Nuance можеÑ
-ее ÑоÑ
ÑанÑÑÑ, а заÑем компании пÑиÑ
одиÑÑÑ
пеÑедаваÑÑ ÐµÐµ в гоÑÑдаÑÑÑвеннÑе
-оÑÐ³Ð°Ð½Ñ Ð¡Ð¨Ð Ð¸Ð»Ð¸ дÑÑгой ÑÑÑанÑ.</p>
- <p>РаÑÐ¿Ð¾Ð·Ð½Ð°Ð²Ð°Ð½Ð¸Ñ ÑеÑи не ÑледÑеÑ
довеÑÑÑÑ, еÑли ÑолÑко оно не пÑоводиÑÑÑ
-ÑвободнÑми пÑогÑаммами на ваÑем
ÑобÑÑвенном компÑÑÑеÑе.</p>
-
- <p>Ð Ñвоей полиÑике пÑиваÑноÑÑи Samsung
ÑвнÑм обÑазом подÑвеÑждаеÑ, ÑÑо <a
-href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">голоÑовÑе
-даннÑе, ÑодеÑжаÑие конÑиденÑиалÑнÑÑ
инÑоÑмаÑиÑ, бÑдÑÑ Ð¿ÐµÑедаваÑÑÑÑ ÑÑеÑÑим
-ÑÑоÑонам</a>.</p>
- </li>
- <li><p><a
-href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
-ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð² “ÑмнÑÑ
”
ÑелевизоÑаÑ
LG</a> докладÑваÑÑ Ð¾ Ñом,
-ÑÑо ÑмоÑÑÐ¸Ñ Ð¿Ð¾Ð»ÑзоваÑелÑ, незавиÑимо оÑ
Ñого, ÑазÑеÑено ли ÑÑо в наÑÑÑойкаÑ
-ÑелевизоÑа (даже когда ÑеÑÐ²ÐµÑ Ð¾ÑвеÑаеÑ
квиÑанÑией “ÑÑÑаниÑа не
-найдена” на вÑÑланнÑе даннÑе, ÑÑо
ниÑего не знаÑиÑ; ÑÑи даннÑе вÑе
-Ñавно могÑÑ ÑоÑ
ÑанÑÑÑÑÑ Ð½Ð° ÑеÑвеÑе LG).</p>
-
- <p>Ð¥Ñже Ñого: <a
-href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
-ÑÐµÐ»ÐµÐ²Ð¸Ð·Ð¾Ñ Ð¿Ð¾Ð´ÑмаÑÑÐ¸Ð²Ð°ÐµÑ Ð·Ð° дÑÑгими
ÑÑÑÑойÑÑвами</a> по локалÑной ÑеÑи
-полÑзоваÑелÑ.</p>
-
- <p>ÐпоÑледÑÑвии LG заÑвила, ÑÑо обновила
пÑогÑаммÑ, ÑÑÐ¾Ð±Ñ Ð¿ÑекÑаÑиÑÑ ÑÑо, но
-ÑпиониÑÑ Ñаким обÑазом Ð¼Ð¾Ð¶ÐµÑ Ð»Ñбой
пÑодÑкÑ.</p>
+поÑенÑиалÑно за вами. Ðаже еÑли ÑÑÑÑойÑÑво
не подклÑÑено к ÑеÑи, оно можеÑ
+ÑоÑ
ÑанÑÑÑ Ð·Ð°Ð¿Ð¸Ñи о Ð²Ð°Ñ Ð´Ð»Ñ Ð¿Ð¾ÑледÑÑÑего
изÑÑÑиÑ.</p>
+ </li>
- <p>ÐÐµÐ¶Ð´Ñ Ñем <a
-href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
-ÑелевизоÑÑ LG вÑе Ñавно помногÑ
ÑпионÑÑ</a>.</p>
+ <li id="M201407170">
+ <p id="nest-thermometers">ТеÑмомеÑÑÑ Nest <a
+href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">вÑÑÑлаÑÑ
много
+даннÑÑ
о полÑзоваÑеле</a>.</p>
</li>
- <li>
+
+ <li id="M201310260">
<p><a
-href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">ÐабелÑное
-Ñелевидение Verizon подглÑдÑÐ²Ð°ÐµÑ Ð·Ð° Ñем,
какие ÑилÑÐ¼Ñ Ð»Ñди ÑмоÑÑÑÑ Ð¸ даже
-какие они заÑ
оÑели запиÑаÑÑ.</a></p>
+href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ÐомпÑÑÑеÑÑ Ð±Ñли запÑогÑаммиÑованÑ
ÑпиониÑÑ Ð·Ð° Ñеми, кÑо бÑал иÑ
напÑÐ¾ÐºÐ°Ñ Ñ
+возможноÑÑÑÑ Ð¿Ð¾ÑледÑÑÑей покÑпки</a>.</p>
</li>
</ul>
-<!-- #SpywareInGames -->
-<div class="big-section">
- <h3 id="SpywareInGames">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð² игÑаÑ
</h3>
+
+<div class="big-subsection">
+ <h4 id="SpywareOnWearables">Ðа лÑдÑÑ
</h4>
<span class="anchor-reference-id">(<a
-href="#SpywareInGames">#SpywareInGames</a>)</span>
+href="#SpywareOnWearables">#SpywareOnWearables</a>)</span>
</div>
-<div style="clear: left;"></div>
-<ul>
- <li>
- <p>Red Shell — пÑогÑамма-Ñпион,
Ð·Ð°Ð»Ð¾Ð¶ÐµÐ½Ð½Ð°Ñ Ð²Ð¾ многиÑ
неÑвободнÑÑ
-игÑаÑ
. Ðна <a
-href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
-оÑÑÐ»ÐµÐ¶Ð¸Ð²Ð°ÐµÑ Ð´Ð°Ð½Ð½Ñе на компÑÑÑеÑаÑ
полÑзоваÑелей и оÑÑÑÐ»Ð°ÐµÑ Ð¸Ñ
ÑÑеÑÑим
-ÑÑоÑонам</a>.</p>
- </li>
+<ul class="blurbs">
+ <li id="M201807260">
+ <p>Ðдежда Томми ÐилÑингеÑа <a
+href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">оÑÑлеживаеÑ,
+как ÑаÑÑо лÑди ее надеваÑÑ</a>.</p>
- <li>
- <p>Blizzard Warden — ÑкÑÑÑÐ°Ñ Ð¿ÑогÑамма
“пÑедоÑвÑаÑениÑ
-обмана”, коÑоÑÐ°Ñ <a
-href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
-ÑÐ¿Ð¸Ð¾Ð½Ð¸Ñ Ð·Ð° каждÑм пÑоÑеÑÑом, ÑабоÑаÑÑем на
компÑÑÑеÑе игÑока, и вÑдаеÑ
-изÑÑдное колиÑеÑÑво лиÑнÑÑ
даннÑÑ
</a>,
вклÑÑÐ°Ñ Ð¼Ð°ÑÑÑ Ð´ÐµÐ¹ÑÑвий, никак не
-ÑвÑзаннÑÑ
Ñ Ð¾Ð±Ð¼Ð°Ð½Ð¾Ð¼.</p>
+ <p>ÐÑо пÑиÑÑÐ°ÐµÑ Ð¿Ð°ÑÑÐ²Ñ Ðº ÑомÑ, ÑÑо
компании оÑÑлеживаÑÑ ÐºÐ°Ð¶Ð´Ñй аÑÐ¿ÐµÐºÑ Ñого,
ÑÑо
+она делаеÑ.</p>
</li>
+</ul>
- <li>
- <p>ArenaNet Ñайком ÑÑÑанавливала ÑпионÑкÑÑ
пÑогÑÐ°Ð¼Ð¼Ñ Ð²Ð¼ÐµÑÑе Ñ Ð¾Ð±Ð½Ð¾Ð²Ð»ÐµÐ½Ð¸ÐµÐ¼ длÑ
-игÑÑ Ñ Ð±Ð¾Ð»ÑÑим колиÑеÑÑвом игÑоков Guild
War 2. ÐÑа ÑпионÑÐºÐ°Ñ Ð¿ÑогÑамма
-позволÑла Arpanet <a
-href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave">
-подглÑдÑваÑÑ Ð·Ð° вÑеми оÑкÑÑÑÑми
пÑоÑеÑÑами, ÑабоÑаÑÑими на компÑÑÑеÑе
-полÑзоваÑелÑ</a>.</p>
+
+<h5 id="SpywareOnSmartWatches">“ÐнÑеллекÑÑалÑнÑе”
ÑаÑÑ</h5>
+
+<ul class="blurbs">
+ <li id="M201603020">
+ <p>ÐÑÐµÐ½Ñ Ð´ÐµÑевÑе “инÑеллекÑÑалÑнÑе
ÑаÑÑ” вÑ
одÑÑ Ð² ÑоÑÑав пÑиложениÑ
+Android, коÑоÑое <a
+href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">подклÑÑаеÑÑÑ
+к Ð½ÐµÐ¾Ð¿Ð¾Ð·Ð½Ð°Ð½Ð½Ð¾Ð¼Ñ ÑайÑÑ Ð² ÐиÑае</a>.</p>
+
+ <p>Ð ÑÑаÑÑе говоÑиÑÑÑ, ÑÑо ÑÑо лазейка, но
Ð¼Ð¾Ð¶ÐµÑ Ð±ÑÑÑ, ÑÑо оÑибка. Ðднако ÑÑо
+как минимÑм Ñлежка.</p>
</li>
- <li>
- <p>ÐÑÐ°Ð¹Ð²ÐµÑ Ð¾Ð¿Ñеделенной игÑовой
клавиаÑÑÑÑ <a
-href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">оÑÑÑлаеÑ
-ÑÐ²ÐµÐ´ÐµÐ½Ð¸Ñ Ð² ÐиÑай</a>.</p>
+ <li id="M201407090">
+ <p>“ÐнÑеллекÑÑалÑнÑе” ÑаÑÑ LG
ÑпÑоекÑиÑованÑ, <a
+href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
+ÑÑÐ¾Ð±Ñ Ð´Ð¾ÐºÐ»Ð°Ð´ÑваÑÑ Ð¾ Ñвоем меÑÑоположении
комÑ-Ñо дÑÑгомÑ, а Ñакже пеÑедаваÑÑ
+и ÑазговоÑÑ</a>.</p>
</li>
+</ul>
- <li><p>ÐеÑÐ²Ð¾Ð±Ð¾Ð´Ð½Ð°Ñ Ð¿ÑогÑамма nVidia GeForce Experience <a
-href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">
-заÑÑавлÑÐµÑ Ð¿Ð¾Ð»ÑзоваÑелей ÑказÑваÑÑ ÑебÑ,
а заÑем вÑÑÑÐ»Ð°ÐµÑ Ð¸Ñ
пеÑÑоналÑнÑе
-даннÑе на ÑеÑвеÑÑ nVidia</a>.</p>
+
+<div class="big-subsection">
+ <h4 id="SpywareInVehicles">ÐвÑомобили</h4>
+ <span class="anchor-reference-id">(<a
+href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
+</div>
+
+<ul class="blurbs">
+ <li id="M201711230">
+ <p>ÐÑогÑÐ°Ð¼Ð¼Ñ Ñ Ð¸ÑкÑÑÑÑвеннÑм
инÑеллекÑом, огÑаниÑиваÑÑие полÑзование
ÑелеÑоном
+во вÑÐµÐ¼Ñ Ð²Ð¾Ð¶Ð´ÐµÐ½Ð¸Ñ, могÑÑ <a
+href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
+оÑÑлеживаÑÑ ÐºÐ°Ð¶Ð´Ð¾Ðµ ваÑе движение</a>.</p>
</li>
- <li><p>Angry Birds <a
-href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
-ÑÐ¿Ð¸Ð¾Ð½Ð¸Ñ Ð² полÑÐ·Ñ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ð¹, и ÐÐÐ Ñоже
полÑзÑеÑÑÑ ÑÑой возможноÑÑÑÑ
-поÑпиониÑÑ</a>. Рблоге ÐжейÑона Ðонга
опиÑÐ°Ð½Ñ <a
-href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
-дÑÑгие пÑогÑаммÑ-ÑпионÑ</a>.</p>
- <p><a
-href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
-ÐодÑобнее о Ñпионаже ÐÐРпоÑÑедÑÑвом
пÑогÑамм</a>.</p>
+ <li id="M201607160">
+ <p>ÐомпÑÑÑеÑизованнÑе авÑомобили Ñ
неÑвободнÑми пÑогÑаммами ÑвлÑÑÑÑÑ <a
+href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
+ÑпионÑÑими ÑÑÑÑойÑÑвами</a>.</p>
</li>
- <li><p>Ðногие <a
-href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
-игÑовÑе видеопÑиÑÑавки подглÑдÑваÑÑ Ð·Ð°
Ñвоими полÑзоваÑелÑми, поÑÑÐ»Ð°Ñ Ð¾ÑÑеÑÑ
-в ÐнÑеÑнеÑ</a> — даже о Ñом, ÑколÑко иÑ
полÑзоваÑели веÑÑÑ.</p>
+ <li id="M201602240">
+ <p id="nissan-modem">Ð Nissan Leaf еÑÑÑ Ð²ÑÑÑоеннÑй
ÑелеÑоннÑй модем, позволÑÑÑий ÑакÑиÑеÑки
комÑ
+Ñгодно <a
+href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">полÑÑаÑÑ
+ÑдаленнÑй доÑÑÑп к компÑÑÑеÑам и вноÑиÑÑ
Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ Ð² ÑазлиÑнÑе
+наÑÑÑойки</a>.</p>
- <p>ÐгÑÐ¾Ð²Ð°Ñ Ð¿ÑиÑÑавка — ÑÑо
компÑÑÑеÑ, а компÑÑÑеÑÑ Ñ Ð½ÐµÑвободной
-опеÑаÑионной ÑиÑÑемой довеÑÑÑÑ Ð½ÐµÐ»ÑзÑ.</p>
- </li>
+ <p>ÐÑо неÑÑÑдно поÑомÑ, ÑÑо в ÑиÑÑеме неÑ
пÑовеÑки подлинноÑÑи полÑзоваÑÐµÐ»Ñ Ð¿Ñи
+доÑÑÑпе по модемÑ. Ðднако даже еÑли бÑ
модем пÑоводил пÑовеÑкÑ, нелÑÐ·Ñ Ð±Ñло
+Ð±Ñ Ð±ÑÑÑ ÑвеÑеннÑми, ÑÑо Ñ Nissan Ð½ÐµÑ Ð´Ð¾ÑÑÑпа.
ÐÑогÑÐ°Ð¼Ð¼Ñ Ð² авÑомобиле
+неÑвободнÑ, <a
href="/philosophy/free-software-even-more-important.html">ÑÑо
+знаÑиÑ, они ÑÑебÑÑÑ Ð¾Ñ Ð¿Ð¾Ð»ÑзоваÑелей
Ñлепой веÑÑ</a>.</p>
- <li><p>СовÑеменнÑе беÑплаÑнÑе игÑÑ <a
-href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
-ÑобиÑаÑÑ ÑиÑокий ÑпекÑÑ Ð´Ð°Ð½Ð½ÑÑ
о ÑвоиÑ
полÑзоваÑелÑÑ
, а Ñакже иÑ
дÑÑзÑÑÑ
и
-знакомÑÑ
</a>.</p>
+ <p>Ðаже еÑли никÑо не подклÑÑаеÑÑÑ Ðº
авÑÐ¾Ð¼Ð¾Ð±Ð¸Ð»Ñ Ð½Ð° ÑаÑÑÑоÑнии, модем ÑоÑовой
+ÑвÑзи позволÑÐµÑ ÑелеÑонной компании
поÑÑоÑнно оÑÑлеживаÑÑ Ð¿ÐµÑемеÑениÑ
+авÑомобилÑ; Ñ
оÑÑ Ð¼Ð¾Ð¶Ð½Ð¾ ÑизиÑеÑки ÑдалиÑÑ
модем ÑоÑовой ÑвÑзи.</p>
+ </li>
- <p>Ð¥Ñже Ñого — они делаÑÑ ÑÑо по
ÑекламнÑм ÑеÑÑм, коÑоÑÑе обÑединÑÑÑ
-даннÑе, ÑобÑаннÑе ÑазлиÑнÑми пÑогÑаммами
и ÑайÑами Ñакого Ñода, ÑделаннÑми
-ÑазнÑми компаниÑми.</p>
+ <li id="M201306140">
+ <p>ÐвÑомобили Tesla позволÑÑÑ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ð¸
полÑÑаÑÑ Ð´Ð°Ð½Ð½Ñе на ÑаÑÑÑоÑнии, а Ñакже
+опÑеделÑÑÑ Ð¼ÐµÑÑоположение авÑÐ¾Ð¼Ð¾Ð±Ð¸Ð»Ñ Ð²
лÑбой Ð¼Ð¾Ð¼ÐµÐ½Ñ (Ñм. паÑагÑаÑÑ b и c
+Ñаздела 2 <a
+href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+в Ñведомлении о конÑиденÑиалÑноÑÑи</a>).
ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ ÑÑвеÑждаеÑ, ÑÑо она не
+Ñ
ÑÐ°Ð½Ð¸Ñ ÑÑиÑ
Ñведений, но еÑли гоÑÑдаÑÑÑво
пÑиказÑÐ²Ð°ÐµÑ ÑобиÑаÑÑ Ð¸ пеÑедаваÑÑ
+ÑÑи даннÑе, Ñо оно Ð¼Ð¾Ð¶ÐµÑ Ð¸Ñ
ÑоÑ
ÑанÑÑÑ.</p>
+ </li>
- <p>Ðни пÑименÑÑÑ ÑÑи даннÑе, ÑÑобÑ
навÑзÑваÑÑ Ð»ÑдÑм покÑпки; они оÑ
оÑÑÑÑÑ Ð½Ð°
-“киÑов”, коÑоÑÑÑ
можно заÑÑавиÑÑ
ÑÑаÑиÑÑ Ð¼Ð½Ð¾Ð³Ð¾ денег. Ðни
-полÑзÑÑÑÑÑ Ñакже ÑеÑнÑм Ñ
одом, ÑÑобÑ
подÑаÑовÑваÑÑ Ð¸Ð³ÑÑ Ð² полÑÐ·Ñ ÐºÐ¾Ð½ÐºÑеÑнÑÑ
-игÑоков.</p>
+ <li id="M201303250">
+ <p id="records-drivers">ÐеÑвободнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð²
авÑомобилÑÑ
<a
+href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">запиÑÑваÑÑ
+ÑÐ²ÐµÐ´ÐµÐ½Ð¸Ñ Ð¾ движениÑÑ
водиÑелей</a>, а заÑем
пеÑедаÑÑ Ð¸Ñ
пÑоизводиÑелÑм
+авÑомобилÑ, ÑÑÑаÑ
овÑм компаниÑм и
пÑоÑим.</p>
- <p>ХоÑÑ ÑÑаÑÑÑ Ð¾Ð¿Ð¸ÑÑÐ²Ð°ÐµÑ Ð±ÐµÑплаÑнÑе
игÑÑ, ÑÐ°ÐºÐ°Ñ Ð¶Ðµ ÑакÑика Ð¼Ð¾Ð¶ÐµÑ Ð¿ÑименÑÑÑÑÑ Ð¸
-в плаÑнÑÑ
игÑаÑ
.</p>
+ <p>СлÑÑай Ñ ÑиÑÑемой ÑбоÑа плаÑежей,
ÑпомÑнÑÑÑй в ÑÑой ÑÑаÑÑе, в
+дейÑÑвиÑелÑноÑÑи не Ð¸Ð¼ÐµÐµÑ Ð¾ÑноÑÐµÐ½Ð¸Ñ Ðº
Ñлежке неÑвободнÑми пÑогÑаммами. ÐÑи
+ÑиÑÑÐµÐ¼Ñ Ð¿ÑедÑÑавлÑÑÑ Ð½ÐµÐ´Ð¾Ð¿ÑÑÑимое
вÑоÑжение в лиÑнÑÑ Ð¶Ð¸Ð·Ð½Ñ Ð¸ Ð´Ð¾Ð»Ð¶Ð½Ñ Ð±ÑÑÑ
+Ð·Ð°Ð¼ÐµÐ½ÐµÐ½Ñ Ð½Ð° ÑиÑÑÐµÐ¼Ñ Ð°Ð½Ð¾Ð½Ð¸Ð¼Ð½ÑÑ
плаÑежей, но
вÑоÑжение оÑÑÑеÑÑвлÑÑÑ Ð½Ðµ
+вÑедоноÑнÑе пÑогÑаммÑ. РдÑÑгиÑ
ÑлÑÑаÑÑ
,
ÑпомÑнÑÑÑÑ
в ÑÑаÑÑе, Ð¼Ñ Ð¸Ð¼ÐµÐµÐ¼ дело
+Ñ Ð²ÑедоноÑнÑми неÑвободнÑми пÑогÑаммами в
авÑомобиле.</p>
</li>
</ul>
-<!-- #SpywareAtRecreation -->
-<div class="big-section">
- <h3 id="SpywareAtRecreation">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð½Ð° оÑдÑÑ
е</h3>
- <span class="anchor-reference-id"> (<a
-href="#SpywareAtRecreation">#SpywareAtRecreation</a>)</span>
+
+<div class="big-subsection">
+ <h4 id="SpywareInVR">ÐиÑÑÑалÑÐ½Ð°Ñ ÑеалÑноÑÑÑ</h4>
+ <span class="anchor-reference-id">(<a
+href="#SpywareInVR">#SpywareInVR</a>)</span>
</div>
-<div style="clear: left;"></div>
-<ul>
- <li><p>ÐолÑзоваÑели ÑÑдÑÑÑÑ Ñ Bose за <a
-href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
-ÑаÑпÑоÑÑÑанение ÑпионÑкой пÑогÑÐ°Ð¼Ð¼Ñ Ð²
наÑÑникаÑ
</a>. ÐонкÑеÑно, пÑиложение
-запиÑÑÐ²Ð°ÐµÑ Ð¸Ð¼ÐµÐ½Ð° звÑковÑÑ
Ñайлов, коÑоÑÑе
пÑоÑлÑÑиваÑÑ Ð¿Ð¾Ð»ÑзоваÑели, а Ñакже
-ÑникалÑнÑй ÑеÑийнÑй Ð½Ð¾Ð¼ÐµÑ Ð½Ð°ÑÑников.
- </p>
- <p>Ð ÑÑде пÑедÑÑвлено обвинение, ÑÑо ÑÑо
делаеÑÑÑ Ð±ÐµÐ· ÑоглаÑиÑ
-полÑзоваÑелÑ. ÐÑли Ð±Ñ Ð¿Ñиложение пиÑало
мелким ÑÑиÑÑом, ÑÑо полÑзоваÑели на
-ÑÑо ÑоглаÑаÑÑÑÑ, бÑло ли Ð±Ñ ÑÑо пÑиемлемо?
Ðи в коем ÑлÑÑае! Ðакон должен
-однознаÑно <a href="/philosophy/surveillance-vs-democracy.html">
запÑеÑаÑÑ
-закладÑваÑÑ Ð² пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð»ÑбÑÑ ÑлежкÑ</a>.
- </p>
+<ul class="blurbs">
+ <li id="M201612230">
+ <p>ÐбоÑÑдование Ð´Ð»Ñ Ð²Ð¸ÑÑÑалÑной
ÑеалÑноÑÑи, измеÑÑÑÑее ÑамÑе неболÑÑие
+движениÑ, ÑÐ¾Ð·Ð´Ð°ÐµÑ Ð²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾ÑÑ Ð´Ð»Ñ
беÑпÑеÑеденÑно ÑÑÑогой Ñлежки за
+полÑзоваÑелем. ÐÑе, ÑÑо нÑжно длÑ
ÑеализаÑии ÑÑой возможноÑÑи —
+<a
+href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/">пÑогÑаммÑ,
+вÑедоноÑнÑе в Ñакой же ÑÑепени, как многие
дÑÑгие пÑогÑаммÑ, пеÑеÑиÑленнÑе
+на ÑÑой ÑÑÑаниÑе</a>.</p>
+
+ <p>Ðожно бÑÑÑ ÑвеÑеннÑм, ÑÑо Facebook
ÑеализÑÐµÑ Ð¼Ð°ÐºÑималÑно возможнÑÑ ÑÐ»ÐµÐ¶ÐºÑ Ð²
+ÑÑÑÑойÑÑваÑ
Oculus Rift. ÐоÑалÑ: никогда не
довеÑÑйÑе ÑиÑÑеме виÑÑÑалÑной
+ÑеалÑноÑÑи, пÑогÑÐ°Ð¼Ð¼Ñ Ð² коÑоÑой
неÑвободнÑ.</p>
</li>
</ul>
-<!-- #SpywareOnTheWeb -->
+
+
<div class="big-section">
<h3 id="SpywareOnTheWeb">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð²
ÐнÑеÑнеÑе</h3>
<span class="anchor-reference-id">(<a
@@ -1573,38 +1779,38 @@
“ÑвободнÑй” и “неÑвободнÑй”
Ð´Ð»Ñ Ð½Ð¸Ñ
не имеÑÑ
ÑмÑÑла</a>, но вÑе Ñавно Ñлежка ÑвлÑеÑÑÑ
злоÑпоÑÑеблением.</p>
-<ul>
- <li><p> ÐÑогÑамма Storyful <a
+<ul class="blurbs">
+ <li id="M201805170">
+ <p>ÐÑогÑамма Storyful <a
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch">ÑпиониÑ
-за ÑепоÑÑеÑами, коÑоÑÑе ÐµÑ Ð¿Ð¾Ð»ÑзÑÑÑÑÑ</a>.
- </p></li>
+за ÑепоÑÑеÑами, коÑоÑÑе ÐµÑ Ð¿Ð¾Ð»ÑзÑÑÑÑÑ</a>.</p>
+ </li>
- <li><p>Ðогда Ð´Ð»Ñ ÐºÐ¾Ð¼Ð¼ÐµÐ½ÑаÑиев на ÑÑÑаниÑе
пÑименÑеÑÑÑ Disqus, <a
-href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook">неÑвободнаÑ
-пÑогÑамма Disqus загÑÑÐ¶Ð°ÐµÑ Ð¿Ð°ÐºÐµÑ Ð¿ÑогÑамм из
Facebook в бÑаÑÐ·ÐµÑ ÐºÐ°Ð¶Ð´Ð¾Ð¼Ñ
-Ð°Ð½Ð¾Ð½Ð¸Ð¼Ð½Ð¾Ð¼Ñ Ð¿Ð¾ÑеÑиÑÐµÐ»Ñ Ð¸ оÑÑÑÐ»Ð°ÐµÑ URL
ÑÑÑаниÑÑ Ð² Facebook</a>.
- </p></li>
+ <li id="M201701060">
+ <p>Ðогда Ð´Ð»Ñ ÐºÐ¾Ð¼Ð¼ÐµÐ½ÑаÑиев на ÑÑÑаниÑе
пÑименÑеÑÑÑ Disqus, неÑÐ²Ð¾Ð±Ð¾Ð´Ð½Ð°Ñ Ð¿ÑогÑамма
+Disqus <a
+href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook">загÑÑжаеÑ
+Ð¿Ð°ÐºÐµÑ Ð¿ÑогÑамм из Facebook в бÑаÑÐ·ÐµÑ ÐºÐ°Ð¶Ð´Ð¾Ð¼Ñ
Ð°Ð½Ð¾Ð½Ð¸Ð¼Ð½Ð¾Ð¼Ñ Ð¿Ð¾ÑеÑиÑÐµÐ»Ñ Ð¸
+оÑÑÑÐ»Ð°ÐµÑ URL ÑÑÑаниÑÑ Ð² Facebook</a>.</p>
+ </li>
- <li><p>ÐÑи ÑоÑговле по ÐнÑеÑнеÑÑ Ñлежка за
клиенÑами <a
+ <li id="M201612064">
+ <p>ÐÑи ÑоÑговле по ÐнÑеÑнеÑÑ Ñлежка за
клиенÑами <a
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices">
позволÑÐµÑ Ð¿ÑодавÑам показÑваÑÑ ÑазнÑм
лÑдÑм ÑазнÑе ÑенÑ</a>. Слежка по
болÑÑей ÑаÑÑи пÑоводиÑÑÑ ÑеÑез запиÑÑ
взаимодейÑÑÐ²Ð¸Ñ Ñ ÑеÑвеÑами, но
неÑвободнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð²Ð½Ð¾ÑÑÑ Ñвой вклад.</p>
</li>
- <li><p><a
-href="https://www.techrepublic.com/blog/asian-technology/japanese-government-warns-baidu-ime-is-spying-on-users/">
-ÐÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð´Ð»Ñ Ð²Ð²Ð¾Ð´Ð° ÑпонÑкого и
киÑайÑкого ÑекÑÑа Baidu ÑпионÑÑ Ð·Ð° Ñвоими
-полÑзоваÑелÑми</a>.</p>
- </li>
-
- <li><p>СÑÑаниÑÑ Ñ ÐºÐ½Ð¾Ð¿ÐºÐ°Ð¼Ð¸ “ÐÑавиÑÑÑ” <a
-href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html">
-позволÑÑÑ Facebook оÑÑлеживаÑÑ Ð¿Ð¾ÑеÑиÑелей
ÑÑиÑ
ÑÑÑаниÑ</a> —
-даже ÑеÑ
, Ñ ÐºÐ¾Ð³Ð¾ Ð½ÐµÑ ÑÑеÑной запиÑи Facebook.</p>
+ <li id="M201405140">
+ <p><a
+href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">
+Microsoft SkyDrive позволÑÐµÑ ÐÐРнепоÑÑедÑÑвенно
пÑоÑмаÑÑиваÑÑ Ð´Ð°Ð½Ð½Ñе
+полÑзоваÑелÑ</a>.</p>
</li>
- <li><p>Ðногие ÑайÑÑ Ð²ÑдаÑÑ ÑвоиÑ
поÑеÑиÑелей ÑекламнÑм ÑеÑÑм, коÑоÑÑе
оÑÑлеживаÑÑ
+ <li id="M201210240">
+ <p>Ðногие ÑайÑÑ Ð²ÑдаÑÑ ÑвоиÑ
поÑеÑиÑелей
ÑекламнÑм ÑеÑÑм, коÑоÑÑе оÑÑлеживаÑÑ
полÑзоваÑелей. Ðз ÑÑÑÑÑи наиболее
попÑлÑÑнÑÑ
ÑайÑов (на май 2012 года)
<a
href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/">93%
@@ -1612,48 +1818,60 @@
оÑÑлеживаÑÑ Ð¸Ñ
</a>.</p>
</li>
- <li><p>Ðногие ÑайÑÑ Ð´Ð¾ÐºÐ»Ð°Ð´ÑваÑÑ Ð¾ вÑеÑ
ÑвоиÑ
поÑеÑиÑелÑÑ
в Google, полÑзÑÑÑÑ
+ <li id="M201208210">
+ <p>Ðногие ÑайÑÑ Ð´Ð¾ÐºÐ»Ð°Ð´ÑваÑÑ Ð¾ вÑеÑ
ÑвоиÑ
поÑеÑиÑелÑÑ
в Google, полÑзÑÑÑÑ
ÑлÑжбой Google Analytics, коÑоÑÐ°Ñ <a
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
ÑообÑÐ°ÐµÑ Ð² Google об иÑ
адÑеÑаÑ
IP и ÑÑÑаниÑаÑ
,
коÑоÑÑе они поÑеÑили</a>.</p>
</li>
- <li><p>Ðногие ÑайÑÑ ÐнÑеÑнеÑа пÑÑаÑÑÑÑ
ÑобиÑаÑÑ Ð°Ð´ÑеÑнÑе книжки полÑзоваÑелей
+ <li id="M201200000">
+ <p>Ðногие ÑайÑÑ ÐнÑеÑнеÑа пÑÑаÑÑÑÑ
ÑобиÑаÑÑ Ð°Ð´ÑеÑнÑе книжки полÑзоваÑелей
(ÑпиÑки ÑелеÑонов или ÑлекÑÑоннÑÑ
адÑеÑов
дÑÑгиÑ
лÑдей, коÑоÑÑе Ñ
ÑанÑÑÑÑ Ñ
полÑзоваÑелей). ÐÑо наÑÑÑаеÑ
непÑикоÑновенноÑÑÑ ÑаÑÑной жизни лÑдей,
запиÑаннÑÑ
в ÑÑиÑ
книжкаÑ
.</p>
</li>
- <li><p><a
-href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">
-Microsoft SkyDrive позволÑÐµÑ ÐÐРнепоÑÑедÑÑвенно
пÑоÑмаÑÑиваÑÑ Ð´Ð°Ð½Ð½Ñе
-полÑзоваÑелÑ</a>.</p>
+ <li id="M201110040">
+ <p>СÑÑаниÑÑ Ñ ÐºÐ½Ð¾Ð¿ÐºÐ°Ð¼Ð¸ “ÐÑавиÑÑÑ” <a
+href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html">
+позволÑÑÑ Facebook оÑÑлеживаÑÑ Ð¿Ð¾ÑеÑиÑелей
ÑÑиÑ
ÑÑÑаниÑ</a> —
+даже ÑеÑ
, Ñ ÐºÐ¾Ð³Ð¾ Ð½ÐµÑ ÑÑеÑной запиÑи Facebook.</p>
</li>
</ul>
-<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
+
<div class="big-subsection">
- <h4 id="SpywareInFlash">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð² JavaScript и
Flash</h4>
+ <h4 id="SpywareInJavaScript">JavaScript</h4>
<span class="anchor-reference-id">(<a
-href="#SpywareInFlash">#SpywareInFlash</a>)</span>
+href="#SpywareInJavaScript">#SpywareInJavaScript</a>)</span>
</div>
-<ul>
- <li>
+<ul class="blurbs">
+ <li id="M201807190">
<p>British Airways полÑзовалиÑÑ Ð½Ð° Ñвоем ÑайÑе <a
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security">неÑвободнÑми
пÑогÑаммами на JavaScript, ÑÑÐ¾Ð±Ñ Ð²ÑдаваÑÑ
пеÑÑоналÑнÑе даннÑе ÑвоиÑ
клиенÑов
дÑÑгим компаниÑм</a>.</p>
</li>
- <li>
+ <li id="M201712300">
<p>ÐекоÑоÑÑе вÑедоноÑнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð°
JavaScript <a
href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research">
ÑпиÑÑваÑÑ Ð¸Ð¼ÐµÐ½Ð° полÑзоваÑелей из пÑогÑамм
Ñ
ÑÐ°Ð½ÐµÐ½Ð¸Ñ Ð¿Ð°Ñолей на базе
бÑаÑзеÑа</a>.</p>
</li>
- <li>
+ <li id="M201712210">
+ <p>Ðногие ÑайÑÑ Ð¿Ð¾Ð»ÑзÑÑÑÑÑ Ð¿ÑогÑаммами
на JavaScript, ÑÑÐ¾Ð±Ñ <a
+href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">подглÑдÑваÑÑ,
+ÑÑо полÑзоваÑели ввели в ÑоÑмÑ, но не
оÑпÑавили</a>, ÑÑÐ¾Ð±Ñ Ð¾Ð¿ÑеделиÑÑ Ð¸Ñ
+лиÑноÑÑÑ. Ðа некоÑоÑÑÑ
<a
+href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
+подали за ÑÑо в ÑÑд</a>.</p>
+ </li>
+
+ <li id="M201711150">
<p>ÐекоÑоÑÑе ÑайÑÑ Ð¿Ð¾ÑÑлаÑÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð°
JavaScript, ÑобиÑаÑÑие вÑе, ÑÑо вводиÑ
полÑзоваÑелÑ, <a
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/">а
@@ -1662,120 +1880,93 @@
<p>ÐÑли полÑзоваÑÑÑÑ LibreJS, Ñо ÑÑи
вÑедоноÑнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð° JavaScript
блокиÑÑÑÑÑÑ.</p>
</li>
+</ul>
- <li><p>Ðногие ÑайÑÑ Ð¿Ð¾Ð»ÑзÑÑÑÑÑ Ð¿ÑогÑаммами
на JavaScript, ÑÑÐ¾Ð±Ñ <a
-href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">подглÑдÑваÑÑ,
-ÑÑо полÑзоваÑели ввели в ÑоÑмÑ, но не
оÑпÑавили</a>, ÑÑÐ¾Ð±Ñ Ð¾Ð¿ÑеделиÑÑ Ð¸Ñ
-лиÑноÑÑÑ. Ðа некоÑоÑÑÑ
<a
-href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
-подали за ÑÑо в ÑÑд</a>.</p>
- </li>
- <li><p>ФÑнкÑÐ¸Ñ Ð¿ÑоигÑÑваÑÐµÐ»Ñ <a
-href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">
-Flash Ð¿Ð¾Ð¼Ð¾Ð³Ð°ÐµÑ ÑайÑам оÑÑлеживаÑÑ
поÑеÑиÑелей</a>.</p>
- </li>
+<div class="big-subsection">
+ <h4 id="SpywareInFlash">Flash</h4>
+ <span class="anchor-reference-id">(<a
+href="#SpywareInFlash">#SpywareInFlash</a>)</span>
+</div>
- <li><p>Flash и JavaScript Ñакже могÑÑ Ð¿ÑименÑÑÑ Ð´Ð»Ñ <a
+<ul class="blurbs">
+ <li id="M201310110">
+ <p>Flash и JavaScript пÑименÑÑÑ Ð´Ð»Ñ <a
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
ÑнÑÑÐ¸Ñ “оÑпеÑаÑков палÑÑев”
ÑÑÑÑойÑÑв</a> Ñ ÑелÑÑ Ð¸Ð´ÐµÐ½ÑиÑикаÑии
полÑзоваÑелей.</p>
</li>
+
+ <li id="M201003010">
+ <p>ФÑнкÑÐ¸Ñ Ð¿ÑоигÑÑваÑÐµÐ»Ñ <a
+href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">
+Flash Ð¿Ð¾Ð¼Ð¾Ð³Ð°ÐµÑ ÑайÑам оÑÑлеживаÑÑ
поÑеÑиÑелей</a>.</p>
+ </li>
</ul>
-<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
+
<div class="big-subsection">
- <h4 id="SpywareInChrome">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð² Chrome</h4>
+ <h4 id="SpywareInChrome">Chrome</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInChrome">#SpywareInChrome</a>)</span>
</div>
-<ul>
- <li><p>Google Chrome <a
-href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/">
-подÑмаÑÑÐ¸Ð²Ð°ÐµÑ Ð·Ð° иÑÑоÑией бÑаÑзеÑов, за
ÑоÑиалÑнÑми гÑÑппами </a> и за
-дÑÑгими ÑÑÑановленнÑми пÑогÑаммами.
- </p>
- </li>
- <li><p>Google Chrome ÑодеÑÐ¶Ð¸Ñ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ð·Ð°Ð¿Ð¸Ñи
нажаÑий на клавиÑи, коÑоÑÐ°Ñ <a
-href="http://www.favbrowser.com/google-chrome-spyware-confirmed/">
-оÑпÑавлÑÐµÑ Ð² Google каждÑй набÑаннÑй URL</a>, по
одной клавиÑе за Ñаз.</p>
+<ul class="blurbs">
+ <li id="M201507280">
+ <p>Google Chrome легко позволÑÐµÑ ÑаÑÑиÑениÑ
веÑÑи <a
+href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/">полнÑÑ
+ÑÐ»ÐµÐ¶ÐºÑ Ð·Ð° полÑзованием бÑаÑзеÑом</a>, и
многие из ниÑ
Ñак и делаÑÑ.</p>
</li>
- <li><p>Google Chrome вклÑÑÐ°ÐµÑ Ð² ÑÐµÐ±Ñ Ð¼Ð¾Ð´ÑлÑ,
коÑоÑÑй <a
+ <li id="M201506180">
+ <p>Google Chrome вклÑÑÐ°ÐµÑ Ð² ÑÐµÐ±Ñ Ð¼Ð¾Ð´ÑлÑ, коÑоÑÑй
<a
href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/">
акÑивиÑÑÐµÑ Ð¼Ð¸ÐºÑоÑÐ¾Ð½Ñ Ð¸ пеÑÐµÐ´Ð°ÐµÑ Ð·Ð²Ñк на
Ñвои ÑеÑвеÑÑ</a>.</p>
</li>
- <li><p>Google Chrome легко позволÑÐµÑ ÑаÑÑиÑениÑ
веÑÑи <a
-href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/">полнÑÑ
-ÑÐ»ÐµÐ¶ÐºÑ Ð·Ð° полÑзованием бÑаÑзеÑом</a>, и
многие из ниÑ
Ñак и делаÑÑ.</p>
+ <li id="M201308040">
+ <p>Google Chrome <a
+href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/">
+подÑмаÑÑÐ¸Ð²Ð°ÐµÑ Ð·Ð° иÑÑоÑией бÑаÑзеÑов, за
ÑоÑиалÑнÑми гÑÑппами </a> и за
+дÑÑгими ÑÑÑановленнÑми пÑогÑаммами.</p>
</li>
-</ul>
-
-<!-- #SpywareInDrones -->
-<div class="big-section">
- <h3 id="SpywareInDrones">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð²
беÑпилоÑникаÑ
</h3>
- <span class="anchor-reference-id">(<a
-href="#SpywareInDrones">#SpywareInDrones</a>)</span>
-</div>
-<div style="clear: left;"></div>
-<ul>
- <li>
- <p>Ðока Ð²Ñ Ð¿Ð¾Ð»ÑзÑеÑеÑÑ Ð±ÐµÑпилоÑником DJI,
ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð´Ð³Ð»ÑдÑваÑÑ Ð·Ð° дÑÑгими, <a
-href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">DJI
-во многиÑ
ÑлÑÑаÑÑ
подглÑдÑÐ²Ð°ÐµÑ Ð·Ð°
вами</a>.</p>
+ <li id="M200809060">
+ <p>Google Chrome ÑодеÑÐ¶Ð¸Ñ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ð·Ð°Ð¿Ð¸Ñи
нажаÑий на клавиÑи, коÑоÑÐ°Ñ <a
+href="http://www.favbrowser.com/google-chrome-spyware-confirmed/">
+оÑпÑавлÑÐµÑ Ð² Google каждÑй набÑаннÑй URL</a>, по
одной клавиÑе за Ñаз.</p>
</li>
</ul>
-<!-- #SpywareEverywhere -->
-<div class="big-section">
- <h3 id="SpywareEverywhere">ÐÑогÑаммÑ-ÑпионÑ
повÑÑдÑ</h3>
- <span class="anchor-reference-id">(<a
-href="#SpywareEverywhere">#SpywareEverywhere</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>ÐÑÑеÑÑвенное пÑодолжение надзоÑа за
лÑдÑми пÑи поÑÑедÑÑве “иÑ
”
-ÑелеÑонов — <a
-href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
-неÑÐ²Ð¾Ð±Ð¾Ð´Ð½Ð°Ñ Ð¿ÑогÑамма Ð´Ð»Ñ Ð¿ÑовеÑки Ñого,
ÑÑо они не “обведÑÑ”
-надзиÑаÑелей “вокÑÑг палÑÑа”</a>.</p>
- </li>
- <li><p><a
-href="https://www.pocket-lint.com/laptops/news/intel/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping">
-УÑÑÑойÑÑва Intel ÑмогÑÑ Ð¿ÑоÑлÑÑиваÑÑ ÑеÑÑ
вÑегда, даже когда они
-“вÑклÑÑенє.</a></p>
- </li>
-</ul>
-<!-- #SpywareInVR -->
<div class="big-section">
- <h3 id="SpywareInVR">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð²
виÑÑÑалÑной ÑеалÑноÑÑи</h3>
+ <h3 id="SpywareInNetworks">СеÑи</h3>
<span class="anchor-reference-id">(<a
-href="#SpywareInVR">#SpywareInVR</a>)</span>
+href="#SpywareInNetworks">#SpywareInNetworks</a>)</span>
</div>
<div style="clear: left;"></div>
-<ul>
- <li><p>ÐбоÑÑдование Ð´Ð»Ñ Ð²Ð¸ÑÑÑалÑной
ÑеалÑноÑÑи, измеÑÑÑÑее ÑамÑе неболÑÑие
-движениÑ, ÑÐ¾Ð·Ð´Ð°ÐµÑ Ð²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾ÑÑ Ð´Ð»Ñ
беÑпÑеÑеденÑно ÑÑÑогой Ñлежки за
-полÑзоваÑелем. ÐÑе, ÑÑо нÑжно длÑ
ÑеализаÑии ÑÑой возможноÑÑи —
-<a
-href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/">пÑогÑаммÑ,
-вÑедоноÑнÑе в Ñакой же ÑÑепени, как многие
дÑÑгие пÑогÑаммÑ, пеÑеÑиÑленнÑе
-на ÑÑой ÑÑÑаниÑе</a>.</p>
+<ul class="blurbs">
+ <li id="M201606030">
+ <p>РаÑÑледование показÑваеÑ, ÑÑо <a
+href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">ЦенÑÑ
+пÑавиÑелÑÑÑвенной ÑвÑзи ÐеликобÑиÑании
полÑзÑеÑÑÑ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñми СШРи ÐÐРдлÑ
+обÑ
ода огÑаниÑений по Ñлежке внÑÑÑи
ÑÑÑанÑ</a>.</p>
- <p>Ðожно бÑÑÑ ÑвеÑеннÑм, ÑÑо Facebook
ÑеализÑÐµÑ Ð¼Ð°ÐºÑималÑно возможнÑÑ ÑÐ»ÐµÐ¶ÐºÑ Ð²
-ÑÑÑÑойÑÑваÑ
Oculus Rift. ÐоÑалÑ: никогда не
довеÑÑйÑе ÑиÑÑеме виÑÑÑалÑной
-ÑеалÑноÑÑи, пÑогÑÐ°Ð¼Ð¼Ñ Ð² коÑоÑой
неÑвободнÑ.</p>
+ <p>ÐонкÑеÑно, ÑпеÑÑлÑжба Ð¼Ð¾Ð¶ÐµÑ Ñаким
обÑазом ÑобиÑаÑÑ ÑлекÑÑоннÑÑ Ð¿Ð¾ÑÑÑ Ñленов
+паÑламенÑа, поÑÐ¾Ð¼Ñ ÑÑо она пÑоÑ
Ð¾Ð´Ð¸Ñ ÑеÑез
Microsoft.</p>
+ </li>
+
+ <li id="M201212290">
+ <p>ТелеÑÐ¾Ð½Ñ TNP Cisco ÑвлÑÑÑÑÑ <a
+href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+ÑÑÑÑойÑÑвами Ñлежки</a>.</p>
</li>
</ul>
+
<div class="translators-notes">
<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
@@ -1852,7 +2043,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/09/12 13:57:56 $
+$Date: 2018/09/30 19:27:48 $
<!-- timestamp end -->
</p>
Index: po/malware-cars.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.ru-en.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- po/malware-cars.ru-en.html 25 Jul 2018 16:30:38 -0000 1.3
+++ po/malware-cars.ru-en.html 30 Sep 2018 19:27:48 -0000 1.4
@@ -1,5 +1,10 @@
<!--#include virtual="/server/header.html" -->
<!-- Parent-Version: 1.84 -->
+<!--
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ Generated from propr-blurbs.rec. Please do not edit this file manually !
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
<title>Malware In Cars
- GNU Project - Free Software Foundation</title>
<!--#include virtual="/proprietary/po/malware-cars.translist" -->
@@ -18,133 +23,165 @@
<p>Here are examples of malware in cars.</p>
-<ul>
-<li>
-<p>Tesla used a universal backdoor in its software to limit customers to
-using just <a
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/">
-part of the battery of some cars</a>.</p>
-
-<p>While remotely allowing car “owners” to use the whole battery
-capacity did not do them any harm, the same back door would permit
-Tesla (perhaps under the command of some government) to remotely order
-the car to use none of its battery. Or perhaps to drive its passenger
-to a torture prison.</p>
-</li>
-
-<li>
-<a
-href="http://jalopnik.com/america-figured-out-a-new-way-audi-cheated-on-emissions-1788630969">
-Audi's proprietary software used a simple method to cheat on emissions
-tests</a>: to activate a special low-emission gearshifting mode until the
-first time the car made a turn.
-</li>
-
-<li>
-<p>Caterpillar vehicles come with a <a
-href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">
-back-door to shutoff the engine</a> remotely.</p>
-</li>
-
-<li>
-<p><a
-href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions">
-Volkswagen programmed its car engine computers to detect the
-Environmental Protection Agency's emission tests</a>,
-and run dirty the rest of the time.</p>
-
-<p>In real driving, the cars exceeded emissions standards by a factor
-of up to 35.</p>
-
-<p>Using free software would not have stopped Volkswagen from
-programming it this way, but would have made it harder to conceal.</p>
-</li>
-
-<li>
-<p><a
href="https://www.eff.org/deeplinks/2013/11/drm-cars-will-drive-consumers-crazy">
-DRM in cars will drive consumers crazy</a>.</p>
-</li>
-
-<li>
-<p>
-The Nissan Leaf has a built-in cell phone modem which allows
-effectively anyone to <a
-href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">
-access its computers remotely and make changes in various
-settings</a>.</p>
-
-<p>That's easy to do because the system has no authentication when
-accessed through the modem. However, even if it asked for
-authentication, you couldn't be confident that Nissan has no
-access. The software in the car is
-proprietary, <a href="/philosophy/free-software-even-more-important.html">which
-means it demands blind faith from its users</a>.</p>
-
-<p>Even if no one connects to the car remotely, the cell phone modem
-enables the phone company to track the car's movements all the time;
-it is possible to physically remove the cell phone modem though.</p>
-</li>
-
-<li>
-<p>Security researchers discovered a <a
-href="http://www.theguardian.com/technology/2015/aug/12/hack-car-brakes-sms-text">
-vulnerability in diagnostic dongles used for vehicle tracking and
-insurance</a> that let them take remote control of a car or
-lorry using an SMS.</p>
-</li>
-
-<li>
-<p>Crackers were able to <a
-href="http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/">
-take remote control of the Jeep</a> “connected car”.</p>
-
-<p>They could track the car, start or stop the engine, and
-activate or deactivate the brakes, and more.</p>
-
-<p>I expect that Chrysler and the NSA can do this too.</p>
-
-<p>If I ever own a car, and it contains a portable phone, I will
-deactivate that.</p>
-</li>
-
-<li>
-<p>It is possible to <a
-href="http://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/">
-take control of some car computers through malware in music files</a>.
-Also <a
-href="http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0">by
-radio</a>. More information in <a
-href="http://www.autosec.org/faq.html"> Automotive Security And
-Privacy Center</a>.</p>
-</li>
-
-<li><p>Computerized cars with nonfree software are <a
-href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
-snooping devices</a>.</p>
-</li>
-
-<li>
-<p>Proprietary software in cars <a
-href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">
-records information about drivers' movements</a>, which is made
-available to car manufacturers, insurance companies, and others.</p>
-
-<p>The case of toll-collection systems, mentioned in this article, is not
-really a matter of proprietary surveillance. These systems are an
-intolerable invasion of privacy, and should be replaced with anonymous
-payment systems, but the invasion isn't done by malware. The other
-cases mentioned are done by proprietary malware in the car.</p>
-</li>
-
-<li>
-<p>Tesla cars allow the company to extract data remotely and determine
-the car's location at any time. (See <a
-href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
-Section 2, paragraphs b and c.</a>). The company says it doesn't
-store this information, but if the state orders it to get the data and
-hand it over, the state can store it.</p>
-</li>
+<ul class="blurbs">
+ <li id="M201711230">
+ <p>AI-powered driving apps can <a
+
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
+ track your every move</a>.</p>
+ </li>
+
+ <li id="M201709290">
+ <p>Bad security in some cars makes it possible to <a
+ href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937">
+ remotely activate the airbags</a>.</p>
+ </li>
+
+ <li id="M201709091">
+ <p>Tesla used software to limit the
+ part of the battery that was available to customers, and <a
+
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/">
+ a universal back door in the software</a> to temporarily increase
+ this limit.</p>
+
+ <p>While remotely allowing car “owners” to use the
+ whole battery capacity did not do them any harm, the same back
+ door would permit Tesla (perhaps under the command of some
+ government) to remotely order the car to use none of its battery. Or
+ perhaps to drive its passenger to a torture prison.</p>
+ </li>
+
+ <li id="M201702170">
+ <p>The mobile apps for communicating <a
+
href="https://www.bleepingcomputer.com/news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/">with
+ a smart but foolish car have very bad security</a>.</p>
+
+ <p>This is in addition to the fact that the car contains a cellular
+ modem that tells big brother all the time where it is. If you own
+ such a car, it would be wise to disconnect the modem so as to turn
+ off the tracking.</p>
+ </li>
+
+ <li id="M201611060">
+ <p><a
+
href="http://jalopnik.com/america-figured-out-a-new-way-audi-cheated-on-emissions-1788630969">
+ Audi's proprietary software used a simple method to cheat on emissions
+ tests</a>: to activate a special low-emission gearshifting mode until
+ the first time the car made a turn.</p>
+ </li>
+
+ <li id="M201608110">
+ <p>Due to weak security, <a
+
href="http://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844">it
+ is easy to open the doors of 100 million cars built by
+ Volkswagen</a>.</p>
+ </li>
+
+ <li id="M201607160">
+ <p>Computerized cars with nonfree software are <a
+
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
+ snooping devices</a>.</p>
+ </li>
+
+ <li id="M201602240">
+ <p id="nissan-modem">The Nissan Leaf has a built-in
+ cell phone modem which allows effectively anyone to <a
+ href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">
+ access its computers remotely and make changes in various
+ settings</a>.</p>
+
+ <p>That's easy to do because the system has no authentication
+ when accessed through the modem. However, even if it asked
+ for authentication, you couldn't be confident that Nissan
+ has no access. The software in the car is proprietary, <a
+ href="/philosophy/free-software-even-more-important.html">which means
+ it demands blind faith from its users</a>.</p>
+
+ <p>Even if no one connects to the car remotely, the cell phone modem
+ enables the phone company to track the car's movements all the time;
+ it is possible to physically remove the cell phone modem, though.</p>
+ </li>
+
+ <li id="M201511194">
+ <p>Caterpillar vehicles come with <a
+
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">
+ a back door to shutoff the engine</a> remotely.</p>
+ </li>
+
+ <li id="M201509210">
+ <p>Volkswagen programmed its car engine computers to <a
+
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions">
+ detect the Environmental Protection Agency's emission tests</a>, and
+ run dirty the rest of the time. In real driving, the cars exceeded
+ emissions standards by a factor of up to 35.</p>
+
+ <p>Using free software would not have stopped Volkswagen from
+ programming it this way, but would have made it harder to conceal,
+ and given the users the possibility of correcting the deception.</p>
+ </li>
+
+ <li id="M201508120">
+ <p>Security researchers discovered a <a
+
href="http://www.theguardian.com/technology/2015/aug/12/hack-car-brakes-sms-text">
+ vulnerability in diagnostic dongles used for vehicle tracking and
+ insurance</a> that let them take remote control of a car or lorry
+ using an SMS.</p>
+ </li>
+
+ <li id="M201507214">
+ <p>Crackers were able to <a
+
href="http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/">
+ take remote control of the Jeep</a> “connected car”. They
+ could track the car, start or stop the engine, and activate or
+ deactivate the brakes, and more.</p>
+
+ <p>I expect that Chrysler and the NSA can do this too.</p>
+
+ <p>If I ever own a car, and it contains a portable phone, I will
+ deactivate that.</p>
+ </li>
+
+ <li id="M201311130">
+ <p><a
+
href="https://www.eff.org/deeplinks/2013/11/drm-cars-will-drive-consumers-crazy">
+ DRM in cars will drive consumers crazy</a>.</p>
+ </li>
+
+ <li id="M201306140">
+ <p>Tesla cars allow the company to extract
+ data remotely and determine the car's location
+ at any time. (See Section 2, paragraphs b and c of the <a
+
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ privacy statement</a>.) The company says it doesn't store this
+ information, but if the state orders it to get the data and hand it
+ over, the state can store it.</p>
+ </li>
+
+ <li id="M201303250">
+ <p id="records-drivers">Proprietary software in cars <a
+
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">
+ records information about drivers' movements</a>, which is made
+ available to car manufacturers, insurance companies, and others.</p>
+
+ <p>The case of toll-collection systems, mentioned in this article,
+ is not really a matter of proprietary surveillance. These systems
+ are an intolerable invasion of privacy, and should be replaced with
+ anonymous payment systems, but the invasion isn't done by malware. The
+ other cases mentioned are done by proprietary malware in the car.</p>
+ </li>
+
+ <li id="M201103110">
+ <p>It is possible to <a
+
href="http://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/">
+ take control of some car computers through malware in music files</a>.
+ Also <a
+ href="http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0">
+ by radio</a>. More information in <a
+ href="http://www.autosec.org/faq.html"> Automotive Security And
+ Privacy Center</a>.</p>
+ </li>
</ul>
+
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
<div id="footer">
@@ -202,7 +239,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/07/25 16:30:38 $
+$Date: 2018/09/30 19:27:48 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-cars.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.ru.po,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- po/malware-cars.ru.po 30 Sep 2018 19:16:54 -0000 1.10
+++ po/malware-cars.ru.po 30 Sep 2018 19:27:48 -0000 1.11
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-09-30 18:25+0000\n"
#. type: Content of: <title>
msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -73,19 +72,6 @@
"безопаÑноÑÑи по ÑеÑи</a>."
#. type: Content of: <ul><li><p>
-# | Tesla used [-a universal backdoor in its-] software to limit [-customers
-# | to using just <a
-# |
href=\"https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/\">-]
-# | {+the+} part of the battery [-of some cars</a>.-] {+that was available to
-# | customers, and <a
-# |
href=\"https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/\">
-# | a universal back door in the software</a> to temporarily increase this
-# | limit.+}
-#| msgid ""
-#| "Tesla used a universal backdoor in its software to limit customers to "
-#| "using just <a href=\"https://techcrunch.com/2017/09/09/tesla-flips-a-"
-#| "switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-"
-#| "evacuate/\"> part of the battery of some cars</a>."
msgid ""
"Tesla used software to limit the part of the battery that was available to "
"customers, and <a href=\"https://techcrunch.com/2017/09/09/tesla-flips-a-"
@@ -96,8 +82,8 @@
"ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Tesla пÑогÑаммÑ, ÑÑÐ¾Ð±Ñ Ð¾Ð³ÑаниÑиÑÑ
емкоÑÑÑ Ð°ÐºÐºÑмÑлÑÑоÑов, коÑоÑÑÑ "
"могли иÑполÑзоваÑÑ ÐºÐ»Ð¸ÐµÐ½ÑÑ, и <a
href=\"https://techcrunch.com/2017/09/09/"
"tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-"
-"people-evacuate/\"> ÑнивеÑÑалÑнÑй ÑеÑнÑй Ñ
од в
пÑогÑаммаÑ
</a> Ð´Ð»Ñ Ñого, ÑÑÐ¾Ð±Ñ "
-"вÑеменно ÑвелиÑиваÑÑ ÑÑÐ¾Ñ Ð¿Ñедел."
+"people-evacuate/\"> ÑнивеÑÑалÑнÑй ÑеÑнÑй Ñ
од в
пÑогÑаммаÑ
</a> Ð´Ð»Ñ Ñого, "
+"ÑÑÐ¾Ð±Ñ Ð²Ñеменно ÑвелиÑиваÑÑ ÑÑÐ¾Ñ Ð¿Ñедел."
#. type: Content of: <ul><li><p>
msgid ""
@@ -194,13 +180,6 @@
"\">ÑÑо знаÑиÑ, они ÑÑебÑÑÑ Ð¾Ñ Ð¿Ð¾Ð»ÑзоваÑелей
Ñлепой веÑÑ</a>."
#. type: Content of: <ul><li><p>
-# | Even if no one connects to the car remotely, the cell phone modem enables
-# | the phone company to track the car's movements all the time; it is
-# | possible to physically remove the cell phone modem{+,+} though.
-#| msgid ""
-#| "Even if no one connects to the car remotely, the cell phone modem enables "
-#| "the phone company to track the car's movements all the time; it is "
-#| "possible to physically remove the cell phone modem though."
msgid ""
"Even if no one connects to the car remotely, the cell phone modem enables "
"the phone company to track the car's movements all the time; it is possible "
@@ -211,13 +190,6 @@
"авÑомобилÑ; Ñ
оÑÑ Ð¼Ð¾Ð¶Ð½Ð¾ ÑизиÑеÑки ÑдалиÑÑ
модем ÑоÑовой ÑвÑзи."
#. type: Content of: <ul><li><p>
-# | Caterpillar vehicles come with [-a-] <a
-# |
href=\"http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it\">
-# | [-back-door-] {+a back door+} to shutoff the engine</a> remotely.
-#| msgid ""
-#| "Caterpillar vehicles come with a <a href=\"http://www.zerohedge.com/"
-#| "news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-"
-#| "cunning-plan-how-deal-it\"> back-door to shutoff the engine</a> remotely."
msgid ""
"Caterpillar vehicles come with <a href=\"http://www.zerohedge.com/"
"news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-"
@@ -228,18 +200,6 @@
"plan-how-deal-it\">ÑеÑнÑм Ñ
одом Ð´Ð»Ñ Ñдаленного
оÑклÑÑÐµÐ½Ð¸Ñ Ð´Ð²Ð¸Ð³Ð°ÑелÑ</a>."
#. type: Content of: <ul><li><p>
-# | [-<a
-# |
href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions\">-]Volkswagen
-# | programmed its car engine computers to {+<a
-# |
href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions\">+}
-# | detect the Environmental Protection Agency's emission tests</a>, and run
-# | dirty the rest of the time. {+In real driving, the cars exceeded emissions
-# | standards by a factor of up to 35.+}
-#| msgid ""
-#| "<a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-"
-#| "emissions\"> Volkswagen programmed its car engine computers to detect the "
-#| "Environmental Protection Agency's emission tests</a>, and run dirty the "
-#| "rest of the time."
msgid ""
"Volkswagen programmed its car engine computers to <a href=\"https://www."
"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
@@ -247,19 +207,13 @@
"of the time. In real driving, the cars exceeded emissions standards by a "
"factor of up to 35."
msgstr ""
-"РФолÑкÑвагене запÑогÑаммиÑовали
компÑÑÑеÑÑ Ð² двигаÑелÑÑ
ÑвоиÑ
"
-"авÑомобилей на <a
href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-"
+"РФолÑкÑвагене запÑогÑаммиÑовали
компÑÑÑеÑÑ Ð² двигаÑелÑÑ
ÑвоиÑ
авÑомобилей "
+"на <a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-"
"emissions\">обнаÑÑжение ÑеÑÑов вÑÑ
лопнÑÑ
газов, пÑоводимÑÑ
ÐгенÑÑÑвом по "
-"оÑ
Ñане окÑÑжаÑÑей ÑÑедÑ</a> СШÐ, и
загÑÑзнÑÑÑ Ð²Ð¾Ð·Ð´ÑÑ
вÑе оÑÑалÑное вÑемÑ. ÐÑи
"
-"движении в ÑеалÑнÑÑ
ÑÑловиÑÑ
авÑомобили
пÑевÑÑали ноÑÐ¼Ñ Ð²ÑÑ
лопа в 35 Ñаз."
+"оÑ
Ñане окÑÑжаÑÑей ÑÑедÑ</a> СШÐ, и
загÑÑзнÑÑÑ Ð²Ð¾Ð·Ð´ÑÑ
вÑе оÑÑалÑное вÑемÑ. "
+"ÐÑи движении в ÑеалÑнÑÑ
ÑÑловиÑÑ
авÑомобили пÑевÑÑали ноÑÐ¼Ñ Ð²ÑÑ
лопа в 35 Ñаз."
#. type: Content of: <ul><li><p>
-# | Using free software would not have stopped Volkswagen from programming it
-# | this way, but would have made it harder to [-conceal.-] {+conceal, and
-# | given the users the possibility of correcting the deception.+}
-#| msgid ""
-#| "Using free software would not have stopped Volkswagen from programming it "
-#| "this way, but would have made it harder to conceal."
msgid ""
"Using free software would not have stopped Volkswagen from programming it "
"this way, but would have made it harder to conceal, and given the users the "
@@ -283,15 +237,6 @@
"авÑомобилÑми поÑÑедÑÑвом SMS."
#. type: Content of: <ul><li><p>
-# | Crackers were able to <a
-# |
href=\"http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/\">
-# | take remote control of the Jeep</a> “connected car”. {+They
-# | could track the car, start or stop the engine, and activate or deactivate
-# | the brakes, and more.+}
-#| msgid ""
-#| "Crackers were able to <a href=\"http://arstechnica.com/security/2015/07/"
-#| "fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/\"> "
-#| "take remote control of the Jeep</a> “connected car”."
msgid ""
"Crackers were able to <a href=\"http://arstechnica.com/security/2015/07/fiat-"
"chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/\"> take "
@@ -302,8 +247,8 @@
"ÐзломÑикам ÑдалоÑÑ <a
href=\"http://arstechnica.com/security/2015/07/fiat-"
"chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/\">
полÑÑиÑÑ "
"ÑдаленнÑй конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´ джипом</a> “Ñ
Ñоединением”. Ðни могли "
-"оÑÑлеживаÑÑ Ð°Ð²ÑомобилÑ, вклÑÑаÑÑ Ð¸
вÑклÑÑаÑÑ Ð´Ð²Ð¸Ð³Ð°ÑелÑ, задейÑÑвоваÑÑ Ð¸
оÑпÑÑкаÑÑ "
-"ÑоÑмоза и Ñ.д."
+"оÑÑлеживаÑÑ Ð°Ð²ÑомобилÑ, вклÑÑаÑÑ Ð¸
вÑклÑÑаÑÑ Ð´Ð²Ð¸Ð³Ð°ÑелÑ, задейÑÑвоваÑÑ Ð¸ "
+"оÑпÑÑкаÑÑ ÑоÑмоза и Ñ.д."
#. type: Content of: <ul><li><p>
msgid "I expect that Chrysler and the NSA can do this too."
@@ -327,21 +272,6 @@
"пÑиводиÑÑ Ð¿Ð¾ÑÑебиÑелей в беÑенÑÑво</a>."
#. type: Content of: <ul><li><p>
-# | Tesla cars allow the company to extract data remotely and determine the
-# | car's location at any time. (See [-<a
-# |
href=\"http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf\">-]
-# | Section 2, paragraphs b and [-c.</a>).-] {+c of the <a
-# |
href=\"http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf\">
-# | privacy statement</a>.)+} The company says it doesn't store this
-# | information, but if the state orders it to get the data and hand it over,
-# | the state can store it.
-#| msgid ""
-#| "Tesla cars allow the company to extract data remotely and determine the "
-#| "car's location at any time. (See <a href=\"http://www.teslamotors.com/"
-#| "sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"
-#| "\"> Section 2, paragraphs b and c.</a>). The company says it doesn't "
-#| "store this information, but if the state orders it to get the data and "
-#| "hand it over, the state can store it."
msgid ""
"Tesla cars allow the company to extract data remotely and determine the "
"car's location at any time. (See Section 2, paragraphs b and c of the <a "
@@ -352,12 +282,11 @@
msgstr ""
"ÐвÑомобили Tesla позволÑÑÑ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ð¸
полÑÑаÑÑ Ð´Ð°Ð½Ð½Ñе на ÑаÑÑÑоÑнии, а Ñакже "
"опÑеделÑÑÑ Ð¼ÐµÑÑоположение авÑÐ¾Ð¼Ð¾Ð±Ð¸Ð»Ñ Ð²
лÑбой Ð¼Ð¾Ð¼ÐµÐ½Ñ (Ñм. паÑагÑаÑÑ b и c "
-"Ñаздела 2 <a href=\"http://www."
-"teslamotors.com/sites/default/files/pdfs/"
-"tmi_privacy_statement_external_6-14-2013_v2.pdf\"> в Ñведомлении "
-"о конÑиденÑиалÑноÑÑи</a>). ÐомпаниÑ
ÑÑвеÑждаеÑ, ÑÑо она не Ñ
ÑÐ°Ð½Ð¸Ñ ÑÑиÑ
Ñведений, "
-"но еÑли гоÑÑдаÑÑÑво пÑиказÑÐ²Ð°ÐµÑ ÑобиÑаÑÑ
и пеÑедаваÑÑ ÑÑи даннÑе, Ñо оно "
-"Ð¼Ð¾Ð¶ÐµÑ Ð¸Ñ
ÑоÑ
ÑанÑÑÑ."
+"Ñаздела 2 <a
href=\"http://www.teslamotors.com/sites/default/files/pdfs/"
+"tmi_privacy_statement_external_6-14-2013_v2.pdf\"> в Ñведомлении
о "
+"конÑиденÑиалÑноÑÑи</a>). ÐомпаниÑ
ÑÑвеÑждаеÑ, ÑÑо она не Ñ
ÑÐ°Ð½Ð¸Ñ ÑÑиÑ
"
+"Ñведений, но еÑли гоÑÑдаÑÑÑво пÑиказÑваеÑ
ÑобиÑаÑÑ Ð¸ пеÑедаваÑÑ ÑÑи даннÑе, "
+"Ñо оно Ð¼Ð¾Ð¶ÐµÑ Ð¸Ñ
ÑоÑ
ÑанÑÑÑ."
#. type: Content of: <ul><li><p>
msgid ""
@@ -372,13 +301,6 @@
"авÑомобилÑ, ÑÑÑаÑ
овÑм компаниÑм и пÑоÑим."
#. type: Content of: <ul><li><p>
-# || No change detected. The change might only be in amounts of spaces.
-#| msgid ""
-#| "The case of toll-collection systems, mentioned in this article, is not "
-#| "really a matter of proprietary surveillance. These systems are an "
-#| "intolerable invasion of privacy, and should be replaced with anonymous "
-#| "payment systems, but the invasion isn't done by malware. The other cases "
-#| "mentioned are done by proprietary malware in the car."
msgid ""
"The case of toll-collection systems, mentioned in this article, is not "
"really a matter of proprietary surveillance. These systems are an "
@@ -394,21 +316,6 @@
"Ñ Ð²ÑедоноÑнÑми неÑвободнÑми пÑогÑаммами
в авÑомобиле."
#. type: Content of: <ul><li><p>
-# | It is possible to <a
-# |
href=\"http://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/\">
-# | take control of some car computers through malware in music files</a>.
-# | Also <a
-# | href=\"http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0\">{+
-# | +}by radio</a>. More information in <a
-# | href=\"http://www.autosec.org/faq.html\"> Automotive Security And Privacy
-# | Center</a>.
-#| msgid ""
-#| "It is possible to <a href=\"http://www.pcworld.idg.com.au/article/379477/"
-#| "hacking_music_can_take_control_your_car/\"> take control of some car "
-#| "computers through malware in music files</a>. Also <a href=\"http://www."
-#| "nytimes.com/2011/03/10/business/10hack.html?_r=0\">by radio</a>. More "
-#| "information in <a href=\"http://www.autosec.org/faq.html\"> Automotive "
-#| "Security And Privacy Center</a>."
msgid ""
"It is possible to <a href=\"http://www.pcworld.idg.com.au/article/379477/"
"hacking_music_can_take_control_your_car/\"> take control of some car "
Index: po/proprietary-deception.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.ru.po,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- po/proprietary-deception.ru.po 30 Sep 2018 19:16:54 -0000 1.37
+++ po/proprietary-deception.ru.po 30 Sep 2018 19:27:48 -0000 1.38
@@ -126,8 +126,8 @@
"of the time. In real driving, the cars exceeded emissions standards by a "
"factor of up to 35."
msgstr ""
-"РФолÑкÑвагене запÑогÑаммиÑовали
компÑÑÑеÑÑ Ð² двигаÑелÑÑ
ÑвоиÑ
авÑомобилей
на "
-"<a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-"
+"РФолÑкÑвагене запÑогÑаммиÑовали
компÑÑÑеÑÑ Ð² двигаÑелÑÑ
ÑвоиÑ
авÑомобилей "
+"на <a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-"
"emissions\">обнаÑÑжение ÑеÑÑов вÑÑ
лопнÑÑ
газов</a>, пÑоводимÑÑ
ÐгенÑÑÑвом по "
"оÑ
Ñане окÑÑжаÑÑей ÑÑÐµÐ´Ñ Ð¡Ð¨Ð, и загÑÑзнÑÑÑ
воздÑÑ
вÑе оÑÑалÑное вÑемÑ. ÐÑи "
"движении в ÑеалÑнÑÑ
ÑÑловиÑÑ
авÑомобили
пÑевÑÑали ноÑÐ¼Ñ Ð²ÑÑ
лопа в 35 Ñаз."
Index: po/proprietary-surveillance.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru-en.html,v
retrieving revision 1.125
retrieving revision 1.126
diff -u -b -r1.125 -r1.126
--- po/proprietary-surveillance.ru-en.html 12 Sep 2018 13:57:57 -0000
1.125
+++ po/proprietary-surveillance.ru-en.html 30 Sep 2018 19:27:48 -0000
1.126
@@ -58,69 +58,60 @@
</div>
<div class="toc">
- <h3 id="TableOfContents">Table of Contents</h3>
- <ul>
+<h3 id="TableOfContents">Table of Contents</h3>
+<ul>
<li><a href="#Introduction">Introduction</a></li>
- <li><a href="#OSSpyware">Spyware in Operating Systems</a>
+ <li><a href="#OSSpyware">Spyware in Laptops and Desktops</a>
<ul>
- <li><a href="#SpywareInWindows">Spyware in Windows</a></li>
- <li><a href="#SpywareInMacOS">Spyware in MacOS</a></li>
- <li><a href="#SpywareInAndroid">Spyware in Android</a></li>
+ <li><a href="#SpywareInWindows">Windows</a></li>
+ <li><a href="#SpywareInMacOS">MacOS</a></li>
+ <li><a href="#SpywareInBIOS">BIOS</a></li>
</ul>
</li>
<li><a href="#SpywareOnMobiles">Spyware on Mobiles</a>
<ul>
- <li><a href="#SpywareIniThings">Spyware in iThings</a></li>
- <li><a href="#SpywareInTelephones">Spyware in Telephones</a></li>
- <li><a href="#SpywareInMobileApps">Spyware in Mobile
Applications</a></li>
- <li><a href="#SpywareInToys">Spyware in Toys</a></li>
- </ul>
- </li>
- <li><a href="#SpywareOnWearables">Spyware on Wearables</a>
- <ul>
- <li><a href="#SpywareOnSmartWatches">Spyware on Smart
Watches</a></li>
+ <li><a href="#SpywareInTelephones">All “Smart”
Phones</a></li>
+ <li><a href="#SpywareIniThings">iThings</a></li>
+ <li><a href="#SpywareInAndroid">Android Telephones</a></li>
+ <li><a href="#SpywareInElectronicReaders">E-Readers</a></li>
</ul>
</li>
- <li><a href="#SpywareAtLowLevel">Spyware at Low Level</a>
+ <li><a href="#SpywareInApplications">Spyware in Applications</a>
<ul>
- <li><a href="#SpywareInBIOS">Spyware in BIOS</a></li>
+ <li><a href="#SpywareInMobileApps">Mobile Apps</a></li>
+ <li><a href="#SpywareInSkype">Skype</a></li>
+ <li><a href="#SpywareInGames">Games</a></li>
</ul>
</li>
- <li><a href="#SpywareAtWork">Spyware at Work</a>
+ <li><a href="#SpywareInEquipment">Spyware in Connected Equipment</a>
<ul>
- <li><a href="#SpywareInSkype">Spyware in Skype</a></li>
- </ul>
- </li>
- <li><a href="#SpywareOnTheRoad">Spyware on the Road</a>
+ <li><a href="#SpywareInTVSets">TV Sets</a></li>
+ <li><a href="#SpywareInCameras">Cameras</a></li>
+ <li><a href="#SpywareInToys">Toys</a></li>
+ <li><a href="#SpywareInDrones">Drones</a></li>
+ <li><a href="#SpywareAtHome">Other Appliances</a></li>
+ <li><a href="#SpywareOnWearables">Wearables</a>
<ul>
- <li><a href="#SpywareInCameras">Spyware in Cameras</a></li>
- <li><a href="#SpywareInElectronicReaders">Spyware in e-Readers</a></li>
- <li><a href="#SpywareInVehicles">Spyware in Vehicles</a></li>
+ <li><a href="#SpywareOnSmartWatches">“Smart”
Watches</a></li>
</ul>
</li>
- <li><a href="#SpywareAtHome">Spyware at Home</a>
- <ul>
- <li><a href="#SpywareInTVSets">Spyware in TV Sets</a></li>
+ <li><a href="#SpywareInVehicles">Vehicles</a></li>
+ <li><a href="#SpywareInVR">Virtual Reality</a></li>
</ul>
</li>
- <li><a href="#SpywareInGames">Spyware in Games</a></li>
- <li><a href="#SpywareInRecreation">Spyware in Recreation</a></li>
<li><a href="#SpywareOnTheWeb">Spyware on the Web</a>
<ul>
- <li><a href="#SpywareInChrome">Spyware in Chrome</a></li>
- <li><a href="#SpywareInFlash">Spyware in JavaScript and Flash</a></li>
+ <li><a href="#SpywareInChrome">Chrome</a></li>
+ <li><a href="#SpywareInJavaScript">JavaScript</a></li>
+ <li><a href="#SpywareInFlash">Flash</a></li>
</ul>
</li>
- <li><a href="#SpywareInDrones">Spyware in Drones</a></li>
- <li><a href="#SpywareEverywhere">Spyware Everywhere</a></li>
- <li><a href="#SpywareInVR">Spyware In VR</a></li>
- </ul>
-</div>
-
+ <li><a href="#SpywareInNetworks">Spyware in Networks</a></li>
+</ul>
</div>
<div style="clear: left;"></div>
-<!-- #Introduction -->
+</div>
<div class="big-section">
<h3 id="Introduction">Introduction</h3>
@@ -141,7 +132,7 @@
keyboard, in the mobile computing industry, in the office, at home, in
transportation systems, and in the classroom.</p>
-<h3 id="AggregateInfoCollection">Aggregate or anonymized data</h3>
+<h4 id="AggregateInfoCollection">Aggregate or anonymized data</h4>
<p>Many companies, in their privacy policy, have a clause that claims
they share aggregate, non-personally identifiable information with
@@ -163,1344 +154,1567 @@
they will <em>do</em> with the data they collect. The wrong is that
they collect it at all.</p>
-<h3 id="LatestAdditions">Latest additions</h3>
+<h4 id="LatestAdditions">Latest additions</h4>
<p>Latest additions are found on top under each category.</p>
-<!-- #OSSpyware -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
+
<div class="big-section">
- <h3 id="OSSpyware">Spyware in Operating Systems</h3>
+ <h3 id="OSSpyware">Spyware in Laptops and Desktops</h3>
<span class="anchor-reference-id">(<a
href="#OSSpyware">#OSSpyware</a>)</span>
</div>
<div style="clear: left;"></div>
-
<div class="big-subsection">
- <h4 id="SpywareInWindows">Spyware in Windows</h4>
+ <h4 id="SpywareInWindows">Windows</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInWindows">#SpywareInWindows</a>)</span>
</div>
-<ul>
- <li><p>Windows 10 telemetry program sends information to Microsoft about the
- user's computer and their use of the computer.</p>
+<ul class="blurbs">
+ <li id="M201712110">
+ <p>HP's proprietary operating system <a
+ href="http://www.bbc.com/news/technology-42309371">includes a
+ proprietary keyboard driver with a key logger in it</a>.</p>
+ </li>
- <p>Furthermore, for users who installed the fourth stable build of
- Windows 10, called the “Creators Update,” Windows maximized
the
- surveillance<a
href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law">
+ <li id="M201710134">
+ <p>Windows 10 telemetry program sends information to Microsoft about
+ the user's computer and their use of the computer.</p>
+
+ <p>Furthermore, for users who installed the
+ fourth stable build of Windows 10, called the
+ “Creators Update,” Windows maximized the surveillance <a
+
href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law">
by force setting the telemetry mode to “Full”</a>.</p>
-<p>The <a
-href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level">
+ <p>The <a
+
href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level">
“Full” telemetry mode</a> allows Microsoft Windows
- engineers to access, among other things, registry keys
- <a href="https://technet.microsoft.com/en-us/library/cc939702.aspx">which
+ engineers to access, among other things, registry keys <a
+ href="https://technet.microsoft.com/en-us/library/cc939702.aspx">which
can contain sensitive information like administrator's login
- password</a>.</p></li>
+ password</a>.</p>
+ </li>
+
+ <li id="M201702020">
+ <p>DRM-restricted files can be used to <a
+
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users">
+ identify people browsing through Tor</a>. The vulnerability exists
+ only if you use Windows.</p>
+ </li>
- <li><p>Windows DRM
- files <a
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users">can
- be used to identify people browsing through Tor</a>. The
- vulnerability exists only if you use Windows.
- </p></li>
-
- <li><p>By default, Windows 10 <a
href="http://betanews.com/2016/11/24/microsoft-shares-windows-10-telemetry-data-with-third-parties">sends
- debugging information to Microsoft, including core dumps</a>. Microsoft
now distributes them to another company.</p></li>
-
-<li>In order to increase Windows 10's install base, Microsoft
-<a
-href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
-blatantly disregards user choice and privacy</a>.
-</li>
-
- <li><p><a
href="https://duo.com/blog/bring-your-own-dilemma-oem-laptops-and-windows-10-security">
- Windows 10 comes with 13 screens of snooping options</a>, all enabled by
default,
- and turning them off would be daunting to most users.</p></li>
+ <li id="M201611240">
+ <p>By default, Windows 10 <a
+
href="http://betanews.com/2016/11/24/microsoft-shares-windows-10-telemetry-data-with-third-parties">sends
+ debugging information to Microsoft, including core dumps</a>. Microsoft
+ now distributes them to another company.</p>
+ </li>
+
+ <li id="M201608171">
+ <p>In order to increase Windows 10's install base, Microsoft <a
+
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
+ blatantly disregards user choice and privacy</a>.</p>
+ </li>
- <li><p><a
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/">
- Microsoft has already backdoored its disk encryption</a>.</p></li>
+ <li id="M201603170">
+ <p><a
+
href="https://duo.com/blog/bring-your-own-dilemma-oem-laptops-and-windows-10-security">
+ Windows 10 comes with 13 screens of snooping options</a>, all enabled
+ by default, and turning them off would be daunting to most users.</p>
+ </li>
- <li>It appears
- <a
href="http://www.ghacks.net/2016/01/05/microsoft-may-be-collecting-more-data-than-initially-thought/">
+ <li id="M201601050">
+ <p>It appears <a
+
href="http://www.ghacks.net/2016/01/05/microsoft-may-be-collecting-more-data-than-initially-thought/">
Windows 10 sends data to Microsoft about what applications are
- running</a>.</li>
- <li><p>A downgrade to Windows 10 deleted surveillance-detection
+ running</a>.</p>
+ </li>
+
+ <li id="M201512280">
+ <p>Microsoft has <a
+
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/">
+ backdoored its disk encryption</a>.</p>
+ </li>
+
+ <li id="M201511264">
+ <p>A downgrade to Windows 10 deleted surveillance-detection
applications. Then another downgrade inserted a general spying
- program. Users noticed this and complained, so Microsoft
- renamed it
- <a
href="https://web.archive.org/web/20160407082751/http://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/">
+ program. Users noticed this and complained, so Microsoft renamed it <a
+
href="https://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/">
to give users the impression it was gone</a>.</p>
+
<p>To use proprietary software is to invite such treatment.</p>
</li>
- <li><p>
- Windows 10 <a
href="https://web.archive.org/web/20151001035410/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/">
- ships with default settings that show no regard for the
- privacy of its users</a>, giving Microsoft the “right”
- to snoop on the users' files, text input, voice input,
- location info, contacts, calendar records and web browsing
- history, as well as automatically connecting the machines to open
- hotspots and showing targeted ads.</p></li>
-
- <li><p>
- <a
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/">
- Windows 10 sends identifiable information to Microsoft</a>, even if a user
- turns off its Bing search and Cortana features, and activates the
- privacy-protection settings.</p></li>
-
- <li><p>
- Microsoft uses Windows 10's “privacy policy” to overtly impose a
- “right” to look at users' files at any time. Windows 10 full disk
- encryption <a
href="https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/">
+
+ <li id="M201508180">
+ <p><a
+
href="https://web.archive.org/web/20150905163414/http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping">
+ Intel devices will be able to listen for speech all the time, even
+ when “off.”</a></p>
+ </li>
+
+ <li id="M201508130">
+ <p><a
+
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/">
+ Windows 10 sends identifiable information to Microsoft</a>, even if
+ a user turns off its Bing search and Cortana features, and activates
+ the privacy-protection settings.</p>
+ </li>
+
+ <li id="M201507300">
+ <p>Windows 10 <a
+
href="https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/">
+ ships with default settings that show no regard for the privacy of
+ its users</a>, giving Microsoft the “right” to snoop on
+ the users' files, text input, voice input, location info, contacts,
+ calendar records and web browsing history, as well as automatically
+ connecting the machines to open hotspots and showing targeted ads.</p>
+
+ <p>We can suppose Microsoft look at users' files for the US government
+ on demand, though the “privacy policy” does not explicitly
+ say so. Will it look at users' files for the Chinese government
+ on demand?</p>
+ </li>
+
+ <li id="M201506170">
+ <p>Microsoft uses Windows 10's “privacy policy”
+ to overtly impose a “right” to look at
+ users' files at any time. Windows 10 full disk encryption <a
+
href="https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/">
gives Microsoft a key</a>.</p>
- <p>Thus, Windows is overt malware in regard to surveillance,
- as in other issues.</p>
+ <p>Thus, Windows is overt malware in regard to surveillance, as in
+ other issues.</p>
- <p>We can suppose Microsoft look at users' files for the US government on
- demand, though the “privacy policy” does not explicit say so.
Will it
- look at users' files for the Chinese government on demand?</p>
+ <p>We can suppose Microsoft look at users' files for the US government
+ on demand, though the “privacy policy” does not explicit
+ say so. Will it look at users' files for the Chinese government
+ on demand?</p>
- <p>The unique “advertising ID” for each user enables other
companies to
- track the browsing of each specific user.</p>
+ <p>The unique “advertising ID” for each user enables
+ other companies to track the browsing of each specific user.</p>
<p>It's as if Microsoft has deliberately chosen to make Windows 10
maximally evil on every dimension; to make a grab for total power
- over anyone that doesn't drop Windows now.</p></li>
+ over anyone that doesn't drop Windows now.</p>
+ </li>
- <li><p>It only gets worse with time.
- <a
href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html">
+ <li id="M201410040">
+ <p>It only gets worse with time. <a
+
href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html">
Windows 10 requires users to give permission for total snooping</a>,
including their files, their commands, their text input, and their
voice input.</p>
</li>
- <li><p><a
href="http://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html">
- Windows 8.1 snoops on local searches.</a>.</p>
+ <li id="M201401150">
+ <p id="baidu-ime"><a
+
href="https://www.techrepublic.com/blog/asian-technology/japanese-government-warns-baidu-ime-is-spying-on-users/">
+ Baidu's Japanese-input and Chinese-input apps spy on users</a>.</p>
</li>
- <li><p>And there's a
- <a href="http://www.marketoracle.co.uk/Article40836.html">
- secret NSA key in Windows</a>, whose functions we don't know.</p>
+ <li id="M201307080">
+ <p>Spyware in older versions of Windows: <a
+ href="https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/">
+ Windows Update snoops on the user</a>. <a
+
href="https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html">
+ Windows 8.1 snoops on local searches</a>. And there's a <a
+ href="http://www.marketoracle.co.uk/Article40836.html"> secret NSA
+ key in Windows</a>, whose functions we don't know.</p>
</li>
-
- <li>HP's proprietary
- operating system <a
href="http://www.bbc.com/news/technology-42309371">includes
- a proprietary keyboard driver with a key logger in it</a>.</li>
</ul>
+
<p>Microsoft's snooping on users did not start with Windows 10.
There's a lot more <a href="/proprietary/malware-microsoft.html">
Microsoft malware</a>.</p>
<div class="big-subsection">
- <h4 id="SpywareInMacOS">Spyware in MacOS</h4>
+ <h4 id="SpywareInMacOS">MacOS</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInMacOS">#SpywareInMacOS</a>)</span>
</div>
-<ul>
- <li><p>Adware Doctor, an ad blocker for
- MacOS, <a
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history">reports
+<ul class="blurbs">
+ <li id="M201809070">
+ <p>Adware Doctor, an ad blocker for MacOS, <a
+
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history">reports
the user's browsing history</a>.</p>
</li>
- <li><p><a
href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/">
- MacOS automatically sends to Apple servers unsaved documents being
- edited</a>. The <a
-
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&utm_medium=twitter/">
- things you have not decided to save are even more sensitive than
- the things you have stored in files</a>.</p>
- </li>
-
- <li><p>Apple has made various
- <a
href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud">
+ <li id="M201411040">
+ <p>Apple has made various <a
+
href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud">
MacOS programs send files to Apple servers without asking
- permission</a>. This exposes the files to Big Brother and perhaps to
- other snoops.</p>
+ permission</a>. This exposes the files to Big Brother and perhaps
+ to other snoops.</p>
<p>It also demonstrates how you can't trust proprietary software,
- because even if today's version doesn't have a malicious
- functionality, tomorrow's version might add it. The developer won't
- remove the malfeature unless many users push back hard, and the users
- can't remove it themselves.</p>
+ because even if today's version doesn't have a malicious functionality,
+ tomorrow's version might add it. The developer won't remove the
+ malfeature unless many users push back hard, and the users can't
+ remove it themselves.</p>
</li>
- <li><p>Various operations in
- <a
href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540">
- the latest MacOS send reports to Apple</a> servers.</p>
+ <li id="M201410300">
+ <p> MacOS automatically <a
+
href="https://web.archive.org/web/20170831144456/https://www.washingtonpost.com/news/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/">
+ sends to Apple servers unsaved documents being edited</a>. The
+ things you have not decided to save are <a
+
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&utm_medium=twitter/">
+ even more sensitive</a> than the things you have stored in files.</p>
+ </li>
+
+ <li id="M201410220">
+ <p>Apple admits the <a
+
href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/">
+ spying in a search facility</a>, but there's a lot <a
+ href="https://github.com/fix-macosx/yosemite-phone-home"> more snooping
+ that Apple has not talked about</a>.</p>
</li>
- <li><p>Apple admits the
- <a
href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/">
- spying in a search facility</a>, but there's a lot
- <a href="https://github.com/fix-macosx/yosemite-phone-home">
- more snooping that Apple has not talked about</a>.</p>
+ <li id="M201410200">
+ <p>Various operations in <a
+
href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540">
+ the latest MacOS send reports to Apple</a> servers.</p>
</li>
- <li><p><a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ <li id="M201401101">
+ <p><a
+
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
Spotlight search</a> sends users' search terms to Apple.</p>
</li>
</ul>
+
<p>There's a lot more <a href="#SpywareIniThings">iThing spyware</a>, and
<a href="/proprietary/malware-apple.html">Apple malware</a>.</p>
<div class="big-subsection">
- <h4 id="SpywareInAndroid">Spyware in Android</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInAndroid">#SpywareInAndroid</a>)</span>
+ <a id="SpywareAtLowLevel"></a>
+ <h4 id="SpywareInBIOS">BIOS</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
</div>
-<ul>
-<li>
- <p>Some Google apps on Android <a
-
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
- record the user's location even when users disable “location
- tracking”</a>.</p>
-
- <p>There are other ways to turn off the other kinds of location tracking,
- but most users will be tricked by the misleading control.</p>
-</li>
-
-<li>
- <p>More
- than <a
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
- of the 5,855 Android apps studied by researchers were found to
- snoop and collect information about its users</a>. 40% of the
- apps were found to insecurely snitch on its users. Furthermore,
- they could detect only some methods of snooping, in these
- proprietary apps whose source code they cannot look at. The other
- apps might be snooping in other ways.</p>
-
- <p>This is evidence that proprietary apps generally work against
- their users. To protect their privacy and freedom, Android users need
- to get rid of the proprietary software—both proprietary Android
- by <a href="https://replicant.us">switching to Replicant</a>, and
- the proprietary apps by getting apps from the free software
- only <a href="https://f-droid.org/">F-Droid store</a>
- that <a href="https://f-droid.org/wiki/page/Antifeatures">
- prominently warns the user if an app contains
- anti-features</a>.</p>
-</li>
-
-<li>
- <p>20 dishonest Android apps
- recorded <a
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
- calls and sent them and text messages and emails to
- snoopers</a>.</p>
-
- <p>Google did not intend to make these apps spy; on the contrary, it
- worked in various ways to prevent that, and deleted these apps
- after discovering what they did. So we cannot blame Google
- specifically for the snooping of these apps.</p>
-
- <p>On the other hand, Google redistributes nonfree Android apps, and
- therefore shares in the responsibility for the injustice of their
- being nonfree. It also distributes its own nonfree apps, such as
- Google
- Play, <a href="/philosophy/free-software-even-more-important.html">which
- are malicious</a>.</p>
-
- <p>Could Google have done a better job of preventing apps from
- cheating? There is no systematic way for Google, or Android
- users, to inspect executable proprietary apps to see what they
- do.</p>
-
- <p>Google could demand the source code for these apps, and study the
- source code somehow to determine whether they mistreat users in
- various ways. If it did a good job of this, it could more or less
- prevent such snooping, except when the app developers are clever
- enough to outsmart the checking.</p>
-
- <p>But since Google itself develops malicious apps, we cannot trust
- Google to protect us. We must demand release of source code to the
- public, so we can depend on each other.</p>
-</li>
-<li>
- <p>A
- <a
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
- research paper</a> that investigated the privacy and security
- of 283 Android VPN apps concluded that “in spite of the
- promises for privacy, security, and anonymity given by the
- majority of VPN apps—millions of users may be unawarely subject
- to poor security guarantees and abusive practices inflicted by
- VPN apps.”</p>
-
- <p>Following is a non-exhaustive list of proprietary VPN apps from
- the research paper that tracks and infringes the privacy of
- users:</p>
-
- <dl>
- <dt>SurfEasy</dt>
- <dd>Includes tracking libraries such as NativeX and Appflood,
- meant to track users and show them targeted ads.</dd>
+<ul class="blurbs">
+ <li id="M201509220">
+ <p><a
+
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+ Lenovo stealthily installed crapware and spyware via
+ BIOS</a> on Windows installs. Note that the specific
+ sabotage method Lenovo used did not affect GNU/Linux; also, a
+ “clean” Windows install is not really clean since <a
+ href="/proprietary/malware-microsoft.html">Microsoft puts in its
+ own malware</a>.</p>
+ </li>
+</ul>
- <dt>sFly Network Booster</dt>
- <dd>Requests the <code>READ_SMS</code> and <code>SEND_SMS</code>
- permissions upon installation, meaning it has full access to
- users' text messages.</dd>
- <dt>DroidVPN and TigerVPN</dt>
- <dd>Requests the <code>READ_LOGS</code> permission to read logs
- for other apps and also core system logs. TigerVPN developers
- have confirmed this.</dd>
- <dt>HideMyAss</dt>
- <dd>Sends traffic to LinkedIn. Also, it stores detailed logs
- and may turn them over to the UK government if
- requested.</dd>
+<div class="big-section">
+ <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
+</div>
+<div style="clear: left;"></div>
- <dt>VPN Services HotspotShield</dt>
- <dd>Injects JavaScript code into the HTML pages returned to the
- users. The stated purpose of the JS injection is to display
- ads. Uses roughly 5 tracking libraries. Also, it redirects the
- user's traffic through valueclick.com (an advertising
- website).</dd>
+<div class="big-subsection">
+ <h4 id="SpywareInTelephones">All “Smart” Phones</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInTelephones">#SpywareInTelephones</a>)</span>
+</div>
- <dt>WiFi Protector VPN</dt>
- <dd>Injects JavaScript code into HTML pages, and also uses
- roughly 5 tracking libraries. Developers of this app have
- confirmed that the non-premium version of the app does
- JavaScript injection for tracking and display ads.</dd>
- </dl>
-</li>
-<li>
- <p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found that 90% of the top-ranked gratis
- proprietary Android apps contained recognizable tracking libraries. For
- the paid proprietary apps, it was only 60%.</p>
-
- <p>The article confusingly describes gratis apps as “free”,
- but most of them are not in fact
- <a href="/philosophy/free-sw.html">free software</a>.
- It also uses the ugly word “monetize”. A good replacement
- for that word is “exploit”; nearly always that will fit
- perfectly.</p>
-</li>
-
-<li>
- <p>Apps for BART
- <a
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
- <p>With free software apps, users could <em>make sure</em> that they don't
snoop.</p>
- <p>With proprietary apps, one can only hope that they don't.</p>
-</li>
+<ul class="blurbs">
+ <li id="M201601110">
+ <p>The natural extension of monitoring
+ people through “their” phones is <a
+
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
+ proprietary software to make sure they can't “fool”
+ the monitoring</a>.</p>
+ </li>
-<li>
- <p>A study found 234 Android apps that track users by
- <a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed in stores or played by TV
programs</a>.
- </p>
-
-</li>
-
-<li>
- <p>Pairs of Android apps can collude to transmit users' personal
- data to servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
- tens of thousands of pairs that collude</a>.</p>
-</li>
-
-<li>
-<p>Google Play intentionally sends app developers <a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
-the personal details of users that install the app</a>.</p>
-
-<p>Merely asking the “consent” of users is not enough
-to legitimize actions like this. At this point, most users have
-stopped reading the “Terms and Conditions” that spell out
-what they are “consenting” to. Google should clearly
-and honestly identify the information it collects on users, instead
-of hiding it in an obscurely worded EULA.</p>
-
-<p>However, to truly protect people's privacy, we must prevent Google
-and other companies from getting this personal information in the first
-place!</p>
-</li>
+ <li id="M201510050">
+ <p>According to Edward Snowden, <a
+ href="http://www.bbc.com/news/uk-34444233">agencies can take over
+ smartphones</a> by sending hidden text messages which enable
+ them to turn the phones on and off, listen to the microphone,
+ retrieve geo-location data from the GPS, take photographs, read
+ text messages, read call, location and web browsing history, and
+ read the contact list. This malware is designed to disguise itself
+ from investigation.</p>
+ </li>
+
+ <li id="M201311120">
+ <p><a
+
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
+ The NSA can tap data in smart phones, including iPhones,
+ Android, and BlackBerry</a>. While there is not much
+ detail here, it seems that this does not operate via
+ the universal back door that we know nearly all portable
+ phones have. It may involve exploiting various bugs. There are <a
+
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
+ lots of bugs in the phones' radio software</a>.</p>
+ </li>
+
+ <li id="M201307000">
+ <p>Portable phones with GPS <a
+
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+ will send their GPS location on remote command, and users cannot stop
+ them</a>. (The US says it will eventually require all new portable phones
+ to have GPS.)</p>
+ </li>
+</ul>
- <li>
- <p>Google Play (a component of Android) <a
-
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks the users' movements without their permission</a>.</p>
- <p>Even if you disable Google Maps and location tracking, you must
- disable Google Play itself to completely stop the tracking. This is
- yet another example of nonfree software pretending to obey the user,
- when it's actually doing something else. Such a thing would be almost
- unthinkable with free software.</p>
+<div class="big-subsection">
+ <h4 id="SpywareIniThings">iThings</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
+</div>
+<ul class="blurbs">
+ <li id="M201711250">
+ <p>The DMCA and the EU Copyright Directive make it <a
+ href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ illegal to study how iOS cr…apps spy on users</a>, because
+ this would require circumventing the iOS DRM.</p>
</li>
- <li><p>More than 73% of the most popular Android apps
- <a href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral and location information</a> of their users with third
parties.</p>
+ <li id="M201709210">
+ <p>In the latest iThings system,
+ “turning off” WiFi and Bluetooth the obvious way <a
+
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
+ doesn't really turn them off</a>. A more advanced way really does turn
+ them off—only until 5am. That's Apple for you—“We
+ know you want to be spied on”.</p>
</li>
- <li><p>“Cryptic communication,” unrelated to the app's
functionality,
- was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in the 500 most popular gratis Android apps</a>.</p>
-
- <p>The article should not have described these apps as
- “free”—they are not free software. The clear way to say
- “zero price” is “gratis.”</p>
-
- <p>The article takes for granted that the usual analytics tools are
- legitimate, but is that valid? Software developers have no right to
- analyze what users are doing or how. “Analytics” tools that
snoop are
- just as wrong as any other snooping.</p>
- </li>
- <li><p>Gratis Android apps (but not <a href="/philosophy/free-sw.html">free
software</a>)
- connect to 100
- <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
and advertising</a> URLs,
- on the average.</p>
- </li>
- <li><p>Spyware is present in some Android devices when they are sold.
- Some Motorola phones modify Android to
- <a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- send personal data to Motorola</a>.</p>
+ <li id="M201702150">
+ <p>Apple proposes <a
+
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
+ fingerprint-scanning touch screen</a>—which would mean no way
+ to use it without having your fingerprints taken. Users would have
+ no way to tell whether the phone is snooping on them.</p>
</li>
- <li><p>Some manufacturers add a
- <a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier IQ.</a></p>
+ <li id="M201611170">
+ <p>iPhones <a
+
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
+ lots of personal data to Apple's servers</a>. Big Brother can get
+ them from there.</p>
</li>
- <li><p><a href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access to any file on the system.</p>
+ <li id="M201609280">
+ <p>The iMessage app on iThings <a
+
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every phone number that the user types into it</a>; the
+ server records these numbers for at least 30 days.</p>
</li>
-</ul>
+ <li id="M201509240">
+ <p>iThings automatically upload to Apple's servers all the photos
+ and videos they make.</p>
+ <blockquote><p> iCloud Photo Library stores every photo and video you
+ take, and keeps them up to date on all your devices. Any edits you
+ make are automatically updated everywhere. […] </p></blockquote>
-<!-- #SpywareOnMobiles -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
+ <p>(From <a href="https://www.apple.com/icloud/photos/">Apple's iCloud
+ information</a> as accessed on 24 Sep 2015.) The iCloud feature is
+ <a href="https://support.apple.com/en-us/HT202033">activated by the
+ startup of iOS</a>. The term “cloud” means “please
+ don't ask where.”</p>
-<div class="big-section">
- <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
-</div>
-<div style="clear: left;"></div>
+ <p>There is a way to
+ <a href="https://support.apple.com/en-us/HT201104"> deactivate
+ iCloud</a>, but it's active by default so it still counts as a
+ surveillance functionality.</p>
+ <p>Unknown people apparently took advantage of this to <a
+
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ nude photos of many celebrities</a>. They needed to break Apple's
+ security to get at them, but NSA can access any of them through <a
+
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p>
+ </li>
-<div class="big-subsection">
- <h4 id="SpywareIniThings">Spyware in iThings</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
-</div>
+ <li id="M201409220">
+ <p>Apple can, and regularly does, <a
+
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones for the state</a>.</p>
-<ul>
- <li><p>The DMCA and the EU Copyright Directive make it <a
-href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal to study how iOS cr...apps spy on users</a>, because this
- would require circumventing the iOS DRM.</p>
+ <p>This may have improved with <a
+
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
+ iOS 8 security improvements</a>; but <a
+ href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
+ not as much as Apple claims</a>.</p>
</li>
- <li><p>In the latest iThings system, “turning off” WiFi and
Bluetooth the
- obvious way <a
-
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
- doesn't really turn them off</a>.
- A more advanced way really does turn them off—only until 5am.
- That's Apple for you—“We know you want to be spied
on”.</p>
+ <li id="M201407230">
+ <p><a
+
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features” of iOS seem to exist
+ for no possible purpose other than surveillance</a>. Here is the <a
+
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p>
</li>
- <li><p>Apple proposes
- <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
- — which would mean no way to use it without having your
fingerprints
- taken. Users would have no way to tell whether the phone is snooping on
- them.</p></li>
+ <li id="M201401100">
+ <p>The <a class="not-a-duplicate"
+
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ iBeacon</a> lets stores determine exactly where the iThing is, and
+ get other info too.</p>
+ </li>
- <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
- lots of personal data to Apple's servers</a>. Big Brother can
- get them from there.</p>
+ <li id="M201312300">
+ <p><a
+
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
+ Either Apple helps the NSA snoop on all the data in an iThing, or it
+ is totally incompetent</a>.</p>
</li>
- <li><p>The iMessage app on iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every phone number that the user types into it</a>; the
server records these numbers for at least 30
- days.</p>
+ <li id="M201308080">
+ <p>The iThing also <a
+
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells Apple its geolocation</a> by default, though that can be
+ turned off.</p>
</li>
- <li><p>Users cannot make an Apple ID <a
-href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">
- (necessary to install even gratis apps)</a>
- without giving a valid email address and receiving the code Apple
- sends to it.</p>
+ <li id="M201210170">
+ <p>There is also a feature for web sites to track users, which is <a
+
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ enabled by default</a>. (That article talks about iOS 6, but it is
+ still true in iOS 7.)</p>
</li>
- <li><p>Around 47% of the most popular iOS apps
- <a class="not-a-duplicate"
- href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral and location information</a> of their users with third
parties.</p>
+ <li id="M201204280">
+ <p>Users cannot make an Apple ID (<a
+
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">
+ necessary to install even gratis apps</a>) without giving a valid
+ email address and receiving the verification code Apple sends
+ to it.</p>
</li>
+</ul>
- <li><p>iThings automatically upload to Apple's servers all the photos and
- videos they make.</p>
- <blockquote><p>
- iCloud Photo Library stores every photo and video you take,
- and keeps them up to date on all your devices.
- Any edits you make are automatically updated everywhere. [...]
- </p></blockquote>
+<div class="big-subsection">
+ <h4 id="SpywareInAndroid">Android Telephones</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInAndroid">#SpywareInAndroid</a>)</span>
+</div>
- <p>(From <a href="https://www.apple.com/icloud/photos/">Apple's iCloud
- information</a> as accessed on 24 Sep 2015.) The iCloud feature is
- <a href="https://support.apple.com/en-us/HT202033">activated by the
- startup of iOS</a>. The term “cloud” means
- “please don't ask where.”</p>
+<ul class="blurbs">
+ <li id="M201711210">
+ <p>Android tracks location for Google <a
+
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
+ even when “location services” are turned off, even when
+ the phone has no SIM card</a>.</p>
+ </li>
- <p>There is a way to <a href="https://support.apple.com/en-us/HT201104">
- deactivate iCloud</a>, but it's active by default so it still counts as a
- surveillance functionality.</p>
+ <li id="M201611150">
+ <p>Some portable phones <a
+
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold with spyware sending lots of data to China</a>.</p>
+ </li>
- <p>Unknown people apparently took advantage of this to
- <a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos of many celebrities</a>. They needed to break Apple's
- security to get at them, but NSA can access any of them through
- <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
- </p></li>
+ <li id="M201609140">
+ <p>Google Play (a component of Android) <a
+
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ tracks the users' movements without their permission</a>.</p>
- <li><p>Spyware in iThings:
- the <a class="not-a-duplicate"
-
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly where the iThing is,
- and get other info too.</p>
+ <p>Even if you disable Google Maps and location tracking, you must
+ disable Google Play itself to completely stop the tracking. This is
+ yet another example of nonfree software pretending to obey the user,
+ when it's actually doing something else. Such a thing would be almost
+ unthinkable with free software.</p>
</li>
- <li><p>There is also a feature for web sites to track users, which is
- <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled by default</a>. (That article talks about iOS 6, but it
- is still true in iOS 7.)</p>
+ <li id="M201507030">
+ <p>Samsung phones come with <a
+
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
+ that users can't delete</a>, and they send so much data that their
+ transmission is a substantial expense for users. Said transmission,
+ not wanted or requested by the user, clearly must constitute spying
+ of some kind.</p>
</li>
- <li><p>The iThing also
- <a
-href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells Apple its geolocation</a> by default, though that can be
- turned off.</p>
+ <li id="M201403120">
+ <p><a href="/proprietary/proprietary-back-doors.html#samsung">
+ Samsung's back door</a> provides access to any file on the system.</p>
</li>
- <li><p>Apple can, and regularly does,
- <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for the state</a>.</p>
+ <li id="M201308010">
+ <p>Spyware in Android phones (and Windows? laptops): The Wall Street
+ Journal (in an article blocked from us by a paywall) reports that <a
+
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
+ the FBI can remotely activate the GPS and microphone in Android phones
+ and laptops</a>. (I suspect this means Windows laptops.) Here is <a
+ href="http://cryptome.org/2013/08/fbi-hackers.htm">more info</a>.</p>
</li>
- <li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps the NSA snoop on all the data in an iThing,
- or it is totally incompetent.</a></p>
+ <li id="M201307280">
+ <p>Spyware is present in some Android devices when
+ they are sold. Some Motorola phones modify Android to <a
+ href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ send personal data to Motorola</a>.</p>
</li>
- <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem to exist for no
- possible purpose other than surveillance</a>. Here is the
- <a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p>
+ <li id="M201307250">
+ <p>A Motorola phone <a
+
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens for voice all the time</a>.</p>
+ </li>
+
+ <li id="M201302150">
+ <p>Google Play intentionally sends app developers <a
+
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
+ the personal details of users that install the app</a>.</p>
+
+ <p>Merely asking the “consent” of users is not enough to
+ legitimize actions like this. At this point, most users have stopped
+ reading the “Terms and Conditions” that spell out what
+ they are “consenting” to. Google should clearly and
+ honestly identify the information it collects on users, instead of
+ hiding it in an obscurely worded EULA.</p>
+
+ <p>However, to truly protect people's privacy, we must prevent Google
+ and other companies from getting this personal information in the
+ first place!</p>
+ </li>
+
+ <li id="M201111170">
+ <p>Some manufacturers add a <a
+
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general surveillance package such as Carrier IQ</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInTelephones">Spyware in Telephones</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInTelephones">#SpywareInTelephones</a>)</span>
+ <h4 id="SpywareInElectronicReaders">E-Readers</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
</div>
-<ul>
- <li><p>Tracking software in popular Android apps is pervasive and
- sometimes very clever. Some trackers can <a
-href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow a user's movements around a physical store by noticing WiFi
- networks</a>.</p>
-</li>
-
- <li><p>Android tracks location for Google <a
-href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
- even when “location services” are turned off, even
- when the phone has no SIM card</a>.</p></li>
-
- <li><p>Some portable phones <a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots of data to China</a>.</p></li>
-
- <li><p>According to Edward Snowden,
- <a href="http://www.bbc.com/news/uk-34444233">agencies can take over
smartphones</a>
- by sending hidden text messages which enable them to turn the phones
- on and off, listen to the microphone, retrieve geo-location data from the
- GPS, take photographs, read text messages, read call, location and web
- browsing history, and read the contact list. This malware is designed to
- disguise itself from investigation.</p>
- </li>
-
- <li><p>Samsung phones come with
- <a
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>,
- and they send so much data that their transmission is a
- substantial expense for users. Said transmission, not wanted or
- requested by the user, clearly must constitute spying of some
- kind.</p></li>
-
- <li><p>A Motorola phone
- <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all the time</a>.</p>
+<ul class="blurbs">
+ <li id="M201603080">
+ <p>E-books can contain JavaScript code, and <a
+
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
+ sometimes this code snoops on readers</a>.</p>
</li>
- <li><p>Spyware in Android phones (and Windows? laptops): The Wall
- Street Journal (in an article blocked from us by a paywall)
- reports that
- <a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
- the FBI can remotely activate the GPS and microphone in Android
- phones and laptops</a>.
- (I suspect this means Windows laptops.) Here is
- <a href="http://cryptome.org/2013/08/fbi-hackers.htm">more info</a>.</p>
+ <li id="M201410080">
+ <p>Adobe made “Digital Editions,”
+ the e-reader used by most US libraries, <a
+
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data to Adobe</a>. Adobe's “excuse”: it's
+ needed to check DRM!</p>
</li>
- <li><p>Portable phones with GPS will send their GPS location on
- remote command and users cannot stop them:
- <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
-
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
- (The US says it will eventually require all new portable phones
- to have GPS.)</p>
+ <li id="M201212031">
+ <p>The Electronic Frontier Foundation has examined and found <a
+ href="https://www.eff.org/pages/reader-privacy-chart-2012">various
+ kinds of surveillance in the Swindle and other e-readers</a>.</p>
</li>
- <li><p>The nonfree Snapchat app's principal purpose is to restrict
- the use of data on the user's computer, but it does surveillance
- too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries to get the user's list of other people's phone
- numbers.</a></p>
+ <li id="M201212030">
+ <p>Spyware in many e-readers—not only the Kindle: <a
+ href="https://www.eff.org/pages/reader-privacy-chart-2012"> they
+ report even which page the user reads at what time</a>.</p>
</li>
</ul>
+
+<div class="big-section">
+ <h3 id="SpywareInApplications">Spyware in Applications</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareInApplications">#SpywareInApplications</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
<div class="big-subsection">
- <h4 id="SpywareInMobileApps">Spyware in Mobile Applications</h4>
+ <h4 id="SpywareInMobileApps">Mobile Apps</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
</div>
-<ul>
- <li><p>The Spanish football streaming app
- <a
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
- the user's movements and listens through the
- microphone</a>.</p>
+<ul class="blurbs">
+ <li id="M201808030">
+ <p>Some Google apps on Android <a
+
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
+ record the user's location even when users disable “location
+ tracking”</a>.</p>
+
+ <p>There are other ways to turn off the other kinds of location
+ tracking, but most users will be tricked by the misleading control.</p>
+ </li>
+
+ <li id="M201806110">
+ <p>The Spanish football streaming app <a
+
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
+ the user's movements and listens through the microphone</a>.</p>
<p>This makes them act as spies for licensing enforcement.</p>
- <p>I expect it implements DRM, too—that there is no way to
- save a recording. But I can't be sure from the article.</p>
+ <p>I expect it implements DRM, too—that there is no way to save
+ a recording. But I can't be sure from the article.</p>
+
+ <p>If you learn to care much less about sports, you will benefit in
+ many ways. This is one more.</p>
+ </li>
+
+ <li id="M201804160">
+ <p>More than <a
+
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
+ of the 5,855 Android apps studied by researchers were found to snoop
+ and collect information about its users</a>. 40% of the apps were
+ found to insecurely snitch on its users. Furthermore, they could
+ detect only some methods of snooping, in these proprietary apps whose
+ source code they cannot look at. The other apps might be snooping
+ in other ways.</p>
- <p>If you learn to care much less about sports, you will benefit
- in many ways. This is one more.</p>
+ <p>This is evidence that proprietary apps generally work against
+ their users. To protect their privacy and freedom, Android users
+ need to get rid of the proprietary software—both proprietary
+ Android by <a href="https://replicant.us">switching to Replicant</a>,
+ and the proprietary apps by getting apps from the free software
+ only <a href="https://f-droid.org/">F-Droid store</a> that <a
+ href="https://f-droid.org/wiki/page/Antifeatures"> prominently warns
+ the user if an app contains anti-features</a>.</p>
</li>
- <li><p>Grindr collects information about <a
+ <li id="M201804020">
+ <p>Grindr collects information about <a
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
which users are HIV-positive, then provides the information to
companies</a>.</p>
<p>Grindr should not have so much information about its users.
- It could be designed so that users communicate such info to each other
- but not to the server's database.</p>
+ It could be designed so that users communicate such info to each
+ other but not to the server's database.</p>
</li>
- <li>
- <p>The moviepass app and dis-service spy on users even more than users
- expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel before and after going to a movie</a>.
- </p>
+ <li id="M201803050">
+ <p>The moviepass app and dis-service
+ spy on users even more than users expected. It <a
+
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
+ where they travel before and after going to a movie</a>.</p>
- <p>Don't be tracked — pay cash!</p>
+ <p>Don't be tracked—pay cash!</p>
</li>
- <li><p>AI-powered driving apps can
- <a
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
- track your every move</a>.</p>
+ <li id="M201711240">
+ <p>Tracking software in popular Android apps
+ is pervasive and sometimes very clever. Some trackers can <a
+
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
+ follow a user's movements around a physical store by noticing WiFi
+ networks</a>.</p>
</li>
- <li><p>The Sarahah app
- <a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+ <li id="M201708270">
+ <p>The Sarahah app <a
+
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
uploads all phone numbers and email addresses</a> in user's address
book to developer's server. Note that this article misuses the words
“<a href="/philosophy/free-sw.html">free software</a>”
referring to zero price.</p>
</li>
- <li>
- <p>Facebook's app listens all the time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop
- on what people are listening to or watching</a>. In addition, it may
- be analyzing people's conversations to serve them with targeted
- advertisements.</p>
- </li>
-
- <li>
- <p>Faceapp appears to do lots of surveillance, judging by
- <a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands to personal data in the device</a>.
- </p>
- </li>
-
- <li>
- <p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app that it will</a>
- pre-install on some of its phones. The app will give Verizon the same
- information about the users' searches that Google normally gets when
- they use its search engine.</p>
-
- <p>Currently, the app is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed on only one phone</a>, and the
- user must explicitly opt-in before the app takes effect. However, the
- app remains spyware—an “optional” piece of spyware is
- still spyware.</p>
- </li>
+ <li id="M201707270">
+ <p>20 dishonest Android apps recorded <a
+
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
+ calls and sent them and text messages and emails to snoopers</a>.</p>
- <li><p>The Meitu photo-editing
- app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data to a Chinese company</a>.</p></li>
-
- <li><p>A pregnancy test controller application not only
- can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
- on many sorts of data in the phone, and in server accounts, it can
- alter them too</a>.
- </p></li>
+ <p>Google did not intend to make these apps spy; on the contrary, it
+ worked in various ways to prevent that, and deleted these apps after
+ discovering what they did. So we cannot blame Google specifically
+ for the snooping of these apps.</p>
- <li><p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before and after the ride</a>.</p>
+ <p>On the other hand, Google redistributes nonfree Android apps, and
+ therefore shares in the responsibility for the injustice of their being
+ nonfree. It also distributes its own nonfree apps, such as Google Play,
+ <a href="/philosophy/free-software-even-more-important.html">which
+ are malicious</a>.</p>
- <p>This example illustrates how “getting the user's
consent”
- for surveillance is inadequate as a protection against massive
- surveillance.</p>
- </li>
+ <p>Could Google have done a better job of preventing apps from
+ cheating? There is no systematic way for Google, or Android users,
+ to inspect executable proprietary apps to see what they do.</p>
- <li><p>Google's new voice messaging app <a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p>
- </li>
+ <p>Google could demand the source code for these apps, and study
+ the source code somehow to determine whether they mistreat users in
+ various ways. If it did a good job of this, it could more or less
+ prevent such snooping, except when the app developers are clever
+ enough to outsmart the checking.</p>
- <li><p>Apps that include
- <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop on what radio and TV programs
- are playing nearby</a>. Also on what users post on various sites
- such as Facebook, Google+ and Twitter.</p>
+ <p>But since Google itself develops malicious apps, we cannot trust
+ Google to protect us. We must demand release of source code to the
+ public, so we can depend on each other.</p>
</li>
- <li><p>Facebook's new Magic Photo app
- <a
-href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
-scans your mobile phone's photo collections for known faces</a>,
- and suggests you to share the picture you take according to who
- is in the frame.</p>
+ <li id="M201705230">
+ <p>Apps for BART <a
+
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
+ on users</a>.</p>
- <p>This spyware feature seems to require online access to some
- known-faces database, which means the pictures are likely to be
- sent across the wire to Facebook's servers and face-recognition
- algorithms.</p>
+ <p>With free software apps, users could <em>make sure</em> that they
+ don't snoop.</p>
- <p>If so, none of Facebook users' pictures are private
- anymore, even if the user didn't “upload” them to the
service.</p>
+ <p>With proprietary apps, one can only hope that they don't.</p>
</li>
- <li><p>Like most “music screaming” disservices, Spotify
- is based on proprietary malware (DRM and snooping). In August
- 2015 it <a
-href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit to increased snooping</a>, and some
- are starting to realize that it is nasty.</p>
-
- <p>This article shows the <a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping as a way
- to “serve” users better</a>—never mind
- whether they want that. This is a typical example of
- the attitude of the proprietary software industry towards
- those they have subjugated.</p>
+ <li id="M201705040">
+ <p>A study found 234 Android apps that track users by <a
+
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
+ to ultrasound from beacons placed in stores or played by TV
+ programs</a>.</p>
+ </li>
+
+ <li id="M201704260">
+ <p>Faceapp appears to do lots of surveillance, judging by <a
+
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much access it demands to personal data in the device</a>.</p>
+ </li>
+
+ <li id="M201704190">
+ <p>Users are suing Bose for <a
+
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
+ distributing a spyware app for its headphones</a>. Specifically,
+ the app would record the names of the audio files users listen to
+ along with the headphone's unique serial number.</p>
- <p>Out, out, damned Spotify!</p>
- </li>
- <li><p>Many proprietary apps for mobile devices report which other
- apps the user has
- installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this in a way that at least is visible and
- optional</a>. Not as bad as what the others do.</p>
+ <p>The suit accuses that this was done without the users' consent.
+ If the fine print of the app said that users gave consent for this,
+ would that make it acceptable? No way! It should be flat out <a
+ href="/philosophy/surveillance-vs-democracy.html"> illegal to design
+ the app to snoop at all</a>.</p>
+ </li>
+
+ <li id="M201704074">
+ <p>Pairs of Android apps can collude
+ to transmit users' personal data to servers. <a
+
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
+ study found tens of thousands of pairs that collude</a>.</p>
+ </li>
+
+ <li id="M201703300">
+ <p>Verizon <a
+
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ announced an opt-in proprietary search app that it will</a> pre-install
+ on some of its phones. The app will give Verizon the same information
+ about the users' searches that Google normally gets when they use
+ its search engine.</p>
+
+ <p>Currently, the app is <a
+
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed on only one phone</a>, and the user must
+ explicitly opt-in before the app takes effect. However, the app
+ remains spyware—an “optional” piece of spyware is
+ still spyware.</p>
</li>
- <li><p>FTC says most mobile apps for children don't respect privacy:
- <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
+ <li id="M201701210">
+ <p>The Meitu photo-editing app <a
+
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ user data to a Chinese company</a>.</p>
</li>
- <li><p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop on the user</a>. This is in addition to
- the snooping done by the phone company, and perhaps by the OS in the
- phone.</p>
+ <li id="M201611280">
+ <p>The Uber app tracks <a
+
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before and after the ride</a>.</p>
- <p>Don't be distracted by the question of whether the app developers get
- users to say “I agree”. That is no excuse for malware.</p>
+ <p>This example illustrates how “getting the user's
+ consent” for surveillance is inadequate as a protection against
+ massive surveillance.</p>
</li>
- <li><p>The Brightest Flashlight app
- <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use by companies.</a></p>
-
- <p>The FTC criticized this app because it asked the user to
- approve sending personal data to the app developer but did not
- ask about sending it to other companies. This shows the
- weakness of the reject-it-if-you-dislike-snooping
- “solution” to surveillance: why should a flashlight
- app send any information to anyone? A free software flashlight
- app would not.</p>
- </li>
-</ul>
+ <li id="M201611160">
+ <p>A <a
+
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
+ research paper</a> that investigated the privacy and security of
+ 283 Android VPN apps concluded that “in spite of the promises
+ for privacy, security, and anonymity given by the majority of VPN
+ apps—millions of users may be unawarely subject to poor security
+ guarantees and abusive practices inflicted by VPN apps.”</p>
-<div class="big-subsection">
- <h4 id="SpywareInToys">Spyware in Toys</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
-</div>
+ <p>Following is a non-exhaustive list of proprietary VPN apps from
+ the research paper that tracks and infringes the privacy of users:</p>
-<ul>
+ <dl>
+ <dt>SurfEasy</dt>
+ <dd>Includes tracking libraries such as NativeX and Appflood,
+ meant to track users and show them targeted ads.</dd>
- <li>
- <p>A remote-control sex toy was found to make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings
- of the conversation between two users</a>.</p>
+ <dt>sFly Network Booster</dt>
+ <dd>Requests the <code>READ_SMS</code> and <code>SEND_SMS</code>
+ permissions upon installation, meaning it has full access to users'
+ text messages.</dd>
+
+ <dt>DroidVPN and TigerVPN</dt>
+ <dd>Requests the <code>READ_LOGS</code> permission to read logs
+ for other apps and also core system logs. TigerVPN developers have
+ confirmed this.</dd>
+
+ <dt>HideMyAss</dt>
+ <dd>Sends traffic to LinkedIn. Also, it stores detailed logs and
+ may turn them over to the UK government if requested.</dd>
+
+ <dt>VPN Services HotspotShield</dt>
+ <dd>Injects JavaScript code into the HTML pages returned to the
+ users. The stated purpose of the JS injection is to display ads. Uses
+ roughly five tracking libraries. Also, it redirects the user's
+ traffic through valueclick.com (an advertising website).</dd>
+
+ <dt>WiFi Protector VPN</dt>
+ <dd>Injects JavaScript code into HTML pages, and also uses roughly
+ five tracking libraries. Developers of this app have confirmed that
+ the non-premium version of the app does JavaScript injection for
+ tracking and display ads.</dd>
+ </dl>
+ </li>
+
+ <li id="M201609210">
+ <p>Google's new voice messaging app <a
+
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p>
</li>
- <li>
- <p>The “smart” toys My Friend Cayla and i-Que transmit
- <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,
- a speech recognition company based in the U.S.</p>
+ <li id="M201606050">
+ <p>Facebook's new Magic Photo app <a
+
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+ scans your mobile phone's photo collections for known faces</a>,
+ and suggests you to share the picture you take according to who is
+ in the frame.</p>
- <p>Those toys also contain major security vulnerabilities; crackers
- can remotely control the toys with a mobile phone. This would
- enable crackers to listen in on a child's speech, and even speak
- into the toys themselves.</p>
+ <p>This spyware feature seems to require online access to some
+ known-faces database, which means the pictures are likely to be
+ sent across the wire to Facebook's servers and face-recognition
+ algorithms.</p>
+
+ <p>If so, none of Facebook users' pictures are private anymore,
+ even if the user didn't “upload” them to the service.</p>
</li>
- <li>
- <p>A computerized vibrator
- <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on its users through the proprietary control app</a>.</p>
+ <li id="M201605310">
+ <p>Facebook's app listens all the time, <a
+
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
+ snoop on what people are listening to or watching</a>. In addition,
+ it may be analyzing people's conversations to serve them with targeted
+ advertisements.</p>
+ </li>
- <p>The app was reporting the temperature of the vibrator minute by
- minute (thus, indirectly, whether it was surrounded by a person's
- body), as well as the vibration frequency.</p>
+ <li id="M201604250">
+ <p>A pregnancy test controller application not only can <a
+
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
+ spy on many sorts of data in the phone, and in server accounts,
+ it can alter them too</a>.</p>
+ </li>
- <p>Note the totally inadequate proposed response: a labeling
- standard with which manufacturers would make statements about
- their products, rather than free software which users could have
- checked and changed.</p>
-
- <p>The company that made the vibrator
- <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots of personal information about how
- people used it</a>.</p>
+ <li id="M201601130">
+ <p>Apps that include <a
+
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop on what radio and TV programs
+ are playing nearby</a>. Also on what users post on various sites
+ such as Facebook, Google+ and Twitter.</p>
+ </li>
- <p>The company's statement that it was anonymizing the data may be
- true, but it doesn't really matter. If it had sold the data to a
- data broker, the data broker would have been able to figure out
- who the user was.</p>
+ <li id="M201511190">
+ <p>“Cryptic communication,”
+ unrelated to the app's functionality, was <a
+ href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found in the 500 most popular gratis Android apps</a>.</p>
+
+ <p>The article should not have described these apps as
+ “free”—they are not free software. The clear way
+ to say “zero price” is “gratis.”</p>
- <p>Following this lawsuit,
- <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered to pay a total of C$4m</a>
- to its customers.</p>
+ <p>The article takes for granted that the usual analytics tools are
+ legitimate, but is that valid? Software developers have no right to
+ analyze what users are doing or how. “Analytics” tools
+ that snoop are just as wrong as any other snooping.</p>
</li>
- <li><p> “CloudPets” toys with microphones <a
-
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak childrens' conversations to the manufacturer</a>. Guess what? <a
-
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found a way to access the data</a> collected by the
- manufacturer's snooping.</p>
+ <li id="M201510300">
+ <p>More than 73% and 47% of mobile applications, from Android and iOS
+ respectively <a href="https://techscience.org/a/2015103001/">share
+ personal, behavioral and location information</a> of their users with
+ third parties.</p>
+ </li>
+
+ <li id="M201508210">
+ <p>Like most “music screaming” disservices, Spotify is
+ based on proprietary malware (DRM and snooping). In August 2015 it <a
+
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded users submit to increased snooping</a>, and some are starting
+ to realize that it is nasty.</p>
- <p>That the manufacturer and the FBI could listen to these conversations
- was unacceptable by itself.</p></li>
+ <p>This article shows the <a
+
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways that they present snooping as a way to “serve”
+ users better</a>—never mind whether they want that. This is a
+ typical example of the attitude of the proprietary software industry
+ towards those they have subjugated.</p>
- <li><p>Barbie
- <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children and adults</a>.</p>
+ <p>Out, out, damned Spotify!</p>
</li>
-</ul>
+ <li id="M201506264">
+ <p><a
+
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
+ study in 2015</a> found that 90% of the top-ranked gratis proprietary
+ Android apps contained recognizable tracking libraries. For the paid
+ proprietary apps, it was only 60%.</p>
+
+ <p>The article confusingly describes gratis apps as
+ “free”, but most of them are not in fact <a
+ href="/philosophy/free-sw.html">free software</a>. It also uses the
+ ugly word “monetize”. A good replacement for that word
+ is “exploit”; nearly always that will fit perfectly.</p>
+ </li>
+
+ <li id="M201505060">
+ <p>Gratis Android apps (but not <a
+ href="/philosophy/free-sw.html">free software</a>) connect to 100 <a
+
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
+ and advertising</a> URLs, on the average.</p>
+ </li>
+
+ <li id="M201504060">
+ <p>Widely used <a
+
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop on the user</a>. This is in addition to
+ the snooping done by the phone company, and perhaps by the OS in
+ the phone.</p>
-<!-- #SpywareOnWearables -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
+ <p>Don't be distracted by the question of whether the app developers
+ get users to say “I agree”. That is no excuse for
+ malware.</p>
+ </li>
-<div class="big-section">
- <h3 id="SpywareOnWearables">Spyware on Wearables</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnWearables">#SpywareOnWearables</a>)</span>
-</div>
-<div style="clear: left;"></div>
+ <li id="M201411260">
+ <p>Many proprietary apps for mobile devices
+ report which other apps the user has installed. <a
+ href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing this in a way that at least is visible and optional</a>. Not
+ as bad as what the others do.</p>
+ </li>
-<ul>
- <li><p>Tommy Hilfiger
- clothing <a
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
- monitor how often people wear it</a>.</p>
+ <li id="M201401151">
+ <p>The Simeji keyboard is a smartphone version of Baidu's <a
+ href="/proprietary/#baidu-ime">spying <abbr
+ title="Input Method Editor">IME</abbr></a>.</p>
+ </li>
- <p>This will teach the sheeple to find it normal that companies
- monitor every aspect of what they do.</p>
+ <li id="M201312270">
+ <p>The nonfree Snapchat app's principal purpose is to restrict the
+ use of data on the user's computer, but it does surveillance too: <a
+
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries to get the user's list of other people's phone
+ numbers</a>.</p>
+ </li>
+
+ <li id="M201312060">
+ <p>The Brightest Flashlight app <a
+
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use by companies</a>.</p>
+
+ <p>The FTC criticized this app because it asked the user to
+ approve sending personal data to the app developer but did not ask
+ about sending it to other companies. This shows the weakness of
+ the reject-it-if-you-dislike-snooping “solution” to
+ surveillance: why should a flashlight app send any information to
+ anyone? A free software flashlight app would not.</p>
+ </li>
+
+ <li id="M201212100">
+ <p>FTC says most mobile apps for children don't respect privacy: <a
+
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
</li>
</ul>
+
<div class="big-subsection">
- <h3 id="SpywareOnSmartWatches">Spyware on “Smart” Watches</h3>
- <span class="anchor-reference-id">
- (<a href="#SpywareOnSmartWatches">#SpywareOnSmartWatches</a>)</span>
+ <h4 id="SpywareInSkype">Skype</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
</div>
-<ul>
- <li>
- <p>An LG “smart” watch is designed
- <a
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
- to report its location to someone else and to transmit
- conversations too</a>.</p>
- </li>
- <li>
- <p>A very cheap “smart watch” comes with an Android app
- <a
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
- that connects to an unidentified site in China</a>.</p>
- <p>The article says this is a back door, but that could be a
- misunderstanding. However, it is certainly surveillance, at
- least.</p>
+<ul class="blurbs">
+ <li id="M201307110">
+ <p>Skype contains <a
+
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">spyware</a>.
+ Microsoft changed Skype <a
+
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p>
</li>
</ul>
-<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
-<div class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
+<div class="big-subsection">
+ <h4 id="SpywareInGames">Games</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
</div>
-<div style="clear: left;"></div>
+<ul class="blurbs">
+ <li id="M201806240">
+ <p>Red Shell is a spyware that
+ is found in many proprietary games. It <a
+
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
+ tracks data on users' computers and sends it to third parties</a>.</p>
+ </li>
-<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
-</div>
+ <li id="M201804144">
+ <p>ArenaNet surreptitiously installed a spyware
+ program along with an update to the massive
+ multiplayer game Guild War 2. The spyware allowed ArenaNet <a
+
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave">
+ to snoop on all open processes running on its user's computer</a>.</p>
+ </li>
+
+ <li id="M201711070">
+ <p>The driver for a certain gaming keyboard <a
+
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
+ information to China</a>.</p>
+ </li>
+
+ <li id="M201611070">
+ <p>nVidia's proprietary GeForce Experience <a
+
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+ users identify themselves and then sends personal data about them to
+ nVidia servers</a>.</p>
+ </li>
-<ul>
-<li><p>
-<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
installs.
-Note that the specific sabotage method Lenovo used did not affect
-GNU/Linux; also, a “clean” Windows install is not really
-clean since <a href="/proprietary/malware-microsoft.html">Microsoft
-puts in its own malware</a>.
-</p></li>
+ <li id="M201512290">
+ <p>Many <a
+
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
+ video game consoles snoop on their users and report to the
+ internet</a>—even what their users weigh.</p>
+
+ <p>A game console is a computer, and you can't trust a computer with
+ a nonfree operating system.</p>
+ </li>
+
+ <li id="M201509160">
+ <p>Modern gratis game cr…apps <a
+
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
+ collect a wide range of data about their users and their users'
+ friends and associates</a>.</p>
+
+ <p>Even nastier, they do it through ad networks that merge the data
+ collected by various cr…apps and sites made by different
+ companies.</p>
+
+ <p>They use this data to manipulate people to buy things, and hunt for
+ “whales” who can be led to spend a lot of money. They also
+ use a back door to manipulate the game play for specific players.</p>
+
+ <p>While the article describes gratis games, games that cost money
+ can use the same tactics.</p>
+ </li>
+
+ <li id="M201401280">
+ <p>Angry Birds <a
+
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies for companies, and the NSA takes advantage
+ to spy through it too</a>. Here's information on <a
+
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ more spyware apps</a>.</p>
+
+ <p><a
+
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
+ More about NSA app spying</a>.</p>
+ </li>
+
+ <li id="M200510200">
+ <p>Blizzard Warden is a hidden
+ “cheating-prevention” program that <a
+ href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
+ spies on every process running on a gamer's computer and sniffs a
+ good deal of personal data</a>, including lots of activities which
+ have nothing to do with cheating.</p>
+ </li>
</ul>
-<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
+
<div class="big-section">
- <h3 id="SpywareAtWork">Spyware at Work</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
+ <h3 id="SpywareInEquipment">Spyware in Connected Equipment</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareInEquipment">#SpywareInEquipment</a>)</span>
</div>
<div style="clear: left;"></div>
-<ul>
- <li><p>Investigation
- Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies, NSA To Route Around Domestic Surveillance
- Restrictions</a>.</p>
+<ul class="blurbs">
+ <li id="M201708280">
+ <p>The bad security in many Internet of Stings devices allows <a
+
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
+ to snoop on the people that use them</a>.</p>
- <p>Specifically, it can collect the emails of members of Parliament
- this way, because they pass it through Microsoft.</p></li>
+ <p>Don't be a sucker—reject all the stings.</p>
- <li><p>Spyware in Cisco TNP IP phones:
- <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p>
+ <p>It is unfortunate that the article uses the term <a
+
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInSkype">Spyware in Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+ <h4 id="SpywareInTVSets">TV Sets</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
</div>
-<ul>
- <li><p>Spyware in Skype:
- <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype
- <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p>
+<p>Emo Phillips made a joke: The other day a woman came up to me and
+said, “Didn't I see you on television?” I said, “I
+don't know. You can't see out the other way.” Evidently that was
+before Amazon “smart” TVs.</p>
+
+<ul class="blurbs">
+ <li id="M201804010">
+ <p>Some “Smart” TVs automatically <a
+
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
+ load downgrades that install a surveillance app</a>.</p>
+
+ <p>We link to the article for the facts it presents. It
+ is too bad that the article finishes by advocating the
+ moral weakness of surrendering to Netflix. The Netflix app <a
+ href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
+ malware too</a>.</p>
</li>
-</ul>
+ <li id="M201702060">
+ <p>Vizio “smart” <a
+
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything that is viewed on them, and not just broadcasts and
+ cable</a>. Even if the image is coming from the user's own computer,
+ the TV reports what it is. The existence of a way to disable the
+ surveillance, even if it were not hidden as it was in these TVs,
+ does not legitimize the surveillance.</p>
+ </li>
+
+ <li id="M201511130">
+ <p>Some web and TV advertisements play inaudible
+ sounds to be picked up by proprietary malware running
+ on other devices in range so as to determine that they
+ are nearby. Once your Internet devices are paired with
+ your TV, advertisers can correlate ads with Web activity, and other <a
+
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
+ cross-device tracking</a>.</p>
+ </li>
+
+ <li id="M201511060">
+ <p>Vizio goes a step further than other TV
+ manufacturers in spying on their users: their <a
+
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits in detail and
+ link them your IP address</a> so that advertisers can track you
+ across devices.</p>
+ <p>It is possible to turn this off, but having it enabled by default
+ is an injustice already.</p>
+ </li>
-<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
+ <li id="M201511020">
+ <p>Tivo's alliance with Viacom adds 2.3 million households
+ to the 600 millions social media profiles the company
+ already monitors. Tivo customers are unaware they're
+ being watched by advertisers. By combining TV viewing
+ information with online social media participation, Tivo can now <a
+ href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
+ correlate TV advertisement with online purchases</a>, exposing all
+ users to new combined surveillance by default.</p>
+ </li>
+
+ <li id="M201507240">
+ <p>Vizio “smart” TVs recognize and <a
+ href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
+ what people are watching</a>, even if it isn't a TV channel.</p>
+ </li>
+
+ <li id="M201505290">
+ <p>Verizon cable TV <a
+
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
+ snoops on what programs people watch, and even what they wanted to
+ record</a>.</p>
+ </li>
+
+ <li id="M201504300">
+ <p>Vizio <a
+ href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
+ used a firmware “upgrade” to make its TVs snoop on what
+ users watch</a>. The TVs did not do that when first sold.</p>
+ </li>
+
+ <li id="M201502090">
+ <p>The Samsung “Smart” TV <a
+
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
+ transmits users' voice on the internet to another company, Nuance</a>.
+ Nuance can save it and would then have to give it to the US or some
+ other government.</p>
+
+ <p>Speech recognition is not to be trusted unless it is done by free
+ software in your own computer.</p>
+
+ <p>In its privacy policy, Samsung explicitly confirms that <a
+
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
+ data containing sensitive information will be transmitted to third
+ parties</a>.</p>
+ </li>
+
+ <li id="M201411090">
+ <p>The Amazon “Smart” TV is <a
+
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
+ snooping all the time</a>.</p>
+ </li>
+
+ <li id="M201409290">
+ <p>More or less all “smart” TVs <a
+
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on their users</a>.</p>
+
+ <p>The report was as of 2014, but we don't expect this has got
+ better.</p>
+
+ <p>This shows that laws requiring products to get users' formal
+ consent before collecting personal data are totally inadequate.
+ And what happens if a user declines consent? Probably the TV will
+ say, “Without your consent to tracking, the TV will not
+ work.”</p>
+
+ <p>Proper laws would say that TVs are not allowed to report what the
+ user watches—no exceptions!</p>
+ </li>
+
+ <li id="M201405200">
+ <p>Spyware in LG “smart” TVs <a
+
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ reports what the user watches, and the switch to turn this off has
+ no effect</a>. (The fact that the transmission reports a 404 error
+ really means nothing; the server could save that data anyway.)</p>
+
+ <p>Even worse, it <a
+
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ snoops on other devices on the user's local network</a>.</p>
+
+ <p>LG later said it had installed a patch to stop this, but any
+ product could spy this way.</p>
+
+ <p>Meanwhile, LG TVs <a
+
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
+ do lots of spying anyway</a>.</p>
+ </li>
+
+ <li id="M201212170">
+ <p id="break-security-smarttv"><a
+
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
+ Crackers found a way to break security on a “smart” TV</a>
+ and use its camera to watch the people who are watching TV.</p>
+ </li>
+</ul>
-<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
-</div>
-<div style="clear: left;"></div>
<div class="big-subsection">
- <h4 id="SpywareInCameras">Spyware in Cameras</h4>
+ <h4 id="SpywareInCameras">Cameras</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
</div>
-<ul>
- <li>
- <p>Every “home security” camera, if its manufacturer can
communicate with it,
- is a surveillance device. <a
-href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
+<ul class="blurbs">
+ <li id="M201710040">
+ <p>Every “home security” camera, if its
+ manufacturer can communicate with it, is a surveillance device. <a
+
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
Canary camera is an example</a>.</p>
- <p>The article describes wrongdoing by the manufacturer, based on the fact
- that the device is tethered to a server.</p>
- <p><a href="/proprietary/proprietary-tethers.html">More about proprietary
tethering</a>.</p>
+
+ <p>The article describes wrongdoing by the manufacturer, based on
+ the fact that the device is tethered to a server.</p>
+
+ <p><a href="/proprietary/proprietary-tethers.html">More about
+ proprietary tethering</a>.</p>
+
<p>But it also demonstrates that the device gives the company
surveillance capability.</p>
</li>
- <li>
+ <li id="M201603220">
+ <p>Over 70 brands of network-connected surveillance cameras have <a
+
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
+ security bugs that allow anyone to watch through them</a>.</p>
+ </li>
+
+ <li id="M201511250">
<p>The Nest Cam “smart” camera is <a
- href="http://www.bbc.com/news/technology-34922712">always
- watching</a>, even when the “owner” switches it
“off.”</p>
- <p>A “smart” device means the manufacturer is using it to
outsmart
- you.</p>
+ href="http://www.bbc.com/news/technology-34922712">always watching</a>,
+ even when the “owner” switches it “off.”</p>
+
+ <p>A “smart” device means the manufacturer is using it
+ to outsmart you.</p>
</li>
</ul>
+
<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
+ <h4 id="SpywareInToys">Toys</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
</div>
-<ul>
- <li><p>E-books can contain JavaScript code,
- and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code snoops on readers</a>.</p>
+<ul class="blurbs">
+ <li id="M201711244">
+ <p>The Furby Connect has a <a
+
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
+ universal back door</a>. If the product as shipped doesn't act as a
+ listening device, remote changes to the code could surely convert it
+ into one.</p>
+ </li>
+
+ <li id="M201711100">
+ <p>A remote-control sex toy was found to make <a
+
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
+ recordings of the conversation between two users</a>.</p>
+ </li>
+
+ <li id="M201703140">
+ <p>A computerized vibrator <a
+
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping on its users through the proprietary control app</a>.</p>
+
+ <p>The app was reporting the temperature of the vibrator minute by
+ minute (thus, indirectly, whether it was surrounded by a person's
+ body), as well as the vibration frequency.</p>
+
+ <p>Note the totally inadequate proposed response: a labeling
+ standard with which manufacturers would make statements about their
+ products, rather than free software which users could have checked
+ and changed.</p>
+
+ <p>The company that made the vibrator <a
+
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued for collecting lots of personal information about how people
+ used it</a>.</p>
+
+ <p>The company's statement that it was anonymizing the data may be
+ true, but it doesn't really matter. If it had sold the data to a data
+ broker, the data broker would have been able to figure out who the
+ user was.</p>
+
+ <p>Following this lawsuit, <a
+
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company has been ordered to pay a total of C$4m</a> to its
+ customers.</p>
</li>
- <li><p>Spyware in many e-readers—not only the
- Kindle: <a href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report even which page the user reads at what time</a>.</p>
+ <li id="M201702280">
+ <p>“CloudPets” toys with microphones <a
+
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
+ leak childrens' conversations to the manufacturer</a>. Guess what? <a
+
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
+ Crackers found a way to access the data</a> collected by the
+ manufacturer's snooping.</p>
+
+ <p>That the manufacturer and the FBI could listen to these
+ conversations was unacceptable by itself.</p>
</li>
- <li><p>Adobe made “Digital Editions,” the e-reader used
- by most US libraries,
- <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of data to Adobe</a>. Adobe's “excuse”: it's
- needed to check DRM!</p>
+ <li id="M201612060">
+ <p>The “smart” toys My Friend Cayla and i-Que transmit <a
+
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
+ conversations to Nuance Communications</a>, a speech recognition
+ company based in the U.S.</p>
+
+ <p>Those toys also contain major security vulnerabilities; crackers
+ can remotely control the toys with a mobile phone. This would enable
+ crackers to listen in on a child's speech, and even speak into the
+ toys themselves.</p>
+ </li>
+
+ <li id="M201502180">
+ <p>Barbie <a
+
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
+ going to spy on children and adults</a>.</p>
</li>
</ul>
+
<div class="big-subsection">
- <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
+ <h4 id="SpywareInDrones">Drones</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInDrones">#SpywareInDrones</a>)</span>
</div>
-<ul>
-<li><p>Computerized cars with nonfree software are
- <a
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
- snooping devices</a>.</p>
- </li>
-
- <li id="nissan-modem"><p>The Nissan Leaf has a built-in cell phone modem
which allows
- effectively
- anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely and make changes in various
- settings</a>.</p>
-
- <p>That's easy to do because the system has no authentication when
- accessed through the modem. However, even if it asked for
- authentication, you couldn't be confident that Nissan has no
- access. The software in the car is
- proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
- means it demands blind faith from its users</a>.</p>
-
- <p>Even if no one connects to the car remotely, the cell phone
- modem enables the phone company to track the car's movements all
- the time; it is possible to physically remove the cell phone modem
- though.</p>
- </li>
-
- <li id="records-drivers"><p>Proprietary software in cars
- <a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
- which is made available to car manufacturers, insurance companies, and
- others.</p>
-
- <p>The case of toll-collection systems, mentioned in this article, is not
- really a matter of proprietary surveillance. These systems are an
- intolerable invasion of privacy, and should be replaced with anonymous
- payment systems, but the invasion isn't done by malware. The other
- cases mentioned are done by proprietary malware in the car.</p></li>
-
- <li><p>Tesla cars allow the company to extract data remotely and
- determine the car's location at any time. (See
- <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b and c.</a>). The company says it doesn't
- store this information, but if the state orders it to get the data
- and hand it over, the state can store it.</p>
+<ul class="blurbs">
+ <li id="M201708040">
+ <p>While you're using a DJI drone
+ to snoop on other people, DJI is in many cases <a
+
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
+ on you</a>.</p>
</li>
</ul>
-<!-- #SpywareAtHome -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtHome">Spyware at Home</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+<div class="big-subsection">
+ <h4 id="SpywareAtHome">Other Appliances</h4><span
class="anchor-reference-id">(<a href="#SpywareAtHome">#SpywareAtHome</a>)</span>
</div>
-<div style="clear: left;"></div>
-<ul>
- <li>
+<ul class="blurbs">
+ <li id="M201808120">
<p>Crackers found a way to break the security of an Amazon device,
- and <a
- href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
- turn it into a listening device for them</a>.</p>
+ and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
+ turn it into a listening device</a> for them.</p>
<p>It was very difficult for them to do this. The job would be much
- easier for Amazon. And if some government such as China or the
- US told Amazon to do this, or cease to sell the product in that
- country, do you think Amazon would have the moral fiber to say
- no?</p>
+ easier for Amazon. And if some government such as China or the US
+ told Amazon to do this, or cease to sell the product in that country,
+ do you think Amazon would have the moral fiber to say no?</p>
<p>These crackers are probably hackers too, but please <a
- href="https://stallman.org/articles/on-hacking.html">
- don't use “hacking” to mean “breaking
- security”</a>.</p>
+ href="https://stallman.org/articles/on-hacking.html"> don't use
+ “hacking” to mean “breaking security”</a>.</p>
</li>
- <li><p>A medical insurance
- company <a
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
- offers a gratis electronic toothbrush that snoops on its user
- by sending usage data back over the Internet</a>.</p>
+ <li id="M201804140">
+ <p>A medical insurance company <a
+
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
+ offers a gratis electronic toothbrush that snoops on its user by
+ sending usage data back over the Internet</a>.</p>
</li>
- <li><p>Lots of “smart” products are
- designed <a
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
+ <li id="M201706204">
+ <p>Lots of “smart” products are designed <a
+
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
listen to everyone in the house, all the time</a>.</p>
- <p>Today's technological practice does not include any way of
- making a device that can obey your voice commands without
- potentially spying on you. Even if it is air-gapped, it could be
- saving up records about you for later examination.</p>
+ <p>Today's technological practice does not include any way of making
+ a device that can obey your voice commands without potentially spying
+ on you. Even if it is air-gapped, it could be saving up records
+ about you for later examination.</p>
</li>
- <li><p>Nest thermometers
- send <a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
- lot of data about the user</a>.</p>
+ <li id="M201407170">
+ <p id="nest-thermometers">Nest thermometers send <a
+ href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a lot of
+ data about the user</a>.</p>
</li>
- <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ <li id="M201310260">
+ <p><a
+
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
Rent-to-own computers were programmed to spy on their renters</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInTVSets">Spyware in TV Sets</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
+ <h4 id="SpywareOnWearables">Wearables</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnWearables">#SpywareOnWearables</a>)</span>
</div>
-<p>Emo Phillips made a joke: The other day a woman came up to me and
-said, “Didn't I see you on television?” I said, “I
-don't know. You can't see out the other way.” Evidently that was
-before Amazon “smart” TVs.</p>
-
-<ul>
- <li><p>Some “Smart” TVs
- automatically <a
href="https://news.ycombinator.com/item?id=16727319">load
- downgrades that install a surveillance app</a>.</p>
-
- <p>We link to the article for the facts it presents. It is too bad
- that the article finishes by advocating the moral weakness of
- surrendering to Netflix. The Netflix
- app <a
href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
- malware too</a>.</p>
- </li>
+<ul class="blurbs">
+ <li id="M201807260">
+ <p>Tommy Hilfiger clothing <a
+
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
+ monitor how often people wear it</a>.</p>
- <li>
- <p>Vizio
- “smart” <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed on them, and not just broadcasts
- and cable</a>. Even if the image is coming from the user's own
- computer, the TV reports what it is. The existence of a way to
- disable the surveillance, even if it were not hidden as it was in
- these TVs, does not legitimize the surveillance.</p>
+ <p>This will teach the sheeple to find it normal that companies
+ monitor every aspect of what they do.</p>
</li>
+</ul>
- <li><p>More or less all “smart” TVs <a
-href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p>
-
- <p>The report was as of 2014, but we don't expect this has got better.</p>
- <p>This shows that laws requiring products to get users' formal
- consent before collecting personal data are totally inadequate.
- And what happens if a user declines consent? Probably the TV
- will say, “Without your consent to tracking, the TV will
- not work.”</p>
+<h5 id="SpywareOnSmartWatches">“Smart” Watches</h5>
- <p>Proper laws would say that TVs are not allowed to report what
- the user watches — no exceptions!</p>
- </li>
- <li><p>Vizio goes a step further than other TV manufacturers in spying on
- their users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in detail and
- link them your IP address</a> so that advertisers can track you
- across devices.</p>
-
- <p>It is possible to turn this off, but having it enabled by default
- is an injustice already.</p>
- </li>
-
- <li><p>Tivo's alliance with Viacom adds 2.3 million households to
- the 600 millions social media profiles the company already
- monitors. Tivo customers are unaware they're being watched by
- advertisers. By combining TV viewing information with online
- social media participation, Tivo can now <a
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
- advertisement with online purchases</a>, exposing all users to
- new combined surveillance by default.</p></li>
- <li><p>Some web and TV advertisements play inaudible sounds to be
- picked up by proprietary malware running on other devices in
- range so as to determine that they are nearby. Once your
- Internet devices are paired with your TV, advertisers can
- correlate ads with Web activity, and
- other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p>
- </li>
- <li><p>Vizio “smart” TVs recognize and
- <a
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track what
people are watching</a>,
- even if it isn't a TV channel.</p>
- </li>
- <li><p>The Amazon “Smart” TV
- <a
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
- snooping all the time</a>.</p>
- </li>
- <li><p>The Samsung “Smart” TV
- <a
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on the internet to another
- company, Nuance</a>. Nuance can save it and would then have to
- give it to the US or some other government.</p>
- <p>Speech recognition is not to be trusted unless it is done
- by free software in your own computer.</p>
+<ul class="blurbs">
+ <li id="M201603020">
+ <p>A very cheap “smart watch” comes with an Android app <a
+
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
+ that connects to an unidentified site in China</a>.</p>
- <p>In its privacy policy, Samsung explicitly confirms
- that <a
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
- data containing sensitive information will be transmitted to
- third parties</a>.</p>
+ <p>The article says this is a back door, but that could be a
+ misunderstanding. However, it is certainly surveillance, at least.</p>
</li>
- <li><p>Spyware in
- <a
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- LG “smart” TVs</a> reports what the user watches, and
- the switch to turn this off has no effect. (The fact that the
- transmission reports a 404 error really means nothing; the server
- could save that data anyway.)</p>
-
- <p>Even worse, it
- <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices on the user's local network.</a></p>
-
- <p>LG later said it had installed a patch to stop this, but any product
- could spy this way.</p>
- <p>Meanwhile, LG TVs
- <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots of spying anyway</a>.</p>
- </li>
- <li>
- <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops on what programs people watch, and even what they wanted to
record.</a></p>
+ <li id="M201407090">
+ <p>An LG “smart” watch is designed <a
+
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
+ to report its location to someone else and to transmit conversations
+ too</a>.</p>
</li>
</ul>
-<!-- #SpywareInGames -->
-<div class="big-section">
- <h3 id="SpywareInGames">Spyware in Games</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li>
- <p>Red Shell is a spyware that is found in many proprietary games. It <a
-
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
- tracks data on users' computers and sends it to third parties</a>.</p>
- </li>
-
- <li>
- <p>Blizzard Warden is a hidden “cheating-prevention” program
- that <a
- href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
- spies on every process running on a gamer's computer and sniffs a
- good deal of personal data</a>, including lots of activities which
- have nothing to do with cheating.</p>
- </li>
-
- <li>
- <p>ArenaNet surreptitiously installed a spyware program along with an
- update to the massive multiplayer game Guild War 2. The spyware
- allowed ArenaNet <a
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave">
- to snoop on all open processes running on its user's
- computer</a>.</p>
- </li>
- <li>
- <p>The driver for a certain gaming keyboard <a
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
information
- to China</a>.</p>
- </li>
+<div class="big-subsection">
+ <h4 id="SpywareInVehicles">Vehicles</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
+</div>
- <li><p>nVidia's proprietary GeForce Experience <a
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
- users identify themselves and then sends personal data about them to
- nVidia servers</a>.</p>
+<ul class="blurbs">
+ <li id="M201711230">
+ <p>AI-powered driving apps can <a
+
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
+ track your every move</a>.</p>
</li>
- <li><p>Angry Birds
- <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies, and the NSA takes advantage to spy through it
too</a>.
- Here's information on
- <a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
- more spyware apps</a>.</p>
- <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA app spying</a>.</p>
+ <li id="M201607160">
+ <p>Computerized cars with nonfree software are <a
+
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
+ snooping devices</a>.</p>
</li>
- <li><p>Many
- <a
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles snoop on their users and report to the
- internet</a>— even what their users weigh.</p>
+ <li id="M201602240">
+ <p id="nissan-modem">The Nissan Leaf has a built-in
+ cell phone modem which allows effectively anyone to <a
+ href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">
+ access its computers remotely and make changes in various
+ settings</a>.</p>
- <p>A game console is a computer, and you can't trust a computer with
- a nonfree operating system.</p>
+ <p>That's easy to do because the system has no authentication
+ when accessed through the modem. However, even if it asked
+ for authentication, you couldn't be confident that Nissan
+ has no access. The software in the car is proprietary, <a
+ href="/philosophy/free-software-even-more-important.html">which means
+ it demands blind faith from its users</a>.</p>
+
+ <p>Even if no one connects to the car remotely, the cell phone modem
+ enables the phone company to track the car's movements all the time;
+ it is possible to physically remove the cell phone modem, though.</p>
+ </li>
+
+ <li id="M201306140">
+ <p>Tesla cars allow the company to extract
+ data remotely and determine the car's location
+ at any time. (See Section 2, paragraphs b and c of the <a
+
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ privacy statement</a>.) The company says it doesn't store this
+ information, but if the state orders it to get the data and hand it
+ over, the state can store it.</p>
+ </li>
+
+ <li id="M201303250">
+ <p id="records-drivers">Proprietary software in cars <a
+
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">
+ records information about drivers' movements</a>, which is made
+ available to car manufacturers, insurance companies, and others.</p>
+
+ <p>The case of toll-collection systems, mentioned in this article,
+ is not really a matter of proprietary surveillance. These systems
+ are an intolerable invasion of privacy, and should be replaced with
+ anonymous payment systems, but the invasion isn't done by malware. The
+ other cases mentioned are done by proprietary malware in the car.</p>
</li>
+</ul>
- <li><p>Modern gratis game cr…apps
- <a
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
- collect a wide range of data about their users and their users'
- friends and associates</a>.</p>
- <p>Even nastier, they do it through ad networks that merge the data
- collected by various cr…apps and sites made by different
- companies.</p>
+<div class="big-subsection">
+ <h4 id="SpywareInVR">Virtual Reality</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVR">#SpywareInVR</a>)</span>
+</div>
- <p>They use this data to manipulate people to buy things, and hunt
- for “whales” who can be led to spend a lot of money. They
- also use a back door to manipulate the game play for specific
players.</p>
+<ul class="blurbs">
+ <li id="M201612230">
+ <p>VR equipment, measuring every slight motion,
+ creates the potential for the most intimate
+ surveillance ever. All it takes to make this potential real <a
+
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/">is
+ software as malicious as many other programs listed in this
+ page</a>.</p>
- <p>While the article describes gratis games, games that cost money
- can use the same tactics.</p>
+ <p>You can bet Facebook will implement the maximum possible
+ surveillance on Oculus Rift devices. The moral is, never trust a VR
+ system with nonfree software in it.</p>
</li>
</ul>
-<!-- #SpywareAtRecreation -->
-<div class="big-section">
- <h3 id="SpywareAtRecreation">Spyware at Recreation</h3>
- <span class="anchor-reference-id">
- (<a href="#SpywareAtRecreation">#SpywareAtRecreation</a>)</span>
-</div>
-<div style="clear: left;"></div>
-<ul>
- <li><p>Users are suing Bose for
- <a
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
- distributing a spyware app for its headphones</a>.
- Specifically, the app would record the names of the audio files
- users listen to along with the headphone's unique serial number.
- </p>
- <p>The suit accuses that this was done without the users' consent.
- If the fine print of the app said that users gave consent for this,
- would that make it acceptable? No way! It should be flat out
- <a href="/philosophy/surveillance-vs-democracy.html">
- illegal to design the app to snoop at all</a>.
- </p>
- </li>
-</ul>
-
-<!-- #SpywareOnTheWeb -->
<div class="big-section">
<h3 id="SpywareOnTheWeb">Spyware on the Web</h3>
@@ -1514,193 +1728,186 @@
makes no sense to call them “free” or
“proprietary”</a>,
but the surveillance is an abuse all the same.</p>
-<ul>
- <li><p> The Storyful
- program <a
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch">spies
- on the reporters that use it</a>.
- </p></li>
-
- <li><p>When a page uses Disqus for
- comments, <a
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook">the
- proprietary Disqus software loads a Facebook software package into
- the browser of every anonymous visitor to the page, and makes the
- page's URL available to Facebook</a>.
- </p></li>
-
- <li><p>Online sales, with tracking and surveillance of customers, <a
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices">enables
- businesses to show different people different prices</a>. Most
- of the tracking is done by recording interactions with
- servers, but proprietary software contributes.</p>
- </li>
-
- <li><p><a
href="https://www.techrepublic.com/blog/asian-technology/japanese-government-warns-baidu-ime-is-spying-on-users/">
- Baidu's Japanese-input and Chinese-input apps spy on users.</a></p>
- </li>
-
- <li><p>Pages that contain “Like” buttons <a
-
href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html">
- enable Facebook to track visitors to those pages</a>—even
- users that don't have Facebook accounts.</p>
- </li>
-
- <li><p>Many web sites rat their visitors to advertising networks that track
- users. Of the top 1000 web sites, <a
+<ul class="blurbs">
+ <li id="M201805170">
+ <p>The Storyful program <a
+
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch">spies
+ on the reporters that use it</a>.</p>
+ </li>
+
+ <li id="M201701060">
+ <p>When a page uses Disqus
+ for comments, the proprietary Disqus software <a
+
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook">loads
+ a Facebook software package into the browser of every anonymous visitor
+ to the page, and makes the page's URL available to Facebook</a>.</p>
+ </li>
+
+ <li id="M201612064">
+ <p>Online sales, with tracking and surveillance of customers, <a
+
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices">enables
+ businesses to show different people different prices</a>. Most of
+ the tracking is done by recording interactions with servers, but
+ proprietary software contributes.</p>
+ </li>
+
+ <li id="M201405140">
+ <p><a
+
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">
+ Microsoft SkyDrive allows the NSA to directly examine users'
+ data</a>.</p>
+ </li>
+
+ <li id="M201210240">
+ <p>Many web sites rat their visitors to advertising
+ networks that track users. Of the top 1000 web sites, <a
href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/">84%
- (as of 5/17/2012) fed their visitors third-party cookies, allowing other
- sites to track them</a>.</p>
+ (as of 5/17/2012) fed their visitors third-party cookies, allowing
+ other sites to track them</a>.</p>
</li>
- <li><p>Many web sites report all their visitors to Google by using
- the Google Analytics service, which
- <a
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
- tells Google the IP address and the page that was visited.</a></p>
+ <li id="M201208210">
+ <p>Many web sites report all their visitors
+ to Google by using the Google Analytics service, which <a
+
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
+ tells Google the IP address and the page that was visited</a>.</p>
</li>
- <li><p>Many web sites try to collect users' address books (the
- user's list of other people's phone numbers or email addresses).
- This violates the privacy of those other people.</p>
+ <li id="M201200000">
+ <p>Many web sites try to collect users' address books (the user's list
+ of other people's phone numbers or email addresses). This violates
+ the privacy of those other people.</p>
</li>
- <li><p><a
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">
- Microsoft SkyDrive allows the NSA to directly examine users'
data</a>.</p>
+ <li id="M201110040">
+ <p>Pages that contain “Like” buttons <a
+
href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html">
+ enable Facebook to track visitors to those pages</a>—even users
+ that don't have Facebook accounts.</p>
</li>
</ul>
-<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
+
<div class="big-subsection">
- <h4 id="SpywareInFlash">Spyware in JavaScript and Flash</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInFlash">#SpywareInFlash</a>)</span>
+ <h4 id="SpywareInJavaScript">JavaScript</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInJavaScript">#SpywareInJavaScript</a>)</span>
</div>
-<ul>
- <li>
- <p>British Airways
- used <a
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security">nonfree
- JavaScript on its web site to give other companies personal data
- on its customers</a>.</p>
+<ul class="blurbs">
+ <li id="M201807190">
+ <p>British Airways used <a
+
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security">nonfree
+ JavaScript on its web site to give other companies personal data on
+ its customers</a>.</p>
</li>
- <li>
+ <li id="M201712300">
<p>Some JavaScript malware <a
href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research">
swipes usernames from browser-based password managers</a>.</p>
</li>
- <li>
- <p>Some websites send JavaScript code to collect all the user's
- input, <a
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/">which
can then
- be used to reproduce the whole session</a>.</p>
-
- <p>If you use LibreJS, it will block that malicious JavaScript
- code.</p>
- </li>
-
- <li><p>Many web sites use JavaScript code <a
+ <li id="M201712210">
+ <p>Many web sites use JavaScript code <a
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
- to snoop on information that users have typed into a form but not
- sent</a>, in order to learn their identity. Some are <a
+ to snoop on information that users have typed into a
+ form but not sent</a>, in order to learn their identity. Some are <a
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
getting sued</a> for this.</p>
</li>
- <li><p>Flash Player's
- <a
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">
- cookie feature helps web sites track visitors</a>.</p>
- </li>
+ <li id="M201711150">
+ <p>Some websites send
+ JavaScript code to collect all the user's input, <a
+
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/">which
+ can then be used to reproduce the whole session</a>.</p>
- <li><p>Flash and JavaScript are also used for
- <a
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
- “fingerprinting” devices</a> to identify users.</p>
+ <p>If you use LibreJS, it will block that malicious JavaScript
+ code.</p>
</li>
</ul>
-<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
+
<div class="big-subsection">
- <h4 id="SpywareInChrome">Spyware in Chrome</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInChrome">#SpywareInChrome</a>)</span>
+ <h4 id="SpywareInFlash">Flash</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInFlash">#SpywareInFlash</a>)</span>
</div>
-<ul>
- <li><p>Google Chrome
- <a href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/">
- spies on browser history, affiliations</a>,
- and other installed software.
- </p>
- </li>
- <li><p>Google Chrome contains a key logger that
- <a href="http://www.favbrowser.com/google-chrome-spyware-confirmed/">
- sends Google every URL typed in</a>, one key at a time.</p>
- </li>
-
- <li><p>Google Chrome includes a module that
- <a
href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/">
- activates microphones and transmits audio to its servers</a>.</p>
+<ul class="blurbs">
+ <li id="M201310110">
+ <p>Flash and JavaScript are used for <a
+
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
+ “fingerprinting” devices</a> to identify users.</p>
</li>
- <li><p>Google Chrome makes it easy for an extension to do <a
-
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/">total
- snooping on the user's browsing</a>, and many of them do so.</p>
+ <li id="M201003010">
+ <p>Flash Player's <a
+
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">
+ cookie feature helps web sites track visitors</a>.</p>
</li>
</ul>
-<!-- #SpywareInDrones -->
-<div class="big-section">
- <h3 id="SpywareInDrones">Spyware in Drones</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareInDrones">#SpywareInDrones</a>)</span>
+<div class="big-subsection">
+ <h4 id="SpywareInChrome">Chrome</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInChrome">#SpywareInChrome</a>)</span>
</div>
-<div style="clear: left;"></div>
-<ul>
- <li>
- <p>While you're using a DJI drone to snoop on other people, DJI is in many
- cases <a
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
on you</a>.</p>
+<ul class="blurbs">
+ <li id="M201507280">
+ <p>Google Chrome makes it easy for an extension to do <a
+
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/">total
+ snooping on the user's browsing</a>, and many of them do so.</p>
</li>
-</ul>
+ <li id="M201506180">
+ <p>Google Chrome includes a module that <a
+
href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/">
+ activates microphones and transmits audio to its servers</a>.</p>
+ </li>
-<!-- #SpywareEverywhere -->
-<div class="big-section">
- <h3 id="SpywareEverywhere">Spyware Everywhere</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareEverywhere">#SpywareEverywhere</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>The natural extension of monitoring people through
- “their” phones is <a
-
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
- proprietary software to make sure they can't “fool” the
- monitoring</a>.</p>
+ <li id="M201308040">
+ <p>Google Chrome <a
+ href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/">
+ spies on browser history, affiliations</a>, and other installed
+ software.</p>
</li>
- <li><p><a
href="https://www.pocket-lint.com/laptops/news/intel/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping">
- Intel devices will be able to listen for speech all the time, even when
“off.”</a></p>
+ <li id="M200809060">
+ <p>Google Chrome contains a key logger that <a
+ href="http://www.favbrowser.com/google-chrome-spyware-confirmed/">
+ sends Google every URL typed in</a>, one key at a time.</p>
</li>
</ul>
-<!-- #SpywareInVR -->
+
+
<div class="big-section">
- <h3 id="SpywareInVR">Spyware In VR</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareInVR">#SpywareInVR</a>)</span>
+ <h3 id="SpywareInNetworks">Spyware in Networks</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareInNetworks">#SpywareInNetworks</a>)</span>
</div>
<div style="clear: left;"></div>
-<ul>
- <li><p>VR equipment, measuring every slight motion, creates the
- potential for the most intimate surveillance ever. All it takes
- to make this potential
- real <a
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/">is
- software as malicious as many other programs listed in this
- page</a>.</p>
+<ul class="blurbs">
+ <li id="M201606030">
+ <p>Investigation Shows <a
+
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies, NSA To Route Around Domestic Surveillance
+ Restrictions</a>.</p>
- <p>You can bet Facebook will implement the maximum possible
- surveillance on Oculus Rift devices. The moral is, never trust a
- VR system with nonfree software in it.</p>
+ <p>Specifically, it can collect the emails of members of Parliament
+ this way, because they pass it through Microsoft.</p>
+ </li>
+
+ <li id="M201212290">
+ <p>The Cisco TNP IP phones are <a
+ href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+ spying devices</a>.</p>
</li>
</ul>
+
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
<div id="footer">
@@ -1758,7 +1965,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/09/12 13:57:57 $
+$Date: 2018/09/30 19:27:48 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.400
retrieving revision 1.401
diff -u -b -r1.400 -r1.401
--- po/proprietary-surveillance.ru.po 30 Sep 2018 19:16:54 -0000 1.400
+++ po/proprietary-surveillance.ru.po 30 Sep 2018 19:27:49 -0000 1.401
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-09-30 18:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -659,24 +658,6 @@
"полÑзоваÑели ÑдалиÑÑ ÐµÐµ не могÑÑ."
#. type: Content of: <ul><li><p>
-# | [-<a
-# |
href=\"http://www.washingtonpost.com/blogs/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/\">-]MacOS
-# | automatically {+<a
-# |
href=\"https://web.archive.org/web/20170831144456/https://www.washingtonpost.com/news/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/\">+}
-# | sends to Apple servers unsaved documents being edited</a>. The [-<a
-# |
href=\"https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&utm_medium=twitter/\">-]
-# | things you have not decided to save are {+<a
-# |
href=\"https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&utm_medium=twitter/\">+}
-# | even more [-sensitive-] {+sensitive</a>+} than the things you have stored
-# | in [-files</a>.-] {+files.+}
-#| msgid ""
-#| "<a href=\"http://www.washingtonpost.com/blogs/the-switch/wp/2014/10/30/"
-#| "how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/"
-#| "\"> MacOS automatically sends to Apple servers unsaved documents being "
-#| "edited</a>. The <a href=\"https://www.schneier.com/blog/archives/2014/10/"
-#| "apple_copies_yo.html?utm_source=twitterfeed&utm_medium=twitter/\"> "
-#| "things you have not decided to save are even more sensitive than the "
-#| "things you have stored in files</a>."
msgid ""
"MacOS automatically <a href=\"https://web.archive.org/web/20170831144456/"
"https://www.washingtonpost.com/news/the-switch/wp/2014/10/30/how-one-mans-"
@@ -688,12 +669,12 @@
msgstr ""
"MacOS авÑомаÑиÑеÑки <a
href=\"https://web.archive.org/web/20170831144456/"
"https://www.washingtonpost.com/news/the-switch/wp/2014/10/30/how-one-mans-"
-"private-files-ended-up-on-apples-icloud-without-his-consent/\"> "
-"вÑÑÑÐ»Ð°ÐµÑ Ð½Ð° ÑеÑвеÑÑ Apple неÑоÑ
ÑаненнÑе
докÑменÑÑ Ð²Ð¾ "
-"вÑÐµÐ¼Ñ ÑедакÑиÑованиÑ</a>. То, ÑÑо Ð²Ñ Ð¿Ð¾ÐºÐ° не
ÑеÑили ÑоÑ
ÑанÑÑÑ, <a href=\"https://www.schneier.com/blog/"
+"private-files-ended-up-on-apples-icloud-without-his-consent/\">
вÑÑÑÐ»Ð°ÐµÑ Ð½Ð° "
+"ÑеÑвеÑÑ Apple неÑоÑ
ÑаненнÑе докÑменÑÑ Ð²Ð¾
вÑÐµÐ¼Ñ ÑедакÑиÑованиÑ</a>. То, ÑÑо "
+"Ð²Ñ Ð¿Ð¾ÐºÐ° не ÑеÑили ÑоÑ
ÑанÑÑÑ, <a
href=\"https://www.schneier.com/blog/"
"archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&"
-"utm_medium=twitter/\">еÑе более "
-"конÑиденÑиалÑно</a>, Ñем Ñо, ÑÑо Ð²Ñ ÑоÑ
Ñанили в ÑайлаÑ
."
+"utm_medium=twitter/\">еÑе более конÑиденÑиалÑно</a>,
Ñем Ñо, ÑÑо Ð²Ñ "
+"ÑоÑ
Ñанили в ÑайлаÑ
."
#. type: Content of: <ul><li><p>
msgid ""
@@ -739,9 +720,6 @@
"a>."
#. type: Content of: <div>
-# | <a [-href=\"#SpywareAtLowLevel\">Spyware at Low Level</a>-]
-# | {+id=\"SpywareAtLowLevel\"></a>+}
-#| msgid "<a href=\"#SpywareAtLowLevel\">Spyware at Low Level</a>"
msgid "<a id=\"SpywareAtLowLevel\"></a>"
msgstr "<a id=\"SpywareAtLowLevel\"></a>"
@@ -789,8 +767,6 @@
"\">#SpywareOnMobiles</a>)</span>"
#. type: Content of: <div><h4>
-# | [-Spyware on-]{+All+} “Smart” [-Watches-] {+Phones+}
-#| msgid "Spyware on “Smart” Watches"
msgid "All “Smart” Phones"
msgstr "СмаÑÑÑонÑ"
@@ -856,33 +832,17 @@
"ÑадиоаппаÑаÑÑÑÑ ÑелеÑонов еÑÑÑ Ð¼Ð½Ð¾Ð¶ÐµÑÑво
оÑибок</a>."
#. type: Content of: <ul><li><p>
-# | Portable phones with GPS {+<a
-# |
href=\"http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers\">+}
-# | will send their GPS location on remote command{+,+} and users cannot stop
-# | [-them: <a
-# |
href=\"http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers\">
-# |
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.-]
-# | {+them</a>.+} (The US says it will eventually require all new portable
-# | phones to have GPS.)
-#| msgid ""
-#| "Portable phones with GPS will send their GPS location on remote command "
-#| "and users cannot stop them: <a href=\"http://www.aclu.org/government-"
-#| "location-tracking-cell-phones-gps-devices-and-license-plate-readers\"> "
-#| "http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-"
-#| "and-license-plate-readers</a>. (The US says it will eventually require "
-#| "all new portable phones to have GPS.)"
msgid ""
"Portable phones with GPS <a href=\"http://www.aclu.org/government-location-"
"tracking-cell-phones-gps-devices-and-license-plate-readers\"> will send "
"their GPS location on remote command, and users cannot stop them</a>. (The "
"US says it will eventually require all new portable phones to have GPS.)"
msgstr ""
-"СоÑовÑе ÑелеÑÐ¾Ð½Ñ Ñ GPS <a href=\"http://"
-"www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-"
-"license-plate-readers\">вÑÑÑлаÑÑ Ñвои ÑпÑÑниковÑе
меÑÑоопÑÐµÐ´ÐµÐ»ÐµÐ½Ð¸Ñ Ð¿Ð¾ "
-"Ñдаленной команде, и полÑзоваÑели не
могÑÑ Ð¾ÑÑановиÑÑ ÑÑо</a>. (СШРпланиÑÑÑÑ
ввеÑÑи "
-"когда-нибÑÐ´Ñ ÑÑебование, по коÑоÑÐ¾Ð¼Ñ Ð²Ð¾
вÑеÑ
новÑÑ
мобилÑнÑÑ
ÑелеÑонаÑ
"
-"должен бÑÑÑ Ð¼Ð¾Ð´ÑÐ»Ñ GPS)."
+"СоÑовÑе ÑелеÑÐ¾Ð½Ñ Ñ GPS <a
href=\"http://www.aclu.org/government-location-"
+"tracking-cell-phones-gps-devices-and-license-plate-readers\">вÑÑÑлаÑÑ
Ñвои "
+"ÑпÑÑниковÑе меÑÑоопÑÐµÐ´ÐµÐ»ÐµÐ½Ð¸Ñ Ð¿Ð¾
Ñдаленной команде, и полÑзоваÑели не могÑÑ "
+"оÑÑановиÑÑ ÑÑо</a>. (СШРпланиÑÑÑÑ Ð²Ð²ÐµÑÑи
когда-нибÑÐ´Ñ ÑÑебование, по "
+"коÑоÑÐ¾Ð¼Ñ Ð²Ð¾ вÑеÑ
новÑÑ
мобилÑнÑÑ
ÑелеÑонаÑ
должен бÑÑÑ Ð¼Ð¾Ð´ÑÐ»Ñ GPS)."
#. type: Content of: <div><h4>
msgid "iThings"
@@ -897,15 +857,6 @@
"\">#SpywareIniThings</a>)</span>"
#. type: Content of: <ul><li><p>
-# | The DMCA and the EU Copyright Directive make it <a
-# | href=\"https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html\">
-# | illegal to study how iOS [-cr...apps-] {+cr…apps+} spy on
-# | users</a>, because this would require circumventing the iOS DRM.
-#| msgid ""
-#| "The DMCA and the EU Copyright Directive make it <a href=\"https://"
-#| "boingboing.net/2017/11/25/la-la-la-cant-hear-you.html\"> illegal to study "
-#| "how iOS cr...apps spy on users</a>, because this would require "
-#| "circumventing the iOS DRM."
msgid ""
"The DMCA and the EU Copyright Directive make it <a href=\"https://boingboing."
"net/2017/11/25/la-la-la-cant-hear-you.html\"> illegal to study how iOS "
@@ -934,18 +885,6 @@
"Apple: “Ð¼Ñ Ð·Ð½Ð°ÐµÐ¼, Ð²Ñ Ñ
оÑиÑе, ÑÑÐ¾Ð±Ñ Ð·Ð° вами
Ñпионили”."
#. type: Content of: <ul><li><p>
-# | Apple proposes <a
-# |
href=\"https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen\">a
-# | fingerprint-scanning touch [-screen</a> — which-]
-# | {+screen</a>—which+} would mean no way to use it without having your
-# | fingerprints taken. Users would have no way to tell whether the phone is
-# | snooping on them.
-#| msgid ""
-#| "Apple proposes <a href=\"https://www.theguardian.com/technology/2017/"
-#| "feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen\">a "
-#| "fingerprint-scanning touch screen</a> — which would mean no way to "
-#| "use it without having your fingerprints taken. Users would have no way to "
-#| "tell whether the phone is snooping on them."
msgid ""
"Apple proposes <a href=\"https://www.theguardian.com/technology/2017/feb/15/"
"apple-removing-iphone-home-button-fingerprint-scanning-screen\">a "
@@ -992,13 +931,6 @@
"ÑоÑогÑаÑии, коÑоÑÑе они делаÑÑ."
#. type: Content of: <ul><li><blockquote><p>
-# | iCloud Photo Library stores every photo and video you take, and keeps them
-# | up to date on all your devices. Any edits you make are automatically
-# | updated everywhere. [-[...]-] {+[…]+}
-#| msgid ""
-#| "iCloud Photo Library stores every photo and video you take, and keeps "
-#| "them up to date on all your devices. Any edits you make are "
-#| "automatically updated everywhere. [...]"
msgid ""
"iCloud Photo Library stores every photo and video you take, and keeps them "
"up to date on all your devices. Any edits you make are automatically updated "
@@ -1019,8 +951,8 @@
"(Ðз <a href=\"https://www.apple.com/icloud/photos/\">ÐнÑоÑмаÑии
об Apple's "
"iCloud</a> на 24 ÑенÑÑбÑÑ 2015 года.) ФÑнкÑиÑ
iCloud <a href="
"\"https://support.apple.com/en-us/HT202033\">акÑивизиÑÑеÑÑÑ
пÑи загÑÑзке "
-"iOS</a>. Слово “<span lang=\"en\" xml:lang=\"en\">cloud</span> "
-"(облако)” ознаÑÐ°ÐµÑ “пожалÑйÑÑа, не
ÑпÑаÑивайÑе, где ÑÑо”."
+"iOS</a>. Слово “<span lang=\"en\" xml:lang=\"en\">cloud</span>
(облако)"
+"” ознаÑÐ°ÐµÑ “пожалÑйÑÑа, не
ÑпÑаÑивайÑе, где ÑÑо”."
#. type: Content of: <ul><li><p>
msgid ""
@@ -1088,35 +1020,18 @@
"доклад</a>."
#. type: Content of: <ul><li><p>
-# | [-Spyware in iThings: the-]{+The+} <a class=\"not-a-duplicate\"
-# |
href=\"http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html\">
-# | iBeacon</a> lets stores determine exactly where the iThing is, and get
-# | other info too.
-#| msgid ""
-#| "Spyware in iThings: the <a class=\"not-a-duplicate\" href=\"http://"
-#| "finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-"
-#| "apple-iphone-tracking-feature-161836223.html\"> iBeacon</a> lets stores "
-#| "determine exactly where the iThing is, and get other info too."
msgid ""
"The <a class=\"not-a-duplicate\" href=\"http://finance.yahoo.com/blogs/the-"
"exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-"
"feature-161836223.html\"> iBeacon</a> lets stores determine exactly where "
"the iThing is, and get other info too."
msgstr ""
-"<a href=\"http://finance.yahoo.com/blogs/the-"
-"exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-"
-"feature-161836223.html\">iBeacon</a> позволÑÐµÑ Ð¼Ð°Ð³Ð°Ð·Ð¸Ð½Ð°Ð¼
ÑоÑно опÑеделÑÑÑ, "
-"где наÑ
одиÑÑÑ Ð°Ð¹-ÑÑÑÑка, а Ñакже полÑÑаÑÑ
и дÑÑгие ÑведениÑ."
+"<a href=\"http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-"
+"worry-over-new-apple-iphone-tracking-feature-161836223.html\">iBeacon</a> "
+"позволÑÐµÑ Ð¼Ð°Ð³Ð°Ð·Ð¸Ð½Ð°Ð¼ ÑоÑно опÑеделÑÑÑ, где
наÑ
одиÑÑÑ Ð°Ð¹-ÑÑÑÑка, а Ñакже "
+"полÑÑаÑÑ Ð¸ дÑÑгие ÑведениÑ."
#. type: Content of: <ul><li><p>
-# | <a
-# |
href=\"http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep\">
-# | Either Apple helps the NSA snoop on all the data in an iThing, or it is
-# | totally [-incompetent.</a>-] {+incompetent</a>.+}
-#| msgid ""
-#| "<a href=\"http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-"
-#| "iphone-presenting-dropout-jeep\"> Either Apple helps the NSA snoop on all "
-#| "the data in an iThing, or it is totally incompetent.</a>"
msgid ""
"<a href=\"http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-"
"presenting-dropout-jeep\"> Either Apple helps the NSA snoop on all the data "
@@ -1127,24 +1042,14 @@
"на ай-ÑÑÑÑкаÑ
, либо ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ ÑовеÑÑенно
некомпеÑенÑна</a>."
#. type: Content of: <ul><li><p>
-# | The iThing also <a
-# |
[-href=\"https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/\">-]
-# |
{+href=\"https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/\">+}
-# | tells Apple its geolocation</a> by default, though that can be turned off.
-#| msgid ""
-#| "The iThing also <a href=\"https://web.archive.org/web/20160313215042/"
-#| "http://www.theregister.co.uk/2013/08/08/"
-#| "ios7_tracking_now_its_a_favourite_feature/\"> tells Apple its "
-#| "geolocation</a> by default, though that can be turned off."
msgid ""
"The iThing also <a href=\"https://www.theregister.co.uk/2013/08/08/"
"ios7_tracking_now_its_a_favourite_feature/\"> tells Apple its geolocation</"
"a> by default, though that can be turned off."
msgstr ""
"Ðй-ÑÑÑÑки Ñакже <a
href=\"https://www.theregister.co.uk/2013/08/08/"
-"ios7_tracking_now_its_a_favourite_feature/"
-"\">докладÑваÑÑ Ð¿Ð¾ ÑмолÑÐ°Ð½Ð¸Ñ Ð² Apple о Ñвоем
меÑÑоположении</a>, Ñ
оÑÑ ÑÑо "
-"можно вÑклÑÑиÑÑ."
+"ios7_tracking_now_its_a_favourite_feature/\">докладÑваÑÑ Ð¿Ð¾
ÑмолÑÐ°Ð½Ð¸Ñ Ð² "
+"Apple о Ñвоем меÑÑоположении</a>, Ñ
оÑÑ ÑÑо
можно вÑклÑÑиÑÑ."
#. type: Content of: <ul><li><p>
msgid ""
@@ -1159,31 +1064,19 @@
"6, но ÑÑо веÑно и Ð´Ð»Ñ iOS 7)."
#. type: Content of: <ul><li><p>
-# | Users cannot make an Apple ID {+(+}<a
-# |
href=\"https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id\">
-# | [-(-]necessary to install even gratis [-apps)</a>-] {+apps</a>)+} without
-# | giving a valid email address and receiving the {+verification+} code Apple
-# | sends to it.
-#| msgid ""
-#| "Users cannot make an Apple ID <a href=\"https://apple.stackexchange.com/"
-#| "questions/49951/how-can-i-download-free-apps-without-registering-an-apple-"
-#| "id\"> (necessary to install even gratis apps)</a> without giving a valid "
-#| "email address and receiving the code Apple sends to it."
msgid ""
"Users cannot make an Apple ID (<a href=\"https://apple.stackexchange.com/"
"questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"
"\"> necessary to install even gratis apps</a>) without giving a valid email "
"address and receiving the verification code Apple sends to it."
msgstr ""
-"ÐолÑзоваÑели не могÑÑ ÑоздаÑÑ "
-"<a href=\"https://apple.stackexchange.com/questions/49951/how-can-i-download-"
-"free-apps-without-registering-an-apple-id\">иденÑиÑикаÑÐ¾Ñ Apple,
необÑ
одимÑй Ð´Ð»Ñ ÑÑÑановки даже беÑплаÑнÑÑ
"
-"пÑиложений</a>, без Ñого, ÑÑÐ¾Ð±Ñ Ð¿ÐµÑедаÑÑ
дейÑÑвиÑелÑнÑй адÑÐµÑ ÑлекÑÑонной поÑÑÑ "
-"и полÑÑиÑÑ ÐºÐ¾Ð´, коÑоÑÑй им поÑÑÐ»Ð°ÐµÑ Apple."
+"ÐолÑзоваÑели не могÑÑ ÑоздаÑÑ <a
href=\"https://apple.stackexchange.com/"
+"questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"
+"\">иденÑиÑикаÑÐ¾Ñ Apple, необÑ
одимÑй длÑ
ÑÑÑановки даже беÑплаÑнÑÑ
"
+"пÑиложений</a>, без Ñого, ÑÑÐ¾Ð±Ñ Ð¿ÐµÑедаÑÑ
дейÑÑвиÑелÑнÑй адÑÐµÑ ÑлекÑÑонной "
+"поÑÑÑ Ð¸ полÑÑиÑÑ ÐºÐ¾Ð´, коÑоÑÑй им поÑÑлаеÑ
Apple."
#. type: Content of: <div><h4>
-# | [-Spyware in-]{+Android+} Telephones
-#| msgid "Spyware in Telephones"
msgid "Android Telephones"
msgstr "Android в ÑелеÑонаÑ
"
@@ -1273,15 +1166,6 @@
"Samsung</a> пÑедоÑÑавлÑÐµÑ Ð´Ð¾ÑÑÑп к лÑбомÑ
ÑÐ°Ð¹Ð»Ñ Ð² ÑиÑÑеме."
#. type: Content of: <ul><li><p>
-# || No change detected. The change might only be in amounts of spaces.
-#| msgid ""
-#| "Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
-#| "(in an article blocked from us by a paywall) reports that <a href="
-#| "\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-"
-#| "android-and-laptop-microphones-reports-wsj\"> the FBI can remotely "
-#| "activate the GPS and microphone in Android phones and laptops</a>. (I "
-#| "suspect this means Windows laptops.) Here is <a href=\"http://cryptome."
-#| "org/2013/08/fbi-hackers.htm\">more info</a>."
msgid ""
"Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
"(in an article blocked from us by a paywall) reports that <a href=\"http://"
@@ -1358,13 +1242,6 @@
"даваÑÑ Google и дÑÑгим компаниÑм Ñвои
пеÑÑоналÑнÑе даннÑе!"
#. type: Content of: <ul><li><p>
-# | Some manufacturers add a <a
-# |
href=\"http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/\">
-# | hidden general surveillance package such as Carrier [-IQ.</a>-] {+IQ</a>.+}
-#| msgid ""
-#| "Some manufacturers add a <a href=\"http://androidsecuritytest.com/"
-#| "features/logs-and-services/loggers/carrieriq/\"> hidden general "
-#| "surveillance package such as Carrier IQ.</a>"
msgid ""
"Some manufacturers add a <a href=\"http://androidsecuritytest.com/features/"
"logs-and-services/loggers/carrieriq/\"> hidden general surveillance package "
@@ -1387,13 +1264,6 @@
"\">#SpywareInElectronicReaders</a>)</span>"
#. type: Content of: <ul><li><p>
-# | E-books can contain JavaScript code, and <a
-# |
href=\"http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds\">{+
-# | +}sometimes this code snoops on readers</a>.
-#| msgid ""
-#| "E-books can contain JavaScript code, and <a href=\"http://www.theguardian."
-#| "com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-"
-#| "women-study-finds\">sometimes this code snoops on readers</a>."
msgid ""
"E-books can contain JavaScript code, and <a href=\"http://www.theguardian."
"com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-"
@@ -1440,18 +1310,10 @@
"полÑзоваÑелÑ</a>."
#. type: Content of: <div><h3>
-# | Spyware in [-Mobile-] Applications
-#| msgid "Spyware in Mobile Applications"
msgid "Spyware in Applications"
msgstr "ÐÑикладнÑе пÑогÑаммÑ"
#. type: Content of: <div>
-# | <span class=\"anchor-reference-id\">(<a
-# | [-href=\"#SpywareIniThings\">#SpywareIniThings</a>)</span>-]
-# | {+href=\"#SpywareInApplications\">#SpywareInApplications</a>)</span>+}
-#| msgid ""
-#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareIniThings"
-#| "\">#SpywareIniThings</a>)</span>"
msgid ""
"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInApplications"
"\">#SpywareInApplications</a>)</span>"
@@ -1599,8 +1461,6 @@
"кино</a>."
#. type: Content of: <ul><li><p>
-# | Don't be [-tracked — pay-] {+tracked—pay+} cash!
-#| msgid "Don't be tracked — pay cash!"
msgid "Don't be tracked—pay cash!"
msgstr "Ðе подвеÑгайÑеÑÑ Ñлежке —
плаÑиÑе налиÑнÑми!"
@@ -1929,15 +1789,6 @@
msgstr "VPN Services HotspotShield"
#. type: Content of: <ul><li><dl><dd>
-# | Injects JavaScript code into the HTML pages returned to the users. The
-# | stated purpose of the JS injection is to display ads. Uses roughly [-5-]
-# | {+five+} tracking libraries. Also, it redirects the user's traffic through
-# | valueclick.com (an advertising website).
-#| msgid ""
-#| "Injects JavaScript code into the HTML pages returned to the users. The "
-#| "stated purpose of the JS injection is to display ads. Uses roughly 5 "
-#| "tracking libraries. Also, it redirects the user's traffic through "
-#| "valueclick.com (an advertising website)."
msgid ""
"Injects JavaScript code into the HTML pages returned to the users. The "
"stated purpose of the JS injection is to display ads. Uses roughly five "
@@ -1946,30 +1797,23 @@
msgstr ""
"ÐÑÑавлÑÐµÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð° JavaScript в ÑÑÑаниÑÑ
HTML, пеÑедаваемÑе "
"полÑзоваÑелÑм. ÐаÑвленное назнаÑение
ÑÑой вÑÑавки — показ "
-"ÑекламÑ. ÐÑполÑзÑÐµÑ Ð¾ÐºÐ¾Ð»Ð¾ пÑÑÑ Ð±Ð¸Ð±Ð»Ð¸Ð¾Ñек
Ñлежки. ÐÑоме Ñого, пÑопÑÑÐºÐ°ÐµÑ Ð¿Ð¾Ñок "
-"даннÑÑ
полÑзоваÑÐµÐ»Ñ ÑеÑез valueclick.com (ÑайÑ
ÑекламÑ)."
+"ÑекламÑ. ÐÑполÑзÑÐµÑ Ð¾ÐºÐ¾Ð»Ð¾ пÑÑÑ Ð±Ð¸Ð±Ð»Ð¸Ð¾Ñек
Ñлежки. ÐÑоме Ñого, пÑопÑÑÐºÐ°ÐµÑ "
+"поÑок даннÑÑ
полÑзоваÑÐµÐ»Ñ ÑеÑез valueclick.com
(ÑÐ°Ð¹Ñ ÑекламÑ)."
#. type: Content of: <ul><li><dl><dt>
msgid "WiFi Protector VPN"
msgstr "WiFi Protector VPN"
#. type: Content of: <ul><li><dl><dd>
-# | Injects JavaScript code into HTML pages, and also uses roughly [-5-]
-# | {+five+} tracking libraries. Developers of this app have confirmed that
-# | the non-premium version of the app does JavaScript injection for tracking
-# | and display ads.
-#| msgid ""
-#| "Injects JavaScript code into HTML pages, and also uses roughly 5 tracking "
-#| "libraries. Developers of this app have confirmed that the non-premium "
-#| "version of the app does JavaScript injection for tracking and display ads."
msgid ""
"Injects JavaScript code into HTML pages, and also uses roughly five tracking "
"libraries. Developers of this app have confirmed that the non-premium "
"version of the app does JavaScript injection for tracking and display ads."
msgstr ""
"ÐÑÑавлÑÐµÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð° JavaScript в ÑÑÑаниÑÑ
HTML, а Ñакже иÑполÑзÑÐµÑ Ð¾ÐºÐ¾Ð»Ð¾ "
-"пÑÑи библиоÑек Ñлежки. РазÑабоÑÑики
пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð¿Ð¾Ð´ÑвеÑдили, ÑÑо деÑевÑе веÑÑии
"
-"пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð´ÐµÐ¹ÑÑвиÑелÑно вÑÑавлÑÑÑ JavaScript
Ð´Ð»Ñ Ñлежки и показа ÑекламÑ."
+"пÑÑи библиоÑек Ñлежки. РазÑабоÑÑики
пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð¿Ð¾Ð´ÑвеÑдили, ÑÑо деÑевÑе "
+"веÑÑии пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð´ÐµÐ¹ÑÑвиÑелÑно
вÑÑавлÑÑÑ JavaScript Ð´Ð»Ñ Ñлежки и показа "
+"ÑекламÑ."
#. type: Content of: <ul><li><p>
msgid ""
@@ -1982,18 +1826,6 @@
"вÑеÑ
пеÑеговоÑов</a>."
#. type: Content of: <ul><li><p>
-# | Facebook's new Magic Photo app <a
-# |
[-href=\"https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/\">-]
-# |
{+href=\"https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/\">+}
-# | scans your mobile phone's photo collections for known faces</a>, and
-# | suggests you to share the picture you take according to who is in the
-# | frame.
-#| msgid ""
-#| "Facebook's new Magic Photo app <a href=\"https://web.archive.org/"
-#| "web/20160605165148/http://www.theregister.co.uk/2015/11/10/"
-#| "facebook_scans_camera_for_your_friends/\"> scans your mobile phone's "
-#| "photo collections for known faces</a>, and suggests you to share the "
-#| "picture you take according to who is in the frame."
msgid ""
"Facebook's new Magic Photo app <a href=\"https://www.theregister.co."
"uk/2015/11/10/facebook_scans_camera_for_your_friends/\"> scans your mobile "
@@ -2001,9 +1833,10 @@
"picture you take according to who is in the frame."
msgstr ""
"Ðовое пÑиложение Facebook, Magic Photo, <a
href=\"https://www.theregister.co."
-"uk/2015/11/10/facebook_scans_camera_for_your_friends/\"> ÑканиÑÑеÑ
ÑоÑоколлекÑии знакомÑÑ
"
-"Ð»Ð¸Ñ Ð½Ð° ваÑиÑ
ÑелеÑонаÑ
</a> и пÑÐµÐ´Ð»Ð°Ð³Ð°ÐµÑ Ð²Ð°Ð¼
обмениваÑÑÑÑ ÑнÑÑÑм вами "
-"изобÑажением в ÑооÑвеÑÑÑвии Ñ Ñем, кÑо наÑ
одиÑÑÑ Ð² кадÑе."
+"uk/2015/11/10/facebook_scans_camera_for_your_friends/\"> ÑканиÑÑÐµÑ "
+"ÑоÑоколлекÑии знакомÑÑ
Ð»Ð¸Ñ Ð½Ð° ваÑиÑ
ÑелеÑонаÑ
</a> и пÑÐµÐ´Ð»Ð°Ð³Ð°ÐµÑ Ð²Ð°Ð¼ "
+"обмениваÑÑÑÑ ÑнÑÑÑм вами изобÑажением в
ÑооÑвеÑÑÑвии Ñ Ñем, кÑо наÑ
одиÑÑÑ Ð² "
+"кадÑе."
#. type: Content of: <ul><li><p>
msgid ""
@@ -2040,15 +1873,6 @@
"a>."
#. type: Content of: <ul><li><p>
-# | A pregnancy test controller application not only can <a
-# |
href=\"http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security\">{+
-# | +}spy on many sorts of data in the phone, and in server accounts, it can
-# | alter them too</a>.
-#| msgid ""
-#| "A pregnancy test controller application not only can <a href=\"http://www."
-#| "theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-"
-#| "bluetooth-app-security\">spy on many sorts of data in the phone, and in "
-#| "server accounts, it can alter them too</a>."
msgid ""
"A pregnancy test controller application not only can <a href=\"http://www."
"theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-"
@@ -2109,24 +1933,16 @@
"лÑбого дÑÑгого подглÑдÑваниÑ."
#. type: Content of: <ul><li><p>
-# | More than 73% {+and 47%+} of [-the most popular-] {+mobile applications,
-# | from+} Android [-apps-] {+and iOS respectively+} <a
-# | [-href=\"http://jots.pub/a/2015103001/index.php\">share-]
-# | {+href=\"https://techscience.org/a/2015103001/\">share+} personal,
-# | behavioral and location information</a> of their users with third parties.
-#| msgid ""
-#| "More than 73% of the most popular Android apps <a href=\"http://jots.pub/"
-#| "a/2015103001/index.php\">share personal, behavioral and location "
-#| "information</a> of their users with third parties."
msgid ""
"More than 73% and 47% of mobile applications, from Android and iOS "
"respectively <a href=\"https://techscience.org/a/2015103001/\">share "
"personal, behavioral and location information</a> of their users with third "
"parties."
msgstr ""
-"Ðолее 73% и 47% ÑамÑÑ
попÑлÑÑнÑÑ
пÑиложений
Android и iOS ÑооÑвеÑÑÑвенно "
-"<a href=\"https://techscience.org/a/2015103001/\"> пÑедоÑÑавлÑÑÑ
лиÑнÑÑ, поведенÑеÑкÑÑ Ð¸ "
-"меÑÑоопÑеделиÑелÑнÑÑ Ð¸Ð½ÑоÑмаÑиÑ</a> ÑвоиÑ
полÑзоваÑелей ÑÑеÑÑим ÑÑоÑонам."
+"Ðолее 73% и 47% ÑамÑÑ
попÑлÑÑнÑÑ
пÑиложений
Android и iOS ÑооÑвеÑÑÑвенно <a "
+"href=\"https://techscience.org/a/2015103001/\"> пÑедоÑÑавлÑÑÑ
лиÑнÑÑ, "
+"поведенÑеÑкÑÑ Ð¸ меÑÑоопÑеделиÑелÑнÑÑ
инÑоÑмаÑиÑ</a> ÑвоиÑ
полÑзоваÑелей "
+"ÑÑеÑÑим ÑÑоÑонам."
#. type: Content of: <ul><li><p>
msgid ""
@@ -2145,20 +1961,6 @@
"ÑÑо ÑквеÑно."
#. type: Content of: <ul><li><p>
-# | This article shows the <a
-# |
[-href=\"https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/\">-]
-# |
{+href=\"https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/\">+}
-# | twisted ways that they present snooping as a way to “serve”
-# | users better</a>—never mind whether they want that. This is a
-# | typical example of the attitude of the proprietary software industry
-# | towards those they have subjugated.
-#| msgid ""
-#| "This article shows the <a href=\"https://web.archive.org/"
-#| "web/20160313214751/http://www.theregister.co.uk/2015/08/21/"
-#| "spotify_worse_than_the_nsa/\"> twisted ways that they present snooping as "
-#| "a way to “serve” users better</a>—never mind whether "
-#| "they want that. This is a typical example of the attitude of the "
-#| "proprietary software industry towards those they have subjugated."
msgid ""
"This article shows the <a href=\"https://www.theregister.co.uk/2015/08/21/"
"spotify_worse_than_the_nsa/\"> twisted ways that they present snooping as a "
@@ -2166,11 +1968,12 @@
"want that. This is a typical example of the attitude of the proprietary "
"software industry towards those they have subjugated."
msgstr ""
-"СледÑÑÑÐ°Ñ ÑÑаÑÑÑ Ð´Ð°ÐµÑ Ð¾Ð±ÑазÑик <a
href=\"https://www.theregister.co.uk/2015/08/21/"
-"spotify_worse_than_the_nsa/\"> извÑаÑÐµÐ½Ð¸Ñ ÑакÑов,
коÑоÑÑми они пÑедÑÑавлÑÑÑ "
-"ÑÐ»ÐµÐ¶ÐºÑ ÐºÐ°Ðº ÑпоÑоб лÑÑÑе
“обÑлÑживаÑÑ” полÑзоваÑелей</a> "
-"— незавиÑимо Ð¾Ñ Ñого, Ñ
оÑÑÑ Ð»Ð¸ Ñе ÑÑого.
ÐÑо ÑипиÑнÑй пÑÐ¸Ð¼ÐµÑ Ð¾ÑноÑÐµÐ½Ð¸Ñ "
-"индÑÑÑÑии неÑвободнÑÑ
пÑогÑамм к Ñем,
кого они подÑинили."
+"СледÑÑÑÐ°Ñ ÑÑаÑÑÑ Ð´Ð°ÐµÑ Ð¾Ð±ÑазÑик <a
href=\"https://www.theregister.co."
+"uk/2015/08/21/spotify_worse_than_the_nsa/\"> извÑаÑениÑ
ÑакÑов, коÑоÑÑми они "
+"пÑедÑÑавлÑÑÑ ÑÐ»ÐµÐ¶ÐºÑ ÐºÐ°Ðº ÑпоÑоб лÑÑÑе
“обÑлÑживаÑÑ” "
+"полÑзоваÑелей</a> — незавиÑимо оÑ
Ñого, Ñ
оÑÑÑ Ð»Ð¸ Ñе ÑÑого. ÐÑо "
+"ÑипиÑнÑй пÑÐ¸Ð¼ÐµÑ Ð¾ÑноÑÐµÐ½Ð¸Ñ Ð¸Ð½Ð´ÑÑÑÑии
неÑвободнÑÑ
пÑогÑамм к Ñем, кого они "
+"подÑинили."
#. type: Content of: <ul><li><p>
msgid "Out, out, damned Spotify!"
@@ -2205,20 +2008,14 @@
"оно в ÑоÑноÑÑи оÑÑÐ°Ð¶Ð°ÐµÑ ÑмÑÑл."
#. type: Content of: <ul><li><p>
-# || No change detected. The change might only be in amounts of spaces.
-#| msgid ""
-#| "Gratis Android apps (but not <a href=\"/philosophy/free-sw.html\">free "
-#| "software</a>) connect to 100 <a href=\"http://www.theguardian.com/"
-#| "technology/2015/may/06/free-android-apps-connect-tracking-advertising-"
-#| "websites\">tracking and advertising</a> URLs, on the average."
msgid ""
"Gratis Android apps (but not <a href=\"/philosophy/free-sw.html\">free "
"software</a>) connect to 100 <a href=\"http://www.theguardian.com/"
"technology/2015/may/06/free-android-apps-connect-tracking-advertising-"
"websites\">tracking and advertising</a> URLs, on the average."
msgstr ""
-"ÐеÑплаÑнÑе (но не <a
href=\"/philosophy/free-sw.html\">ÑвободнÑе</"
-"a>)пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Android <a
href=\"http://www.theguardian.com/technology/2015/"
+"ÐеÑплаÑнÑе (но не <a
href=\"/philosophy/free-sw.html\">ÑвободнÑе</a>)"
+"пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Android <a
href=\"http://www.theguardian.com/technology/2015/"
"may/06/free-android-apps-connect-tracking-advertising-websites"
"\">подклÑÑаÑÑÑÑ Ðº 100 URL Ñлежки и ÑекламÑ</a> (в
ÑÑеднем)."
@@ -2261,21 +2058,10 @@
"proprietary/#baidu-ime\">spying <abbr title=\"Input Method Editor\">IME</"
"abbr></a>."
msgstr ""
-"ÐлавиаÑÑÑа Simeji — ÑмаÑÑÑÐ¾Ð½Ð½Ð°Ñ Ð²ÐµÑÑиÑ
<a href=\"/"
-"proprietary/#baidu-ime\">ÑпионÑÑего меÑода ввода</a>
Baidu."
+"ÐлавиаÑÑÑа Simeji — ÑмаÑÑÑÐ¾Ð½Ð½Ð°Ñ Ð²ÐµÑÑиÑ
<a href=\"/proprietary/"
+"#baidu-ime\">ÑпионÑÑего меÑода ввода</a> Baidu."
#. type: Content of: <ul><li><p>
-# | The nonfree Snapchat app's principal purpose is to restrict the use of
-# | data on the user's computer, but it does surveillance too: <a
-# |
href=\"http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers\">
-# | it tries to get the user's list of other people's phone [-numbers.</a>-]
-# | {+numbers</a>.+}
-#| msgid ""
-#| "The nonfree Snapchat app's principal purpose is to restrict the use of "
-#| "data on the user's computer, but it does surveillance too: <a href="
-#| "\"http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-"
-#| "hackers\"> it tries to get the user's list of other people's phone "
-#| "numbers.</a>"
msgid ""
"The nonfree Snapchat app's principal purpose is to restrict the use of data "
"on the user's computer, but it does surveillance too: <a href=\"http://www."
@@ -2289,14 +2075,6 @@
"адÑеÑной книжки полÑзоваÑелÑ</a>."
#. type: Content of: <ul><li><p>
-# | The Brightest Flashlight app <a
-# |
href=\"http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers\">
-# | sends user data, including geolocation, for use by [-companies.</a>-]
-# | {+companies</a>.+}
-#| msgid ""
-#| "The Brightest Flashlight app <a href=\"http://www.theguardian.com/"
-#| "technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers\"> "
-#| "sends user data, including geolocation, for use by companies.</a>"
msgid ""
"The Brightest Flashlight app <a href=\"http://www.theguardian.com/"
"technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers\"> "
@@ -2350,20 +2128,6 @@
"\">#SpywareInSkype</a>)</span>"
#. type: Content of: <ul><li><p>
-# | [-Spyware in Skype:-]{+Skype contains+} <a
-# |
[-href=\"http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/\">
-# |
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.-]
-# |
{+href=\"https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/\">spyware</a>.+}
-# | Microsoft changed Skype <a
-# |
href=\"http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data\">
-# | specifically for spying</a>.
-#| msgid ""
-#| "Spyware in Skype: <a href=\"http://www.forbes.com/sites/"
-#| "petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/\"> "
-#| "http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-"
-#| "snoops-on-your-skype/</a>. Microsoft changed Skype <a href=\"http://www."
-#| "guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data\"> "
-#| "specifically for spying</a>."
msgid ""
"Skype contains <a href=\"https://web.archive.org/web/20130928235637/http://"
"www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-"
@@ -2371,11 +2135,11 @@
"guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data\"> "
"specifically for spying</a>."
msgstr ""
-"<a href=\"https://web.archive.org/web/20130928235637/http://"
-"www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-"
-"your-skype/\">Skype ÑодеÑÐ¶Ð¸Ñ Ð¿ÑогÑаммÑ-ÑпионÑ</a>. Ð
Microsoft изменили Skype <a
href=\"http://www.guardian.co.uk/world/2013/"
-"jul/11/microsoft-nsa-collaboration-user-data\"> ÑпеÑиалÑно "
-"Ð´Ð»Ñ Ñого, ÑÑÐ¾Ð±Ñ ÑпиониÑÑ</a>."
+"<a href=\"https://web.archive.org/web/20130928235637/http://www.forbes.com/"
+"sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"
+"\">Skype ÑодеÑÐ¶Ð¸Ñ Ð¿ÑогÑаммÑ-ÑпионÑ</a>. Ð Microsoft
изменили Skype <a href="
+"\"http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-"
+"user-data\"> ÑпеÑиалÑно Ð´Ð»Ñ Ñого, ÑÑобÑ
ÑпиониÑÑ</a>."
#. type: Content of: <div><h4>
msgid "Games"
@@ -2438,15 +2202,6 @@
"даннÑе на ÑеÑвеÑÑ nVidia</a>."
#. type: Content of: <ul><li><p>
-# | Many <a
-# |
href=\"http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/\">
-# | video game consoles snoop on their users and report to the
-# | internet</a>—[- -]even what their users weigh.
-#| msgid ""
-#| "Many <a href=\"http://www.thestar.com/news/canada/2015/12/29/how-much-"
-#| "data-are-video-games-collecting-about-you.html/\"> video game consoles "
-#| "snoop on their users and report to the internet</a>— even what "
-#| "their users weigh."
msgid ""
"Many <a href=\"http://www.thestar.com/news/canada/2015/12/29/how-much-data-"
"are-video-games-collecting-about-you.html/\"> video game consoles snoop on "
@@ -2542,18 +2297,10 @@
"маÑÑÑ Ð´ÐµÐ¹ÑÑвий, никак не ÑвÑзаннÑÑ
Ñ
обманом."
#. type: Content of: <div><h3>
-# | Spyware in [-Chrome-] {+Connected Equipment+}
-#| msgid "Spyware in Chrome"
msgid "Spyware in Connected Equipment"
msgstr "СеÑевое обоÑÑдование"
#. type: Content of: <div>
-# | <span class=\"anchor-reference-id\">(<a
-# | [-href=\"#SpywareInSkype\">#SpywareInSkype</a>)</span>-]
-# | {+href=\"#SpywareInEquipment\">#SpywareInEquipment</a>)</span>+}
-#| msgid ""
-#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInSkype"
-#| "\">#SpywareInSkype</a>)</span>"
msgid ""
"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInEquipment"
"\">#SpywareInEquipment</a>)</span>"
@@ -2574,9 +2321,6 @@
"ÑвÑзи подглÑдÑваÑÑ Ð·Ð° лÑдÑми, коÑоÑÑе ими
полÑзÑÑÑÑÑ</a>."
#. type: Content of: <ul><li><p>
-# | Don't be [-tracked — pay cash!-] {+a sucker—reject all the
-# | stings.+}
-#| msgid "Don't be tracked — pay cash!"
msgid "Don't be a sucker—reject all the stings."
msgstr "Ðе подвеÑгайÑеÑÑ Ñлежке —
плаÑиÑе налиÑнÑми!"
@@ -2613,23 +2357,15 @@
"ÑмнÑÑ
” ÑелевизоÑов Amazon."
#. type: Content of: <ul><li><p>
-# | Some “Smart” TVs automatically <a
-# | [-href=\"https://news.ycombinator.com/item?id=16727319\">load-]
-# |
{+href=\"https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928\">
-# | load+} downgrades that install a surveillance app</a>.
-#| msgid ""
-#| "Some “Smart” TVs automatically <a href=\"https://news."
-#| "ycombinator.com/item?id=16727319\">load downgrades that install a "
-#| "surveillance app</a>."
msgid ""
"Some “Smart” TVs automatically <a href=\"https://web.archive.org/"
"web/20180405014828/https:/twitter.com/buro9/status/980349887006076928\"> "
"load downgrades that install a surveillance app</a>."
msgstr ""
"ÐекоÑоÑÑе “инÑеллекÑÑалÑнÑе”
ÑелевизоÑÑ Ð°Ð²ÑомаÑиÑеÑки <a href="
-"\"https://web.archive.org/"
-"web/20180405014828/https:/twitter.com/buro9/status/980349887006076928\">загÑÑжаÑÑ
ÑÑÑаÑение, "
-"коÑоÑое ÑÑÑÐ°Ð½Ð°Ð²Ð»Ð¸Ð²Ð°ÐµÑ Ð¿Ñиложение
Ñлежки</a>."
+"\"https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/"
+"status/980349887006076928\">загÑÑжаÑÑ ÑÑÑаÑение,
коÑоÑое ÑÑÑÐ°Ð½Ð°Ð²Ð»Ð¸Ð²Ð°ÐµÑ "
+"пÑиложение Ñлежки</a>."
#. type: Content of: <ul><li><p>
msgid ""
@@ -2661,20 +2397,6 @@
"бÑл ÑкÑÑÑ, как в ÑÑиÑ
ÑелевизоÑаÑ
, не можеÑ
опÑавдÑваÑÑ ÑÑÑ ÑлежкÑ."
#. type: Content of: <ul><li><p>
-# | Some web and TV advertisements play inaudible sounds to be picked up by
-# | proprietary malware running on other devices in range so as to determine
-# | that they are nearby. Once your Internet devices are paired with your TV,
-# | advertisers can correlate ads with Web activity, and other <a
-# |
href=\"http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/\">{+
-# | +}cross-device tracking</a>.
-#| msgid ""
-#| "Some web and TV advertisements play inaudible sounds to be picked up by "
-#| "proprietary malware running on other devices in range so as to determine "
-#| "that they are nearby. Once your Internet devices are paired with your "
-#| "TV, advertisers can correlate ads with Web activity, and other <a href="
-#| "\"http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-"
-#| "inaudible-sound-to-link-your-phone-tv-tablet-and-pc/\">cross-device "
-#| "tracking</a>."
msgid ""
"Some web and TV advertisements play inaudible sounds to be picked up by "
"proprietary malware running on other devices in range so as to determine "
@@ -2714,22 +2436,6 @@
"ÐÑо можно вÑклÑÑиÑÑ, но неÑпÑаведливо Ñже
Ñо, ÑÑо по ÑмолÑÐ°Ð½Ð¸Ñ ÑÑо вклÑÑено."
#. type: Content of: <ul><li><p>
-# | Tivo's alliance with Viacom adds 2.3 million households to the 600
-# | millions social media profiles the company already monitors. Tivo
-# | customers are unaware they're being watched by advertisers. By combining
-# | TV viewing information with online social media participation, Tivo can
-# | now <a
-# |
href=\"http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102\">{+
-# | +}correlate TV advertisement with online purchases</a>, exposing all users
-# | to new combined surveillance by default.
-#| msgid ""
-#| "Tivo's alliance with Viacom adds 2.3 million households to the 600 "
-#| "millions social media profiles the company already monitors. Tivo "
-#| "customers are unaware they're being watched by advertisers. By combining "
-#| "TV viewing information with online social media participation, Tivo can "
-#| "now <a href=\"http://www.reuters.com/article/viacom-tivo-"
-#| "idUSL1N12U1VV20151102\">correlate TV advertisement with online purchases</"
-#| "a>, exposing all users to new combined surveillance by default."
msgid ""
"Tivo's alliance with Viacom adds 2.3 million households to the 600 millions "
"social media profiles the company already monitors. Tivo customers are "
@@ -2759,24 +2465,15 @@
"лÑди</a>, даже еÑли ÑÑо не ÑелевизионнаÑ
пеÑедаÑа."
#. type: Content of: <ul><li><p>
-# | [-<a
-# |
href=\"http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/\">Verizon-]{+Verizon+}
-# | cable TV {+<a
-# |
href=\"http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/\">+}
-# | snoops on what programs people watch, and even what they wanted to
-# | [-record.</a>-] {+record</a>.+}
-#| msgid ""
-#| "<a href=\"http://arstechnica.com/business/2015/05/verizon-fios-reps-know-"
-#| "what-tv-channels-you-watch/\">Verizon cable TV snoops on what programs "
-#| "people watch, and even what they wanted to record.</a>"
msgid ""
"Verizon cable TV <a href=\"http://arstechnica.com/business/2015/05/verizon-"
"fios-reps-know-what-tv-channels-you-watch/\"> snoops on what programs people "
"watch, and even what they wanted to record</a>."
msgstr ""
-"ÐабелÑное Ñелевидение Verizon <a
href=\"http://arstechnica.com/business/2015/05/verizon-fios-reps-know-"
-"what-tv-channels-you-watch/\">подглÑдÑÐ²Ð°ÐµÑ Ð·Ð° "
-"Ñем, какие ÑилÑÐ¼Ñ Ð»Ñди ÑмоÑÑÑÑ Ð¸ даже
какие они заÑ
оÑели запиÑаÑÑ</a>."
+"ÐабелÑное Ñелевидение Verizon <a
href=\"http://arstechnica.com/"
+"business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"
+"\">подглÑдÑÐ²Ð°ÐµÑ Ð·Ð° Ñем, какие ÑилÑÐ¼Ñ Ð»Ñди
ÑмоÑÑÑÑ Ð¸ даже какие они заÑ
оÑели "
+"запиÑаÑÑ</a>."
#. type: Content of: <ul><li><p>
msgid ""
@@ -2790,17 +2487,6 @@
"a>. Ðогда ÑелевизоÑÑ Ð¿Ñодавали, они ÑÑого
еÑе не делали."
#. type: Content of: <ul><li><p>
-# | The Samsung “Smart” TV <a
-# |
href=\"http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm\">{+
-# | +}transmits users' voice on the internet to another company, Nuance</a>.
-# | Nuance can save it and would then have to give it to the US or some other
-# | government.
-#| msgid ""
-#| "The Samsung “Smart” TV <a href=\"http://www.consumerreports."
-#| "org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-"
-#| "are-sharing-your-voice-data-with/index.htm\">transmits users' voice on "
-#| "the internet to another company, Nuance</a>. Nuance can save it and "
-#| "would then have to give it to the US or some other government."
msgid ""
"The Samsung “Smart” TV <a href=\"http://www.consumerreports.org/"
"cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-"
@@ -2836,14 +2522,6 @@
"конÑиденÑиалÑнÑÑ Ð¸Ð½ÑоÑмаÑиÑ, бÑдÑÑ
пеÑедаваÑÑÑÑ ÑÑеÑÑим ÑÑоÑонам</a>."
#. type: Content of: <ul><li><p>
-# | The Amazon “Smart” TV {+is+} <a
-# |
[-href=\"http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance\">is-]
-# |
{+href=\"http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance\">+}
-# | snooping all the time</a>.
-#| msgid ""
-#| "The Amazon “Smart” TV <a href=\"http://www.theguardian.com/"
-#| "technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-"
-#| "surveillance\">is snooping all the time</a>."
msgid ""
"The Amazon “Smart” TV is <a href=\"http://www.theguardian.com/"
"technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-"
@@ -2881,11 +2559,6 @@
"ÑабоÑаÑÑ”."
#. type: Content of: <ul><li><p>
-# | Proper laws would say that TVs are not allowed to report what the user
-# | [-watches — no-] {+watches—no+} exceptions!
-#| msgid ""
-#| "Proper laws would say that TVs are not allowed to report what the user "
-#| "watches — no exceptions!"
msgid ""
"Proper laws would say that TVs are not allowed to report what the user "
"watches—no exceptions!"
@@ -2894,19 +2567,6 @@
"ÑÑо пÑоÑмаÑÑÐ¸Ð²Ð°ÐµÑ Ð¿Ð¾Ð»ÑзоваÑÐµÐ»Ñ —
безо вÑÑкиÑ
иÑклÑÑений!"
#. type: Content of: <ul><li><p>
-# | Spyware in [-<a
-# |
href=\"http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html\">-]
-# | LG “smart” [-TVs</a>-] {+TVs <a
-# |
href=\"http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html\">+}
-# | reports what the user watches, and the switch to turn this off has no
-# | [-effect.-] {+effect</a>.+} (The fact that the transmission reports a 404
-# | error really means nothing; the server could save that data anyway.)
-#| msgid ""
-#| "Spyware in <a href=\"http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-"
-#| "tvs-logging-usb-filenames-and.html\"> LG “smart” TVs</a> "
-#| "reports what the user watches, and the switch to turn this off has no "
-#| "effect. (The fact that the transmission reports a 404 error really means "
-#| "nothing; the server could save that data anyway.)"
msgid ""
"Spyware in LG “smart” TVs <a href=\"http://doctorbeet.blogspot."
"co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html\"> reports what "
@@ -2914,22 +2574,14 @@
"fact that the transmission reports a 404 error really means nothing; the "
"server could save that data anyway.)"
msgstr ""
-"ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð² “ÑмнÑÑ
”
ÑелевизоÑаÑ
LG <a
href=\"http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-"
-"filenames-and.html\"> докладÑваÑÑ Ð¾ Ñом, ÑÑо ÑмоÑÑиÑ
полÑзоваÑелÑ, незавиÑимо Ð¾Ñ Ñого, "
-"ÑазÑеÑено ли ÑÑо в наÑÑÑойкаÑ
ÑелевизоÑа</"
-"a> (даже когда ÑеÑÐ²ÐµÑ Ð¾ÑвеÑÐ°ÐµÑ "
+"ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð² “ÑмнÑÑ
”
ÑелевизоÑаÑ
LG <a href=\"http://"
+"doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"
+"\"> докладÑваÑÑ Ð¾ Ñом, ÑÑо ÑмоÑÑиÑ
полÑзоваÑелÑ, незавиÑимо Ð¾Ñ Ñого, "
+"ÑазÑеÑено ли ÑÑо в наÑÑÑойкаÑ
ÑелевизоÑа</a> (даже когда ÑеÑÐ²ÐµÑ Ð¾ÑвеÑÐ°ÐµÑ "
"квиÑанÑией “ÑÑÑаниÑа не найдена” на
вÑÑланнÑе даннÑе, ÑÑо ниÑего "
"не знаÑиÑ; ÑÑи даннÑе вÑе Ñавно могÑÑ ÑоÑ
ÑанÑÑÑÑÑ Ð½Ð° ÑеÑвеÑе LG)."
#. type: Content of: <ul><li><p>
-# | Even worse, it <a
-# |
href=\"http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/\">
-# | snoops on other devices on the user's local [-network.</a>-]
-# | {+network</a>.+}
-#| msgid ""
-#| "Even worse, it <a href=\"http://rambles.renney.me/2013/11/lg-tv-logging-"
-#| "filenames-from-network-folders/\"> snoops on other devices on the user's "
-#| "local network.</a>"
msgid ""
"Even worse, it <a href=\"http://rambles.renney.me/2013/11/lg-tv-logging-"
"filenames-from-network-folders/\"> snoops on other devices on the user's "
@@ -3236,13 +2888,6 @@
"\">#SpywareAtHome</a>)</span>"
#. type: Content of: <ul><li><p>
-# | Crackers found a way to break the security of an Amazon device, and <a
-# | href=\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it
-# | into a listening [-device-] {+device</a>+} for [-them</a>.-] {+them.+}
-#| msgid ""
-#| "Crackers found a way to break the security of an Amazon device, and <a "
-#| "href=\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it "
-#| "into a listening device for them</a>."
msgid ""
"Crackers found a way to break the security of an Amazon device, and <a href="
"\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it into a "
@@ -3330,8 +2975,6 @@
"Ñеми, кÑо бÑал иÑ
напÑÐ¾ÐºÐ°Ñ Ñ Ð²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾ÑÑÑÑ
поÑледÑÑÑей покÑпки</a>."
#. type: Content of: <div><h4>
-# | [-Spyware on-]Wearables
-#| msgid "Spyware on Wearables"
msgid "Wearables"
msgstr "Ðа лÑдÑÑ
"
@@ -3362,8 +3005,6 @@
"она делаеÑ."
#. type: Content of: <h5>
-# | [-Spyware on-]“Smart” Watches
-#| msgid "Spyware on “Smart” Watches"
msgid "“Smart” Watches"
msgstr "“ÐнÑеллекÑÑалÑнÑе” ÑаÑÑ"
@@ -3432,16 +3073,6 @@
"and.html\"> ÑпионÑÑими ÑÑÑÑойÑÑвами</a>."
#. type: Content of: <ul><li><p>
-# | The Nissan Leaf has a built-in cell phone modem which allows effectively
-# | anyone {+to+} <a
-# |
[-href=\"https://www.troyhunt.com/controlling-vehicle-features-of-nissan/\">to-]
-# |
{+href=\"https://www.troyhunt.com/controlling-vehicle-features-of-nissan/\">+}
-# | access its computers remotely and make changes in various settings</a>.
-#| msgid ""
-#| "The Nissan Leaf has a built-in cell phone modem which allows effectively "
-#| "anyone <a href=\"https://www.troyhunt.com/controlling-vehicle-features-of-"
-#| "nissan/\">to access its computers remotely and make changes in various "
-#| "settings</a>."
msgid ""
"The Nissan Leaf has a built-in cell phone modem which allows effectively "
"anyone to <a href=\"https://www.troyhunt.com/controlling-vehicle-features-of-"
@@ -3468,13 +3099,6 @@
"\">ÑÑо знаÑиÑ, они ÑÑебÑÑÑ Ð¾Ñ Ð¿Ð¾Ð»ÑзоваÑелей
Ñлепой веÑÑ</a>."
#. type: Content of: <ul><li><p>
-# | Even if no one connects to the car remotely, the cell phone modem enables
-# | the phone company to track the car's movements all the time; it is
-# | possible to physically remove the cell phone modem{+,+} though.
-#| msgid ""
-#| "Even if no one connects to the car remotely, the cell phone modem enables "
-#| "the phone company to track the car's movements all the time; it is "
-#| "possible to physically remove the cell phone modem though."
msgid ""
"Even if no one connects to the car remotely, the cell phone modem enables "
"the phone company to track the car's movements all the time; it is possible "
@@ -3485,21 +3109,6 @@
"авÑомобилÑ; Ñ
оÑÑ Ð¼Ð¾Ð¶Ð½Ð¾ ÑизиÑеÑки ÑдалиÑÑ
модем ÑоÑовой ÑвÑзи."
#. type: Content of: <ul><li><p>
-# | Tesla cars allow the company to extract data remotely and determine the
-# | car's location at any time. (See [-<a
-# |
href=\"http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf\">-]
-# | Section 2, paragraphs b and [-c.</a>).-] {+c of the <a
-# |
href=\"http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf\">
-# | privacy statement</a>.)+} The company says it doesn't store this
-# | information, but if the state orders it to get the data and hand it over,
-# | the state can store it.
-#| msgid ""
-#| "Tesla cars allow the company to extract data remotely and determine the "
-#| "car's location at any time. (See <a href=\"http://www.teslamotors.com/"
-#| "sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"
-#| "\"> Section 2, paragraphs b and c.</a>). The company says it doesn't "
-#| "store this information, but if the state orders it to get the data and "
-#| "hand it over, the state can store it."
msgid ""
"Tesla cars allow the company to extract data remotely and determine the "
"car's location at any time. (See Section 2, paragraphs b and c of the <a "
@@ -3510,23 +3119,13 @@
msgstr ""
"ÐвÑомобили Tesla позволÑÑÑ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ð¸
полÑÑаÑÑ Ð´Ð°Ð½Ð½Ñе на ÑаÑÑÑоÑнии, а Ñакже "
"опÑеделÑÑÑ Ð¼ÐµÑÑоположение авÑÐ¾Ð¼Ð¾Ð±Ð¸Ð»Ñ Ð²
лÑбой Ð¼Ð¾Ð¼ÐµÐ½Ñ (Ñм. паÑагÑаÑÑ b и c "
-"Ñаздела 2 <a href=\"http://www."
-"teslamotors.com/sites/default/files/pdfs/"
-"tmi_privacy_statement_external_6-14-2013_v2.pdf\"> в Ñведомлении "
-"о конÑиденÑиалÑноÑÑи</a>). ÐомпаниÑ
ÑÑвеÑждаеÑ, ÑÑо она не Ñ
ÑÐ°Ð½Ð¸Ñ ÑÑиÑ
Ñведений, "
-"но еÑли гоÑÑдаÑÑÑво пÑиказÑÐ²Ð°ÐµÑ ÑобиÑаÑÑ
и пеÑедаваÑÑ ÑÑи даннÑе, Ñо оно "
-"Ð¼Ð¾Ð¶ÐµÑ Ð¸Ñ
ÑоÑ
ÑанÑÑÑ."
-
-#. type: Content of: <ul><li><p>
-# | Proprietary software in cars <a
-# |
href=\"http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/\">{+
-# | +}records information about drivers' movements</a>, which is made
-# | available to car manufacturers, insurance companies, and others.
-#| msgid ""
-#| "Proprietary software in cars <a href=\"http://www.usatoday.com/story/"
-#| "money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/\">records "
-#| "information about drivers' movements</a>, which is made available to car "
-#| "manufacturers, insurance companies, and others."
+"Ñаздела 2 <a
href=\"http://www.teslamotors.com/sites/default/files/pdfs/"
+"tmi_privacy_statement_external_6-14-2013_v2.pdf\"> в Ñведомлении
о "
+"конÑиденÑиалÑноÑÑи</a>). ÐомпаниÑ
ÑÑвеÑждаеÑ, ÑÑо она не Ñ
ÑÐ°Ð½Ð¸Ñ ÑÑиÑ
"
+"Ñведений, но еÑли гоÑÑдаÑÑÑво пÑиказÑваеÑ
ÑобиÑаÑÑ Ð¸ пеÑедаваÑÑ ÑÑи даннÑе, "
+"Ñо оно Ð¼Ð¾Ð¶ÐµÑ Ð¸Ñ
ÑоÑ
ÑанÑÑÑ."
+
+#. type: Content of: <ul><li><p>
msgid ""
"Proprietary software in cars <a href=\"http://www.usatoday.com/story/money/"
"cars/2013/03/24/car-spying-edr-data-privacy/1991751/\"> records information "
@@ -3626,18 +3225,6 @@
"ÑепоÑÑеÑами, коÑоÑÑе ÐµÑ Ð¿Ð¾Ð»ÑзÑÑÑÑÑ</a>."
#. type: Content of: <ul><li><p>
-# | When a page uses Disqus for comments, [-<a
-# |
href=\"https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook\">the-]
-# | {+the+} proprietary Disqus software [-loads-] {+<a
-# |
href=\"https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook\">loads+}
-# | a Facebook software package into the browser of every anonymous visitor to
-# | the page, and makes the page's URL available to Facebook</a>.
-#| msgid ""
-#| "When a page uses Disqus for comments, <a href=\"https://blog.dantup."
-#| "com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-"
-#| "sends-the-url-to-facebook\">the proprietary Disqus software loads a "
-#| "Facebook software package into the browser of every anonymous visitor to "
-#| "the page, and makes the page's URL available to Facebook</a>."
msgid ""
"When a page uses Disqus for comments, the proprietary Disqus software <a "
"href=\"https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-"
@@ -3645,9 +3232,9 @@
"software package into the browser of every anonymous visitor to the page, "
"and makes the page's URL available to Facebook</a>."
msgstr ""
-"Ðогда Ð´Ð»Ñ ÐºÐ¾Ð¼Ð¼ÐµÐ½ÑаÑиев на ÑÑÑаниÑе
пÑименÑеÑÑÑ Disqus, неÑÐ²Ð¾Ð±Ð¾Ð´Ð½Ð°Ñ Ð¿ÑогÑамма Disqus
<a href=\"https://"
-"blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-"
-"logged-in-sends-the-url-to-facebook\">загÑÑÐ¶Ð°ÐµÑ "
+"Ðогда Ð´Ð»Ñ ÐºÐ¾Ð¼Ð¼ÐµÐ½ÑаÑиев на ÑÑÑаниÑе
пÑименÑеÑÑÑ Disqus, неÑÐ²Ð¾Ð±Ð¾Ð´Ð½Ð°Ñ Ð¿ÑогÑамма "
+"Disqus <a href=\"https://blog.dantup.com/2017/01/visiting-a-site-that-uses-"
+"disqus-comments-when-not-logged-in-sends-the-url-to-facebook\">загÑÑжаеÑ
"
"Ð¿Ð°ÐºÐµÑ Ð¿ÑогÑамм из Facebook в бÑаÑÐ·ÐµÑ ÐºÐ°Ð¶Ð´Ð¾Ð¼Ñ
Ð°Ð½Ð¾Ð½Ð¸Ð¼Ð½Ð¾Ð¼Ñ Ð¿Ð¾ÑеÑиÑÐµÐ»Ñ Ð¸ "
"оÑÑÑÐ»Ð°ÐµÑ URL ÑÑÑаниÑÑ Ð² Facebook</a>."
@@ -3690,17 +3277,6 @@
"ÑÑоÑон, позволÑÑ Ð´ÑÑгим ÑайÑам
оÑÑлеживаÑÑ Ð¸Ñ
</a>."
#. type: Content of: <ul><li><p>
-# | Many web sites report all their visitors to Google by using the Google
-# | Analytics service, which <a
-# |
href=\"http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/\">
-# | tells Google the IP address and the page that was [-visited.</a>-]
-# | {+visited</a>.+}
-#| msgid ""
-#| "Many web sites report all their visitors to Google by using the Google "
-#| "Analytics service, which <a href=\"http://www.pcworld.idg.com.au/"
-#| "article/434164/"
-#| "google_analytics_breaks_norwegian_privacy_laws_local_agency_said/\"> "
-#| "tells Google the IP address and the page that was visited.</a>"
msgid ""
"Many web sites report all their visitors to Google by using the Google "
"Analytics service, which <a href=\"http://www.pcworld.idg.com.au/"
@@ -3742,12 +3318,6 @@
msgstr "JavaScript"
#. type: Content of: <div>
-# | <span class=\"anchor-reference-id\">(<a
-# | [-href=\"#SpywareInMacOS\">#SpywareInMacOS</a>)</span>-]
-# | {+href=\"#SpywareInJavaScript\">#SpywareInJavaScript</a>)</span>+}
-#| msgid ""
-#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMacOS"
-#| "\">#SpywareInMacOS</a>)</span>"
msgid ""
"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInJavaScript"
"\">#SpywareInJavaScript</a>)</span>"
@@ -3825,22 +3395,14 @@
"\">#SpywareInFlash</a>)</span>"
#. type: Content of: <ul><li><p>
-# | Flash and JavaScript are [-also-] used for <a
-# |
href=\"http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/\">
-# | “fingerprinting” devices</a> to identify users.
-#| msgid ""
-#| "Flash and JavaScript are also used for <a href=\"http://arstechnica.com/"
-#| "security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-"
-#| "fingerprinting/\"> “fingerprinting” devices</a> to identify "
-#| "users."
msgid ""
"Flash and JavaScript are used for <a href=\"http://arstechnica.com/"
"security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-"
"fingerprinting/\"> “fingerprinting” devices</a> to identify "
"users."
msgstr ""
-"Flash и JavaScript пÑименÑÑÑ Ð´Ð»Ñ <a href=\"http://arstechnica."
-"com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-"
+"Flash и JavaScript пÑименÑÑÑ Ð´Ð»Ñ <a
href=\"http://arstechnica.com/"
+"security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-"
"fingerprinting/\"> ÑнÑÑÐ¸Ñ “оÑпеÑаÑков
палÑÑев” ÑÑÑÑойÑÑв</a> Ñ "
"ÑелÑÑ Ð¸Ð´ÐµÐ½ÑиÑикаÑии полÑзоваÑелей."
@@ -3909,18 +3471,10 @@
"Google каждÑй набÑаннÑй URL</a>, по одной
клавиÑе за Ñаз."
#. type: Content of: <div><h3>
-# | Spyware in [-Toys-] {+Networks+}
-#| msgid "Spyware in Toys"
msgid "Spyware in Networks"
msgstr "СеÑи"
#. type: Content of: <div>
-# | <span class=\"anchor-reference-id\">(<a
-# | [-href=\"#SpywareInTVSets\">#SpywareInTVSets</a>)</span>-]
-# | {+href=\"#SpywareInNetworks\">#SpywareInNetworks</a>)</span>+}
-#| msgid ""
-#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInTVSets"
-#| "\">#SpywareInTVSets</a>)</span>"
msgid ""
"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInNetworks"
"\">#SpywareInNetworks</a>)</span>"
@@ -3950,20 +3504,12 @@
"паÑламенÑа, поÑÐ¾Ð¼Ñ ÑÑо она пÑоÑ
Ð¾Ð´Ð¸Ñ ÑеÑез
Microsoft."
#. type: Content of: <ul><li><p>
-# | [-Spyware in-]{+The+} Cisco TNP IP [-phones:-] {+phones are+} <a
-# |
href=\"http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html\">
-# | [-http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a>-]
-# | {+spying devices</a>.+}
-#| msgid ""
-#| "Spyware in Cisco TNP IP phones: <a href=\"http://boingboing."
-#| "net/2012/12/29/your-cisco-phone-is-listening.html\"> http://boingboing."
-#| "net/2012/12/29/your-cisco-phone-is-listening.html</a>"
msgid ""
"The Cisco TNP IP phones are <a href=\"http://boingboing.net/2012/12/29/your-"
"cisco-phone-is-listening.html\"> spying devices</a>."
msgstr ""
-"ТелеÑÐ¾Ð½Ñ TNP Cisco ÑвлÑÑÑÑÑ <a href=\"http://boingboing."
-"net/2012/12/29/your-cisco-phone-is-listening.html\"> ÑÑÑÑойÑÑвами
Ñлежки</a>."
+"ТелеÑÐ¾Ð½Ñ TNP Cisco ÑвлÑÑÑÑÑ <a
href=\"http://boingboing.net/2012/12/29/your-"
+"cisco-phone-is-listening.html\"> ÑÑÑÑойÑÑвами Ñлежки</a>."
# type: Content of: <div><div>
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary malware-cars.ru.html proprietar...,
GNUN <=