[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po proprietary-insecurity.de.po...
From: |
GNUN |
Subject: |
www/proprietary/po proprietary-insecurity.de.po... |
Date: |
Fri, 5 Oct 2018 08:59:28 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 18/10/05 08:59:27
Modified files:
proprietary/po : proprietary-insecurity.de.po
proprietary-insecurity.fr.po
proprietary-insecurity.it-diff.html
proprietary-insecurity.it.po
proprietary-insecurity.ja-diff.html
proprietary-insecurity.ja.po
proprietary-insecurity.pot
proprietary-insecurity.ru.po
proprietary-surveillance.de.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.118&r2=1.119
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.144&r2=1.145
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-diff.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.134&r2=1.135
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja-diff.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja.po?cvsroot=www&r1=1.105&r2=1.106
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pot?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.193&r2=1.194
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.232&r2=1.233
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.319&r2=1.320
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.72&r2=1.73
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.245&r2=1.246
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.83&r2=1.84
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.218&r2=1.219
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.167&r2=1.168
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.408&r2=1.409
Patches:
Index: proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.118
retrieving revision 1.119
diff -u -b -r1.118 -r1.119
--- proprietary-insecurity.de.po 1 Oct 2018 09:59:22 -0000 1.118
+++ proprietary-insecurity.de.po 5 Oct 2018 12:59:26 -0000 1.119
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-01 09:56+0000\n"
+"POT-Creation-Date: 2018-10-05 12:56+0000\n"
"PO-Revision-Date: 2018-08-29 02:41+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -34,7 +34,7 @@
msgstr ""
"<a href=\"/proprietary/\">Weitere Beispiele proprietärer Schadsoftware</a>"
-#. type: Content of: <p>
+#. type: Content of: <div><p>
msgid ""
"Nonfree (proprietary) software is very often malware (designed to mistreat "
"the user). Nonfree software is controlled by its developers, which puts them "
@@ -51,16 +51,7 @@
"Entwickler diese Macht zum Schaden derer aus, denen sie eigentlich dienen "
"sollte."
-#. type: Content of: <p>
-msgid ""
-"This page lists clearly established cases of insecurity in proprietary "
-"software that has grave consequences or is otherwise noteworthy."
-msgstr ""
-"Diese Seite zeigt eindeutig nachgewiesene Fälle von Unsicherheit in "
-"proprietärer Software, die schwerwiegende Folgen hat oder anderweitig "
-"erwähnenswert ist."
-
-#. type: Content of: <p>
+#. type: Content of: <div><p>
msgid ""
"It is incorrect to compare free software with a fictitious idea of "
"proprietary software as perfect, but the press often implicitly does that "
@@ -75,7 +66,7 @@
"proprietäre Software nicht nur nicht perfekt, sondern häufig auch sehr "
"schlampig <ins>programmiert</ins> ist."
-#. type: Content of: <p>
+#. type: Content of: <div><p>
# | It would be equally incorrect to compare proprietary software with a
# | fictitious idea of free software as perfect. Every nontrivial program has
# | bugs, and any system, free or proprietary, may have security [-errors.-]
@@ -115,6 +106,24 @@
#. type: Content of: <p>
msgid ""
+"This page lists clearly established cases of insecurity in proprietary "
+"software that has grave consequences or is otherwise noteworthy."
+msgstr ""
+"Diese Seite zeigt eindeutig nachgewiesene Fälle von Unsicherheit in "
+"proprietärer Software, die schwerwiegende Folgen hat oder anderweitig "
+"erwähnenswert ist."
+
+#. type: Content of: <p>
+msgid ""
+"<a href=\"/proprietary/proprietary-tethers.html\">Tethered appliances and "
+"applications</a> are intrinsically insecure because there is always a chance "
+"that the server will go offline accidentally, making them useless. We don't "
+"list them here unless they have documented vulnerabilities in addition to "
+"the fact that they are tethered."
+msgstr ""
+
+#. type: Content of: <p>
+msgid ""
"If you know of an example that ought to be in this page but isn't here, "
"please write to <a href=\"mailto:address@hidden"><address@hidden"
"org></a> to inform us. Please include the URL of a trustworthy reference "
@@ -128,23 +137,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Honeywell's “smart” thermostats communicate only through the "
-"company's server. They have all the nasty characteristics of such devices: "
-"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
-"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
-"user, or of all users at once), as well as the risk of an outage (which is "
-"what just happened)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In addition, setting the desired temperature requires running nonfree "
-"software. With an old-fashioned thermostat, you can do it using controls "
-"right on the thermostat."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Researchers have discovered how to <a href=\"http://news.rub.de/english/"
"press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> hide "
"voice commands in other audio</a>, so that people cannot hear them, but "
Index: proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.144
retrieving revision 1.145
diff -u -b -r1.144 -r1.145
--- proprietary-insecurity.fr.po 1 Oct 2018 11:16:18 -0000 1.144
+++ proprietary-insecurity.fr.po 5 Oct 2018 12:59:26 -0000 1.145
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2018-10-01 09:56+0000\n"
+"POT-Creation-Date: 2018-10-05 12:56+0000\n"
"PO-Revision-Date: 2018-10-01 13:15+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-05 12:56+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -36,7 +37,7 @@
"<a href=\"/proprietary/proprietary.html\">Autres exemples de malveillance "
"dans le logiciel privateur</a>"
-#. type: Content of: <p>
+#. type: Content of: <div><p>
msgid ""
"Nonfree (proprietary) software is very often malware (designed to mistreat "
"the user). Nonfree software is controlled by its developers, which puts them "
@@ -51,16 +52,7 @@
"base</a>. Les développeurs exercent souvent ce pouvoir au détriment des "
"utilisateurs qu'ils devraient servir."
-#. type: Content of: <p>
-msgid ""
-"This page lists clearly established cases of insecurity in proprietary "
-"software that has grave consequences or is otherwise noteworthy."
-msgstr ""
-"Cette page répertorie des failles de sécurité de logiciels privateurs, "
-"failles clairement établies qui ont des conséquences graves ou méritent "
-"d'être mentionnées pour d'autres raisons. "
-
-#. type: Content of: <p>
+#. type: Content of: <div><p>
msgid ""
"It is incorrect to compare free software with a fictitious idea of "
"proprietary software as perfect, but the press often implicitly does that "
@@ -74,7 +66,7 @@
"exemples ci-dessous montrent que le logiciel privateur n'est pas parfait et "
"qu'il est souvent tout à fait bâclé."
-#. type: Content of: <p>
+#. type: Content of: <div><p>
msgid ""
"It would be equally incorrect to compare proprietary software with a "
"fictitious idea of free software as perfect. Every nontrivial program has "
@@ -97,6 +89,24 @@
#. type: Content of: <p>
msgid ""
+"This page lists clearly established cases of insecurity in proprietary "
+"software that has grave consequences or is otherwise noteworthy."
+msgstr ""
+"Cette page répertorie des failles de sécurité de logiciels privateurs, "
+"failles clairement établies qui ont des conséquences graves ou méritent "
+"d'être mentionnées pour d'autres raisons. "
+
+#. type: Content of: <p>
+msgid ""
+"<a href=\"/proprietary/proprietary-tethers.html\">Tethered appliances and "
+"applications</a> are intrinsically insecure because there is always a chance "
+"that the server will go offline accidentally, making them useless. We don't "
+"list them here unless they have documented vulnerabilities in addition to "
+"the fact that they are tethered."
+msgstr ""
+
+#. type: Content of: <p>
+msgid ""
"If you know of an example that ought to be in this page but isn't here, "
"please write to <a href=\"mailto:address@hidden"><address@hidden"
"org></a> to inform us. Please include the URL of a trustworthy reference "
@@ -110,33 +120,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Honeywell's “smart” thermostats communicate only through the "
-"company's server. They have all the nasty characteristics of such devices: "
-"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
-"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
-"user, or of all users at once), as well as the risk of an outage (which is "
-"what just happened)."
-msgstr ""
-"Les thermostats « intelligents » d'Honeywell communiquent par "
-"l'intermédiaire du serveur de la société. Ils ont toutes les "
-"caractéristiques de ce genre d'appareil : <a href=\"https://www."
-"businessinsider.com/honeywell-iot-thermostats-server-"
-"outage-2018-9\">surveillance et risque de sabotage</a> (d'un utilisateur "
-"particulier ou de tous les utilisateurs en même temps), sans compter le "
-"risque de panne du serveur (c'est ce qui vient d'arriver)."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In addition, setting the desired temperature requires running nonfree "
-"software. With an old-fashioned thermostat, you can do it using controls "
-"right on the thermostat."
-msgstr ""
-"De plus, le réglage de la température se fait au moyen d'un logiciel non "
-"libre. Avec un thermostat traditionnel, on peut le faire directement sur le "
-"thermostat."
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Researchers have discovered how to <a href=\"http://news.rub.de/english/"
"press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> hide "
"voice commands in other audio</a>, so that people cannot hear them, but "
@@ -1158,3 +1141,28 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "Honeywell's “smart” thermostats communicate only through the "
+#~ "company's server. They have all the nasty characteristics of such "
+#~ "devices: <a href=\"https://www.businessinsider.com/honeywell-iot-"
+#~ "thermostats-server-outage-2018-9\"> surveillance, and danger of sabotage</"
+#~ "a> (of a specific user, or of all users at once), as well as the risk of "
+#~ "an outage (which is what just happened)."
+#~ msgstr ""
+#~ "Les thermostats « intelligents » d'Honeywell communiquent par "
+#~ "l'intermédiaire du serveur de la société. Ils ont toutes les "
+#~ "caractéristiques de ce genre d'appareil : <a href=\"https://www."
+#~ "businessinsider.com/honeywell-iot-thermostats-server-"
+#~ "outage-2018-9\">surveillance et risque de sabotage</a> (d'un utilisateur "
+#~ "particulier ou de tous les utilisateurs en même temps), sans compter le "
+#~ "risque de panne du serveur (c'est ce qui vient d'arriver)."
+
+#~ msgid ""
+#~ "In addition, setting the desired temperature requires running nonfree "
+#~ "software. With an old-fashioned thermostat, you can do it using controls "
+#~ "right on the thermostat."
+#~ msgstr ""
+#~ "De plus, le réglage de la température se fait au moyen d'un logiciel non
"
+#~ "libre. Avec un thermostat traditionnel, on peut le faire directement sur "
+#~ "le thermostat."
Index: proprietary-insecurity.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it-diff.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- proprietary-insecurity.it-diff.html 1 Oct 2018 09:59:22 -0000 1.15
+++ proprietary-insecurity.it-diff.html 5 Oct 2018 12:59:26 -0000 1.16
@@ -25,6 +25,7 @@
<a href="/proprietary/proprietary.html">Other examples of proprietary
malware</a>
+<span class="inserted"><ins><em><div class="comment"></em></ins></span>
<p>Nonfree (proprietary) software is very often malware (designed to
mistreat the user). Nonfree software is controlled by its developers,
which puts them in a position of power over the users; <a
@@ -32,9 +33,9 @@
basic injustice</a>. The developers often exercise that power to the
detriment of the users they ought to serve.</p>
-<p>This page lists clearly established cases of insecurity in
+<span class="removed"><del><strong><p>This page lists clearly
established cases of insecurity in
proprietary software that has grave consequences or is otherwise
-noteworthy.</p>
+noteworthy.</p></strong></del></span>
<p>It is incorrect to compare free software with a fictitious idea of
proprietary software as perfect, but the press often implicitly does
@@ -52,33 +53,29 @@
users helpless is what's culpable about proprietary software.</p>
<span class="removed"><del><strong><ul>
-<li id="break-security-smarttv">
- <p><a
-
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way</strong></del></span>
+<li id="break-security-smarttv"></strong></del></span>
+<span class="inserted"><ins><em></div>
+
+<p>This page lists clearly established cases of insecurity in
+proprietary software that has grave consequences or is otherwise
+noteworthy.</p></em></ins></span>
+
+<p><a
+ <span
class="removed"><del><strong>href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
+ Crackers found</strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-tethers.html">Tethered
appliances
+and applications</a> are intrinsically insecure because there is
always</em></ins></span>
+a <span class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>chance that the server will go offline accidentally,
making them
+useless. We don't list them here unless they have documented
+vulnerabilities in addition</em></ins></span> to <span
class="removed"><del><strong>break security on</strong></del></span> <span
class="inserted"><ins><em>the fact that they are tethered.</p>
-<span class="inserted"><ins><em><p>If you know of an example that
ought</em></ins></span> to <span class="removed"><del><strong>break security
on</strong></del></span> <span class="inserted"><ins><em>be in this page but
isn't
+<p>If you know of an example that ought to be in this page but isn't
here, please write
to <a href="mailto:address@hidden"><address@hidden></a>
-to inform us. Please include the URL of</em></ins></span> a <span
class="inserted"><ins><em>trustworthy reference or two
-to present the specifics.</p>
+to inform us. Please include the URL of</em></ins></span> a <span
class="removed"><del><strong>“smart” TV</a> and use its
camera</strong></del></span> <span class="inserted"><ins><em>trustworthy
reference or two</em></ins></span>
+to <span class="removed"><del><strong>watch</strong></del></span> <span
class="inserted"><ins><em>present</em></ins></span> the <span
class="inserted"><ins><em>specifics.</p>
<ul class="blurbs">
- <li id="M201809260">
- <p>Honeywell's</em></ins></span> “smart” <span
class="removed"><del><strong>TV</a></strong></del></span> <span
class="inserted"><ins><em>thermostats communicate
- only through the company's server. They have
- all the nasty characteristics of such devices: <a
-
href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9">
- surveillance,</em></ins></span> and <span class="removed"><del><strong>use
its camera
- to watch</strong></del></span> <span class="inserted"><ins><em>danger of
sabotage</a> (of a specific user, or of
- all users at once), as well as the risk of an outage (which is what
- just happened).</p>
-
- <p>In addition, setting the desired temperature requires running
- nonfree software. With an old-fashioned thermostat, you can do it
- using controls right on</em></ins></span> the <span
class="inserted"><ins><em>thermostat.</p>
- </li>
-
+<!-- INSERT insecurity -->
<li id="M201809240">
<p>Researchers have discovered how to <a
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
@@ -130,17 +127,16 @@
<p>Some Samsung phones randomly <a
href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages">send
photos</em></ins></span> to <span class="removed"><del><strong>capture
keystrokes without
- taking</strong></del></span> <span class="inserted"><ins><em>people
in</em></ins></span> the <span
class="removed"><del><strong>risk</strong></del></span> <span
class="inserted"><ins><em>owner's contact list</a>.</p>
- </li>
-
- <li id="M201712240">
- <p>One</em></ins></span> of <span class="removed"><del><strong>being
classified as malicious task by AV
+ taking</strong></del></span> <span class="inserted"><ins><em>people
in</em></ins></span> the <span class="removed"><del><strong>risk of being
classified as malicious task by AV
heuristics”.
- </p>
-</li>
-<li>
+ </p></strong></del></span> <span class="inserted"><ins><em>owner's
contact list</a>.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong><li>
<p>The proprietary code that runs pacemakers, insulin pumps, and other
-medical devices</strong></del></span> <span class="inserted"><ins><em>the
dangers of the “internet of stings”</em></ins></span>
+medical devices</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201712240">
+ <p>One of the dangers of the “internet of
stings”</em></ins></span>
is <span class="inserted"><ins><em>that, if you lose your internet
service, you also</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.co.uk/news/technology-40042584">
full</strong></del></span>
<span
class="inserted"><ins><em>href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/">
@@ -237,16 +233,12 @@
can be hijacked through their Wi-Fi chips</a>
because</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.bbc.co.uk/news/technology-40042584">
full</em></ins></span> of <span class="removed"><del><strong>a bug in
Broadcom's non-free firmware.</p></strong></del></span> <span
class="inserted"><ins><em>gross
- security faults</a>.</p></em></ins></span>
+ security faults</a>.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>When Miele's Internet</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201705160">
+ <li id="M201705160">
<p>Conexant HD Audio Driver Package (version 1.0.0.46 and earlier)
- pre-installed on 28 models</em></ins></span> of <span
class="removed"><del><strong>Stings hospital disinfectant dishwasher is
-<a
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">connected
to</strong></del></span> <span class="inserted"><ins><em>HP laptops logged the
user's keystroke
+ pre-installed on 28 models of HP laptops logged the user's keystroke
to a file in the filesystem. Any process with access to the filesystem
or the MapViewOfFile API could gain access to the log. Furthermore, <a
href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt">according
@@ -266,14 +258,16 @@
<p>Many Android devices <a
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/">
can be hijacked through their Wi-Fi chips</a> because of a bug in
- Broadcom's non-free firmware.</p>
+ Broadcom's non-free firmware.</p></em></ins></span>
</li>
- <li id="M201703270">
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201703270"></em></ins></span>
<p>When Miele's Internet of
- Stings hospital disinfectant dishwasher is <a
-
href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">
- connected to</em></ins></span> the Internet, its security is
crap</a>.</p>
+ Stings hospital disinfectant dishwasher is <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">connected</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">
+ connected</em></ins></span> to the Internet, its security is
crap</a>.</p>
<p>For example, a cracker can gain access to the dishwasher's
filesystem, infect it with malware, and force the dishwasher to launch
@@ -517,10 +511,7 @@
<span class="removed"><del><strong><li>
<p>
Malware found
-on</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201510210">
- <p>FitBit fitness trackers have a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html">security
+on <a
href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html">security
cameras available through Amazon</a>.
</p>
@@ -548,10 +539,13 @@
<li>
<p>
-FitBit fitness trackers <a
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/">
-have a Bluetooth vulnerability</a></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/">
- Bluetooth vulnerability</a></em></ins></span> that allows attackers
to send malware
+FitBit fitness trackers</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201510210">
+ <p>FitBit fitness trackers have a</em></ins></span> <a
+
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/">
+<span class="removed"><del><strong>have a</strong></del></span>
+ Bluetooth vulnerability</a> that allows attackers to send malware
to the devices, which can subsequently spread to computers and other
FitBit trackers that interact with <span class="removed"><del><strong>them.
</p></strong></del></span> <span
class="inserted"><ins><em>them.</p></em></ins></span>
@@ -747,18 +741,18 @@
from the state. Quite the contrary: confiding your data to someone
else's server, if not first encrypted by you with free software,
undermines your <span class="removed"><del><strong>rights.
-</p></strong></del></span> <span
class="inserted"><ins><em>rights.</p></em></ins></span>
+</p></strong></del></span> <span
class="inserted"><ins><em>rights.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201404250">
+ <li id="M201404250">
<p>Lots of <a
href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">
- hospital equipment has lousy security</a>, and it can be
fatal.</p>
+ hospital equipment has lousy security</a>, and it can be
fatal.</p></em></ins></span>
</li>
- <li id="M201402210">
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201402210">
<p>The <a
href="http://arstechnica.com/security/2014/02/crypto-weaknesses-in-whatsapp-the-kind-of-stuff-the-nsa-would-love/">insecurity
of WhatsApp</a> makes eavesdropping a snap.</p>
@@ -924,7 +918,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/01 09:59:22 $
+$Date: 2018/10/05 12:59:26 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.134
retrieving revision 1.135
diff -u -b -r1.134 -r1.135
--- proprietary-insecurity.it.po 1 Oct 2018 09:59:22 -0000 1.134
+++ proprietary-insecurity.it.po 5 Oct 2018 12:59:26 -0000 1.135
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2018-10-01 09:56+0000\n"
+"POT-Creation-Date: 2018-10-05 12:56+0000\n"
"PO-Revision-Date: 2017-12-31 13:13+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -35,7 +35,7 @@
"<a href=\"/proprietary/proprietary.html\">Altri esempi di malware "
"proprietario</a>"
-#. type: Content of: <p>
+#. type: Content of: <div><p>
msgid ""
"Nonfree (proprietary) software is very often malware (designed to mistreat "
"the user). Nonfree software is controlled by its developers, which puts them "
@@ -51,16 +51,7 @@
"sviluppatori esercitano questo potere a danno degli utenti che invece "
"dovrebbero servire."
-#. type: Content of: <p>
-msgid ""
-"This page lists clearly established cases of insecurity in proprietary "
-"software that has grave consequences or is otherwise noteworthy."
-msgstr ""
-"Questa pagina elenca casi chiaramente dimostrati di scarsa sicurezza in "
-"software proprietario che ha gravi conseguenze o che è altrimenti degna di "
-"nota."
-
-#. type: Content of: <p>
+#. type: Content of: <div><p>
msgid ""
"It is incorrect to compare free software with a fictitious idea of "
"proprietary software as perfect, but the press often implicitly does that "
@@ -74,7 +65,7 @@
"mostrano che il software proprietario non è perfetto ed è anzi abbastanza "
"trasandato."
-#. type: Content of: <p>
+#. type: Content of: <div><p>
# | It would be equally incorrect to compare proprietary software with a
# | fictitious idea of free software as perfect. Every nontrivial program has
# | bugs, and any system, free or proprietary, may have security [-errors.-]
@@ -113,27 +104,28 @@
#. type: Content of: <p>
msgid ""
-"If you know of an example that ought to be in this page but isn't here, "
-"please write to <a href=\"mailto:address@hidden"><address@hidden"
-"org></a> to inform us. Please include the URL of a trustworthy reference "
-"or two to present the specifics."
+"This page lists clearly established cases of insecurity in proprietary "
+"software that has grave consequences or is otherwise noteworthy."
msgstr ""
+"Questa pagina elenca casi chiaramente dimostrati di scarsa sicurezza in "
+"software proprietario che ha gravi conseguenze o che è altrimenti degna di "
+"nota."
-#. type: Content of: <ul><li><p>
+#. type: Content of: <p>
msgid ""
-"Honeywell's “smart” thermostats communicate only through the "
-"company's server. They have all the nasty characteristics of such devices: "
-"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
-"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
-"user, or of all users at once), as well as the risk of an outage (which is "
-"what just happened)."
+"<a href=\"/proprietary/proprietary-tethers.html\">Tethered appliances and "
+"applications</a> are intrinsically insecure because there is always a chance "
+"that the server will go offline accidentally, making them useless. We don't "
+"list them here unless they have documented vulnerabilities in addition to "
+"the fact that they are tethered."
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <p>
msgid ""
-"In addition, setting the desired temperature requires running nonfree "
-"software. With an old-fashioned thermostat, you can do it using controls "
-"right on the thermostat."
+"If you know of an example that ought to be in this page but isn't here, "
+"please write to <a href=\"mailto:address@hidden"><address@hidden"
+"org></a> to inform us. Please include the URL of a trustworthy reference "
+"or two to present the specifics."
msgstr ""
#. type: Content of: <ul><li><p>
Index: proprietary-insecurity.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja-diff.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- proprietary-insecurity.ja-diff.html 1 Oct 2018 09:59:22 -0000 1.34
+++ proprietary-insecurity.ja-diff.html 5 Oct 2018 12:59:27 -0000 1.35
@@ -25,6 +25,7 @@
<a href="/proprietary/proprietary.html">Other examples of proprietary
malware</a>
+<span class="inserted"><ins><em><div class="comment"></em></ins></span>
<p>Nonfree (proprietary) software is very often malware (designed to
mistreat the user). Nonfree software is controlled by its developers,
which puts them in a position of power over the users; <a
@@ -32,17 +33,16 @@
basic injustice</a>. The developers often exercise that power to the
detriment of the users they ought to serve.</p>
-<p>This page lists clearly established cases of insecurity in
-proprietary software that has grave consequences or is otherwise
-noteworthy.</p>
+<span class="removed"><del><strong><p>This page lists clearly
established cases</strong></del></span>
-<p>It <span class="inserted"><ins><em>is incorrect to compare free
software with a fictitious idea of
-proprietary software as perfect, but the press often implicitly does
-that whenever a security hole in a free program is discovered. The
+<span class="inserted"><ins><em><p>It is incorrect to compare free
software with a fictitious idea</em></ins></span> of <span
class="removed"><del><strong>insecurity in</strong></del></span>
+proprietary software <span class="inserted"><ins><em>as perfect, but the press
often implicitly does</em></ins></span>
+that <span class="removed"><del><strong>has grave consequences
or</strong></del></span> <span class="inserted"><ins><em>whenever a security
hole in a free program</em></ins></span> is <span
class="removed"><del><strong>otherwise
+noteworthy.</p></strong></del></span> <span
class="inserted"><ins><em>discovered. The
examples below show that proprietary software isn't perfect, and
-is often quite sloppy.</p>
+is often quite sloppy.</p></em></ins></span>
-<p>It</em></ins></span> would be <span
class="inserted"><ins><em>equally</em></ins></span> incorrect to compare
proprietary software with
+<p>It would be <span class="inserted"><ins><em>equally</em></ins></span>
incorrect to compare proprietary software with
a fictitious idea of free software as perfect. Every nontrivial
program has bugs, and any system, free or proprietary, may have
security
@@ -54,8 +54,19 @@
<ul>
<li>
-<p>4G LTE phone networks are drastically insecure. They
can</strong></del></span> <span class="inserted"><ins><em>any security problems
that arise</em>. Keeping the
+<p>4G LTE phone networks</strong></del></span> <span
class="inserted"><ins><em>any security problems that arise</em>. Keeping
the
users helpless is what's culpable about proprietary software.</p>
+</div>
+
+<p>This page lists clearly established cases of insecurity in
+proprietary software that has grave consequences or is otherwise
+noteworthy.</p>
+
+<p><a href="/proprietary/proprietary-tethers.html">Tethered
appliances
+and applications</a></em></ins></span> are <span
class="removed"><del><strong>drastically insecure. They
can</strong></del></span> <span class="inserted"><ins><em>intrinsically
insecure because there is always
+a chance that the server will go offline accidentally, making them
+useless. We don't list them here unless they have documented
+vulnerabilities in addition to the fact that they are tethered.</p>
<p>If you know of an example that ought to</em></ins></span> be
<span class="removed"><del><strong><a
href="https://web.archive.org/web/20161027223907/http://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/">
@@ -77,65 +88,38 @@
</li>
<li>
-<p>A <a
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/">flaw
in
-Internet Explorer and Edge</a> allows an attacker</strong></del></span>
<span class="inserted"><ins><em>trustworthy reference or two</em></ins></span>
-to <span class="removed"><del><strong>retrieve
-Microsoft account credentials, if</strong></del></span> <span
class="inserted"><ins><em>present</em></ins></span> the <span
class="removed"><del><strong>user is tricked into visiting a
-malicious link.</p>
-</li>
-
-<li>
-<p><a
href="https://techcrunch.com/2016/07/29/research-shows-deleted-whatsapp-messages-arent-actually-deleted/">“Deleted”
-WhatsApp messages are not entirely deleted</a>.</strong></del></span>
<span class="inserted"><ins><em>specifics.</p>
+<p>A</strong></del></span> <span class="inserted"><ins><em>trustworthy
reference or two
+to present the specifics.</p>
<ul class="blurbs">
- <li id="M201809260">
- <p>Honeywell's “smart” thermostats communicate
- only through the company's server.</em></ins></span> They <span
class="removed"><del><strong>can be recovered
-in various ways.
-</p>
-</li>
-
-<li>
-<p>A vulnerability in Apple's Image I/O API allowed an attacker
to</strong></del></span> <span class="inserted"><ins><em>have
- all the nasty characteristics of such devices:</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
- malacious code from any application which uses this API to render a
- certain kind</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9">
- surveillance, and danger</em></ins></span> of <span
class="removed"><del><strong>image file</a>.</p>
-</li>
-<li>
-<p>A bug in</strong></del></span> <span
class="inserted"><ins><em>sabotage</a> (of</em></ins></span> a <span
class="removed"><del><strong>proprietary ASN.1 library, used in cell phone
towers</strong></del></span> <span class="inserted"><ins><em>specific user, or
of
- all users at once),</em></ins></span> as well as <span
class="removed"><del><strong>cell phones and
-routers, <a
href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover">allows
-taking control</strong></del></span> <span class="inserted"><ins><em>the
risk</em></ins></span> of <span class="removed"><del><strong>those
systems</a>.</p></strong></del></span> <span
class="inserted"><ins><em>an outage (which is what
- just happened).</p>
-
- <p>In addition, setting the desired temperature requires running
- nonfree software. With an old-fashioned thermostat, you can do it
- using controls right on the thermostat.</p></em></ins></span>
- </li>
-
-<span class="removed"><del><strong><li>
-<p>Antivirus programs</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201809240">
- <p>Researchers</em></ins></span> have <span
class="inserted"><ins><em>discovered how to <a
-
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
- hide voice commands in other audio</a>,</em></ins></span> so <span
class="removed"><del><strong>many errors</strong></del></span> that <span
class="removed"><del><strong><a
href="https://theconversation.com/as-more-vulnerabilities-are-discovered-is-it-time-to-uninstall-antivirus-software-61374">they
- may make security worse</a>.</p>
-<p>GNU/Linux does not need antivirus
software.</p></strong></del></span> <span
class="inserted"><ins><em>people cannot hear
- them, but Alexa and Siri can.</p>
+<!-- INSERT insecurity -->
+ <li id="M201809240">
+ <p>Researchers have discovered how to</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/">flaw</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
+ hide voice commands</em></ins></span> in
+<span class="removed"><del><strong>Internet Explorer</strong></del></span>
<span class="inserted"><ins><em>other audio</a>, so that people cannot
hear
+ them, but Alexa</em></ins></span> and <span
class="removed"><del><strong>Edge</a> allows an
attacker</strong></del></span> <span class="inserted"><ins><em>Siri
can.</p>
</li>
<li id="M201808120">
- <p>Crackers found a way to break the security of an Amazon device,
+ <p>Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>retrieve
+Microsoft account credentials, if</strong></del></span> <span
class="inserted"><ins><em>break</em></ins></span> the <span
class="removed"><del><strong>user is tricked</strong></del></span> <span
class="inserted"><ins><em>security of an Amazon device,
and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
- turn it into a listening device</a> for them.</p>
+ turn it</em></ins></span> into <span
class="removed"><del><strong>visiting</strong></del></span> a
+<span class="removed"><del><strong>malicious link.</p>
+</li>
- <p>It was very difficult for them to do this. The job would be much
+<li>
+<p><a
href="https://techcrunch.com/2016/07/29/research-shows-deleted-whatsapp-messages-arent-actually-deleted/">“Deleted”
+WhatsApp messages are not entirely deleted</a>. They
can</strong></del></span> <span class="inserted"><ins><em>listening
device</a> for them.</p>
+
+ <p>It was very difficult for them to do this. The job
would</em></ins></span> be <span
class="removed"><del><strong>recovered</strong></del></span> <span
class="inserted"><ins><em>much
easier for Amazon. And if some government such as China or the US
- told Amazon to do this, or cease to sell the product in that country,
+ told Amazon to do this, or cease to sell the product</em></ins></span> in
<span class="removed"><del><strong>various ways.
+</p>
+</li>
+
+<li></strong></del></span> <span class="inserted"><ins><em>that country,
do you think Amazon would have the moral fiber to say no?</p>
<p>These crackers are probably hackers too, but please <a
@@ -366,33 +350,39 @@
in various ways.</p>
</li>
- <li id="M201607220">
+ <li id="M201607220"></em></ins></span>
<p>A vulnerability in Apple's Image I/O API allowed an attacker to
<a
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
- malicious code from any application which uses this API to render a
- certain kind of image file</a>.</p></em></ins></span>
+ <span class="removed"><del><strong>malacious</strong></del></span>
+ <span class="inserted"><ins><em>malicious</em></ins></span> code from any
application which uses this API to render a
+ certain kind of image file</a>.</p>
</li>
+<span class="removed"><del><strong><li></strong></del></span>
-<span class="removed"><del><strong><li>
-<p>Over 70 brands</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201607190">
+ <span class="inserted"><ins><em><li id="M201607190"></em></ins></span>
<p>A bug in a proprietary ASN.1 library, used
in cell phone towers as well as cell phones and routers, <a
href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover">allows
- taking control</em></ins></span> of <span
class="removed"><del><strong>network-connected surveillance
-cameras</strong></del></span> <span class="inserted"><ins><em>those
systems</a>.</p>
+ taking control of those systems</a>.</p>
</li>
- <li id="M201606290">
- <p>Antivirus programs have so many errors that</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">have</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theconversation.com/as-more-vulnerabilities-are-discovered-is-it-time-to-uninstall-antivirus-software-61374">they
- may make</em></ins></span> security <span
class="removed"><del><strong>bugs that allow anyone to watch through
them</a>.</p></strong></del></span> <span
class="inserted"><ins><em>worse</a>.</p>
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201606290"></em></ins></span>
+ <p>Antivirus programs have so many errors that <a
+
href="https://theconversation.com/as-more-vulnerabilities-are-discovered-is-it-time-to-uninstall-antivirus-software-61374">they
+ may make security worse</a>.</p>
- <p>GNU/Linux does not need antivirus
software.</p></em></ins></span>
+ <p>GNU/Linux does not need antivirus software.</p>
</li>
<span class="removed"><del><strong><li>
+<p>Over 70 brands of network-connected surveillance
+cameras <a
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">have
+security bugs that allow anyone to watch through them</a>.</p>
+</li>
+
+<li>
<p>
Samsung's</strong></del></span>
@@ -882,7 +872,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/01 09:59:22 $
+$Date: 2018/10/05 12:59:27 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja.po,v
retrieving revision 1.105
retrieving revision 1.106
diff -u -b -r1.105 -r1.106
--- proprietary-insecurity.ja.po 1 Oct 2018 09:59:22 -0000 1.105
+++ proprietary-insecurity.ja.po 5 Oct 2018 12:59:27 -0000 1.106
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2018-10-01 09:56+0000\n"
+"POT-Creation-Date: 2018-10-05 12:56+0000\n"
"PO-Revision-Date: 2016-10-31 12:56+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -34,7 +34,7 @@
"<a
href=\"/proprietary/proprietary.html\">ã»ãã®ãããã©ã¤ã¨ã¿ãªã»ãã«ã¦ã§ã¢"
"ã®ä¾</a>"
-#. type: Content of: <p>
+#. type: Content of: <div><p>
msgid ""
"Nonfree (proprietary) software is very often malware (designed to mistreat "
"the user). Nonfree software is controlled by its developers, which puts them "
@@ -49,15 +49,7 @@
"æ¬çãªä¸æ£ç¾©</a>ã§ããéçºè
ã¯ããã°ãã°ãã®åãè¡ä½¿ãããµã¼ãã¹ãã¹ãã¦ã¼ã¶"
"ã«å¯¾ãã¦æ害ãä¸ãã¾ãã"
-#. type: Content of: <p>
-msgid ""
-"This page lists clearly established cases of insecurity in proprietary "
-"software that has grave consequences or is otherwise noteworthy."
-msgstr ""
-"ãã®ãã¼ã¸ã§ã¯æ確ã«ç¢ºèªã§ãããããã©ã¤ã¨ã¿ãªãªã½ããã¦ã§ã¢ã®å±éºæ§ã®ã±ã¼ã¹"
-"ãæ²è¼ãã¾ããã²ã©ãçµæã¨ãªããã®ããããã§ãªããã°è¨é²ã«å¤ãããã®ã§ãã"
-
-#. type: Content of: <p>
+#. type: Content of: <div><p>
msgid ""
"It is incorrect to compare free software with a fictitious idea of "
"proprietary software as perfect, but the press often implicitly does that "
@@ -66,7 +58,7 @@
"sloppy."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><p>
#, fuzzy
#| msgid ""
#| "It would be incorrect to compare proprietary software with a fictitious "
@@ -94,27 +86,27 @@
#. type: Content of: <p>
msgid ""
-"If you know of an example that ought to be in this page but isn't here, "
-"please write to <a href=\"mailto:address@hidden"><address@hidden"
-"org></a> to inform us. Please include the URL of a trustworthy reference "
-"or two to present the specifics."
+"This page lists clearly established cases of insecurity in proprietary "
+"software that has grave consequences or is otherwise noteworthy."
msgstr ""
+"ãã®ãã¼ã¸ã§ã¯æ確ã«ç¢ºèªã§ãããããã©ã¤ã¨ã¿ãªãªã½ããã¦ã§ã¢ã®å±éºæ§ã®ã±ã¼ã¹"
+"ãæ²è¼ãã¾ããã²ã©ãçµæã¨ãªããã®ããããã§ãªããã°è¨é²ã«å¤ãããã®ã§ãã"
-#. type: Content of: <ul><li><p>
+#. type: Content of: <p>
msgid ""
-"Honeywell's “smart” thermostats communicate only through the "
-"company's server. They have all the nasty characteristics of such devices: "
-"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
-"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
-"user, or of all users at once), as well as the risk of an outage (which is "
-"what just happened)."
+"<a href=\"/proprietary/proprietary-tethers.html\">Tethered appliances and "
+"applications</a> are intrinsically insecure because there is always a chance "
+"that the server will go offline accidentally, making them useless. We don't "
+"list them here unless they have documented vulnerabilities in addition to "
+"the fact that they are tethered."
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <p>
msgid ""
-"In addition, setting the desired temperature requires running nonfree "
-"software. With an old-fashioned thermostat, you can do it using controls "
-"right on the thermostat."
+"If you know of an example that ought to be in this page but isn't here, "
+"please write to <a href=\"mailto:address@hidden"><address@hidden"
+"org></a> to inform us. Please include the URL of a trustworthy reference "
+"or two to present the specifics."
msgstr ""
#. type: Content of: <ul><li><p>
Index: proprietary-insecurity.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pot,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- proprietary-insecurity.pot 1 Oct 2018 09:59:22 -0000 1.75
+++ proprietary-insecurity.pot 5 Oct 2018 12:59:27 -0000 1.76
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2018-10-01 09:56+0000\n"
+"POT-Creation-Date: 2018-10-05 12:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -30,7 +30,7 @@
"malware</a>"
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><p>
msgid ""
"Nonfree (proprietary) software is very often malware (designed to mistreat "
"the user). Nonfree software is controlled by its developers, which puts them "
@@ -40,13 +40,7 @@
"detriment of the users they ought to serve."
msgstr ""
-#. type: Content of: <p>
-msgid ""
-"This page lists clearly established cases of insecurity in proprietary "
-"software that has grave consequences or is otherwise noteworthy."
-msgstr ""
-
-#. type: Content of: <p>
+#. type: Content of: <div><p>
msgid ""
"It is incorrect to compare free software with a fictitious idea of "
"proprietary software as perfect, but the press often implicitly does that "
@@ -55,7 +49,7 @@
"sloppy."
msgstr ""
-#. type: Content of: <p>
+#. type: Content of: <div><p>
msgid ""
"It would be equally incorrect to compare proprietary software with a "
"fictitious idea of free software as perfect. Every nontrivial program has "
@@ -68,29 +62,26 @@
#. type: Content of: <p>
msgid ""
-"If you know of an example that ought to be in this page but isn't here, "
-"please write to <a "
-"href=\"mailto:address@hidden"><address@hidden></a> to inform "
-"us. Please include the URL of a trustworthy reference or two to present the "
-"specifics."
+"This page lists clearly established cases of insecurity in proprietary "
+"software that has grave consequences or is otherwise noteworthy."
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <p>
msgid ""
-"Honeywell's “smart” thermostats communicate only through the "
-"company's server. They have all the nasty characteristics of such devices: "
-"<a "
-"href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9\">
"
-"surveillance, and danger of sabotage</a> (of a specific user, or of all "
-"users at once), as well as the risk of an outage (which is what just "
-"happened)."
+"<a href=\"/proprietary/proprietary-tethers.html\">Tethered appliances and "
+"applications</a> are intrinsically insecure because there is always a chance "
+"that the server will go offline accidentally, making them useless. We don't "
+"list them here unless they have documented vulnerabilities in addition to "
+"the fact that they are tethered."
msgstr ""
-#. type: Content of: <ul><li><p>
+#. type: Content of: <p>
msgid ""
-"In addition, setting the desired temperature requires running nonfree "
-"software. With an old-fashioned thermostat, you can do it using controls "
-"right on the thermostat."
+"If you know of an example that ought to be in this page but isn't here, "
+"please write to <a "
+"href=\"mailto:address@hidden"><address@hidden></a> to inform "
+"us. Please include the URL of a trustworthy reference or two to present the "
+"specifics."
msgstr ""
#. type: Content of: <ul><li><p>
Index: proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.193
retrieving revision 1.194
diff -u -b -r1.193 -r1.194
--- proprietary-insecurity.ru.po 1 Oct 2018 15:58:20 -0000 1.193
+++ proprietary-insecurity.ru.po 5 Oct 2018 12:59:27 -0000 1.194
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2018-10-01 09:56+0000\n"
+"POT-Creation-Date: 2018-10-05 12:56+0000\n"
"PO-Revision-Date: 2018-10-01 17:17+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-05 12:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -34,7 +35,7 @@
"<a href=\"/proprietary/proprietary.html\">ÐÑÑгие пÑимеÑÑ
вÑедоноÑнÑÑ
"
"неÑвободнÑÑ
пÑогÑамм</a>"
-#. type: Content of: <p>
+#. type: Content of: <div><p>
msgid ""
"Nonfree (proprietary) software is very often malware (designed to mistreat "
"the user). Nonfree software is controlled by its developers, which puts them "
@@ -49,16 +50,7 @@
"РазÑабоÑÑики ÑаÑÑо полÑзÑÑÑÑÑ ÑÑой
влаÑÑÑÑ Ð² ÑÑеÑб полÑзоваÑелÑм, коÑоÑÑÑ
"
"они Ð´Ð¾Ð»Ð¶Ð½Ñ Ð¾Ð±ÑлÑживаÑÑ."
-#. type: Content of: <p>
-msgid ""
-"This page lists clearly established cases of insecurity in proprietary "
-"software that has grave consequences or is otherwise noteworthy."
-msgstr ""
-"Ðа ÑÑой ÑÑÑаниÑе пеÑеÑиÑÐ»ÐµÐ½Ñ Ð´Ð¾ÑÑовеÑно
ÑÑÑановленнÑе ÑлÑÑаи ÑÑзвимоÑÑи "
-"неÑвободнÑÑ
пÑогÑамм, коÑоÑÐ°Ñ Ð¸Ð¼ÐµÐµÑ
ÑÑжкие поÑледÑÑÐ²Ð¸Ñ Ð¸Ð»Ð¸ коÑоÑÑÑ ÑледÑÐµÑ "
-"оÑмеÑиÑÑ Ð¿Ð¾ дÑÑгим пÑиÑинам."
-
-#. type: Content of: <p>
+#. type: Content of: <div><p>
msgid ""
"It is incorrect to compare free software with a fictitious idea of "
"proprietary software as perfect, but the press often implicitly does that "
@@ -72,7 +64,7 @@
"ниже пÑимеÑÑ Ð¿Ð¾ÐºÐ°Ð·ÑваÑÑ, ÑÑо неÑвободнÑе
пÑогÑÐ°Ð¼Ð¼Ñ Ð½Ðµ ÑовеÑÑÐµÐ½Ð½Ñ Ð¸ ÑаÑÑо "
"напиÑÐ°Ð½Ñ Ð²ÐµÑÑма небÑежно."
-#. type: Content of: <p>
+#. type: Content of: <div><p>
msgid ""
"It would be equally incorrect to compare proprietary software with a "
"fictitious idea of free software as perfect. Every nontrivial program has "
@@ -95,6 +87,24 @@
#. type: Content of: <p>
msgid ""
+"This page lists clearly established cases of insecurity in proprietary "
+"software that has grave consequences or is otherwise noteworthy."
+msgstr ""
+"Ðа ÑÑой ÑÑÑаниÑе пеÑеÑиÑÐ»ÐµÐ½Ñ Ð´Ð¾ÑÑовеÑно
ÑÑÑановленнÑе ÑлÑÑаи ÑÑзвимоÑÑи "
+"неÑвободнÑÑ
пÑогÑамм, коÑоÑÐ°Ñ Ð¸Ð¼ÐµÐµÑ
ÑÑжкие поÑледÑÑÐ²Ð¸Ñ Ð¸Ð»Ð¸ коÑоÑÑÑ ÑледÑÐµÑ "
+"оÑмеÑиÑÑ Ð¿Ð¾ дÑÑгим пÑиÑинам."
+
+#. type: Content of: <p>
+msgid ""
+"<a href=\"/proprietary/proprietary-tethers.html\">Tethered appliances and "
+"applications</a> are intrinsically insecure because there is always a chance "
+"that the server will go offline accidentally, making them useless. We don't "
+"list them here unless they have documented vulnerabilities in addition to "
+"the fact that they are tethered."
+msgstr ""
+
+#. type: Content of: <p>
+msgid ""
"If you know of an example that ought to be in this page but isn't here, "
"please write to <a href=\"mailto:address@hidden"><address@hidden"
"org></a> to inform us. Please include the URL of a trustworthy reference "
@@ -107,32 +117,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Honeywell's “smart” thermostats communicate only through the "
-"company's server. They have all the nasty characteristics of such devices: "
-"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
-"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
-"user, or of all users at once), as well as the risk of an outage (which is "
-"what just happened)."
-msgstr ""
-"“ÐнÑеллекÑÑалÑнÑе” ÑеÑмоÑÑаÑÑ Honeywell
ÑвÑзÑваÑÑÑÑ ÑолÑко Ñ "
-"ÑеÑвеÑом компании. У ниÑ
еÑÑÑ Ð²Ñе ÑквеÑнÑе
ÑеÑÑÑ ÑакиÑ
ÑÑÑÑойÑÑв: <a href="
-"\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
-"outage-2018-9\"> Ñлежка и опаÑноÑÑÑ ÑабоÑажа</a>
(конкÑеÑного полÑзоваÑÐµÐ»Ñ Ð¸ "
-"вÑеÑ
полÑзоваÑелей ÑÑазÑ), а Ñакже ÑиÑк
пеÑеÑÑвов в ÑабоÑе (именно ÑÑо и "
-"пÑоизоÑло)."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In addition, setting the desired temperature requires running nonfree "
-"software. With an old-fashioned thermostat, you can do it using controls "
-"right on the thermostat."
-msgstr ""
-"ÐÑоме Ñого, ÑÑÑановка ÑÑебÑемой
ÑемпеÑаÑÑÑÑ ÑÑебÑÐµÑ Ð½ÐµÑвободнÑÑ
пÑогÑамм.
Ð "
-"ÑÑаÑомоднÑÑ
ÑеÑмоÑÑаÑаÑ
ÑÑо делаеÑÑÑ Ñ
помоÑÑÑ Ð¾Ñганов ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð¿ÑÑмо на "
-"ÑеÑмоÑÑаÑе."
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Researchers have discovered how to <a href=\"http://news.rub.de/english/"
"press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> hide "
"voice commands in other audio</a>, so that people cannot hear them, but "
@@ -1139,3 +1123,27 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Ðбновлено:"
+
+#~ msgid ""
+#~ "Honeywell's “smart” thermostats communicate only through the "
+#~ "company's server. They have all the nasty characteristics of such "
+#~ "devices: <a href=\"https://www.businessinsider.com/honeywell-iot-"
+#~ "thermostats-server-outage-2018-9\"> surveillance, and danger of sabotage</"
+#~ "a> (of a specific user, or of all users at once), as well as the risk of "
+#~ "an outage (which is what just happened)."
+#~ msgstr ""
+#~ "“ÐнÑеллекÑÑалÑнÑе” ÑеÑмоÑÑаÑÑ
Honeywell ÑвÑзÑваÑÑÑÑ ÑолÑко Ñ "
+#~ "ÑеÑвеÑом компании. У ниÑ
еÑÑÑ Ð²Ñе
ÑквеÑнÑе ÑеÑÑÑ ÑакиÑ
ÑÑÑÑойÑÑв: <a href="
+#~ "\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
+#~ "outage-2018-9\"> Ñлежка и опаÑноÑÑÑ ÑабоÑажа</a>
(конкÑеÑного "
+#~ "полÑзоваÑÐµÐ»Ñ Ð¸ вÑеÑ
полÑзоваÑелей
ÑÑазÑ), а Ñакже ÑиÑк пеÑеÑÑвов в ÑабоÑе "
+#~ "(именно ÑÑо и пÑоизоÑло)."
+
+#~ msgid ""
+#~ "In addition, setting the desired temperature requires running nonfree "
+#~ "software. With an old-fashioned thermostat, you can do it using controls "
+#~ "right on the thermostat."
+#~ msgstr ""
+#~ "ÐÑоме Ñого, ÑÑÑановка ÑÑебÑемой
ÑемпеÑаÑÑÑÑ ÑÑебÑÐµÑ Ð½ÐµÑвободнÑÑ
пÑогÑамм. "
+#~ "Ð ÑÑаÑомоднÑÑ
ÑеÑмоÑÑаÑаÑ
ÑÑо делаеÑÑÑ
Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ Ð¾Ñганов ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð¿ÑÑмо "
+#~ "на ÑеÑмоÑÑаÑе."
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.232
retrieving revision 1.233
diff -u -b -r1.232 -r1.233
--- proprietary-surveillance.de.po 1 Oct 2018 19:58:10 -0000 1.232
+++ proprietary-surveillance.de.po 5 Oct 2018 12:59:27 -0000 1.233
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-01 19:55+0000\n"
+"POT-Creation-Date: 2018-10-05 12:56+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -29,6 +29,13 @@
#. type: Content of: <p>
msgid ""
+"<a href=\"/proprietary/proprietary.html\"> Other examples of proprietary "
+"malware</a>"
+msgstr ""
+"<a href=\"/proprietary/\">Weitere Beispiele proprietärer Schadsoftware</a>"
+
+#. type: Content of: <div><p>
+msgid ""
"Nonfree (proprietary) software is very often malware (designed to mistreat "
"the user). Nonfree software is controlled by its developers, which puts them "
"in a position of power over the users; <a href=\"/philosophy/free-software-"
@@ -44,7 +51,7 @@
"Entwickler diese Macht zum Schaden derer aus, denen sie eigentlich dienen "
"sollte."
-#. type: Content of: <div><p>
+#. type: Content of: <p>
msgid ""
"This document attempts to track <strong>clearly established cases of "
"proprietary software that spies on or tracks users</strong>."
@@ -53,14 +60,14 @@
"proprietärer Software, die Nutzer ausspioniert oder verfolgt</strong>, zu "
"verfolgen:"
-#. type: Content of: <div><p>
+#. type: Content of: <p>
msgid ""
-"<a href=\"/proprietary/proprietary.html\"> Other examples of proprietary "
-"malware</a>"
+"The tethered appliances and applications are by nature doing surveillance. "
+"We are not listing them here because they have their own page: <a href=\"/"
+"proprietary/proprietary-tethers.html\">Proprietary Tethers</a>."
msgstr ""
-"<a href=\"/proprietary/\">Weitere Beispiele proprietärer Schadsoftware</a>"
-#. type: Content of: <div><p>
+#. type: Content of: <p>
msgid ""
"If you know of an example that ought to be in this page but isn't here, "
"please write to <a href=\"mailto:address@hidden"><address@hidden"
@@ -1217,18 +1224,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The iMessage app on iThings <a href=\"https://theintercept.com/2016/09/28/"
-"apple-logs-your-imessage-contacts-and-may-share-them-with-police/\">tells a "
-"server every phone number that the user types into it</a>; the server "
-"records these numbers for at least 30 days."
-msgstr ""
-"iMessage-App auf iDingern <a href=\"https://theintercept.com/2016/09/28/"
-"apple-logs-your-imessage-contacts-and-may-share-them-with-police/\">teilt "
-"einem Server jede vom Nutzer gewählte Telefonnummer mit</a>; diese Daten "
-"bleiben für mindestens 30 Tage auf dem Server."
-
-#. type: Content of: <ul><li><p>
-msgid ""
"iThings automatically upload to Apple's servers all the photos and videos "
"they make."
msgstr ""
@@ -1425,11 +1420,12 @@
"iOS 7 zu)."
#. type: Content of: <ul><li><p>
-# | Users cannot make an Apple ID {+(+}<a
+# | Users cannot make an Apple ID [-<a
# |
href=\"https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id\">
-# | [-(-]necessary to install even gratis [-apps)</a>-] {+apps</a>)+} without
-# | giving a valid email address and receiving the {+verification+} code Apple
-# | sends to it.
+# | (necessary-] {+(<a
+# |
href=\"https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id\">necessary+}
+# | to install even gratis [-apps)</a>-] {+apps</a>)+} without giving a valid
+# | email address and receiving the {+verification+} code Apple sends to it.
#, fuzzy
#| msgid ""
#| "Users cannot make an Apple ID <a href=\"https://apple.stackexchange.com/"
@@ -1439,7 +1435,7 @@
msgid ""
"Users cannot make an Apple ID (<a href=\"https://apple.stackexchange.com/"
"questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"
-"\"> necessary to install even gratis apps</a>) without giving a valid email "
+"\">necessary to install even gratis apps</a>) without giving a valid email "
"address and receiving the verification code Apple sends to it."
msgstr ""
"Ohne Angabe einer gültigen E-Mail-Adresse und des von Apple dorthin "
@@ -1570,10 +1566,22 @@
"Informationen</a>."
#. type: Content of: <ul><li><p>
+# | Spyware is present in some Android devices when they are sold. Some
+# | Motorola [-phones modify-] {+phones, made when this company was owned by
+# | Google, use a modified version of+} Android [-to-] {+that+} <a
+# |
href=\"http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html\">
+# | send{+s+} personal data to Motorola</a>.
+#, fuzzy
+#| msgid ""
+#| "Spyware is present in some Android devices when they are sold. Some "
+#| "Motorola phones modify Android to <a href=\"http://www.beneaththewaves."
+#| "net/Projects/Motorola_Is_Listening.html\"> send personal data to "
+#| "Motorola</a>."
msgid ""
"Spyware is present in some Android devices when they are sold. Some "
-"Motorola phones modify Android to <a href=\"http://www.beneaththewaves.net/"
-"Projects/Motorola_Is_Listening.html\"> send personal data to Motorola</a>."
+"Motorola phones, made when this company was owned by Google, use a modified "
+"version of Android that <a href=\"http://www.beneaththewaves.net/Projects/"
+"Motorola_Is_Listening.html\"> sends personal data to Motorola</a>."
msgstr ""
"In einigen Android-Geräten ist bereits bei Verkauf Software zum Ausspähen "
"vorhanden. In einigen Motorola-Telefonen wurde Android modifiziert um <a "
@@ -2580,8 +2588,8 @@
#. type: Content of: <ul><li><p>
msgid ""
"The Simeji keyboard is a smartphone version of Baidu's <a href=\"/"
-"proprietary/#baidu-ime\">spying <abbr title=\"Input Method Editor\">IME</"
-"abbr></a>."
+"proprietary/proprietary-surveillance.html#baidu-ime\">spying <abbr title="
+"\"Input Method Editor\">IME</abbr></a>."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -2750,19 +2758,6 @@
"2017.\">sendet Daten nach China</a>."
#. type: Content of: <ul><li><p>
-msgid ""
-"nVidia's proprietary GeForce Experience <a href=\"http://www.gamersnexus.net/"
-"industry/2672-geforce-experience-data-transfer-analysis\">makes users "
-"identify themselves and then sends personal data about them to nVidia "
-"servers</a>."
-msgstr ""
-"<a href=\"//www.gamersnexus.net/industry/2672-geforce-experience-data-"
-"transfer-analysis\" title=\"Steve Burke, Analyzing GeForce Experience Data "
-"Transfers with Packet Monitoring, unter: GamersNexus.net 2016.\">Nvidia "
-"GeForce Experience lässt Nutzer identifizieren und sendet dann "
-"personenbezogene Daten an Nvidia-Server</a>."
-
-#. type: Content of: <ul><li><p>
# | Many <a
# |
href=\"http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/\">
# | video game consoles snoop on their users and report to the
@@ -3590,23 +3585,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Honeywell's “smart” thermostats communicate only through the "
-"company's server. They have all the nasty characteristics of such devices: "
-"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
-"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
-"user, or of all users at once), as well as the risk of an outage (which is "
-"what just happened)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In addition, setting the desired temperature requires running nonfree "
-"software. With an old-fashioned thermostat, you can do it using controls "
-"right on the thermostat."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Crackers found a way to break the security of an Amazon device, and <a href="
"\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it into a "
"listening device</a> for them."
@@ -4531,6 +4509,29 @@
msgid "Updated:"
msgstr "Letzte Ãnderung:"
+#~ msgid ""
+#~ "The iMessage app on iThings <a href=\"https://theintercept.com/2016/09/28/"
+#~ "apple-logs-your-imessage-contacts-and-may-share-them-with-police/\">tells "
+#~ "a server every phone number that the user types into it</a>; the server "
+#~ "records these numbers for at least 30 days."
+#~ msgstr ""
+#~ "iMessage-App auf iDingern <a href=\"https://theintercept.com/2016/09/28/"
+#~ "apple-logs-your-imessage-contacts-and-may-share-them-with-police/\">teilt "
+#~ "einem Server jede vom Nutzer gewählte Telefonnummer mit</a>; diese Daten "
+#~ "bleiben für mindestens 30 Tage auf dem Server."
+
+#~ msgid ""
+#~ "nVidia's proprietary GeForce Experience <a href=\"http://www.gamersnexus."
+#~ "net/industry/2672-geforce-experience-data-transfer-analysis\">makes users "
+#~ "identify themselves and then sends personal data about them to nVidia "
+#~ "servers</a>."
+#~ msgstr ""
+#~ "<a href=\"//www.gamersnexus.net/industry/2672-geforce-experience-data-"
+#~ "transfer-analysis\" title=\"Steve Burke, Analyzing GeForce Experience "
+#~ "Data Transfers with Packet Monitoring, unter: GamersNexus.net 2016."
+#~ "\">Nvidia GeForce Experience lässt Nutzer identifizieren und sendet dann "
+#~ "personenbezogene Daten an Nvidia-Server</a>."
+
#~ msgid "<a href=\"#SpywareAtWork\">Spyware at Work</a>"
#~ msgstr "<a href=\"#SpywareAtWork\">Spionageprogramme bei der Arbeit</a>"
Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.319
retrieving revision 1.320
diff -u -b -r1.319 -r1.320
--- proprietary-surveillance.fr.po 1 Oct 2018 21:03:40 -0000 1.319
+++ proprietary-surveillance.fr.po 5 Oct 2018 12:59:27 -0000 1.320
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-01 19:55+0000\n"
+"POT-Creation-Date: 2018-10-05 12:56+0000\n"
"PO-Revision-Date: 2018-10-01 23:03+0200\n"
"Last-Translator: Félicien Pillot <felicien AT gnu.org>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-05 12:56+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -28,6 +29,14 @@
#. type: Content of: <p>
msgid ""
+"<a href=\"/proprietary/proprietary.html\"> Other examples of proprietary "
+"malware</a>"
+msgstr ""
+"<a href=\"/proprietary/proprietary.html\">Autres exemples de malveillance "
+"dans le logiciel privateur</a>"
+
+#. type: Content of: <div><p>
+msgid ""
"Nonfree (proprietary) software is very often malware (designed to mistreat "
"the user). Nonfree software is controlled by its developers, which puts them "
"in a position of power over the users; <a href=\"/philosophy/free-software-"
@@ -41,7 +50,7 @@
"base</a>. Les développeurs exercent souvent ce pouvoir au détriment des "
"utilisateurs qu'ils devraient servir."
-#. type: Content of: <div><p>
+#. type: Content of: <p>
msgid ""
"This document attempts to track <strong>clearly established cases of "
"proprietary software that spies on or tracks users</strong>."
@@ -50,15 +59,14 @@
"logiciels privateurs espionnant l'utilisateur ou le suivant à la trace</"
"strong>."
-#. type: Content of: <div><p>
+#. type: Content of: <p>
msgid ""
-"<a href=\"/proprietary/proprietary.html\"> Other examples of proprietary "
-"malware</a>"
+"The tethered appliances and applications are by nature doing surveillance. "
+"We are not listing them here because they have their own page: <a href=\"/"
+"proprietary/proprietary-tethers.html\">Proprietary Tethers</a>."
msgstr ""
-"<a href=\"/proprietary/proprietary.html\">Autres exemples de malveillance "
-"dans le logiciel privateur</a>"
-#. type: Content of: <div><p>
+#. type: Content of: <p>
msgid ""
"If you know of an example that ought to be in this page but isn't here, "
"please write to <a href=\"mailto:address@hidden"><address@hidden"
@@ -924,18 +932,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The iMessage app on iThings <a href=\"https://theintercept.com/2016/09/28/"
-"apple-logs-your-imessage-contacts-and-may-share-them-with-police/\">tells a "
-"server every phone number that the user types into it</a>; the server "
-"records these numbers for at least 30 days."
-msgstr ""
-"L'appli iMessage des iTrucs <a href=\"https://theintercept.com/2016/09/28/"
-"apple-logs-your-imessage-contacts-and-may-share-them-with-police/\">informe "
-"le serveur de chaque numéro que l'utilisateur saisit dans son interface</a>;
"
-"le serveur enregistre ces numéros pendant au moins 30 jours."
-
-#. type: Content of: <ul><li><p>
-msgid ""
"iThings automatically upload to Apple's servers all the photos and videos "
"they make."
msgstr ""
@@ -1079,10 +1075,20 @@
"parle d'iOSÂ 6, mais c'est encore vrai d'iOSÂ 7)."
#. type: Content of: <ul><li><p>
+# | Users cannot make an Apple ID (<a
+# |
href=\"https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id\">[-
+# | -]necessary to install even gratis apps</a>) without giving a valid email
+# | address and receiving the verification code Apple sends to it.
+#, fuzzy
+#| msgid ""
+#| "Users cannot make an Apple ID (<a href=\"https://apple.stackexchange.com/"
+#| "questions/49951/how-can-i-download-free-apps-without-registering-an-apple-"
+#| "id\"> necessary to install even gratis apps</a>) without giving a valid "
+#| "email address and receiving the verification code Apple sends to it."
msgid ""
"Users cannot make an Apple ID (<a href=\"https://apple.stackexchange.com/"
"questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"
-"\"> necessary to install even gratis apps</a>) without giving a valid email "
+"\">necessary to install even gratis apps</a>) without giving a valid email "
"address and receiving the verification code Apple sends to it."
msgstr ""
"Les utilisateurs d'Apple ne peuvent pas créer leur identifiant (<a href="
@@ -1199,10 +1205,22 @@
"org/2013/08/fbi-hackers.htm\">informations complémentaires</a>."
#. type: Content of: <ul><li><p>
+# | Spyware is present in some Android devices when they are sold. Some
+# | Motorola [-phones modify-] {+phones, made when this company was owned by
+# | Google, use a modified version of+} Android [-to-] {+that+} <a
+# |
href=\"http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html\">
+# | send{+s+} personal data to Motorola</a>.
+#, fuzzy
+#| msgid ""
+#| "Spyware is present in some Android devices when they are sold. Some "
+#| "Motorola phones modify Android to <a href=\"http://www.beneaththewaves."
+#| "net/Projects/Motorola_Is_Listening.html\"> send personal data to "
+#| "Motorola</a>."
msgid ""
"Spyware is present in some Android devices when they are sold. Some "
-"Motorola phones modify Android to <a href=\"http://www.beneaththewaves.net/"
-"Projects/Motorola_Is_Listening.html\"> send personal data to Motorola</a>."
+"Motorola phones, made when this company was owned by Google, use a modified "
+"version of Android that <a href=\"http://www.beneaththewaves.net/Projects/"
+"Motorola_Is_Listening.html\"> sends personal data to Motorola</a>."
msgstr ""
"Des logiciels espions sont présents dans certains appareils sous Android au "
"moment de l'achat. Dans certains téléphones Motorola, Android a été
modifié "
@@ -2071,10 +2089,19 @@
"font les autres."
#. type: Content of: <ul><li><p>
+# | The Simeji keyboard is a smartphone version of Baidu's <a
+# | [-href=\"/proprietary/#baidu-ime\">spying-]
+# | {+href=\"/proprietary/proprietary-surveillance.html#baidu-ime\">spying+}
+# | <abbr title=\"Input Method Editor\">IME</abbr></a>.
+#, fuzzy
+#| msgid ""
+#| "The Simeji keyboard is a smartphone version of Baidu's <a href=\"/"
+#| "proprietary/#baidu-ime\">spying <abbr title=\"Input Method Editor\">IME</"
+#| "abbr></a>."
msgid ""
"The Simeji keyboard is a smartphone version of Baidu's <a href=\"/"
-"proprietary/#baidu-ime\">spying <abbr title=\"Input Method Editor\">IME</"
-"abbr></a>."
+"proprietary/proprietary-surveillance.html#baidu-ime\">spying <abbr title="
+"\"Input Method Editor\">IME</abbr></a>."
msgstr ""
"Le clavier Simeji est une version pour smartphone de l'<a href=\"/"
"proprietary/#baidu-ime\">éditeur de méthode d'entrée espion</a> de Baidu."
@@ -2211,18 +2238,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"nVidia's proprietary GeForce Experience <a href=\"http://www.gamersnexus.net/"
-"industry/2672-geforce-experience-data-transfer-analysis\">makes users "
-"identify themselves and then sends personal data about them to nVidia "
-"servers</a>."
-msgstr ""
-"La carte graphique privatrice nVidia GeForce Experience <a href=\"http://www."
-"gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"
-"\">oblige les utilisateurs à s'identifier, puis envoie leurs données "
-"personnelles aux serveurs de nVidia</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Many <a href=\"http://www.thestar.com/news/canada/2015/12/29/how-much-data-"
"are-video-games-collecting-about-you.html/\"> video game consoles snoop on "
"their users and report to the internet</a>—even what their users weigh."
@@ -2925,33 +2940,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Honeywell's “smart” thermostats communicate only through the "
-"company's server. They have all the nasty characteristics of such devices: "
-"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
-"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
-"user, or of all users at once), as well as the risk of an outage (which is "
-"what just happened)."
-msgstr ""
-"Les thermostats « intelligents » d'Honeywell communiquent par "
-"l'intermédiaire du serveur de la société. Ils ont toutes les "
-"caractéristiques de ce genre d'appareil : <a href=\"https://www."
-"businessinsider.com/honeywell-iot-thermostats-server-"
-"outage-2018-9\">surveillance et risque de sabotage</a> (d'un utilisateur "
-"particulier ou de tous les utilisateurs en même temps), sans compter le "
-"risque de panne du serveur (c'est ce qui vient d'arriver)."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In addition, setting the desired temperature requires running nonfree "
-"software. With an old-fashioned thermostat, you can do it using controls "
-"right on the thermostat."
-msgstr ""
-"De plus, le réglage de la température se fait au moyen d'un logiciel non "
-"libre. Avec un thermostat traditionnel, on peut le faire directement sur le "
-"thermostat."
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Crackers found a way to break the security of an Amazon device, and <a href="
"\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it into a "
"listening device</a> for them."
@@ -3660,3 +3648,51 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "The iMessage app on iThings <a href=\"https://theintercept.com/2016/09/28/"
+#~ "apple-logs-your-imessage-contacts-and-may-share-them-with-police/\">tells "
+#~ "a server every phone number that the user types into it</a>; the server "
+#~ "records these numbers for at least 30 days."
+#~ msgstr ""
+#~ "L'appli iMessage des iTrucs <a href=\"https://theintercept.com/2016/09/28/"
+#~ "apple-logs-your-imessage-contacts-and-may-share-them-with-police/"
+#~ "\">informe le serveur de chaque numéro que l'utilisateur saisit dans son "
+#~ "interface</a>; le serveur enregistre ces numéros pendant au moins "
+#~ "30Â jours."
+
+#~ msgid ""
+#~ "nVidia's proprietary GeForce Experience <a href=\"http://www.gamersnexus."
+#~ "net/industry/2672-geforce-experience-data-transfer-analysis\">makes users "
+#~ "identify themselves and then sends personal data about them to nVidia "
+#~ "servers</a>."
+#~ msgstr ""
+#~ "La carte graphique privatrice nVidia GeForce Experience <a href=\"http://"
+#~ "www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-"
+#~ "analysis\">oblige les utilisateurs à s'identifier, puis envoie leurs "
+#~ "données personnelles aux serveurs de nVidia</a>."
+
+#~ msgid ""
+#~ "Honeywell's “smart” thermostats communicate only through the "
+#~ "company's server. They have all the nasty characteristics of such "
+#~ "devices: <a href=\"https://www.businessinsider.com/honeywell-iot-"
+#~ "thermostats-server-outage-2018-9\"> surveillance, and danger of sabotage</"
+#~ "a> (of a specific user, or of all users at once), as well as the risk of "
+#~ "an outage (which is what just happened)."
+#~ msgstr ""
+#~ "Les thermostats « intelligents » d'Honeywell communiquent par "
+#~ "l'intermédiaire du serveur de la société. Ils ont toutes les "
+#~ "caractéristiques de ce genre d'appareil : <a href=\"https://www."
+#~ "businessinsider.com/honeywell-iot-thermostats-server-"
+#~ "outage-2018-9\">surveillance et risque de sabotage</a> (d'un utilisateur "
+#~ "particulier ou de tous les utilisateurs en même temps), sans compter le "
+#~ "risque de panne du serveur (c'est ce qui vient d'arriver)."
+
+#~ msgid ""
+#~ "In addition, setting the desired temperature requires running nonfree "
+#~ "software. With an old-fashioned thermostat, you can do it using controls "
+#~ "right on the thermostat."
+#~ msgstr ""
+#~ "De plus, le réglage de la température se fait au moyen d'un logiciel non
"
+#~ "libre. Avec un thermostat traditionnel, on peut le faire directement sur "
+#~ "le thermostat."
Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.72
retrieving revision 1.73
diff -u -b -r1.72 -r1.73
--- proprietary-surveillance.it-diff.html 1 Oct 2018 19:58:10 -0000
1.72
+++ proprietary-surveillance.it-diff.html 5 Oct 2018 12:59:27 -0000
1.73
@@ -19,13 +19,14 @@
}
#surveillance div.toc {
width: 24.5em; max-width: 94%;
- margin-bottom: 1em;
+ <span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span>
+ <span class="inserted"><ins><em>margin: 1em 0;</em></ins></span>
}
@media (min-width: 48em) {
#surveillance div.toc {
float: left;
width: auto; max-width: 48%;
- margin: .2em 0 1em;
+ margin: <span class="removed"><del><strong>.2em</strong></del></span>
<span class="inserted"><ins><em>1.2em</em></ins></span> 0 1em;
}
#surveillance .medium {
width: 43%;
@@ -39,6 +40,10 @@
<h2>Proprietary Surveillance</h2>
+<span class="inserted"><ins><em><p><a
href="/proprietary/proprietary.html">
+ Other examples of proprietary malware</a></p>
+
+<div class="comment"></em></ins></span>
<p>Nonfree (proprietary) software is very often malware (designed to
mistreat the user). Nonfree software is controlled by its developers,
which puts them in a position of power over the users; <a
@@ -46,20 +51,27 @@
basic injustice</a>. The developers often exercise that power to the
detriment of the users they ought to serve.</p>
-<div class="announcement">
+<span class="removed"><del><strong><div
class="announcement"></strong></del></span>
+<span class="inserted"><ins><em></div></em></ins></span>
+
<p>This document attempts to
track <strong>clearly established cases of proprietary software that
spies on or tracks users</strong>.</p>
-<p><a href="/proprietary/proprietary.html">
- Other examples of proprietary malware</a></p>
+<span class="removed"><del><strong><p><a
href="/proprietary/proprietary.html">
+ Other examples</strong></del></span>
-<span class="inserted"><ins><em><p>If you know of an example that ought
to be in this page but isn't
-here, please write
-to <a href="mailto:address@hidden"><address@hidden></a>
+<span class="inserted"><ins><em><p>The tethered appliances and
applications are by nature doing
+surveillance. We are not listing them here because they have their own
+page: <a href="/proprietary/proprietary-tethers.html">Proprietary
+Tethers</a>.</p>
+
+<p>If you know</em></ins></span> of <span
class="removed"><del><strong>proprietary malware</a></p>
+</div></strong></del></span> <span class="inserted"><ins><em>an example
that ought to be in this page but isn't
+here, please write to <a
+href="mailto:address@hidden"><address@hidden></a>
to inform us. Please include the URL of a trustworthy reference or two
to present the specifics.</p></em></ins></span>
-</div>
<div id="surveillance">
@@ -300,32 +312,29 @@
<p>To use proprietary software is to invite such treatment.</p>
</li>
- <span class="removed"><del><strong><li><p>
- Windows 10 <a
href="https://web.archive.org/web/20151001035410/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/">
- ships with default settings that show no regard for the
- privacy of its users</a>, giving Microsoft the
“right”</strong></del></span>
+ <span class="removed"><del><strong><li><p></strong></del></span>
<span class="inserted"><ins><em><li id="M201508180">
<p><a
href="https://web.archive.org/web/20150905163414/http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping">
- Intel devices will be able</em></ins></span> to <span
class="removed"><del><strong>snoop on</strong></del></span> <span
class="inserted"><ins><em>listen for speech all</em></ins></span> the <span
class="removed"><del><strong>users' files,</strong></del></span> <span
class="inserted"><ins><em>time, even
+ Intel devices will be able to listen for speech all the time, even
when “off.”</a></p>
</li>
<li id="M201508130">
<p><a
-
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/">
- Windows 10 sends identifiable information to Microsoft</a>, even if
+
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/"></em></ins></span>
+ Windows 10 <span class="inserted"><ins><em>sends identifiable information
to Microsoft</a>, even if
a user turns off its Bing search and Cortana features, and activates
the privacy-protection settings.</p>
</li>
<li id="M201507300">
- <p>Windows 10 <a
-
href="https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/">
+ <p>Windows 10</em></ins></span> <a <span
class="removed"><del><strong>href="https://web.archive.org/web/20151001035410/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/"></em></ins></span>
ships with default settings that show no regard for the privacy of
its users</a>, giving Microsoft the “right” to snoop on
- the users' files,</em></ins></span> text input, voice input, location
info, contacts,
+ the users' files, text input, voice input, location info, contacts,
calendar records and web browsing history, as well as automatically
connecting the machines to open hotspots and showing targeted <span
class="removed"><del><strong>ads.</p></li>
@@ -498,7 +507,8 @@
<p><a <span
class="removed"><del><strong>href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
Lenovo stealthily installed crapware and spyware via
- BIOS</a> on Windows installs. Note</em></ins></span> that <span
class="removed"><del><strong>90%</strong></del></span> <span
class="inserted"><ins><em>the specific
+ BIOS</a> on Windows installs. Note</em></ins></span> that <span
class="removed"><del><strong>90% of the top-ranked gratis
+ proprietary Android apps contained recognizable tracking libraries.
For</strong></del></span> the <span class="removed"><del><strong>paid
proprietary apps, it was only 60%.</p></strong></del></span> <span
class="inserted"><ins><em>specific
sabotage method Lenovo used did not affect GNU/Linux; also, a
“clean” Windows install is not really clean since <a
href="/proprietary/malware-microsoft.html">Microsoft puts in its
@@ -521,8 +531,9 @@
<ul class="blurbs">
<!-- INSERT phones -->
- <li id="M201601110">
- <p>The natural extension of monitoring
+ <li id="M201601110"></em></ins></span>
+ <p>The <span class="removed"><del><strong>article confusingly
describes gratis apps as “free”,
+ but most</strong></del></span> <span class="inserted"><ins><em>natural
extension</em></ins></span> of <span class="inserted"><ins><em>monitoring
people through “their” phones is <a
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
proprietary software to make sure they can't “fool”
@@ -532,8 +543,8 @@
<li id="M201510050">
<p>According to Edward Snowden, <a
href="http://www.bbc.com/news/uk-34444233">agencies can take over
- smartphones</a> by sending hidden text messages which enable
- them to turn the phones on and off, listen to the microphone,
+ smartphones</a> by sending hidden text messages which
enable</em></ins></span>
+ them <span class="removed"><del><strong>are not</strong></del></span>
<span class="inserted"><ins><em>to turn the phones on and off, listen to the
microphone,
retrieve geo-location data from the GPS, take photographs, read
text messages, read call, location and web browsing history, and
read the contact list. This malware is designed to disguise itself
@@ -543,10 +554,13 @@
<li id="M201311120">
<p><a
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
- The NSA can tap data in smart phones, including iPhones,
+ The NSA can tap data</em></ins></span> in <span
class="removed"><del><strong>fact
+ <a href="/philosophy/free-sw.html">free software</a>.
+ It also uses</strong></del></span> <span class="inserted"><ins><em>smart
phones, including iPhones,
Android, and BlackBerry</a>. While there is not much
- detail here, it seems that this does not operate via
- the universal back door that we know nearly all portable
+ detail here, it seems that this does not operate via</em></ins></span>
+ the <span class="removed"><del><strong>ugly word “monetize”. A
good replacement
+ for</strong></del></span> <span class="inserted"><ins><em>universal back
door</em></ins></span> that <span class="removed"><del><strong>word is
“exploit”;</strong></del></span> <span class="inserted"><ins><em>we
know</em></ins></span> nearly <span class="removed"><del><strong>always
that</strong></del></span> <span class="inserted"><ins><em>all portable
phones have. It may involve exploiting various bugs. There are <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
lots of bugs in the phones' radio software</a>.</p>
@@ -554,12 +568,16 @@
<li id="M201307000">
<p>Portable phones with GPS <a
-
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
- will send their GPS location on remote command, and users cannot stop
+
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"></em></ins></span>
+ will <span class="removed"><del><strong>fit
+ perfectly.</p></strong></del></span> <span
class="inserted"><ins><em>send their GPS location on remote command, and users
cannot stop
them</a>. (The US says it will eventually require all new portable
phones
- to have GPS.)</p>
+ to have GPS.)</p></em></ins></span>
</li>
-</ul>
+
+<span class="removed"><del><strong><li>
+ <p>Apps</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
@@ -581,36 +599,29 @@
“turning off” WiFi and Bluetooth the obvious way <a
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
doesn't really turn them off</a>. A more advanced way really does
turn
- them off—only until 5am. That's Apple for you—“We
+ them off—only until 5am. That's Apple</em></ins></span> for <span
class="removed"><del><strong>BART</strong></del></span> <span
class="inserted"><ins><em>you—“We
know you want to be spied on”.</p>
</li>
<li id="M201702150">
- <p>Apple proposes <a
-
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
+ <p>Apple proposes</em></ins></span> <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>—which would mean no way
to use it without having your fingerprints taken. Users would have
- no way to tell whether the phone is snooping on them.</p>
+ no way to tell whether the phone is snooping</em></ins></span> on <span
class="removed"><del><strong>users</a>.</p>
+ <p>With free software apps, users could <em>make sure</em>
that</strong></del></span> <span class="inserted"><ins><em>them.</p>
</li>
<li id="M201611170">
<p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
- lots</em></ins></span> of <span class="inserted"><ins><em>personal data to
Apple's servers</a>. Big Brother can get
+ lots of personal data to Apple's servers</a>. Big Brother can get
them from there.</p>
</li>
- <li id="M201609280">
- <p>The iMessage app on iThings <a
-
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every phone number that</em></ins></span> the <span
class="removed"><del><strong>top-ranked gratis
- proprietary Android apps contained recognizable tracking libraries.
For</strong></del></span> <span class="inserted"><ins><em>user types into
it</a>;</em></ins></span> the <span class="removed"><del><strong>paid
proprietary apps,</strong></del></span>
- <span class="inserted"><ins><em>server records these numbers for at least
30 days.</p>
- </li>
-
<li id="M201509240">
<p>iThings automatically upload to Apple's servers all the photos
- and videos they make.</p>
+ and videos</em></ins></span> they <span
class="inserted"><ins><em>make.</p>
<blockquote><p> iCloud Photo Library stores every photo and
video you
take, and keeps them up to date on all your devices. Any edits you
@@ -619,105 +630,99 @@
<p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
information</a> as accessed on 24 Sep 2015.) The iCloud feature is
<a href="https://support.apple.com/en-us/HT202033">activated by the
- startup of iOS</a>. The term “cloud” means “please
- don't ask where.”</p>
+ startup of iOS</a>. The term “cloud” means
“please</em></ins></span>
+ don't <span class="removed"><del><strong>snoop.</p>
+ <p>With proprietary apps, one</strong></del></span> <span
class="inserted"><ins><em>ask where.”</p>
<p>There is a way to
<a href="https://support.apple.com/en-us/HT201104"> deactivate
- iCloud</a>, but it's active by default so</em></ins></span> it <span
class="removed"><del><strong>was only 60%.</p>
-
- <p>The article confusingly describes gratis apps</strong></del></span>
<span class="inserted"><ins><em>still counts</em></ins></span> as <span
class="removed"><del><strong>“free”,</strong></del></span> <span
class="inserted"><ins><em>a
+ iCloud</a>, but it's active by default so it still counts as a
surveillance functionality.</p>
<p>Unknown people apparently took advantage of this to <a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
nude photos of many celebrities</a>. They needed to break Apple's
- security to get at them,</em></ins></span> but <span
class="removed"><del><strong>most</strong></del></span> <span
class="inserted"><ins><em>NSA can access any</em></ins></span> of them <span
class="removed"><del><strong>are not in fact</strong></del></span> <span
class="inserted"><ins><em>through</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-sw.html">free
software</a>.
- It also uses</strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p>
+ security to get at them, but NSA</em></ins></span> can <span
class="removed"><del><strong>only hope that they
don't.</p></strong></del></span> <span class="inserted"><ins><em>access
any of them through <a
+
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p></em></ins></span>
</li>
- <li id="M201409220">
- <p>Apple can, and regularly does, <a
-
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for</em></ins></span> the <span
class="removed"><del><strong>ugly word “monetize”. A good
replacement</strong></del></span> <span
class="inserted"><ins><em>state</a>.</p>
+<span class="removed"><del><strong><li>
+ <p>A study found 234 Android apps that track users
by</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201409220">
+ <p>Apple can, and regularly does,</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
+ to ultrasound</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data</em></ins></span> from <span
class="removed"><del><strong>beacons placed in stores or played by TV
programs</a>.
+ </p></strong></del></span> <span
class="inserted"><ins><em>iPhones for the state</a>.</p>
<p>This may have improved with <a
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
iOS 8 security improvements</a>; but <a
href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
- not as much as Apple claims</a>.</p>
+ not as much as Apple claims</a>.</p></em></ins></span>
</li>
- <li id="M201407230">
+<span class="removed"><del><strong><li>
+ <p>Pairs</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201407230">
<p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem to exist</em></ins></span>
- for <span class="removed"><del><strong>that word</strong></del></span>
<span class="inserted"><ins><em>no possible purpose other than
surveillance</a>. Here</em></ins></span> is <span
class="removed"><del><strong>“exploit”; nearly always that will fit
- perfectly.</p></strong></del></span> <span
class="inserted"><ins><em>the <a
-
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Several “features”</em></ins></span> of <span
class="removed"><del><strong>Android apps can collude to transmit users'
personal
+ data</strong></del></span> <span class="inserted"><ins><em>iOS
seem</em></ins></span> to <span
class="removed"><del><strong>servers.</strong></del></span> <span
class="inserted"><ins><em>exist
+ for no possible purpose other than surveillance</a>. Here is
the</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
+ tens of thousands of pairs that
collude</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
Technical presentation</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
- <p>Apps for BART</strong></del></span>
+<p>Google Play intentionally sends app developers</strong></del></span>
<span class="inserted"><ins><em><li id="M201401100">
- <p>The</em></ins></span> <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop</strong></del></span>
<span class="inserted"><ins><em>class="not-a-duplicate"
+ <p>The</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
<span class="inserted"><ins><em>class="not-a-duplicate"
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly where the iThing is, and
+ iBeacon</a> lets stores determine exactly where</em></ins></span>
the <span class="removed"><del><strong>personal details of users that
install</strong></del></span> <span class="inserted"><ins><em>iThing is, and
get other info too.</p>
</li>
<li id="M201312300">
<p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps the NSA snoop</em></ins></span> on <span
class="removed"><del><strong>users</a>.</p>
- <p>With free software apps, users could <em>make
sure</em></strong></del></span> <span class="inserted"><ins><em>all the
data in an iThing, or it
- is totally incompetent</a>.</p>
+ Either Apple helps</em></ins></span> the <span
class="removed"><del><strong>app</a>.</p>
+
+<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>NSA snoop on all</em></ins></span> the <span
class="removed"><del><strong>“consent” of
users</strong></del></span> <span class="inserted"><ins><em>data in an iThing,
or it</em></ins></span>
+ is <span class="removed"><del><strong>not enough
+to legitimize actions like this. At this point, most users have
+stopped reading the “Terms and Conditions”</strong></del></span>
<span class="inserted"><ins><em>totally incompetent</a>.</p>
</li>
<li id="M201308080">
<p>The iThing also <a
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells Apple its geolocation</a> by default, though</em></ins></span>
that <span class="removed"><del><strong>they don't snoop.</p>
- <p>With proprietary apps, one</strong></del></span> can <span
class="removed"><del><strong>only hope that they
don't.</p></strong></del></span> <span class="inserted"><ins><em>be
- turned off.</p></em></ins></span>
+ tells Apple its geolocation</a> by default, though</em></ins></span>
that <span class="removed"><del><strong>spell out
+what they are “consenting” to. Google should
clearly</strong></del></span> <span class="inserted"><ins><em>can be
+ turned off.</p>
</li>
-<span class="removed"><del><strong><li>
- <p>A study found 234 Android apps that</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201210170">
- <p>There is also a feature for web sites to</em></ins></span> track
<span class="removed"><del><strong>users by</strong></del></span> <span
class="inserted"><ins><em>users, which is</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed in stores or
played</strong></del></span>
- <span
class="inserted"><ins><em>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled</em></ins></span> by <span class="removed"><del><strong>TV
programs</a>.
- </p></strong></del></span> <span
class="inserted"><ins><em>default</a>. (That article talks about iOS 6,
but it is
- still true in iOS 7.)</p></em></ins></span>
+ <li id="M201210170">
+ <p>There is also a feature for web sites to track users, which is
<a
+
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ enabled by default</a>. (That article talks about iOS 6, but it is
+ still true in iOS 7.)</p>
</li>
-<span class="removed"><del><strong><li>
- <p>Pairs of Android apps can collude to transmit users' personal
- data</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201204280">
+ <li id="M201204280">
<p>Users cannot make an Apple ID (<a
-
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">
- necessary</em></ins></span> to <span class="removed"><del><strong>servers.
<a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
- tens of thousands of pairs that collude</a>.</p>
-</li>
+
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">necessary
+ to install even gratis apps</a>) without giving a valid
+ email address</em></ins></span> and <span
class="removed"><del><strong>honestly identify</strong></del></span> <span
class="inserted"><ins><em>receiving</em></ins></span> the <span
class="removed"><del><strong>information it collects on users, instead
+of hiding it in an obscurely worded EULA.</p>
-<li>
-<p>Google Play intentionally sends app developers <a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
-the personal details of users that</strong></del></span> install <span
class="inserted"><ins><em>even gratis apps</a>) without giving a valid
- email address and receiving</em></ins></span> the <span
class="removed"><del><strong>app</a>.</p>
-
-<p>Merely asking the “consent” of users is not
enough</strong></del></span> <span class="inserted"><ins><em>verification code
Apple sends</em></ins></span>
- to <span class="removed"><del><strong>legitimize actions like this. At
this point, most users have
-stopped reading the “Terms and Conditions” that spell out
-what they are “consenting” to.</strong></del></span> <span
class="inserted"><ins><em>it.</p>
+<p>However,</strong></del></span> <span
class="inserted"><ins><em>verification code Apple sends</em></ins></span>
+ to <span class="removed"><del><strong>truly protect people's privacy, we
must prevent</strong></del></span> <span class="inserted"><ins><em>it.</p>
</li>
</ul>
@@ -730,21 +735,18 @@
<ul class="blurbs">
<!-- INSERT android -->
<li id="M201711210">
- <p>Android tracks location for</em></ins></span> Google <span
class="removed"><del><strong>should clearly
-and honestly identify</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>Android tracks location for</em></ins></span> Google
+<span class="removed"><del><strong>and other companies from getting this
personal information in</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
even when “location services” are turned off, even
when</em></ins></span>
- the <span class="removed"><del><strong>information it collects on users,
instead</strong></del></span> <span class="inserted"><ins><em>phone has no SIM
card</a>.</p>
+ the <span class="removed"><del><strong>first
+place!</p></strong></del></span> <span class="inserted"><ins><em>phone
has no SIM card</a>.</p>
</li>
<li id="M201611150">
<p>Some portable phones <a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots</em></ins></span> of <span
class="removed"><del><strong>hiding it in an obscurely worded EULA.</p>
-
-<p>However,</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> to <span
class="removed"><del><strong>truly protect people's privacy, we must prevent
Google
-and other companies from getting this personal information in the first
-place!</p></strong></del></span> <span
class="inserted"><ins><em>China</a>.</p></em></ins></span>
+ sold with spyware sending lots of data to
China</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li></strong></del></span>
@@ -767,50 +769,51 @@
<p>Samsung phones come with</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
behavioral</strong></del></span>
<span
class="inserted"><ins><em>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
- that users can't delete</a>,</em></ins></span> and <span
class="removed"><del><strong>location information</a>
of</strong></del></span> <span class="inserted"><ins><em>they send so much data
that</em></ins></span> their <span class="removed"><del><strong>users with
third parties.</p></strong></del></span>
- <span class="inserted"><ins><em>transmission is a substantial expense for
users. Said transmission,
- not wanted or requested by the user, clearly must constitute spying
- of some kind.</p></em></ins></span>
+ that users can't delete</a>,</em></ins></span> and <span
class="removed"><del><strong>location information</a>
of</strong></del></span> <span class="inserted"><ins><em>they send so much data
that</em></ins></span> their <span class="removed"><del><strong>users with
third parties.</p>
</li>
- <span class="removed"><del><strong><li><p>“Cryptic
communication,” unrelated</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201403120">
- <p><a href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access</em></ins></span> to <span
class="inserted"><ins><em>any file on</em></ins></span> the <span
class="removed"><del><strong>app's functionality,
+ <li><p>“Cryptic communication,” unrelated to the
app's functionality,
was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found</strong></del></span> <span class="inserted"><ins><em>system.</p>
- </li>
-
- <li id="M201308010">
- <p>Spyware</em></ins></span> in <span
class="removed"><del><strong>the 500 most popular gratis</strong></del></span>
Android <span class="removed"><del><strong>apps</a>.</p>
+ found in the 500 most popular gratis Android apps</a>.</p>
<p>The article should not have described these apps as
- “free”—they are not free software.</strong></del></span>
<span class="inserted"><ins><em>phones (and Windows?
laptops):</em></ins></span> The <span class="removed"><del><strong>clear way to
say
- “zero price” is “gratis.”</p>
+ “free”—they are not free software. The clear way to say
+ “zero price”</strong></del></span>
+ <span class="inserted"><ins><em>transmission</em></ins></span> is <span
class="removed"><del><strong>“gratis.”</p>
- <p>The</strong></del></span> <span class="inserted"><ins><em>Wall
Street
- Journal (in an</em></ins></span> article <span
class="removed"><del><strong>takes for granted</strong></del></span> <span
class="inserted"><ins><em>blocked from us by a paywall)
reports</em></ins></span> that <span class="inserted"><ins><em><a
-
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"></em></ins></span>
- the <span class="removed"><del><strong>usual analytics tools are
- legitimate, but is that valid? Software developers have no right to
- analyze what users are doing or how. “Analytics” tools that
snoop are
- just as wrong as any other snooping.</p>
+ <p>The article takes</strong></del></span> <span
class="inserted"><ins><em>a substantial expense</em></ins></span> for <span
class="removed"><del><strong>granted that</strong></del></span> <span
class="inserted"><ins><em>users. Said transmission,
+ not wanted or requested by</em></ins></span> the <span
class="removed"><del><strong>usual analytics tools are
+ legitimate, but is that valid? Software developers have no
right</strong></del></span> <span class="inserted"><ins><em>user, clearly must
constitute spying
+ of some kind.</p>
</li>
- <li><p>Gratis</strong></del></span> <span
class="inserted"><ins><em>FBI can remotely activate the GPS and microphone
in</em></ins></span> Android <span class="removed"><del><strong>apps (but not
<a href="/philosophy/free-sw.html">free software</a>)
- connect to 100
- <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
<span class="inserted"><ins><em>phones</em></ins></span>
- and <span class="removed"><del><strong>advertising</a> URLs,
- on the average.</p></strong></del></span> <span
class="inserted"><ins><em>laptops</a>. (I suspect this means Windows
laptops.) Here is <a
+
+ <li id="M201403120">
+ <p><a href="/proprietary/proprietary-back-doors.html#samsung">
+ Samsung's back door</a> provides access</em></ins></span> to
+ <span class="removed"><del><strong>analyze what users are doing or how.
“Analytics” tools that snoop are
+ just as wrong as</strong></del></span> any <span
class="removed"><del><strong>other snooping.</p></strong></del></span>
<span class="inserted"><ins><em>file on the system.</p></em></ins></span>
+ </li>
+ <span
class="removed"><del><strong><li><p>Gratis</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201308010">
+ <p>Spyware in</em></ins></span> Android <span
class="removed"><del><strong>apps (but not <a
href="/philosophy/free-sw.html">free software</a>)
+ connect to 100</strong></del></span> <span
class="inserted"><ins><em>phones (and Windows? laptops): The Wall Street
+ Journal (in an article blocked from us by a paywall) reports
that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
and advertising</a> URLs,
+ on</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"></em></ins></span>
+ the <span
class="removed"><del><strong>average.</p></strong></del></span> <span
class="inserted"><ins><em>FBI can remotely activate the GPS and microphone in
Android phones
+ and laptops</a>. (I suspect this means Windows laptops.) Here is
<a
href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p></em></ins></span>
</li>
<span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
<span class="inserted"><ins><em><li id="M201307280">
- <p>Spyware</em></ins></span> is present in some Android devices when
- they are sold. Some Motorola phones modify Android to <a
+ <p>Spyware</em></ins></span> is present in some Android devices when
they are
+ sold. Some Motorola <span class="removed"><del><strong>phones
modify</strong></del></span> <span class="inserted"><ins><em>phones, made when
this company was owned
+ by Google, use a modified version of</em></ins></span> Android <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>that</em></ins></span> <a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- send personal data to Motorola</a>.</p>
+ <span class="removed"><del><strong>send</strong></del></span>
+ <span class="inserted"><ins><em>sends</em></ins></span> personal data to
Motorola</a>.</p>
</li>
<span
class="removed"><del><strong><li><p>Some</strong></del></span>
@@ -850,63 +853,32 @@
</ul>
-
-<span class="removed"><del><strong><!-- #SpywareOnMobiles -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
-
-<div class="big-section">
- <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
-</div>
-<div style="clear: left;"></div></strong></del></span>
-
-
-<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareIniThings">Spyware
in iThings</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInElectronicReaders">E-Readers</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareIniThings">#SpywareIniThings</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></em></ins></span>
+<span class="inserted"><ins><em><div class="big-subsection">
+ <h4 id="SpywareInElectronicReaders">E-Readers</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li><p>Apple proposes</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT e-readers -->
- <li id="M201603080">
- <p>E-books can contain JavaScript code, and</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
- — which would mean no way to use it without having your
fingerprints
- taken. Users would have no way to tell whether the phone is
snooping</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
- sometimes this code snoops</em></ins></span> on
- <span class="removed"><del><strong>them.</p></li>
-
- <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
- lots of personal data to Apple's servers</a>. Big Brother can
- get them from there.</p></strong></del></span> <span
class="inserted"><ins><em>readers</a>.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>The iMessage app on
iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every phone number that the user types into
it</a>;</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201410080">
- <p>Adobe made “Digital Editions,”</em></ins></span>
- the <span class="removed"><del><strong>server records these numbers for at
least 30
- days.</p>
+<ul class="blurbs"></em></ins></span>
+<!-- <span
class="removed"><del><strong>#SpywareOnMobiles</strong></del></span> <span
class="inserted"><ins><em>INSERT e-readers</em></ins></span> -->
+<span class="removed"><del><strong><!-- WEBMASTERS: make sure to place new
items</strong></del></span>
+ <span class="inserted"><ins><em><li id="M201603080">
+ <p>E-books can contain JavaScript code, and <a
+
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
+ sometimes this code snoops</em></ins></span> on <span
class="removed"><del><strong>top under each subsection
--></strong></del></span> <span
class="inserted"><ins><em>readers</a>.</p>
+ </li>
+
+ <li id="M201410080">
+ <p>Adobe made “Digital Editions,”
+ the e-reader used by most US libraries, <a
+
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data to Adobe</a>. Adobe's “excuse”: it's
+ needed to check DRM!</p>
</li>
- <li><p>Users cannot make an Apple ID</strong></del></span> <span
class="inserted"><ins><em>e-reader used by most US libraries,</em></ins></span>
<a <span
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of data</em></ins></span> to <span
class="removed"><del><strong>install even gratis apps)</a>
- without giving a valid email address and receiving the code Apple
- sends</strong></del></span> <span
class="inserted"><ins><em>Adobe</a>. Adobe's “excuse”: it's
- needed</em></ins></span> to <span
class="removed"><del><strong>it.</p></strong></del></span> <span
class="inserted"><ins><em>check DRM!</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Around
47%</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201212031">
+ <li id="M201212031">
<p>The Electronic Frontier Foundation has examined and found <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">various
- kinds</em></ins></span> of <span class="inserted"><ins><em>surveillance
in</em></ins></span> the <span class="removed"><del><strong>most popular
iOS</strong></del></span> <span class="inserted"><ins><em>Swindle and other
e-readers</a>.</p>
+ kinds of surveillance in the Swindle and other
e-readers</a>.</p>
</li>
<li id="M201212030">
@@ -914,241 +886,263 @@
href="https://www.eff.org/pages/reader-privacy-chart-2012"> they
report even which page the user reads at what time</a>.</p>
</li>
-</ul>
+</ul></em></ins></span>
<div class="big-section">
- <h3 id="SpywareInApplications">Spyware in Applications</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareInApplications">#SpywareInApplications</a>)</span>
+ <h3 <span class="removed"><del><strong>id="SpywareOnMobiles">Spyware
on Mobiles</h3></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInApplications">Spyware in
Applications</h3></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInApplications">#SpywareInApplications</a>)</span></em></ins></span>
</div>
<div style="clear: left;"></div>
<div class="big-subsection">
- <h4 id="SpywareInMobileApps">Mobile Apps</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareIniThings">Spyware
in iThings</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInMobileApps">Mobile
Apps</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareIniThings">#SpywareIniThings</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li><p>Apple proposes</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<!-- INSERT apps -->
<li id="M201808030">
- <p>Some Google</em></ins></span> apps <span
class="inserted"><ins><em>on Android</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
- href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral and</strong></del></span>
+ <p>Some Google apps on Android</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
+ — which would mean no way to use it without having your
fingerprints
+ taken. Users would have no way</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
- record the user's</em></ins></span> location <span
class="removed"><del><strong>information</a></strong></del></span> <span
class="inserted"><ins><em>even when users disable “location
+ record the user's location even when users disable “location
tracking”</a>.</p>
- <p>There are other ways to turn off the other
kinds</em></ins></span> of <span
class="removed"><del><strong>their</strong></del></span> <span
class="inserted"><ins><em>location
- tracking, but most</em></ins></span> users <span
class="removed"><del><strong>with third
parties.</p></strong></del></span> <span class="inserted"><ins><em>will
be tricked by the misleading control.</p></em></ins></span>
+ <p>There are other ways</em></ins></span> to <span
class="removed"><del><strong>tell whether</strong></del></span> <span
class="inserted"><ins><em>turn off</em></ins></span> the <span
class="removed"><del><strong>phone is snooping on
+ them.</p></li>
+
+ <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
+ lots</strong></del></span> <span class="inserted"><ins><em>other
kinds</em></ins></span> of <span class="removed"><del><strong>personal data to
Apple's servers</a>. Big Brother can
+ get them from there.</p></strong></del></span> <span
class="inserted"><ins><em>location
+ tracking, but most users will be tricked by the misleading
control.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>iThings automatically
upload to Apple's servers all</strong></del></span>
+ <span class="removed"><del><strong><li><p>The
iMessage</strong></del></span>
<span class="inserted"><ins><em><li id="M201806110">
- <p>The Spanish football streaming app <a
-
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks</em></ins></span>
- the <span class="removed"><del><strong>photos and
+ <p>The Spanish football streaming</em></ins></span> app <span
class="removed"><del><strong>on iThings</strong></del></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every phone number that</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks</em></ins></span>
+ the <span class="removed"><del><strong>user types into
it</a>;</strong></del></span> <span class="inserted"><ins><em>user's
movements and listens through</em></ins></span> the <span
class="removed"><del><strong>server records these numbers</strong></del></span>
<span class="inserted"><ins><em>microphone</a>.</p>
+
+ <p>This makes them act as spies</em></ins></span> for <span
class="removed"><del><strong>at least 30
+ days.</p>
+ </li>
+
+ <li><p>Users cannot make an Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary</strong></del></span>
<span class="inserted"><ins><em>licensing enforcement.</p>
+
+ <p>I expect it implements DRM, too—that there is no
way</em></ins></span> to <span class="removed"><del><strong>install even gratis
apps)</a>
+ without giving</strong></del></span> <span
class="inserted"><ins><em>save</em></ins></span>
+ a <span class="removed"><del><strong>valid email address and receiving the
code Apple
+ sends to it.</p>
+ </li>
+
+ <li><p>Around 47% of the most popular iOS apps
+ <a class="not-a-duplicate"
+ href="http://jots.pub/a/2015103001/index.php">share personal,
+ behavioral and location information</a> of their users with third
parties.</p>
+ </li>
+
+ <li><p>iThings automatically upload to Apple's servers
all</strong></del></span> <span class="inserted"><ins><em>recording. But I
can't be sure from</em></ins></span> the <span
class="removed"><del><strong>photos and
videos they make.</p>
<blockquote><p>
- iCloud Photo Library stores every photo and video you
take,</strong></del></span> <span class="inserted"><ins><em>user's
movements</em></ins></span> and <span
class="removed"><del><strong>keeps</strong></del></span> <span
class="inserted"><ins><em>listens through the microphone</a>.</p>
+ iCloud Photo Library stores every photo and video</strong></del></span>
<span class="inserted"><ins><em>article.</p>
- <p>This makes</em></ins></span> them <span
class="removed"><del><strong>up to date on all your devices.
- Any edits you make are automatically updated everywhere. [...]
+ <p>If</em></ins></span> you <span class="removed"><del><strong>take,
+ and keeps them up</strong></del></span> <span
class="inserted"><ins><em>learn</em></ins></span> to <span
class="removed"><del><strong>date on all your devices.
+ Any edits</strong></del></span> <span class="inserted"><ins><em>care
much less about sports,</em></ins></span> you <span
class="removed"><del><strong>make are automatically updated everywhere. [...]
</p></blockquote>
<p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
- information</a></strong></del></span> <span
class="inserted"><ins><em>act</em></ins></span> as <span
class="removed"><del><strong>accessed on 24 Sep 2015.) The iCloud feature is
+ information</a> as accessed on 24 Sep 2015.) The iCloud feature is
<a href="https://support.apple.com/en-us/HT202033">activated by the
startup of iOS</a>. The term “cloud” means
“please don't ask where.”</p>
- <p>There</strong></del></span> <span class="inserted"><ins><em>spies
for licensing enforcement.</p>
-
- <p>I expect it implements DRM, too—that
there</em></ins></span> is <span
class="removed"><del><strong>a</strong></del></span> <span
class="inserted"><ins><em>no</em></ins></span> way to <span
class="removed"><del><strong><a
href="https://support.apple.com/en-us/HT201104">
- deactivate iCloud</a>, but it's active by default so it still
counts as</strong></del></span> <span
class="inserted"><ins><em>save</em></ins></span>
- a
- <span class="removed"><del><strong>surveillance functionality.</p>
-
- <p>Unknown people apparently took advantage of
this</strong></del></span> <span class="inserted"><ins><em>recording. But I
can't be sure from the article.</p>
-
- <p>If you learn</em></ins></span> to <span
class="inserted"><ins><em>care much less about sports, you will benefit in
- many ways. This is one more.</p>
+ <p>There</strong></del></span> <span class="inserted"><ins><em>will
benefit in
+ many ways. This</em></ins></span> is <span class="removed"><del><strong>a
way to</strong></del></span> <span class="inserted"><ins><em>one more.</p>
</li>
<li id="M201804160">
- <p>More than</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos</strong></del></span>
+ <p>More than</em></ins></span> <a <span
class="removed"><del><strong>href="https://support.apple.com/en-us/HT201104">
+ deactivate iCloud</a>, but it's active by default so it still
counts as a
+ surveillance functionality.</p>
+
+ <p>Unknown people apparently took advantage</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%</em></ins></span>
- of <span class="removed"><del><strong>many celebrities</a>. They
needed</strong></del></span> <span class="inserted"><ins><em>the 5,855 Android
apps studied by researchers were found</em></ins></span> to <span
class="removed"><del><strong>break Apple's
- security</strong></del></span> <span class="inserted"><ins><em>snoop
- and collect information about its users</a>. 40% of the apps were
- found</em></ins></span> to <span class="removed"><del><strong>get at them,
but NSA can access any</strong></del></span> <span
class="inserted"><ins><em>insecurely snitch on its users. Furthermore, they
could
- detect only some methods</em></ins></span> of <span
class="removed"><del><strong>them through
- <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
+ of <span class="removed"><del><strong>this</strong></del></span> <span
class="inserted"><ins><em>the 5,855 Android apps studied by researchers were
found</em></ins></span> to
+ <span class="removed"><del><strong><a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ nude photos</strong></del></span> <span class="inserted"><ins><em>snoop
+ and collect information about its users</a>. 40%</em></ins></span>
of <span class="removed"><del><strong>many celebrities</a>. They
needed</strong></del></span> <span class="inserted"><ins><em>the apps were
+ found</em></ins></span> to <span class="removed"><del><strong>break Apple's
+ security</strong></del></span> <span
class="inserted"><ins><em>insecurely snitch on its users. Furthermore, they
could
+ detect only some methods of snooping, in these proprietary apps whose
+ source code they cannot look at. The other apps might be snooping
+ in other ways.</p>
+
+ <p>This is evidence that proprietary apps generally work against
+ their users. To protect their privacy and freedom, Android users
+ need</em></ins></span> to get <span class="removed"><del><strong>at them,
but NSA can access any</strong></del></span> <span
class="inserted"><ins><em>rid</em></ins></span> of <span
class="removed"><del><strong>them through</strong></del></span> <span
class="inserted"><ins><em>the proprietary software—both proprietary
+ Android by</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
</p></li>
- <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>snooping,</em></ins></span> in <span
class="removed"><del><strong>iThings:
- the <a class="not-a-duplicate"
+ <li><p>Spyware in iThings:</strong></del></span> <span
class="inserted"><ins><em>href="https://replicant.us">switching to
Replicant</a>,
+ and the proprietary apps by getting apps from</em></ins></span> the <span
class="inserted"><ins><em>free software
+ only</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly where the iThing is,
- and get</strong></del></span> <span class="inserted"><ins><em>these
proprietary apps whose
- source code they cannot look at. The</em></ins></span> other <span
class="removed"><del><strong>info too.</p>
+ iBeacon</a> lets stores determine exactly
where</strong></del></span> <span
class="inserted"><ins><em>href="https://f-droid.org/">F-Droid
store</a> that <a
+ href="https://f-droid.org/wiki/page/Antifeatures"> prominently
warns</em></ins></span>
+ the <span class="removed"><del><strong>iThing is,
+ and get other info too.</p></strong></del></span> <span
class="inserted"><ins><em>user if an app contains
anti-features</a>.</p></em></ins></span>
</li>
- <li><p>There</strong></del></span> <span
class="inserted"><ins><em>apps might be snooping
- in other ways.</p>
+ <span class="removed"><del><strong><li><p>There is also a
feature for web sites to track users, which is</strong></del></span>
- <p>This</em></ins></span> is <span class="removed"><del><strong>also
a feature for web sites</strong></del></span> <span
class="inserted"><ins><em>evidence that proprietary apps generally work against
- their users. To protect their privacy and freedom, Android users
- need</em></ins></span> to <span class="removed"><del><strong>track users,
which is
- <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled</strong></del></span> <span class="inserted"><ins><em>get rid of
the proprietary software—both proprietary
- Android</em></ins></span> by <span
class="removed"><del><strong>default</a>. (That article talks about iOS
6, but it
- is still true in iOS 7.)</p>
+ <span class="inserted"><ins><em><li id="M201804020">
+ <p>Grindr collects information about</em></ins></span> <a <span
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ enabled by default</a>. (That article talks</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
+ which users are HIV-positive, then provides the information to
+ companies</a>.</p>
+
+ <p>Grindr should not have so much information</em></ins></span>
about <span class="removed"><del><strong>iOS 6,</strong></del></span> <span
class="inserted"><ins><em>its users.
+ It could be designed so that users communicate such info to each
+ other</em></ins></span> but <span class="removed"><del><strong>it
+ is still true in iOS 7.)</p></strong></del></span> <span
class="inserted"><ins><em>not to the server's
database.</p></em></ins></span>
</li>
- <li><p>The iThing also</strong></del></span> <a
+ <span class="removed"><del><strong><li><p>The iThing
also</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201803050">
+ <p>The moviepass app and dis-service
+ spy on users even more than users expected. It</em></ins></span> <a
<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells Apple its geolocation</a> by default, though that can be
- turned off.</p>
- </li>
+ tells Apple its geolocation</a> by default, though that
can</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
+ where they travel before and after going to a movie</a>.</p>
- <li><p>Apple can,</strong></del></span> <span
class="inserted"><ins><em>href="https://replicant.us">switching to
Replicant</a>,</em></ins></span>
- and <span class="removed"><del><strong>regularly does,
- <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for</strong></del></span> the
<span class="removed"><del><strong>state</a>.</p>
+ <p>Don't</em></ins></span> be
+ <span class="removed"><del><strong>turned
off.</p></strong></del></span> <span
class="inserted"><ins><em>tracked—pay cash!</p></em></ins></span>
</li>
- <li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps</strong></del></span> <span
class="inserted"><ins><em>proprietary apps by getting apps
from</em></ins></span> the <span class="removed"><del><strong>NSA snoop on
all</strong></del></span> <span class="inserted"><ins><em>free software
- only <a href="https://f-droid.org/">F-Droid store</a> that
<a
- href="https://f-droid.org/wiki/page/Antifeatures"> prominently
warns</em></ins></span>
- the <span class="removed"><del><strong>data in</strong></del></span> <span
class="inserted"><ins><em>user if</em></ins></span> an <span
class="removed"><del><strong>iThing,
- or it is totally incompetent.</a></p></strong></del></span>
<span class="inserted"><ins><em>app contains
anti-features</a>.</p></em></ins></span>
- </li>
+ <span class="removed"><del><strong><li><p>Apple
can,</strong></del></span>
- <span class="removed"><del><strong><li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem</strong></del></span>
+ <span class="inserted"><ins><em><li id="M201711240">
+ <p>Tracking software in popular Android apps
+ is pervasive</em></ins></span> and <span
class="removed"><del><strong>regularly does,</strong></del></span> <span
class="inserted"><ins><em>sometimes very clever. Some trackers can <a
+
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
+ follow a user's movements around a physical store by noticing WiFi
+ networks</a>.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201804020">
- <p>Grindr collects information about <a
-
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
- which users are HIV-positive, then provides the
information</em></ins></span> to <span class="removed"><del><strong>exist for no
- possible purpose</strong></del></span>
- <span class="inserted"><ins><em>companies</a>.</p>
-
- <p>Grindr should not have so much information about its users.
- It could be designed so that users communicate such info to
each</em></ins></span>
- other <span class="inserted"><ins><em>but not to the server's
database.</p>
+ <li id="M201708270">
+ <p>The Sarahah app</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones for</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+ uploads all phone numbers and email addresses</a> in user's address
+ book to developer's server. Note that this article
misuses</em></ins></span> the <span
class="removed"><del><strong>state</a>.</p></strong></del></span>
<span class="inserted"><ins><em>words
+ “<a href="/philosophy/free-sw.html">free
software</a>”
+ referring to zero price.</p></em></ins></span>
</li>
- <li id="M201803050">
- <p>The moviepass app and dis-service
- spy on users even more</em></ins></span> than <span
class="removed"><del><strong>surveillance</a>.
Here</strong></del></span> <span class="inserted"><ins><em>users expected. It
<a
-
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel before and after going to a movie</a>.</p>
+ <span class="removed"><del><strong><li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
+ Either Apple helps the NSA snoop</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201707270">
+ <p>20 dishonest Android apps recorded <a
+
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
+ calls and sent them and text messages and emails to
snoopers</a>.</p>
- <p>Don't be tracked—pay cash!</p>
+ <p>Google did not intend to make these apps spy;</em></ins></span>
on <span class="removed"><del><strong>all</strong></del></span> the <span
class="removed"><del><strong>data in an iThing,
+ or</strong></del></span> <span
class="inserted"><ins><em>contrary,</em></ins></span> it <span
class="removed"><del><strong>is totally incompetent.</a></p>
</li>
- <li id="M201711240">
- <p>Tracking software in popular Android apps</em></ins></span>
- is <span class="removed"><del><strong>the</strong></del></span> <span
class="inserted"><ins><em>pervasive and sometimes very clever. Some trackers
can</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow a user's movements around a physical store by noticing WiFi
- networks</a>.</p></em></ins></span>
+ <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features” of iOS seem</strong></del></span>
+ <span class="inserted"><ins><em>worked in various ways</em></ins></span>
to <span class="removed"><del><strong>exist</strong></del></span> <span
class="inserted"><ins><em>prevent that, and deleted these apps after
+ discovering what they did. So we cannot blame Google
specifically</em></ins></span>
+ for <span class="removed"><del><strong>no
+ possible purpose</strong></del></span> <span
class="inserted"><ins><em>the snooping of these apps.</p>
+
+ <p>On the</em></ins></span> other <span
class="removed"><del><strong>than surveillance</a>. Here
is</strong></del></span> <span class="inserted"><ins><em>hand, Google
redistributes nonfree Android apps, and
+ therefore shares in the responsibility for</em></ins></span> the <span
class="inserted"><ins><em>injustice of their being
+ nonfree. It also distributes its own nonfree apps, such as Google
Play,</em></ins></span>
+ <a <span
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
+</ul>
<div class="big-subsection">
- <h4 id="SpywareInTelephones">Spyware</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201708270">
- <p>The Sarahah app <a
-
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone numbers and email addresses</a></em></ins></span>
in <span class="removed"><del><strong>Telephones</h4>
+ <h4 id="SpywareInTelephones">Spyware in Telephones</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInTelephones">#SpywareInTelephones</a>)</span>
</div>
<ul>
- <li><p>According</strong></del></span> <span
class="inserted"><ins><em>user's address
- book</em></ins></span> to <span class="removed"><del><strong>Edward
Snowden,</strong></del></span> <span class="inserted"><ins><em>developer's
server. Note that this article misuses the words
- “<a href="/philosophy/free-sw.html">free
software</a>”
- referring to zero price.</p>
- </li>
-
- <li id="M201707270">
- <p>20 dishonest Android apps recorded</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
- by sending hidden</strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
- calls and sent them and</em></ins></span> text messages <span
class="removed"><del><strong>which enable them</strong></del></span> <span
class="inserted"><ins><em>and emails</em></ins></span> to <span
class="removed"><del><strong>turn the phones</strong></del></span> <span
class="inserted"><ins><em>snoopers</a>.</p>
-
- <p>Google did not intend to make these apps spy;</em></ins></span>
on <span class="removed"><del><strong>and off, listen</strong></del></span>
<span class="inserted"><ins><em>the contrary, it
- worked in various ways</em></ins></span> to <span
class="inserted"><ins><em>prevent that, and deleted these apps after
- discovering what they did. So we cannot blame Google specifically
- for</em></ins></span> the <span class="removed"><del><strong>microphone,
retrieve geo-location data from</strong></del></span> <span
class="inserted"><ins><em>snooping of these apps.</p>
-
- <p>On</em></ins></span> the
- <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call, location and web
- browsing history,</strong></del></span> <span
class="inserted"><ins><em>other hand, Google redistributes nonfree Android
apps,</em></ins></span> and <span
class="removed"><del><strong>read</strong></del></span>
- <span class="inserted"><ins><em>therefore shares in</em></ins></span> the
<span class="removed"><del><strong>contact list. This
malware</strong></del></span> <span class="inserted"><ins><em>responsibility
for the injustice of their being
- nonfree. It also distributes its own nonfree apps, such as Google Play,
- <a href="/philosophy/free-software-even-more-important.html">which
+ <li><p>According</strong></del></span> <span
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html">which
are malicious</a>.</p>
<p>Could Google have done a better job of preventing apps from
- cheating? There</em></ins></span> is <span
class="removed"><del><strong>designed</strong></del></span> <span
class="inserted"><ins><em>no systematic way for Google, or Android
users,</em></ins></span>
- to
- <span class="removed"><del><strong>disguise itself from
investigation.</p>
- </li>
-
- <li><p>Samsung phones come with
- <a
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>,</strong></del></span> <span
class="inserted"><ins><em>inspect executable proprietary apps to see what they
do.</p>
-
- <p>Google could demand the source code for these
apps,</em></ins></span> and <span class="inserted"><ins><em>study
- the source code somehow to determine whether</em></ins></span> they <span
class="removed"><del><strong>send so much data that their transmission
is</strong></del></span> <span class="inserted"><ins><em>mistreat users in
- various ways. If it did</em></ins></span> a
- <span class="removed"><del><strong>substantial expense for users. Said
transmission, not wanted</strong></del></span> <span
class="inserted"><ins><em>good job of this, it could more</em></ins></span> or
- <span class="removed"><del><strong>requested by</strong></del></span>
<span class="inserted"><ins><em>less
- prevent such snooping, except when</em></ins></span> the <span
class="removed"><del><strong>user, clearly</strong></del></span> <span
class="inserted"><ins><em>app developers are clever
- enough to outsmart the checking.</p>
+ cheating? There is no systematic way for Google, or Android
users,</em></ins></span>
+ to <span class="removed"><del><strong>Edward Snowden,
+ <a href="http://www.bbc.com/news/uk-34444233">agencies can take
over smartphones</a>
+ by sending hidden text messages which enable them</strong></del></span>
<span class="inserted"><ins><em>inspect executable proprietary
apps</em></ins></span> to <span
class="removed"><del><strong>turn</strong></del></span> <span
class="inserted"><ins><em>see what they do.</p>
+
+ <p>Google could demand</em></ins></span> the <span
class="removed"><del><strong>phones
+ on</strong></del></span> <span class="inserted"><ins><em>source code for
these apps,</em></ins></span> and <span class="removed"><del><strong>off,
listen to</strong></del></span> <span
class="inserted"><ins><em>study</em></ins></span>
+ the <span class="removed"><del><strong>microphone, retrieve geo-location
data from</strong></del></span> <span class="inserted"><ins><em>source code
somehow to determine whether they mistreat users in
+ various ways. If it did a good job of this, it could more or less
+ prevent such snooping, except when</em></ins></span> the
+ <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call, location and web
+ browsing history, and read</strong></del></span> <span
class="inserted"><ins><em>app developers are clever
+ enough to outsmart</em></ins></span> the <span
class="removed"><del><strong>contact list. This malware is
designed</strong></del></span> <span
class="inserted"><ins><em>checking.</p>
<p>But since Google itself develops malicious apps, we cannot trust
- Google to protect us. We</em></ins></span> must <span
class="removed"><del><strong>constitute spying</strong></del></span> <span
class="inserted"><ins><em>demand release</em></ins></span> of <span
class="removed"><del><strong>some
- kind.</p></li>
-
- <li><p>A Motorola phone
- <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all</strong></del></span> <span
class="inserted"><ins><em>source code to</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
- <span class="inserted"><ins><em>public, so we can depend on each
other.</p></em></ins></span>
+ Google to protect us. We must demand release of source
code</em></ins></span> to
+ <span class="removed"><del><strong>disguise itself from
investigation.</p></strong></del></span> <span
class="inserted"><ins><em>the
+ public, so we can depend on each other.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Spyware in Android
phones (and Windows? laptops): The Wall
- Street Journal (in an article blocked from us by a paywall)
- reports that</strong></del></span>
+ <span class="removed"><del><strong><li><p>Samsung phones come
with</strong></del></span>
<span class="inserted"><ins><em><li id="M201705230">
- <p>Apps for BART</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
- the FBI</strong></del></span>
+ <p>Apps for BART</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that</strong></del></span>
<span
class="inserted"><ins><em>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
- <p>With free software apps, users could <em>make
sure</em> that they
- don't snoop.</p>
+ <p>With free software apps,</em></ins></span> users <span
class="removed"><del><strong>can't delete</a>,
+ and</strong></del></span> <span class="inserted"><ins><em>could
<em>make sure</em> that</em></ins></span> they <span
class="removed"><del><strong>send so much data</strong></del></span>
+ <span class="inserted"><ins><em>don't snoop.</p>
+
+ <p>With proprietary apps, one can only hope</em></ins></span> that
<span class="removed"><del><strong>their transmission is a
+ substantial expense for users. Said transmission, not wanted or
+ requested by the user, clearly must constitute spying of some
+ kind.</p></li>
- <p>With proprietary apps, one</em></ins></span> can <span
class="removed"><del><strong>remotely activate the GPS and microphone
in</strong></del></span> <span class="inserted"><ins><em>only hope that they
don't.</p>
+ <li><p>A Motorola phone
+ <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens for voice all the
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>they don't.</p></em></ins></span>
</li>
- <li id="M201705040">
- <p>A study found 234</em></ins></span> Android
- <span class="removed"><del><strong>phones and laptops</a>.
- (I suspect this means Windows laptops.) Here is</strong></del></span>
<span class="inserted"><ins><em>apps that track users by</em></ins></span>
<a <span
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p></strong></del></span>
+ <span class="removed"><del><strong><li><p>Spyware
in</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201705040">
+ <p>A study found 234</em></ins></span> Android <span
class="removed"><del><strong>phones (and Windows? laptops): The Wall
+ Street Journal (in an article blocked from us by a paywall)
+ reports</strong></del></span> <span
class="inserted"><ins><em>apps</em></ins></span> that <span
class="inserted"><ins><em>track users by</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
+ the FBI can remotely activate the GPS and
microphone</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed in stores or played by TV
+ to ultrasound from beacons placed</em></ins></span> in <span
class="removed"><del><strong>Android
+ phones and laptops</a>.
+ (I suspect this means Windows laptops.) Here is
+ <a href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p></strong></del></span> <span
class="inserted"><ins><em>stores or played by TV
programs</a>.</p></em></ins></span>
</li>
@@ -1173,10 +1167,11 @@
<span class="inserted"><ins><em>along with</em></ins></span> the <span
class="removed"><del><strong>use</strong></del></span> <span
class="inserted"><ins><em>headphone's unique serial number.</p>
<p>The suit accuses that this was done without the users' consent.
- If the fine print</em></ins></span> of <span
class="removed"><del><strong>data on</strong></del></span> the <span
class="removed"><del><strong>user's computer, but it does surveillance
- too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"></strong></del></span>
<span class="inserted"><ins><em>app said that users gave consent for this,
- would that make</em></ins></span> it <span
class="removed"><del><strong>tries</strong></del></span> <span
class="inserted"><ins><em>acceptable? No way! It should be flat out <a
- href="/philosophy/surveillance-vs-democracy.html">
illegal</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>design</em></ins></span>
+ If the fine print</em></ins></span> of <span
class="removed"><del><strong>data on</strong></del></span> the <span
class="removed"><del><strong>user's computer, but</strong></del></span> <span
class="inserted"><ins><em>app said that users gave consent for this,
+ would that make</em></ins></span> it <span
class="removed"><del><strong>does surveillance
+ too:</strong></del></span> <span class="inserted"><ins><em>acceptable?
No way! It should be flat out</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries</strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html">
illegal</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>design</em></ins></span>
the <span class="removed"><del><strong>user's list of other people's phone
numbers.</a></p>
</li>
@@ -1242,27 +1237,18 @@
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
movements before and after the ride</a>.</p>
- <p>This example illustrates how “getting the user's
+ <p>This example illustrates how “getting the <span
class="removed"><del><strong>user's consent”</strong></del></span> <span
class="inserted"><ins><em>user's
consent” for surveillance is inadequate as a protection against
massive surveillance.</p>
</li>
- <span class="removed"><del><strong><li><p>Google's new voice
messaging app</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201611160">
- <p>A</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p>
- </li>
-
- <li><p>Apps</strong></del></span>
- <span
class="inserted"><ins><em>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
- research paper</a></em></ins></span> that <span
class="removed"><del><strong>include
- <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop on what radio</strong></del></span>
<span class="inserted"><ins><em>investigated the privacy</em></ins></span> and
<span class="removed"><del><strong>TV programs
- are playing nearby</a>. Also on what</strong></del></span> <span
class="inserted"><ins><em>security of
+ <li id="M201611160">
+ <p>A <a
+
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
+ research paper</a> that investigated the privacy and security of
283 Android VPN apps concluded that “in spite of the promises
for privacy, security, and anonymity given by the majority of VPN
- apps—millions of</em></ins></span> users <span
class="removed"><del><strong>post on various sites</strong></del></span> <span
class="inserted"><ins><em>may be unawarely subject to poor security
+ apps—millions of users may be unawarely subject to poor security
guarantees and abusive practices inflicted by VPN apps.”</p>
<p>Following is a non-exhaustive list, taken from the research paper,
@@ -1271,7 +1257,7 @@
<dl>
<dt>SurfEasy</dt>
- <dd>Includes tracking libraries</em></ins></span> such as <span
class="removed"><del><strong>Facebook, Google+</strong></del></span> <span
class="inserted"><ins><em>NativeX</em></ins></span> and <span
class="removed"><del><strong>Twitter.</p></strong></del></span> <span
class="inserted"><ins><em>Appflood,
+ <dd>Includes tracking libraries such as NativeX and Appflood,
meant to track users and show them targeted ads.</dd>
<dt>sFly Network Booster</dt>
@@ -1297,18 +1283,28 @@
<dt>WiFi Protector VPN</dt>
<dd>Injects JavaScript code into HTML pages, and also uses roughly
five tracking libraries. Developers of this app have confirmed that
- the non-premium version of the app does JavaScript injection for
- tracking the user and displaying ads.</dd>
- </dl>
+ the non-premium version of the app does JavaScript
injection</em></ins></span> for <span class="removed"><del><strong>surveillance
is inadequate as a protection against massive
+ surveillance.</p></strong></del></span>
+ <span class="inserted"><ins><em>tracking the user and displaying
ads.</dd>
+ </dl></em></ins></span>
</li>
- <li id="M201609210">
- <p>Google's new voice messaging app <a
+ <span
class="removed"><del><strong><li><p>Google's</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201609210">
+ <p>Google's</em></ins></span> new voice messaging app <a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p></em></ins></span>
+ all conversations</a>.</p>
</li>
- <span
class="removed"><del><strong><li><p>Facebook's</strong></del></span>
+ <span class="removed"><del><strong><li><p>Apps that include
+ <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop on what radio and TV programs
+ are playing nearby</a>. Also on what users post on various sites
+ such as Facebook, Google+ and Twitter.</p>
+ </li>
+
+ <li><p>Facebook's</strong></del></span>
<span class="inserted"><ins><em><li id="M201606050">
<p>Facebook's</em></ins></span> new Magic Photo app <a
@@ -1448,7 +1444,7 @@
<li id="M201401151">
<p>The Simeji keyboard is a smartphone version of Baidu's <a
- href="/proprietary/#baidu-ime">spying <abbr
+ href="/proprietary/proprietary-surveillance.html#baidu-ime">spying
<abbr
title="Input Method Editor">IME</abbr></a>.</p>
</li>
@@ -1482,234 +1478,149 @@
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInGames">Spyware in
Games</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInSkype">Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInGames">Spyware in
Games</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInSkype">Skype</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInGames">#SpywareInGames</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInSkype">#SpywareInSkype</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li><p>nVidia's proprietary GeForce Experience <a
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+ users identify themselves and then sends personal data about them to
+ nVidia servers</a>.</p>
+ </li>
+
+ <li><p>Angry Birds
+ <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies for companies, and the NSA takes advantage to spy through it
too</a>.
+ Here's information on</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<!-- INSERT skype -->
<li id="M201307110">
- <p>Skype contains <a
-
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">spyware</a>.
+ <p>Skype contains</em></ins></span> <a <span
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ more spyware apps</a>.</p>
+ <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
+ More about NSA app</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">spyware</a>.
Microsoft changed Skype <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p>
+ specifically for</em></ins></span> spying</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInGames">Games</h4></em></ins></span>
- <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInToys">Spyware in
Toys</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInGames">Games</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInToys">#SpywareInToys</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInGames">#SpywareInGames</a>)</span></em></ins></span>
</div>
<span class="removed"><del><strong><ul>
- <li><p>nVidia's</strong></del></span>
+ <li>
+ <p>The “smart” toys My Friend Cayla and i-Que
transmit</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<!-- INSERT games -->
<li id="M201806240">
<p>Red Shell is a spyware that
- is found in many proprietary games. It <a
-
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
- tracks data on users' computers and sends it to third
parties</a>.</p>
+ is found in many proprietary games. It</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
+ tracks data on users' computers and sends it</em></ins></span> to <span
class="removed"><del><strong>Nuance
Communications</a>,</strong></del></span> <span
class="inserted"><ins><em>third parties</a>.</p>
</li>
<li id="M201804144">
- <p>ArenaNet surreptitiously installed a spyware
- program along with an update to the massive
- multiplayer game Guild War 2. The spyware allowed ArenaNet <a
-
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave">
- to snoop on all open processes running on its user's
computer</a>.</p>
- </li>
+ <p>ArenaNet surreptitiously installed</em></ins></span> a <span
class="removed"><del><strong>speech recognition company based in the
U.S.</p>
- <li id="M201711070">
- <p>The driver for a certain gaming keyboard <a
-
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
- information to China</a>.</p>
+ <p>Those toys also contain major security vulnerabilities; crackers
+ can remotely control the toys</strong></del></span> <span
class="inserted"><ins><em>spyware
+ program along</em></ins></span> with <span class="removed"><del><strong>a
mobile phone. This would
+ enable crackers</strong></del></span> <span class="inserted"><ins><em>an
update</em></ins></span> to <span class="removed"><del><strong>listen in on a
child's speech, and even speak
+ into</strong></del></span> the <span class="removed"><del><strong>toys
themselves.</p>
</li>
- <li id="M201611070">
- <p>nVidia's</em></ins></span> proprietary GeForce Experience <a
-
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
- users identify themselves and then sends personal data about them to
- nVidia servers</a>.</p>
+ <li>
+ <p>A computerized vibrator</strong></del></span> <span
class="inserted"><ins><em>massive
+ multiplayer game Guild War 2. The spyware allowed
ArenaNet</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave">
+ to snoop on all open processes running</em></ins></span> on its <span
class="removed"><del><strong>users through the proprietary control
app</a>.</p></strong></del></span> <span
class="inserted"><ins><em>user's computer</a>.</p>
</li>
- <span
class="removed"><del><strong><li><p>Angry</strong></del></span>
+ <li id="M201711070"></em></ins></span>
+ <p>The <span class="removed"><del><strong>app was reporting the
temperature of the vibrator minute by
+ minute (thus, indirectly, whether it was surrounded by a person's
+ body), as well as the vibration frequency.</p>
+
+ <p>Note the totally inadequate proposed
response:</strong></del></span> <span class="inserted"><ins><em>driver
for</em></ins></span> a <span class="removed"><del><strong>labeling
+ standard with which manufacturers would make statements
about</strong></del></span> <span class="inserted"><ins><em>certain gaming
keyboard <a
+
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
+ information to China</a>.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201512290">
+ <li id="M201512290">
<p>Many <a
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles snoop on their users and report to the
- internet</a>—even what their users weigh.</p>
+ video game consoles snoop on</em></ins></span> their <span
class="removed"><del><strong>products, rather than free software
which</strong></del></span> users <span class="removed"><del><strong>could have
+ checked</strong></del></span> and <span
class="removed"><del><strong>changed.</p>
+
+ <p>The company that made</strong></del></span> <span
class="inserted"><ins><em>report to</em></ins></span> the <span
class="removed"><del><strong>vibrator</strong></del></span>
+ <span class="inserted"><ins><em>internet</a>—even what their
users weigh.</p>
<p>A game console is a computer, and you can't trust a computer with
a nonfree operating system.</p>
</li>
<li id="M201509160">
- <p>Modern gratis game cr…apps <a
-
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
- collect a wide range of data about their users and their users'
+ <p>Modern gratis game cr…apps</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued for collecting lots of personal information about how
+ people used it</a>.</p>
+
+ <p>The company's statement that it was anonymizing
the</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
+ collect a wide range of</em></ins></span> data <span
class="removed"><del><strong>may be
+ true, but it doesn't really matter. If</strong></del></span> <span
class="inserted"><ins><em>about their users and their users'
friends and associates</a>.</p>
- <p>Even nastier, they do it through ad networks that merge the data
- collected by various cr…apps and sites made by different
+ <p>Even nastier, they do</em></ins></span> it <span
class="removed"><del><strong>had sold</strong></del></span> <span
class="inserted"><ins><em>through ad networks that merge</em></ins></span> the
data <span class="removed"><del><strong>to a
+ data broker, the</strong></del></span>
+ <span class="inserted"><ins><em>collected by various cr…apps and
sites made by different
companies.</p>
- <p>They use this data to manipulate people to buy things, and hunt
for
- “whales” who can be led to spend a lot of money. They also
- use a back door to manipulate the game play for specific players.</p>
-
- <p>While the article describes gratis games, games that cost money
- can use the same tactics.</p>
- </li>
-
- <li id="M201401280">
- <p>Angry</em></ins></span> Birds <a
-
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies, and the NSA takes advantage
- to spy through it too</a>. Here's information on <a
-
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
- more spyware apps</a>.</p>
-
- <p><a
-
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA app spying</a>.</p>
- </li>
-<span class="removed"><del><strong></ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInToys">Spyware in Toys</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
-</div>
-
-<ul>
- <li>
- <p>The “smart” toys My Friend Cayla and i-Que transmit
- <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,
- a speech recognition company based in the U.S.</p>
-
- <p>Those toys also contain major security vulnerabilities; crackers
- can remotely control the toys with a mobile phone. This would
- enable crackers to listen in on a child's speech, and even speak
- into the toys themselves.</p>
- </li>
-
- <li>
- <p>A computerized vibrator
- <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on its users through the proprietary control
app</a>.</p>
-
- <p>The app was reporting the temperature of the vibrator minute by
- minute (thus, indirectly, whether it was surrounded
by</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M200510200">
- <p>Blizzard Warden is</em></ins></span> a <span
class="removed"><del><strong>person's
- body), as well as the vibration frequency.</p>
-
- <p>Note the totally inadequate proposed
response:</strong></del></span> <span class="inserted"><ins><em>hidden
- “cheating-prevention” program that <a
- href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
- spies on every process running on</em></ins></span> a <span
class="removed"><del><strong>labeling
- standard with which manufacturers would make statements about
- their products, rather than free software</strong></del></span> <span
class="inserted"><ins><em>gamer's computer and sniffs a
- good deal of personal data</a>, including lots of
activities</em></ins></span> which <span class="removed"><del><strong>users
could</strong></del></span>
- have
- <span class="removed"><del><strong>checked and
changed.</p></strong></del></span> <span
class="inserted"><ins><em>nothing to do with cheating.</p>
- </li>
-</ul>
-
-
-
-<div class="big-section">
- <h3 id="SpywareInEquipment">Spyware in Connected Equipment</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareInEquipment">#SpywareInEquipment</a>)</span>
-</div>
-<div style="clear: left;"></div>
+ <p>They use this</em></ins></span> data <span
class="removed"><del><strong>broker would have been able</strong></del></span>
to <span class="removed"><del><strong>figure out</strong></del></span> <span
class="inserted"><ins><em>manipulate people to buy things, and hunt for
+ “whales”</em></ins></span> who <span
class="removed"><del><strong>the user was.</p>
-<ul class="blurbs">
-<!-- INSERT stings -->
- <li id="M201708280"></em></ins></span>
- <p>The <span class="removed"><del><strong>company that made the
vibrator
- <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots</strong></del></span> <span
class="inserted"><ins><em>bad security in many Internet</em></ins></span> of
<span class="removed"><del><strong>personal information about
how</strong></del></span> <span class="inserted"><ins><em>Stings devices allows
<a
-
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
- to snoop on the</em></ins></span> people <span
class="removed"><del><strong>used it</a>.</p>
+ <p>Following this lawsuit,
+ <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company has been ordered</strong></del></span> <span
class="inserted"><ins><em>can be led</em></ins></span> to <span
class="removed"><del><strong>pay</strong></del></span> <span
class="inserted"><ins><em>spend</em></ins></span> a <span
class="removed"><del><strong>total</strong></del></span> <span
class="inserted"><ins><em>lot</em></ins></span> of <span
class="removed"><del><strong>C$4m</a>
+ to its customers.</p>
+ </li>
+
+ <li><p> “CloudPets” toys with microphones
+ <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to the
+ manufacturer</a>. Guess what?
+ <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found</strong></del></span> <span class="inserted"><ins><em>money. They also
+ use</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>back door</em></ins></span> to <span
class="removed"><del><strong>access</strong></del></span> <span
class="inserted"><ins><em>manipulate</em></ins></span> the <span
class="removed"><del><strong>data</a>
+ collected by</strong></del></span> <span class="inserted"><ins><em>game
play for specific players.</p>
- <p>The company's statement</strong></del></span> that <span
class="removed"><del><strong>it was anonymizing the data
may</strong></del></span> <span class="inserted"><ins><em>use
them</a>.</p>
+ <p>While</em></ins></span> the <span
class="removed"><del><strong>manufacturer's snooping.</p>
- <p>Don't</em></ins></span> be
- <span class="removed"><del><strong>true, but it doesn't really matter.
If it had sold the data to</strong></del></span> a
- <span class="removed"><del><strong>data broker,</strong></del></span>
<span class="inserted"><ins><em>sucker—reject all</em></ins></span> the
<span class="removed"><del><strong>data broker would have been
able</strong></del></span> <span class="inserted"><ins><em>stings.</p>
-
- <p>It is unfortunate that the article uses the term <a
-
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
+ <p>That</strong></del></span> <span
class="inserted"><ins><em>article describes gratis games, games that cost money
+ can use</em></ins></span> the <span
class="removed"><del><strong>manufacturer</strong></del></span> <span
class="inserted"><ins><em>same tactics.</p>
</li>
-</ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInTVSets">TV Sets</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
-</div>
-
-<p>Emo Phillips made a joke: The other day a woman came
up</em></ins></span> to <span
class="removed"><del><strong>figure</strong></del></span> <span
class="inserted"><ins><em>me and
-said, “Didn't I see you on television?” I said, “I
-don't know. You can't see</em></ins></span> out
- <span class="removed"><del><strong>who</strong></del></span> the <span
class="removed"><del><strong>user was.</p>
-
- <p>Following this lawsuit,</strong></del></span> <span
class="inserted"><ins><em>other way.” Evidently that was
-before Amazon “smart” TVs.</p>
-
-<ul class="blurbs">
-<!-- INSERT tvsets -->
- <li id="M201804010">
- <p>Some “Smart” TVs automatically</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered to pay</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
- load downgrades that install</em></ins></span> a <span
class="removed"><del><strong>total</strong></del></span> <span
class="inserted"><ins><em>surveillance app</a>.</p>
-
- <p>We link to the article for the facts it presents. It
- is too bad that the article finishes by advocating the
- moral weakness</em></ins></span> of <span
class="removed"><del><strong>C$4m</a></strong></del></span> <span
class="inserted"><ins><em>surrendering</em></ins></span> to <span
class="removed"><del><strong>its customers.</p></strong></del></span>
<span class="inserted"><ins><em>Netflix. The Netflix app <a
- href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
- malware too</a>.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201702060">
- <p>Vizio “smart”</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed on them, and not just broadcasts and
- cable</a>. Even if the image is coming from the user's own
computer,</em></ins></span>
- the
- <span class="removed"><del><strong>manufacturer</a>. Guess what?
- <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found</strong></del></span> <span class="inserted"><ins><em>TV reports what it
is. The existence of</em></ins></span> a way to <span
class="removed"><del><strong>access the data</a>
- collected by</strong></del></span> <span
class="inserted"><ins><em>disable</em></ins></span> the <span
class="removed"><del><strong>manufacturer's snooping.</p>
-
- <p>That</strong></del></span>
- <span class="inserted"><ins><em>surveillance, even if it were not hidden
as it was in these TVs,
- does not legitimize</em></ins></span> the <span
class="removed"><del><strong>manufacturer</strong></del></span> <span
class="inserted"><ins><em>surveillance.</p>
- </li>
-
- <li id="M201511130">
- <p>Some web</em></ins></span> and <span
class="removed"><del><strong>the FBI could listen</strong></del></span> <span
class="inserted"><ins><em>TV advertisements play inaudible
- sounds</em></ins></span> to <span class="removed"><del><strong>these
conversations
- was unacceptable</strong></del></span> <span
class="inserted"><ins><em>be picked up</em></ins></span> by <span
class="removed"><del><strong>itself.</p></li>
+ <li id="M201401280">
+ <p>Angry Birds <a
+
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies for companies,</em></ins></span> and the <span
class="removed"><del><strong>FBI could listen to these conversations
+ was unacceptable by itself.</p></li>
<li><p>Barbie
- <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children and adults</a>.</p>
+ <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span> <span class="inserted"><ins><em>NSA takes
advantage</em></ins></span>
+ to spy <span class="inserted"><ins><em>through it too</a>. Here's
information</em></ins></span> on <span class="removed"><del><strong>children
and adults</a>.</p>
</li>
</ul>
<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure to place new items</strong></del></span> <span
class="inserted"><ins><em>proprietary malware running</em></ins></span>
- on <span class="removed"><del><strong>top under each subsection -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
<div class="big-section">
<h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
@@ -1719,78 +1630,86 @@
<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware</strong></del></span> <span
class="inserted"><ins><em>other devices</em></ins></span> in <span
class="removed"><del><strong>BIOS</h4>
+ <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
</div>
<ul>
-<li><p>
-<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
installs.
-Note</strong></del></span> <span class="inserted"><ins><em>range so as to
determine</em></ins></span> that <span class="removed"><del><strong>the
specific sabotage method Lenovo used did not affect
+<li><p></strong></del></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware and</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ more</em></ins></span> spyware <span class="removed"><del><strong>via
BIOS</a> on Windows installs.
+Note that the specific sabotage method Lenovo used did not affect
GNU/Linux; also, a “clean” Windows install is not really
-clean since</strong></del></span> <span class="inserted"><ins><em>they
- are nearby. Once your Internet devices are paired with
- your TV, advertisers can correlate ads with Web activity, and
other</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
-puts</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
- cross-device tracking</a>.</p>
- </li>
-
- <li id="M201511060">
- <p>Vizio goes a step further than other TV
- manufacturers</em></ins></span> in <span class="removed"><del><strong>its
own malware</a>.
+clean since <a href="/proprietary/malware-microsoft.html">Microsoft
+puts in its own malware</a>.
</p></li>
</ul>
<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure to place new items</strong></del></span> <span
class="inserted"><ins><em>spying</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
+<!-- WEBMASTERS: make sure to place new items</strong></del></span> <span
class="inserted"><ins><em>apps</a>.</p>
+
+ <p><a
+
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
+ More about NSA app spying</a>.</p>
+ </li>
+
+ <li id="M200510200">
+ <p>Blizzard Warden is a hidden
+ “cheating-prevention” program that <a
+ href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
+ spies</em></ins></span> on <span class="removed"><del><strong>top under
each subsection --></strong></del></span> <span
class="inserted"><ins><em>every process running on a gamer's computer and
sniffs a
+ good deal of personal data</a>, including lots of activities which
+ have nothing to do with cheating.</p>
+ </li>
+</ul></em></ins></span>
+
+
<div class="big-section">
- <h3 id="SpywareAtWork">Spyware at Work</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
+ <h3 <span class="removed"><del><strong>id="SpywareAtWork">Spyware at
Work</h3></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInEquipment">Spyware in Connected
Equipment</h3></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtWork">#SpywareAtWork</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInEquipment">#SpywareInEquipment</a>)</span></em></ins></span>
</div>
<div style="clear: left;"></div>
-<ul>
+<span class="removed"><del><strong><ul>
<li><p>Investigation
- Shows</strong></del></span> <span class="inserted"><ins><em>their
users: their</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Shows</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
+<!-- INSERT stings -->
+ <li id="M201708280">
+ <p>The bad security in many Internet of Stings devices
allows</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
Using US Companies, NSA To Route Around Domestic Surveillance
Restrictions</a>.</p>
- <p>Specifically, it</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in detail and
- link them your IP address</a> so that advertisers</em></ins></span>
can <span class="removed"><del><strong>collect the emails of members of
Parliament</strong></del></span> <span class="inserted"><ins><em>track you
- across devices.</p>
+ <p>Specifically, it can collect</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
+ to snoop on</em></ins></span> the <span
class="removed"><del><strong>emails of members of Parliament
+ this way, because they pass it through Microsoft.</p></li>
- <p>It is possible to turn</em></ins></span> this <span
class="removed"><del><strong>way, because they pass</strong></del></span> <span
class="inserted"><ins><em>off, but having</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
+ <li><p>Spyware in Cisco TNP IP phones:</strong></del></span>
<span class="inserted"><ins><em>people that use them</a>.</p>
- <li><p>Spyware in Cisco TNP IP phones:
- <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
<span class="inserted"><ins><em>enabled by default
- is an injustice already.</p></em></ins></span>
+ <p>Don't be a sucker—reject all the stings.</p>
+
+ <p>It is unfortunate that the article uses the
term</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p></em></ins></span>
</li>
-<span class="removed"><del><strong></ul>
+</ul>
<div class="big-subsection">
- <h4 id="SpywareInSkype">Spyware in Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInSkype">Spyware in
Skype</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInTVSets">TV
Sets</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInSkype">#SpywareInSkype</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></em></ins></span>
</div>
-<ul>
+<span class="removed"><del><strong><ul>
<li><p>Spyware in Skype:
<a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201511020">
- <p>Tivo's alliance with Viacom adds 2.3 million households
- to the 600 millions social media profiles the company
- already monitors. Tivo customers are unaware they're
- being watched by advertisers. By combining TV viewing
- information with online social media participation, Tivo can
now</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ Microsoft changed Skype
+ <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
specifically for spying</a>.</p>
</li>
</ul>
@@ -1799,12 +1718,12 @@
<!-- #SpywareOnTheRoad -->
<!-- WEBMASTERS: make sure</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
- correlate TV advertisement with online purchases</a>, exposing all
- users</em></ins></span> to <span
class="removed"><del><strong>place</strong></del></span> new <span
class="removed"><del><strong>items on top under each subsection -->
+
+<span class="inserted"><ins><em><p>Emo Phillips made a joke: The other
day a woman came up</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
+ <h3 id="SpywareOnTheRoad">Spyware</strong></del></span> <span
class="inserted"><ins><em>me and
+said, “Didn't I see you</em></ins></span> on <span
class="removed"><del><strong>The Road</h3>
<span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
</div>
<div style="clear: left;"></div>
@@ -1816,66 +1735,78 @@
<ul>
<li>
- <p>The Nest Cam</strong></del></span> <span
class="inserted"><ins><em>combined surveillance by default.</p>
+ <p>The Nest Cam</strong></del></span> <span
class="inserted"><ins><em>television?” I said, “I
+don't know. You can't see out the other way.” Evidently that was
+before Amazon</em></ins></span> “smart” <span
class="removed"><del><strong>camera is</strong></del></span> <span
class="inserted"><ins><em>TVs.</p>
+
+<ul class="blurbs">
+<!-- INSERT tvsets -->
+ <li id="M201804010">
+ <p>Some “Smart” TVs automatically</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
+ watching</a>, even when</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
+ load downgrades that install a surveillance app</a>.</p>
+
+ <p>We link to</em></ins></span> the <span
class="removed"><del><strong>“owner” switches</strong></del></span>
<span class="inserted"><ins><em>article for the facts</em></ins></span> it
<span class="removed"><del><strong>“off.”</p>
+ <p>A</strong></del></span> <span class="inserted"><ins><em>presents.
It
+ is too bad that the article finishes by advocating the
+ moral weakness of surrendering to Netflix. The Netflix app <a
+ href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
+ malware too</a>.</p>
</li>
- <li id="M201507240">
- <p>Vizio</em></ins></span> “smart” <span
class="removed"><del><strong>camera is</strong></del></span> <span
class="inserted"><ins><em>TVs recognize and</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
- what people are</em></ins></span> watching</a>, even <span
class="removed"><del><strong>when the “owner” switches it
“off.”</p>
- <p>A “smart” device means the manufacturer is
using</strong></del></span> <span
class="inserted"><ins><em>if</em></ins></span> it <span
class="removed"><del><strong>to outsmart
- you.</p></strong></del></span> <span
class="inserted"><ins><em>isn't a TV channel.</p></em></ins></span>
+ <li id="M201702060">
+ <p>Vizio</em></ins></span> “smart” <span
class="removed"><del><strong>device means</strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything that is viewed on them, and not just broadcasts and
+ cable</a>. Even if</em></ins></span> the <span
class="removed"><del><strong>manufacturer</strong></del></span> <span
class="inserted"><ins><em>image</em></ins></span> is <span
class="removed"><del><strong>using</strong></del></span> <span
class="inserted"><ins><em>coming from the user's own computer,
+ the TV reports what</em></ins></span> it <span
class="inserted"><ins><em>is. The existence of a way</em></ins></span> to <span
class="removed"><del><strong>outsmart
+ you.</p></strong></del></span> <span
class="inserted"><ins><em>disable the
+ surveillance, even if it were not hidden as it was in these TVs,
+ does not legitimize the surveillance.</p></em></ins></span>
</li>
<span class="removed"><del><strong></ul>
<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
+ <h4 id="SpywareInElectronicReaders">Spyware</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201511130">
+ <p>Some web and TV advertisements play inaudible
+ sounds to be picked up by proprietary malware running
+ on other devices</em></ins></span> in <span
class="removed"><del><strong>e-Readers</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
</div>
<ul>
- <li><p>E-books can contain Javascript code,
- and</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201505290">
- <p>Verizon cable TV</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"></em></ins></span>
- snoops on <span
class="removed"><del><strong>readers</a>.</p></strong></del></span>
<span class="inserted"><ins><em>what programs people watch, and even what they
wanted to
- record</a>.</p></em></ins></span>
+ <li><p>E-books</strong></del></span> <span
class="inserted"><ins><em>range so as to determine that they
+ are nearby. Once your Internet devices are paired with
+ your TV, advertisers</em></ins></span> can <span
class="removed"><del><strong>contain Javascript code,</strong></del></span>
<span class="inserted"><ins><em>correlate ads with Web
activity,</em></ins></span> and <span
class="inserted"><ins><em>other</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code snoops on readers</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
+ cross-device tracking</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Spyware in many
e-readers—not only the
- Kindle:</strong></del></span>
+ <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
- <span class="inserted"><ins><em><li id="M201504300">
- <p>Vizio</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report even which page the user reads at</strong></del></span>
- <span
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
- used a firmware “upgrade” to make its TVs snoop
on</em></ins></span> what <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
- <span class="inserted"><ins><em>users watch</a>. The TVs did not do
that when first sold.</p></em></ins></span>
+ <span class="inserted"><ins><em><li id="M201511060">
+ <p>Vizio goes a step further than other TV
+ manufacturers</em></ins></span> in <span class="removed"><del><strong>many
e-readers—not only the
+ Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
+ they report even which page the user reads at what
time</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Adobe made
“Digital Editions,”</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201502090">
- <p>The Samsung “Smart” TV <a
-
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
- transmits users' voice on the internet to another company,
Nuance</a>.
- Nuance can save it and would then have to give it to</em></ins></span> the
<span class="removed"><del><strong>e-reader used
- by most</strong></del></span> US <span
class="removed"><del><strong>libraries,</strong></del></span> <span
class="inserted"><ins><em>or some
- other government.</p>
-
- <p>Speech recognition is not to be trusted unless it is done by free
- software in your own computer.</p>
+ <li><p>Adobe made “Digital Editions,” the e-reader
used
+ by most US libraries,</strong></del></span> <span
class="inserted"><ins><em>spying on their users: their</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data to Adobe</a>. Adobe's “excuse”: it's
+ needed</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits in detail and
+ link them your IP address</a> so that advertisers can track you
+ across devices.</p>
- <p>In its privacy policy, Samsung explicitly confirms
that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of</strong></del></span>
- <span
class="inserted"><ins><em>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice</em></ins></span>
- data <span class="inserted"><ins><em>containing sensitive information will
be transmitted</em></ins></span> to <span
class="removed"><del><strong>Adobe</a>. Adobe's “excuse”:
it's
- needed to check DRM!</p></strong></del></span> <span
class="inserted"><ins><em>third
- parties</a>.</p></em></ins></span>
+ <p>It is possible</em></ins></span> to <span
class="removed"><del><strong>check DRM!</p></strong></del></span> <span
class="inserted"><ins><em>turn this off, but having it enabled by default
+ is an injustice already.</p></em></ins></span>
</li>
<span class="removed"><del><strong></ul>
@@ -1885,36 +1816,84 @@
</div>
<ul>
-<li><p>Computerized cars with nonfree software
are</strong></del></span>
+<li><p>Computerized cars</strong></del></span>
- <span class="inserted"><ins><em><li id="M201411090">
- <p>The Amazon “Smart” TV is</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"></em></ins></span>
- snooping <span
class="removed"><del><strong>devices</a>.</p></strong></del></span>
<span class="inserted"><ins><em>all the
time</a>.</p></em></ins></span>
+ <span class="inserted"><ins><em><li id="M201511020">
+ <p>Tivo's alliance</em></ins></span> with <span
class="removed"><del><strong>nonfree software</strong></del></span> <span
class="inserted"><ins><em>Viacom adds 2.3 million households
+ to the 600 millions social media profiles the company
+ already monitors. Tivo customers</em></ins></span> are <span
class="inserted"><ins><em>unaware they're
+ being watched by advertisers. By combining TV viewing
+ information with online social media participation, Tivo can
now</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
+ snooping devices</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
+ correlate TV advertisement with online purchases</a>, exposing all
+ users to new combined surveillance by default.</p></em></ins></span>
</li>
- <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has a built-in cell phone modem which allows
+ <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has</strong></del></span> <span
class="inserted"><ins><em>id="M201507240">
+ <p>Vizio “smart” TVs recognize and <a
+ href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
+ what people are watching</a>, even if it isn't</em></ins></span> a
<span class="removed"><del><strong>built-in cell phone modem which allows
effectively
- anyone</strong></del></span> <span
class="inserted"><ins><em>id="M201409290">
- <p>More or less all “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely and make changes in various
+ anyone</strong></del></span> <span class="inserted"><ins><em>TV
channel.</p>
+ </li>
+
+ <li id="M201505290">
+ <p>Verizon cable TV</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access its computers remotely</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
+ snoops on what programs people watch,</em></ins></span> and <span
class="removed"><del><strong>make changes in various
settings</a>.</p>
- <p>That's easy to do because the system</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p>
-
- <p>The report was as of 2014, but we don't expect
this</em></ins></span> has <span class="removed"><del><strong>no authentication
when
- accessed through the modem. However, even if it asked for
- authentication, you couldn't be confident</strong></del></span> <span
class="inserted"><ins><em>got
- better.</p>
+ <p>That's easy</strong></del></span> <span
class="inserted"><ins><em>even what they wanted to
+ record</a>.</p>
+ </li>
+
+ <li id="M201504300">
+ <p>Vizio <a
+
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
+ used a firmware “upgrade”</em></ins></span> to <span
class="inserted"><ins><em>make its TVs snoop on what
+ users watch</a>. The TVs did not</em></ins></span> do <span
class="removed"><del><strong>because the system has no
authentication</strong></del></span> <span
class="inserted"><ins><em>that</em></ins></span> when
+ <span class="removed"><del><strong>accessed through</strong></del></span>
<span class="inserted"><ins><em>first sold.</p>
+ </li>
+
+ <li id="M201502090">
+ <p>The Samsung “Smart” TV <a
+
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
+ transmits users' voice on</em></ins></span> the <span
class="removed"><del><strong>modem. However, even if</strong></del></span>
<span class="inserted"><ins><em>internet to another company, Nuance</a>.
+ Nuance can save</em></ins></span> it <span
class="removed"><del><strong>asked for
+ authentication, you couldn't</strong></del></span> <span
class="inserted"><ins><em>and would then have to give it to the US or some
+ other government.</p>
+
+ <p>Speech recognition is not to</em></ins></span> be <span
class="removed"><del><strong>confident that Nissan has no
+ access. The</strong></del></span> <span class="inserted"><ins><em>trusted
unless it is done by free</em></ins></span>
+ software in <span class="removed"><del><strong>the
car</strong></del></span> <span class="inserted"><ins><em>your own
computer.</p>
+
+ <p>In its privacy policy, Samsung explicitly confirms that <a
+
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
+ data containing sensitive information will be transmitted to third
+ parties</a>.</p>
+ </li>
+
+ <li id="M201411090">
+ <p>The Amazon “Smart” TV</em></ins></span> is
+ <span class="removed"><del><strong>proprietary,</strong></del></span>
<a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
+ means it demands blind faith from its</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
+ snooping all the time</a>.</p>
+ </li>
- <p>This shows</em></ins></span> that <span
class="removed"><del><strong>Nissan has no
- access. The software in the car is
- proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
- means it demands blind faith from its users</a>.</p>
+ <li id="M201409290">
+ <p>More or less all “smart” TVs <a
+
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on their</em></ins></span> users</a>.</p>
+
+ <span class="removed"><del><strong><p>Even if no one
connects</strong></del></span>
+
+ <span class="inserted"><ins><em><p>The report was as of 2014, but we
don't expect this has got
+ better.</p>
- <p>Even if no one connects</strong></del></span> <span
class="inserted"><ins><em>laws requiring products</em></ins></span> to <span
class="inserted"><ins><em>get users' formal
+ <p>This shows that laws requiring products</em></ins></span> to
<span class="inserted"><ins><em>get users' formal
consent before collecting personal data are totally inadequate.
And what happens if a user declines consent? Probably</em></ins></span>
the <span class="removed"><del><strong>car remotely, the cell phone
modem enables the phone company</strong></del></span> <span
class="inserted"><ins><em>TV will
@@ -2095,59 +2074,71 @@
<p>Proper laws</strong></del></span> <span
class="inserted"><ins><em>data broker</em></ins></span> would <span
class="removed"><del><strong>say that TVs are not allowed</strong></del></span>
<span class="inserted"><ins><em>have been able</em></ins></span> to <span
class="removed"><del><strong>report what</strong></del></span> <span
class="inserted"><ins><em>figure out who</em></ins></span> the
user <span class="removed"><del><strong>watches — no
exceptions!</p>
</li>
- <li><p>Vizio goes</strong></del></span> <span
class="inserted"><ins><em>was.</p>
+ <li><p>Vizio goes a step further than other TV manufacturers in
spying on
+ their users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits in detail and
+ link them your IP address</a> so that advertisers can track you
+ across devices.</p>
+
+ <p>It is possible to turn</strong></del></span> <span
class="inserted"><ins><em>was.</p>
+
+ <p>Following</em></ins></span> this <span
class="removed"><del><strong>off, but having it enabled by default
+ is an injustice already.</p>
+ </li>
- <p>Following this lawsuit, <a
-
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered to pay</em></ins></span> a <span
class="removed"><del><strong>step further than other TV manufacturers in spying
on
- their users: their</strong></del></span> <span
class="inserted"><ins><em>total of C$4m</a> to its
+ <li><p>Tivo's alliance with Viacom adds 2.3 million households to
+ the 600 millions social media profiles</strong></del></span> <span
class="inserted"><ins><em>lawsuit, <a
+
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></em></ins></span>
+ the company <span class="removed"><del><strong>already
+ monitors. Tivo customers are unaware they're being watched by
+ advertisers. By combining TV viewing information</strong></del></span>
<span class="inserted"><ins><em>has been ordered to pay a total of
C$4m</a> to its
customers.</p>
</li>
<li id="M201702280">
- <p>“CloudPets” toys with microphones</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in
detail</strong></del></span>
+ <p>“CloudPets” toys</em></ins></span> with <span
class="removed"><del><strong>online
+ social media participation, Tivo can now</strong></del></span> <span
class="inserted"><ins><em>microphones</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
+ advertisement with online purchases</a>, exposing all
users</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak childrens' conversations to the manufacturer</a>. Guess what?
<a
+ leak childrens' conversations</em></ins></span> to
+ <span class="removed"><del><strong>new combined
surveillance</strong></del></span> <span class="inserted"><ins><em>the
manufacturer</a>. Guess what? <a
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found a way to access the data</a> collected by the
+ Crackers found a way to access the data</a>
collected</em></ins></span> by <span
class="removed"><del><strong>default.</p></li>
+ <li><p>Some web</strong></del></span> <span
class="inserted"><ins><em>the
manufacturer's snooping.</p>
- <p>That the manufacturer</em></ins></span> and
- <span class="removed"><del><strong>link them your IP address</a>
so that advertisers can track you
- across devices.</p>
-
- <p>It is possible</strong></del></span> <span
class="inserted"><ins><em>the FBI could listen</em></ins></span> to <span
class="removed"><del><strong>turn this off, but having it
enabled</strong></del></span> <span class="inserted"><ins><em>these
- conversations was unacceptable</em></ins></span> by <span
class="removed"><del><strong>default
- is an injustice already.</p></strong></del></span> <span
class="inserted"><ins><em>itself.</p></em></ins></span>
+ <p>That the manufacturer</em></ins></span> and <span
class="removed"><del><strong>TV advertisements play inaudible
sounds</strong></del></span> <span class="inserted"><ins><em>the FBI could
listen</em></ins></span> to <span class="removed"><del><strong>be
+ picked up</strong></del></span> <span class="inserted"><ins><em>these
+ conversations was unacceptable</em></ins></span> by <span
class="removed"><del><strong>proprietary malware running on other devices in
+ range so as to determine that they are nearby. Once your
+ Internet devices are paired with your TV, advertisers can
+ correlate ads with Web activity, and
+ other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span> <span
class="inserted"><ins><em>itself.</p></em></ins></span>
</li>
-
- <span class="removed"><del><strong><li><p>Tivo's
alliance</strong></del></span>
+ <span
class="removed"><del><strong><li><p>Vizio</strong></del></span>
<span class="inserted"><ins><em><li id="M201612060">
- <p>The “smart” toys My Friend Cayla and i-Que transmit
<a
-
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
- conversations to Nuance Communications</a>, a speech recognition
+ <p>The</em></ins></span> “smart” <span
class="removed"><del><strong>TVs recognize</strong></del></span> <span
class="inserted"><ins><em>toys My Friend Cayla</em></ins></span> and <span
class="inserted"><ins><em>i-Que transmit</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,
+ even if it isn't</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
+ conversations to Nuance Communications</a>,</em></ins></span> a
<span class="removed"><del><strong>TV channel.</p></strong></del></span>
<span class="inserted"><ins><em>speech recognition
company based in the U.S.</p>
<p>Those toys also contain major security vulnerabilities; crackers
- can remotely control the toys</em></ins></span> with <span
class="removed"><del><strong>Viacom adds 2.3 million
households</strong></del></span> <span class="inserted"><ins><em>a mobile
phone. This would enable
- crackers</em></ins></span> to <span class="inserted"><ins><em>listen in on
a child's speech, and even speak into</em></ins></span> the <span
class="removed"><del><strong>600 millions social media profiles the company
already
- monitors. Tivo customers are unaware they're being watched by
- advertisers. By combining TV viewing information with online
- social media participation, Tivo can now</strong></del></span>
- <span class="inserted"><ins><em>toys themselves.</p>
+ can remotely control the toys with a mobile phone. This would enable
+ crackers to listen in on a child's speech, and even speak into the
+ toys themselves.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>The Amazon
“Smart” TV</strong></del></span>
- <li id="M201502180">
- <p>Barbie</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
- advertisement with online purchases</a>, exposing all
users</strong></del></span>
+ <span class="inserted"><ins><em><li id="M201502180">
+ <p>Barbie</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
+ watching</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
- going</em></ins></span> to
- <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
- <li><p>Some web</strong></del></span> <span
class="inserted"><ins><em>spy on children</em></ins></span> and <span
class="removed"><del><strong>TV advertisements play inaudible
sounds</strong></del></span> <span
class="inserted"><ins><em>adults</a>.</p>
+ going to spy on children</em></ins></span> and <span
class="removed"><del><strong>listening all the
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>adults</a>.</p></em></ins></span>
</li>
-</ul>
+ <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
@@ -2158,18 +2149,12 @@
<ul class="blurbs">
<!-- INSERT drones -->
<li id="M201708040">
- <p>While you're using a DJI drone</em></ins></span>
- to <span class="removed"><del><strong>be
- picked up by proprietary malware running</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span> on other <span
class="removed"><del><strong>devices</strong></del></span> <span
class="inserted"><ins><em>people, DJI is</em></ins></span> in
- <span class="removed"><del><strong>range so as to determine that they
are nearby. Once your
- Internet devices are paired with your TV, advertisers can
- correlate ads with Web activity, and
- other</strong></del></span> <span class="inserted"><ins><em>many
cases</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
- on you</a>.</p></em></ins></span>
+ <p>While you're using a DJI drone
+ to snoop on other people, DJI is in many cases</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping</em></ins></span>
+ on <span class="removed"><del><strong>the internet</strong></del></span>
<span class="inserted"><ins><em>you</a>.</p>
</li>
- <span
class="removed"><del><strong><li><p>Vizio</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<div class="big-subsection">
@@ -2178,33 +2163,11 @@
<ul class="blurbs">
<!-- INSERT home -->
- <li id="M201809260">
- <p>Honeywell's</em></ins></span> “smart” <span
class="removed"><del><strong>TVs recognize and
- <a
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track what
people are watching</a>,
- even if it isn't a TV channel.</p>
- </li>
- <li><p>The Amazon “Smart” TV</strong></del></span>
<span class="inserted"><ins><em>thermostats communicate
- only through the company's server. They have
- all the nasty characteristics of such devices:</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
- watching</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9">
- surveillance,</em></ins></span> and <span
class="removed"><del><strong>listening</strong></del></span> <span
class="inserted"><ins><em>danger of sabotage</a> (of a specific user, or
of</em></ins></span>
- all <span class="inserted"><ins><em>users at once), as well
as</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
- </li>
- <li><p>The Samsung “Smart” TV
- <a
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on</strong></del></span> <span class="inserted"><ins><em>risk of
an outage (which is what
- just happened).</p>
-
- <p>In addition, setting</em></ins></span> the <span
class="removed"><del><strong>internet to another
- company, Nuance</a>. Nuance</strong></del></span> <span
class="inserted"><ins><em>desired temperature requires running
- nonfree software. With an old-fashioned thermostat, you</em></ins></span>
can <span class="removed"><del><strong>save</strong></del></span> <span
class="inserted"><ins><em>do</em></ins></span> it <span
class="removed"><del><strong>and would then have</strong></del></span>
- <span class="inserted"><ins><em>using controls right on the
thermostat.</p>
- </li>
-
<li id="M201808120">
- <p>Crackers found a way</em></ins></span> to
- <span class="removed"><del><strong>give</strong></del></span> <span
class="inserted"><ins><em>break the security of an Amazon device,
- and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
+ <p>Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>another
+ company, Nuance</a>. Nuance can save it</strong></del></span> <span
class="inserted"><ins><em>break the security of an Amazon
device,</em></ins></span>
+ and <span class="removed"><del><strong>would then have to
+ give</strong></del></span> <span class="inserted"><ins><em><a
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
turn</em></ins></span> it <span class="inserted"><ins><em>into a listening
device</a> for them.</p>
<p>It was very difficult for them</em></ins></span> to <span
class="inserted"><ins><em>do this. The job would be much
@@ -2782,7 +2745,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/01 19:58:10 $
+$Date: 2018/10/05 12:59:27 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.245
retrieving revision 1.246
diff -u -b -r1.245 -r1.246
--- proprietary-surveillance.it.po 1 Oct 2018 19:58:10 -0000 1.245
+++ proprietary-surveillance.it.po 5 Oct 2018 12:59:27 -0000 1.246
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-01 19:55+0000\n"
+"POT-Creation-Date: 2018-10-05 12:56+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -28,6 +28,14 @@
#. type: Content of: <p>
msgid ""
+"<a href=\"/proprietary/proprietary.html\"> Other examples of proprietary "
+"malware</a>"
+msgstr ""
+"<a href=\"/proprietary/proprietary/proprietary.html\">Altri esempi di "
+"malware proprietario</a>"
+
+#. type: Content of: <div><p>
+msgid ""
"Nonfree (proprietary) software is very often malware (designed to mistreat "
"the user). Nonfree software is controlled by its developers, which puts them "
"in a position of power over the users; <a href=\"/philosophy/free-software-"
@@ -42,7 +50,7 @@
"sviluppatori esercitano questo potere a danno degli utenti che invece "
"dovrebbero servire."
-#. type: Content of: <div><p>
+#. type: Content of: <p>
msgid ""
"This document attempts to track <strong>clearly established cases of "
"proprietary software that spies on or tracks users</strong>."
@@ -51,15 +59,14 @@
"dimostrati di software proprietario che spia o traccia i propri utenti</"
"strong>."
-#. type: Content of: <div><p>
+#. type: Content of: <p>
msgid ""
-"<a href=\"/proprietary/proprietary.html\"> Other examples of proprietary "
-"malware</a>"
+"The tethered appliances and applications are by nature doing surveillance. "
+"We are not listing them here because they have their own page: <a href=\"/"
+"proprietary/proprietary-tethers.html\">Proprietary Tethers</a>."
msgstr ""
-"<a href=\"/proprietary/proprietary/proprietary.html\">Altri esempi di "
-"malware proprietario</a>"
-#. type: Content of: <div><p>
+#. type: Content of: <p>
msgid ""
"If you know of an example that ought to be in this page but isn't here, "
"please write to <a href=\"mailto:address@hidden"><address@hidden"
@@ -1184,18 +1191,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The iMessage app on iThings <a href=\"https://theintercept.com/2016/09/28/"
-"apple-logs-your-imessage-contacts-and-may-share-them-with-police/\">tells a "
-"server every phone number that the user types into it</a>; the server "
-"records these numbers for at least 30 days."
-msgstr ""
-"L'applicazione iMessage dei vari iGadget <a href=\"https://theintercept."
-"com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-"
-"police/\">comunica a un server ogni numero di telefono digitato dall'utente</"
-"a>; il server tiene memorizzati i numeri per almeno 30 giorni."
-
-#. type: Content of: <ul><li><p>
-msgid ""
"iThings automatically upload to Apple's servers all the photos and videos "
"they make."
msgstr ""
@@ -1373,10 +1368,9 @@
# | Users cannot make an Apple ID [-<a
# |
href=\"http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool\">(necessary-]
# | {+(<a
-# |
href=\"https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id\">
-# | necessary+} to install even gratis [-apps)</a>-] {+apps</a>)+} without
-# | giving a valid email address and receiving the {+verification+} code Apple
-# | sends to it.
+# |
href=\"https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id\">necessary+}
+# | to install even gratis [-apps)</a>-] {+apps</a>)+} without giving a valid
+# | email address and receiving the {+verification+} code Apple sends to it.
#, fuzzy
#| msgid ""
#| "Users cannot make an Apple ID <a href=\"http://apple.stackexchange.com/"
@@ -1386,7 +1380,7 @@
msgid ""
"Users cannot make an Apple ID (<a href=\"https://apple.stackexchange.com/"
"questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"
-"\"> necessary to install even gratis apps</a>) without giving a valid email "
+"\">necessary to install even gratis apps</a>) without giving a valid email "
"address and receiving the verification code Apple sends to it."
msgstr ""
"Gli utenti non possono creare una ID di Apple (che serve <a href=\"http://"
@@ -1510,10 +1504,22 @@
"a>."
#. type: Content of: <ul><li><p>
+# | Spyware is present in some Android devices when they are sold. Some
+# | Motorola [-phones modify-] {+phones, made when this company was owned by
+# | Google, use a modified version of+} Android [-to-] {+that+} <a
+# |
href=\"http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html\">
+# | send{+s+} personal data to Motorola</a>.
+#, fuzzy
+#| msgid ""
+#| "Spyware is present in some Android devices when they are sold. Some "
+#| "Motorola phones modify Android to <a href=\"http://www.beneaththewaves."
+#| "net/Projects/Motorola_Is_Listening.html\"> send personal data to "
+#| "Motorola</a>."
msgid ""
"Spyware is present in some Android devices when they are sold. Some "
-"Motorola phones modify Android to <a href=\"http://www.beneaththewaves.net/"
-"Projects/Motorola_Is_Listening.html\"> send personal data to Motorola</a>."
+"Motorola phones, made when this company was owned by Google, use a modified "
+"version of Android that <a href=\"http://www.beneaththewaves.net/Projects/"
+"Motorola_Is_Listening.html\"> sends personal data to Motorola</a>."
msgstr ""
"Alcuni dispositivi Android sono venduti con spyware al loro interno. Alcuni "
"telefoni di Motorola modificano Android per <a href=\"http://www."
@@ -2376,8 +2382,8 @@
#. type: Content of: <ul><li><p>
msgid ""
"The Simeji keyboard is a smartphone version of Baidu's <a href=\"/"
-"proprietary/#baidu-ime\">spying <abbr title=\"Input Method Editor\">IME</"
-"abbr></a>."
+"proprietary/proprietary-surveillance.html#baidu-ime\">spying <abbr title="
+"\"Input Method Editor\">IME</abbr></a>."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -2534,18 +2540,6 @@
msgstr ""
#. type: Content of: <ul><li><p>
-msgid ""
-"nVidia's proprietary GeForce Experience <a href=\"http://www.gamersnexus.net/"
-"industry/2672-geforce-experience-data-transfer-analysis\">makes users "
-"identify themselves and then sends personal data about them to nVidia "
-"servers</a>."
-msgstr ""
-"GeForce Experience, software proprietario di nVidia, <a href=\"http://www."
-"gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis\">fa "
-"sì che gli utenti si identifichino e poi manda i loro dati personali ai "
-"server di nVidia</a>."
-
-#. type: Content of: <ul><li><p>
# | Many <a
# |
href=\"http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/\">
# | video game consoles snoop on their users and report to the
@@ -3329,23 +3323,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Honeywell's “smart” thermostats communicate only through the "
-"company's server. They have all the nasty characteristics of such devices: "
-"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
-"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
-"user, or of all users at once), as well as the risk of an outage (which is "
-"what just happened)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In addition, setting the desired temperature requires running nonfree "
-"software. With an old-fashioned thermostat, you can do it using controls "
-"right on the thermostat."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Crackers found a way to break the security of an Amazon device, and <a href="
"\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it into a "
"listening device</a> for them."
@@ -4122,6 +4099,29 @@
msgid "Updated:"
msgstr "Ultimo aggiornamento:"
+#~ msgid ""
+#~ "The iMessage app on iThings <a href=\"https://theintercept.com/2016/09/28/"
+#~ "apple-logs-your-imessage-contacts-and-may-share-them-with-police/\">tells "
+#~ "a server every phone number that the user types into it</a>; the server "
+#~ "records these numbers for at least 30 days."
+#~ msgstr ""
+#~ "L'applicazione iMessage dei vari iGadget <a href=\"https://theintercept."
+#~ "com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-"
+#~ "police/\">comunica a un server ogni numero di telefono digitato "
+#~ "dall'utente</a>; il server tiene memorizzati i numeri per almeno 30 "
+#~ "giorni."
+
+#~ msgid ""
+#~ "nVidia's proprietary GeForce Experience <a href=\"http://www.gamersnexus."
+#~ "net/industry/2672-geforce-experience-data-transfer-analysis\">makes users "
+#~ "identify themselves and then sends personal data about them to nVidia "
+#~ "servers</a>."
+#~ msgstr ""
+#~ "GeForce Experience, software proprietario di nVidia, <a href=\"http://www."
+#~ "gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"
+#~ "\">fa sì che gli utenti si identifichino e poi manda i loro dati "
+#~ "personali ai server di nVidia</a>."
+
#~ msgid "<a href=\"#SpywareAtWork\">Spyware at Work</a>"
#~ msgstr "<a href=\"#SpywareAtWork\">Spyware sul lavoro</a>"
Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.83
retrieving revision 1.84
diff -u -b -r1.83 -r1.84
--- proprietary-surveillance.ja-diff.html 1 Oct 2018 19:58:10 -0000
1.83
+++ proprietary-surveillance.ja-diff.html 5 Oct 2018 12:59:27 -0000
1.84
@@ -19,13 +19,14 @@
}
#surveillance div.toc {
width: 24.5em; max-width: 94%;
- margin-bottom: 1em;
+ <span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span>
+ <span class="inserted"><ins><em>margin: 1em 0;</em></ins></span>
}
@media (min-width: 48em) {
#surveillance div.toc {
float: left;
width: auto; max-width: 48%;
- margin: .2em 0 1em;
+ margin: <span class="removed"><del><strong>.2em</strong></del></span>
<span class="inserted"><ins><em>1.2em</em></ins></span> 0 1em;
}
#surveillance .medium {
width: 43%;
@@ -39,6 +40,10 @@
<h2>Proprietary Surveillance</h2>
+<span class="inserted"><ins><em><p><a
href="/proprietary/proprietary.html">
+ Other examples of proprietary malware</a></p>
+
+<div class="comment"></em></ins></span>
<p>Nonfree (proprietary) software is very often malware (designed to
mistreat the user). Nonfree software is controlled by its developers,
which puts them in a position of power over the users; <a
@@ -46,20 +51,27 @@
basic injustice</a>. The developers often exercise that power to the
detriment of the users they ought to serve.</p>
-<div class="announcement">
+<span class="removed"><del><strong><div
class="announcement"></strong></del></span>
+<span class="inserted"><ins><em></div></em></ins></span>
+
<p>This document attempts to
track <strong>clearly established cases of proprietary software that
spies on or tracks users</strong>.</p>
-<p><a href="/proprietary/proprietary.html">
- Other examples of proprietary malware</a></p>
+<span class="removed"><del><strong><p><a
href="/proprietary/proprietary.html">
+ Other examples</strong></del></span>
-<span class="inserted"><ins><em><p>If you know of an example that ought
to be in this page but isn't
-here, please write
-to <a href="mailto:address@hidden"><address@hidden></a>
+<span class="inserted"><ins><em><p>The tethered appliances and
applications are by nature doing
+surveillance. We are not listing them here because they have their own
+page: <a href="/proprietary/proprietary-tethers.html">Proprietary
+Tethers</a>.</p>
+
+<p>If you know</em></ins></span> of <span
class="removed"><del><strong>proprietary malware</a></p>
+</div></strong></del></span> <span class="inserted"><ins><em>an example
that ought to be in this page but isn't
+here, please write to <a
+href="mailto:address@hidden"><address@hidden></a>
to inform us. Please include the URL of a trustworthy reference or two
to present the specifics.</p></em></ins></span>
-</div>
<div id="surveillance">
@@ -296,32 +308,29 @@
<p>To use proprietary software is to invite such treatment.</p>
</li>
- <span class="removed"><del><strong><li><p>
- Windows 10 <a
href="https://web.archive.org/web/20151001035410/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/">
- ships with default settings that show no regard for the
- privacy of its users</a>, giving Microsoft the
“right”</strong></del></span>
+ <span class="removed"><del><strong><li><p></strong></del></span>
<span class="inserted"><ins><em><li id="M201508180">
<p><a
href="https://web.archive.org/web/20150905163414/http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping">
- Intel devices will be able</em></ins></span> to <span
class="removed"><del><strong>snoop on</strong></del></span> <span
class="inserted"><ins><em>listen for speech all</em></ins></span> the <span
class="removed"><del><strong>users' files, text</strong></del></span> <span
class="inserted"><ins><em>time, even
+ Intel devices will be able to listen for speech all the time, even
when “off.”</a></p>
</li>
<li id="M201508130">
<p><a
-
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/">
- Windows 10 sends identifiable information to Microsoft</a>, even if
+
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/"></em></ins></span>
+ Windows 10 <span class="inserted"><ins><em>sends identifiable information
to Microsoft</a>, even if
a user turns off its Bing search and Cortana features, and activates
the privacy-protection settings.</p>
</li>
<li id="M201507300">
- <p>Windows 10 <a
-
href="https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/">
+ <p>Windows 10</em></ins></span> <a <span
class="removed"><del><strong>href="https://web.archive.org/web/20151001035410/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/"></em></ins></span>
ships with default settings that show no regard for the privacy of
its users</a>, giving Microsoft the “right” to snoop on
- the users' files, text</em></ins></span> input, voice input, location
info, contacts,
+ the users' files, text input, voice input, location info, contacts,
calendar records and web browsing history, as well as automatically
connecting the machines to open hotspots and showing targeted <span
class="removed"><del><strong>ads.</p></li>
@@ -577,8 +586,10 @@
them <span class="removed"><del><strong>from there.</p>
</li>
- <li><p>The iMessage app</strong></del></span> <span
class="inserted"><ins><em>to turn the phones on and off, listen to the
microphone,
- retrieve geo-location data from the GPS, take photographs, read
+ <li><p>The iMessage app</strong></del></span> <span
class="inserted"><ins><em>to turn the phones</em></ins></span> on <span
class="removed"><del><strong>iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every phone number that</strong></del></span> <span
class="inserted"><ins><em>and off, listen to</em></ins></span> the <span
class="removed"><del><strong>user types into
it</a>;</strong></del></span> <span class="inserted"><ins><em>microphone,
+ retrieve geo-location data from</em></ins></span> the <span
class="removed"><del><strong>server records these numbers for at least 30
+ days.</p></strong></del></span> <span
class="inserted"><ins><em>GPS, take photographs, read
text messages, read call, location and web browsing history, and
read the contact list. This malware is designed to disguise itself
from investigation.</p>
@@ -593,13 +604,15 @@
the universal back door that we know nearly all portable
phones have. It may involve exploiting various bugs. There are <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
- lots of bugs in the phones' radio software</a>.</p>
+ lots of bugs in the phones' radio
software</a>.</p></em></ins></span>
</li>
- <li id="M201307000">
+ <span
class="removed"><del><strong><li><p>Users</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201307000">
<p>Portable phones with GPS <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
- will send their GPS location on remote command, and users cannot stop
+ will send their GPS location on remote command, and
users</em></ins></span> cannot <span class="inserted"><ins><em>stop
them</a>. (The US says it will eventually require all new portable
phones
to have GPS.)</p>
</li>
@@ -614,54 +627,42 @@
<ul class="blurbs">
<!-- INSERT ithings -->
<li id="M201711250">
- <p>The DMCA and the EU Copyright Directive make it <a
- href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal to study how iOS cr…apps spy on users</a>, because
+ <p>The DMCA and the EU Copyright Directive</em></ins></span> make
<span class="removed"><del><strong>an Apple ID</strong></del></span> <span
class="inserted"><ins><em>it</em></ins></span> <a <span
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ illegal</em></ins></span> to <span class="removed"><del><strong>install
even gratis apps)</a>
+ without giving a valid email address</strong></del></span> <span
class="inserted"><ins><em>study how iOS cr…apps spy on users</a>,
because
this would require circumventing the iOS DRM.</p>
</li>
<li id="M201709210">
<p>In the latest iThings system,
- “turning off” WiFi and Bluetooth the obvious way <a
+ “turning off” WiFi</em></ins></span> and <span
class="removed"><del><strong>receiving</strong></del></span> <span
class="inserted"><ins><em>Bluetooth</em></ins></span> the <span
class="removed"><del><strong>code</strong></del></span> <span
class="inserted"><ins><em>obvious way <a
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
doesn't really turn them off</a>. A more advanced way really does
turn
- them off—only until 5am. That's Apple for you—“We
- know you want to be spied on”.</p>
+ them off—only until 5am. That's</em></ins></span> Apple
+ <span class="removed"><del><strong>sends</strong></del></span> <span
class="inserted"><ins><em>for you—“We
+ know you want</em></ins></span> to <span
class="removed"><del><strong>it.</p></strong></del></span> <span
class="inserted"><ins><em>be spied on”.</p></em></ins></span>
</li>
- <li id="M201702150">
+ <span class="removed"><del><strong><li><p>Around 47%
of</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201702150">
<p>Apple proposes <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>—which would mean no way
to use it without having your fingerprints taken. Users would have
- no way to tell whether the phone is snooping on them.</p>
+ no way to tell whether</em></ins></span> the <span
class="removed"><del><strong>most popular iOS apps</strong></del></span> <span
class="inserted"><ins><em>phone is snooping on them.</p>
</li>
<li id="M201611170">
- <p>iPhones <a
-
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
- lots of personal data to Apple's servers</a>. Big Brother can get
- them from there.</p>
- </li>
-
- <li id="M201609280">
- <p>The iMessage app</em></ins></span> on iThings <a
-
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every phone number that the user types into it</a>; the
- server records these numbers for at least 30 days.</p>
+ <p>iPhones</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
+ behavioral and location information</a></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
+ lots</em></ins></span> of <span class="removed"><del><strong>their users
with third parties.</p></strong></del></span> <span
class="inserted"><ins><em>personal data to Apple's servers</a>. Big
Brother can get
+ them from there.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Users cannot make an
Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install even gratis apps)</a>
- without giving a valid email address and receiving the code Apple
- sends to it.</p>
- </li>
-
- <li><p>Around 47% of the most popular iOS apps
- <a href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral and location information</a> of their users with third
parties.</p>
- </li>
-
- <li><p>iThings</strong></del></span>
+ <span
class="removed"><del><strong><li><p>iThings</strong></del></span>
<span class="inserted"><ins><em><li id="M201509240">
<p>iThings</em></ins></span> automatically upload to Apple's servers
all the photos
@@ -690,24 +691,47 @@
<li><p>Spyware in iThings:
the <a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a></strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p>
+ iBeacon</a> lets stores determine exactly where the iThing is,
+ and get other info too.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>There is also a
feature for web sites to track users, which is
+ <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ enabled by default</a>. (That article talks about iOS 6, but it
+ is still true in iOS 7.)</p>
+ </li>
+
+ <li><p>The iThing also
+ <a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells Apple its geolocation</a> by default, though that can be
+ turned off.</p>
</li>
- <li id="M201409220">
- <p>Apple can, and regularly does, <a
+ <li><p>Apple can, and regularly does,</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201409220">
+ <p>Apple can, and regularly does,</em></ins></span> <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
remotely extract some data from iPhones for the state</a>.</p>
+ <span class="removed"><del><strong></li>
+
+ <li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
+ Either</strong></del></span>
- <p>This may have improved with <a
+ <span class="inserted"><ins><em><p>This may have improved with <a
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
iOS 8 security improvements</a>; but <a
href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
- not as much as Apple claims</a>.</p>
+ not as much as</em></ins></span> Apple <span
class="removed"><del><strong>helps the NSA snoop on all the data in an iThing,
+ or it is totally incompetent.</a></p></strong></del></span>
<span class="inserted"><ins><em>claims</a>.</p></em></ins></span>
</li>
- <li id="M201407230">
- <p><a
+ <span
class="removed"><del><strong><li><p><a</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201407230">
+ <p><a</em></ins></span>
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
Several “features” of iOS seem to exist
for no possible purpose other than surveillance</a>. Here is the
<a
@@ -715,16 +739,14 @@
Technical presentation</a>.</p>
</li>
- <li id="M201401100">
+ <span class="inserted"><ins><em><li id="M201401100">
<p>The <a class="not-a-duplicate"
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a></em></ins></span> lets stores determine exactly where
the iThing is, and
+ iBeacon</a> lets stores determine exactly where the iThing is, and
get other info too.</p>
</li>
- <span
class="removed"><del><strong><li><p>There</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201312300">
+ <li id="M201312300">
<p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
Either Apple helps the NSA snoop on all the data in an iThing, or it
@@ -739,42 +761,19 @@
</li>
<li id="M201210170">
- <p>There</em></ins></span> is also a feature for web sites to track
users, which is <a
+ <p>There is also a feature for web sites to track users, which is
<a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
enabled by default</a>. (That article talks about iOS 6, but it is
still true in iOS 7.)</p>
</li>
- <span class="removed"><del><strong><li><p>The iThing also
- <a
-href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201204280">
- <p>Users cannot make an</em></ins></span> Apple <span
class="removed"><del><strong>its geolocation</a> by default, though that
can be
- turned off.</p>
- </li>
-
- <li><p>Apple can,</strong></del></span> <span
class="inserted"><ins><em>ID (<a
-
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">
- necessary to install even gratis apps</a>) without giving a valid
- email address</em></ins></span> and <span
class="removed"><del><strong>regularly does,
- <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for</strong></del></span> <span
class="inserted"><ins><em>receiving</em></ins></span> the <span
class="removed"><del><strong>state</a>.</p>
- </li>
-
- <li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either</strong></del></span> <span
class="inserted"><ins><em>verification code</em></ins></span> Apple <span
class="removed"><del><strong>helps the NSA snoop on all the data in an iThing,
- or it is totally incompetent.</a></p>
- </li>
-
- <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem</strong></del></span> <span
class="inserted"><ins><em>sends</em></ins></span>
- to <span class="removed"><del><strong>exist for no
- possible purpose other than surveillance</a>. Here is the
- <a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p></strong></del></span> <span
class="inserted"><ins><em>it.</p></em></ins></span>
- </li>
+ <li id="M201204280">
+ <p>Users cannot make an Apple ID (<a
+
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">necessary
+ to install even gratis apps</a>) without giving a valid
+ email address and receiving the verification code Apple sends
+ to it.</p>
+ </li></em></ins></span>
</ul>
@@ -850,28 +849,28 @@
href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
</li>
- <span
class="removed"><del><strong><li><p>Portable</strong></del></span>
+ <span class="removed"><del><strong><li><p>Portable phones with
GPS will send their GPS location on
+ remote command and users cannot stop them:</strong></del></span>
<span class="inserted"><ins><em><li id="M201307280">
- <p>Spyware is present in some Android devices when
- they are sold. Some Motorola</em></ins></span> phones <span
class="removed"><del><strong>with GPS will</strong></del></span> <span
class="inserted"><ins><em>modify Android to <a
-
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"></em></ins></span>
- send <span class="removed"><del><strong>their GPS location on
- remote command and users cannot stop them:</strong></del></span> <span
class="inserted"><ins><em>personal data to Motorola</a>.</p>
- </li>
-
- <li id="M201307250">
- <p>A Motorola phone</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+ <p>Spyware is present in some Android devices when they are
+ sold. Some Motorola phones, made when this company was owned
+ by Google, use a modified version of Android that</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
- (The US says it will eventually require</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice</em></ins></span> all <span
class="removed"><del><strong>new portable phones
- to have GPS.)</p></strong></del></span> <span
class="inserted"><ins><em>the time</a>.</p></em></ins></span>
+ (The US says it will eventually require all new portable
phones</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ sends personal data</em></ins></span> to <span
class="removed"><del><strong>have GPS.)</p></strong></del></span> <span
class="inserted"><ins><em>Motorola</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li><p>The nonfree Snapchat
app's principal purpose</strong></del></span>
- <span class="inserted"><ins><em><li id="M201302150">
+ <span class="inserted"><ins><em><li id="M201307250">
+ <p>A Motorola phone <a
+
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens for voice all the time</a>.</p>
+ </li>
+
+ <li id="M201302150">
<p>Google Play intentionally sends app developers <a
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
the personal details of users that install the app</a>.</p>
@@ -913,31 +912,31 @@
<li id="M201603080">
<p>E-books can contain JavaScript code,</em></ins></span> and <span
class="removed"><del><strong>after the ride</a>.</p>
- <p>This example illustrates how “getting the user's
consent”
+ <p>This example illustrates how
“getting</strong></del></span> <span class="inserted"><ins><em><a
+
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
+ sometimes this code snoops on readers</a>.</p>
+ </li>
+
+ <li id="M201410080">
+ <p>Adobe made “Digital Editions,”</em></ins></span>
+ the <span class="removed"><del><strong>user's consent”
for surveillance is inadequate as a protection against massive
surveillance.</p>
</li>
- <li><p>Google's new voice messaging app</strong></del></span>
<a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ <li><p>Google's new voice messaging app</strong></del></span>
<span class="inserted"><ins><em>e-reader used by most US
libraries,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
all conversations</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
- sometimes this code snoops on
readers</a>.</p></em></ins></span>
+ <span
class="inserted"><ins><em>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data to Adobe</a>. Adobe's “excuse”: it's
+ needed to check DRM!</p></em></ins></span>
</li>
<span class="removed"><del><strong><li><p>Apps that
include</strong></del></span>
- <span class="inserted"><ins><em><li id="M201410080">
- <p>Adobe made “Digital Editions,”
- the e-reader used by most US libraries,</em></ins></span> <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ <span class="inserted"><ins><em><li id="M201212031">
+ <p>The Electronic Frontier Foundation has examined and
found</em></ins></span> <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
Symphony</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of data to Adobe</a>. Adobe's “excuse”: it's
- needed to check DRM!</p>
- </li>
-
- <li id="M201212031">
- <p>The Electronic Frontier Foundation has examined and found <a
- href="https://www.eff.org/pages/reader-privacy-chart-2012">various
+ <span
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012">various
kinds of</em></ins></span> surveillance <span
class="removed"><del><strong>software snoop on what radio</strong></del></span>
<span class="inserted"><ins><em>in the Swindle</em></ins></span> and <span
class="removed"><del><strong>TV programs
are playing nearby</a>. Also on</strong></del></span> <span
class="inserted"><ins><em>other e-readers</a>.</p>
</li>
@@ -1019,9 +1018,9 @@
their users. To protect their privacy</em></ins></span> and <span
class="removed"><del><strong>snooping). In August
2015 it <a
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded</strong></del></span> <span class="inserted"><ins><em>freedom,
Android</em></ins></span> users <span
class="removed"><del><strong>submit</strong></del></span>
- <span class="inserted"><ins><em>need</em></ins></span> to <span
class="removed"><del><strong>increased snooping</a>, and some
- are starting to realize that it is nasty.</p>
+ demanded</strong></del></span> <span class="inserted"><ins><em>freedom,
Android</em></ins></span> users <span class="removed"><del><strong>submit to
increased snooping</a>, and some
+ are starting</strong></del></span>
+ <span class="inserted"><ins><em>need</em></ins></span> to <span
class="removed"><del><strong>realize that it is nasty.</p>
<p>This article shows</strong></del></span> <span
class="inserted"><ins><em>get rid of</em></ins></span> the <span
class="inserted"><ins><em>proprietary software—both proprietary
Android by</em></ins></span> <a
@@ -1068,10 +1067,11 @@
<span class="removed"><del><strong><li><p>The Brightest
Flashlight</strong></del></span>
<span class="inserted"><ins><em><li id="M201803050">
- <p>The moviepass</em></ins></span> app <span
class="inserted"><ins><em>and dis-service
- spy on users even more than users expected. It</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use</strong></del></span>
- <span
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
+ <p>The moviepass</em></ins></span> app
+ <span class="removed"><del><strong><a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use</strong></del></span>
<span class="inserted"><ins><em>and dis-service
+ spy on users even more than users expected. It <a
+
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
where they travel before and after going to a movie</a>.</p>
<p>Don't be tracked—pay cash!</p>
@@ -1574,24 +1574,31 @@
<p>More</em></ins></span> than <span
class="removed"><del><strong>other TV manufacturers in spying on
their users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
“smart” TVs analyze your viewing habits in
detail</strong></del></span> <span
class="inserted"><ins><em>73%</em></ins></span> and
- <span class="removed"><del><strong>link them your IP address</a>
so that advertisers</strong></del></span> <span class="inserted"><ins><em>47%
of mobile applications, from Android and iOS
+ <span class="removed"><del><strong>link them your IP address</a>
so that advertisers can track you
+ across devices.</p>
+
+ <p>It</strong></del></span> <span class="inserted"><ins><em>47% of
mobile applications, from Android and iOS
respectively <a href="https://techscience.org/a/2015103001/">share
personal, behavioral and location information</a> of their users with
third parties.</p>
</li>
<li id="M201508210">
- <p>Like most “music screaming” disservices, Spotify is
- based on proprietary malware (DRM and snooping). In August 2015 it <a
+ <p>Like most “music screaming” disservices,
Spotify</em></ins></span> is <span
class="removed"><del><strong>possible</strong></del></span>
+ <span class="inserted"><ins><em>based on proprietary malware (DRM and
snooping). In August 2015 it <a
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit to increased snooping</a>, and some are
starting
- to realize that it is nasty.</p>
+ demanded users submit</em></ins></span> to <span
class="removed"><del><strong>turn this off, but having</strong></del></span>
<span class="inserted"><ins><em>increased snooping</a>, and some are
starting
+ to realize that</em></ins></span> it <span
class="removed"><del><strong>enabled by default</strong></del></span> is <span
class="removed"><del><strong>an injustice already.</p>
+ </li>
+
+ <li><p>Tivo's alliance with Viacom adds 2.3 million
households</strong></del></span> <span
class="inserted"><ins><em>nasty.</p>
<p>This article shows the <a
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping as a way to “serve”
+ twisted ways that they present snooping as a way</em></ins></span> to
<span class="inserted"><ins><em>“serve”
users better</a>—never mind whether they want that. This is a
- typical example of the attitude of the proprietary software industry
+ typical example of</em></ins></span> the <span
class="removed"><del><strong>600 millions social media
profiles</strong></del></span> <span class="inserted"><ins><em>attitude
of</em></ins></span> the <span class="removed"><del><strong>company already
+ monitors. Tivo customers</strong></del></span> <span
class="inserted"><ins><em>proprietary software industry
towards those they have subjugated.</p>
<p>Out, out, damned Spotify!</p>
@@ -1605,24 +1612,31 @@
proprietary apps, it was only 60%.</p>
<p>The article confusingly describes gratis apps as
- “free”, but most of them are not in fact <a
- href="/philosophy/free-sw.html">free software</a>. It also uses
the
+ “free”, but most of them</em></ins></span> are <span
class="removed"><del><strong>unaware they're being watched by
+ advertisers. By combining TV viewing information with online
+ social media participation, Tivo can now</strong></del></span> <span
class="inserted"><ins><em>not in fact</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
+ advertisement with online purchases</a>, exposing all
users</strong></del></span>
+ <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>. It also uses the
ugly word “monetize”. A good replacement for that word
is “exploit”; nearly always that will fit perfectly.</p>
</li>
<li id="M201505060">
<p>Gratis Android apps (but not <a
- href="/philosophy/free-sw.html">free software</a>) connect to 100
<a
-
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
- and advertising</a> URLs, on the average.</p>
+ href="/philosophy/free-sw.html">free software</a>)
connect</em></ins></span> to
+ <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
+ <li><p>Some web</strong></del></span> <span
class="inserted"><ins><em>100 <a
+
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</em></ins></span>
+ and <span class="removed"><del><strong>TV advertisements play inaudible
sounds to be
+ picked up by proprietary malware running</strong></del></span> <span
class="inserted"><ins><em>advertising</a> URLs,</em></ins></span> on
<span class="removed"><del><strong>other devices</strong></del></span> <span
class="inserted"><ins><em>the average.</p>
</li>
<li id="M201504060">
<p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop on the user</a>. This is in addition to
- the snooping done by the phone company, and perhaps by the OS in
+ QR-code scanner apps snoop on the user</a>. This
is</em></ins></span> in
+ <span class="removed"><del><strong>range so as</strong></del></span>
<span class="inserted"><ins><em>addition</em></ins></span> to <span
class="removed"><del><strong>determine that they</strong></del></span>
+ <span class="inserted"><ins><em>the snooping done by the phone company,
and perhaps by the OS in
the phone.</p>
<p>Don't be distracted by the question of whether the app developers
@@ -1640,7 +1654,7 @@
<li id="M201401151">
<p>The Simeji keyboard is a smartphone version of Baidu's <a
- href="/proprietary/#baidu-ime">spying <abbr
+ href="/proprietary/proprietary-surveillance.html#baidu-ime">spying
<abbr
title="Input Method Editor">IME</abbr></a>.</p>
</li>
@@ -1718,13 +1732,6 @@
information to China</a>.</p>
</li>
- <li id="M201611070">
- <p>nVidia's proprietary GeForce Experience <a
-
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
- users identify themselves and then sends personal data about them to
- nVidia servers</a>.</p>
- </li>
-
<li id="M201512290">
<p>Many <a
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
@@ -1860,10 +1867,7 @@
to the 600 millions social media profiles the company
already monitors. Tivo customers are unaware they're
being watched by advertisers. By combining TV viewing
- information with online social media participation, Tivo</em></ins></span>
can <span class="removed"><del><strong>track you
- across devices.</p>
-
- <p>It</strong></del></span> <span class="inserted"><ins><em>now
<a
+ information with online social media participation, Tivo can now <a
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
correlate TV advertisement with online purchases</a>, exposing all
users to new combined surveillance by default.</p>
@@ -1896,7 +1900,7 @@
Nuance can save it and would then have to give it to the US or some
other government.</p>
- <p>Speech recognition</em></ins></span> is <span
class="removed"><del><strong>possible</strong></del></span> <span
class="inserted"><ins><em>not to be trusted unless it is done by free
+ <p>Speech recognition is not to be trusted unless it is done by free
software in your own computer.</p>
<p>In its privacy policy, Samsung explicitly confirms that <a
@@ -1920,9 +1924,10 @@
better.</p>
<p>This shows that laws requiring products to get users' formal
- consent before collecting personal data are totally inadequate.
+ consent before collecting personal data</em></ins></span> are <span
class="removed"><del><strong>nearby. Once</strong></del></span> <span
class="inserted"><ins><em>totally inadequate.
And what happens if a user declines consent? Probably the TV will
- say, “Without your consent to tracking, the TV will not
+ say, “Without</em></ins></span> your
+ <span class="removed"><del><strong>Internet</strong></del></span> <span
class="inserted"><ins><em>consent to tracking, the TV will not
work.”</p>
<p>Proper laws would say that TVs are not allowed to report what the
@@ -1932,15 +1937,15 @@
<li id="M201405200">
<p>Spyware in LG “smart” TVs <a
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what the user watches, and the switch</em></ins></span> to turn
this <span class="removed"><del><strong>off,</strong></del></span> <span
class="inserted"><ins><em>off has
+ reports what the user watches, and the switch to turn this off has
no effect</a>. (The fact that the transmission reports a 404 error
really means nothing; the server could save that data anyway.)</p>
<p>Even worse, it <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices on the user's local network</a>.</p>
+ snoops on other</em></ins></span> devices <span
class="inserted"><ins><em>on the user's local network</a>.</p>
- <p>LG later said it had installed a patch to stop
this,</em></ins></span> but <span
class="removed"><del><strong>having</strong></del></span> <span
class="inserted"><ins><em>any
+ <p>LG later said it had installed a patch to stop this, but any
product could spy this way.</p>
<p>Meanwhile, LG TVs <a
@@ -1952,7 +1957,7 @@
<p id="break-security-smarttv"><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
Crackers found a way to break security on a “smart”
TV</a>
- and use its camera to watch the people who are watching TV.</p>
+ and use its camera to watch the people who</em></ins></span> are <span
class="removed"><del><strong>paired</strong></del></span> <span
class="inserted"><ins><em>watching TV.</p>
</li>
</ul>
@@ -2024,15 +2029,12 @@
was snooping on its users through the proprietary control
app</a>.</p>
<p>The app was reporting the temperature of the vibrator minute by
- minute (thus, indirectly, whether</em></ins></span> it <span
class="removed"><del><strong>enabled</strong></del></span> <span
class="inserted"><ins><em>was surrounded</em></ins></span> by <span
class="removed"><del><strong>default
- is an injustice already.</p>
- </li>
-
- <li><p>Tivo's alliance</strong></del></span> <span
class="inserted"><ins><em>a person's
+ minute (thus, indirectly, whether it was surrounded by a person's
body), as well as the vibration frequency.</p>
<p>Note the totally inadequate proposed response: a labeling
- standard</em></ins></span> with <span class="removed"><del><strong>Viacom
adds 2.3 million households</strong></del></span> <span
class="inserted"><ins><em>which manufacturers would make statements about their
+ standard</em></ins></span> with <span class="removed"><del><strong>your
TV, advertisers can
+ correlate ads</strong></del></span> <span
class="inserted"><ins><em>which manufacturers would make statements about their
products, rather than free software which users could have checked
and changed.</p>
@@ -2042,56 +2044,52 @@
used it</a>.</p>
<p>The company's statement that it was anonymizing the data may be
- true, but it doesn't really matter. If it had sold the
data</em></ins></span> to <span class="inserted"><ins><em>a data
- broker,</em></ins></span> the <span class="removed"><del><strong>600
millions social media profiles</strong></del></span> <span
class="inserted"><ins><em>data broker would have been able to figure out who the
+ true, but it doesn't really matter. If it had sold the data to a data
+ broker, the data broker would have been able to figure out who the
user was.</p>
<p>Following this lawsuit, <a
-
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></em></ins></span>
- the company <span class="removed"><del><strong>already
- monitors. Tivo customers are unaware they're being watched by
- advertisers. By combining TV viewing information</strong></del></span>
<span class="inserted"><ins><em>has been ordered to pay a total of
C$4m</a> to its
+
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company has been ordered to pay a total of C$4m</a> to its
customers.</p>
</li>
<li id="M201702280">
- <p>“CloudPets” toys</em></ins></span> with <span
class="removed"><del><strong>online
- social media participation, Tivo can now</strong></del></span> <span
class="inserted"><ins><em>microphones</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
- advertisement with online purchases</a>, exposing all
users</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak childrens' conversations</em></ins></span> to
- <span class="removed"><del><strong>new combined
surveillance</strong></del></span> <span class="inserted"><ins><em>the
manufacturer</a>. Guess what? <a
+ <p>“CloudPets” toys</em></ins></span> with <span
class="removed"><del><strong>Web activity,</strong></del></span> <span
class="inserted"><ins><em>microphones <a
+
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
+ leak childrens' conversations to the manufacturer</a>. Guess what?
<a
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found a way to access the data</a>
collected</em></ins></span> by <span
class="removed"><del><strong>default.</p></li>
- <li><p>Some web</strong></del></span> <span
class="inserted"><ins><em>the
+ Crackers found a way to access the data</a> collected by the
manufacturer's snooping.</p>
- <p>That the manufacturer</em></ins></span> and <span
class="removed"><del><strong>TV advertisements play inaudible
sounds</strong></del></span> <span class="inserted"><ins><em>the FBI could
listen</em></ins></span> to <span class="removed"><del><strong>be
- picked up</strong></del></span> <span class="inserted"><ins><em>these
- conversations was unacceptable</em></ins></span> by <span
class="removed"><del><strong>proprietary malware running on other devices in
- range so as</strong></del></span> <span
class="inserted"><ins><em>itself.</p>
+ <p>That the manufacturer</em></ins></span> and
+ <span class="removed"><del><strong>other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span> <span
class="inserted"><ins><em>the FBI could listen to these
+ conversations was unacceptable by itself.</p></em></ins></span>
</li>
+ <span
class="removed"><del><strong><li><p>Vizio</strong></del></span>
- <li id="M201612060">
- <p>The “smart” toys My Friend Cayla and i-Que transmit
<a
-
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
- conversations</em></ins></span> to <span
class="removed"><del><strong>determine that they are nearby. Once your
- Internet devices are paired with your TV,
advertisers</strong></del></span> <span class="inserted"><ins><em>Nuance
Communications</a>, a speech recognition
+ <span class="inserted"><ins><em><li id="M201612060">
+ <p>The</em></ins></span> “smart” <span
class="removed"><del><strong>TVs recognize</strong></del></span> <span
class="inserted"><ins><em>toys My Friend Cayla</em></ins></span> and <span
class="inserted"><ins><em>i-Que transmit</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,
+ even if it isn't</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
+ conversations to Nuance Communications</a>,</em></ins></span> a
<span class="removed"><del><strong>TV channel.</p></strong></del></span>
<span class="inserted"><ins><em>speech recognition
company based in the U.S.</p>
- <p>Those toys also contain major security vulnerabilities;
crackers</em></ins></span>
- can
- <span class="removed"><del><strong>correlate ads</strong></del></span>
<span class="inserted"><ins><em>remotely control the toys</em></ins></span>
with <span class="removed"><del><strong>Web activity,</strong></del></span>
<span class="inserted"><ins><em>a mobile phone. This would enable
+ <p>Those toys also contain major security vulnerabilities; crackers
+ can remotely control the toys with a mobile phone. This would enable
crackers to listen in on a child's speech, and even speak into the
- toys themselves.</p>
+ toys themselves.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>The Amazon
“Smart” TV</strong></del></span>
- <li id="M201502180">
- <p>Barbie <a
-
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
- going to spy on children</em></ins></span> and <span
class="inserted"><ins><em>adults</a>.</p>
+ <span class="inserted"><ins><em><li id="M201502180">
+ <p>Barbie</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
+ watching</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
+ going to spy on children</em></ins></span> and <span
class="removed"><del><strong>listening all the
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>adults</a>.</p></em></ins></span>
</li>
-</ul>
+ <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
@@ -2103,12 +2101,11 @@
<!-- INSERT drones -->
<li id="M201708040">
<p>While you're using a DJI drone
- to snoop on</em></ins></span> other <span
class="inserted"><ins><em>people, DJI is in many cases</em></ins></span> <a
<span
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
- on you</a>.</p></em></ins></span>
+ to snoop on other people, DJI is in many cases</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping</em></ins></span>
+ on <span class="removed"><del><strong>the internet</strong></del></span>
<span class="inserted"><ins><em>you</a>.</p>
</li>
- <span
class="removed"><del><strong><li><p>Vizio</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<div class="big-subsection">
@@ -2117,33 +2114,11 @@
<ul class="blurbs">
<!-- INSERT home -->
- <li id="M201809260">
- <p>Honeywell's</em></ins></span> “smart” <span
class="removed"><del><strong>TVs recognize and
- <a
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track what
people are watching</a>,
- even if it isn't a TV channel.</p>
- </li>
- <li><p>The Amazon “Smart” TV</strong></del></span>
<span class="inserted"><ins><em>thermostats communicate
- only through the company's server. They have
- all the nasty characteristics of such devices:</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
- watching</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9">
- surveillance,</em></ins></span> and <span
class="removed"><del><strong>listening</strong></del></span> <span
class="inserted"><ins><em>danger of sabotage</a> (of a specific user, or
of</em></ins></span>
- all <span class="inserted"><ins><em>users at once), as well
as</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
- </li>
- <li><p>The Samsung “Smart” TV
- <a
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on</strong></del></span> <span class="inserted"><ins><em>risk of
an outage (which is what
- just happened).</p>
-
- <p>In addition, setting</em></ins></span> the <span
class="removed"><del><strong>internet to another
- company, Nuance</a>. Nuance</strong></del></span> <span
class="inserted"><ins><em>desired temperature requires running
- nonfree software. With an old-fashioned thermostat, you</em></ins></span>
can <span class="removed"><del><strong>save</strong></del></span> <span
class="inserted"><ins><em>do</em></ins></span> it <span
class="removed"><del><strong>and would then have</strong></del></span>
- <span class="inserted"><ins><em>using controls right on the
thermostat.</p>
- </li>
-
<li id="M201808120">
- <p>Crackers found a way</em></ins></span> to
- <span class="removed"><del><strong>give</strong></del></span> <span
class="inserted"><ins><em>break the security of an Amazon device,
- and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
+ <p>Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>another
+ company, Nuance</a>. Nuance can save it</strong></del></span> <span
class="inserted"><ins><em>break the security of an Amazon
device,</em></ins></span>
+ and <span class="removed"><del><strong>would then have to
+ give</strong></del></span> <span class="inserted"><ins><em><a
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
turn</em></ins></span> it <span class="inserted"><ins><em>into a listening
device</a> for them.</p>
<p>It was very difficult for them</em></ins></span> to <span
class="inserted"><ins><em>do this. The job would be much
@@ -2691,7 +2666,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/01 19:58:10 $
+$Date: 2018/10/05 12:59:27 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.218
retrieving revision 1.219
diff -u -b -r1.218 -r1.219
--- proprietary-surveillance.ja.po 1 Oct 2018 19:58:10 -0000 1.218
+++ proprietary-surveillance.ja.po 5 Oct 2018 12:59:27 -0000 1.219
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-01 19:55+0000\n"
+"POT-Creation-Date: 2018-10-05 12:56+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -28,6 +28,14 @@
#. type: Content of: <p>
msgid ""
+"<a href=\"/proprietary/proprietary.html\"> Other examples of proprietary "
+"malware</a>"
+msgstr ""
+"<a
href=\"/proprietary/proprietary.html\">ãã®ã»ãã®ãããã©ã¤ã¨ã¿ãªãªãã«"
+"ã¦ã§ã¢ã®ä¾</a>"
+
+#. type: Content of: <div><p>
+msgid ""
"Nonfree (proprietary) software is very often malware (designed to mistreat "
"the user). Nonfree software is controlled by its developers, which puts them "
"in a position of power over the users; <a href=\"/philosophy/free-software-"
@@ -41,7 +49,7 @@
"æ¬çãªä¸æ£ç¾©</a>ã§ããéçºè
ã¯ããã°ãã°ãã®åãè¡ä½¿ãããµã¼ãã¹ãã¹ãã¦ã¼ã¶"
"ã«å¯¾ãã¦æ害ãä¸ãã¾ãã"
-#. type: Content of: <div><p>
+#. type: Content of: <p>
msgid ""
"This document attempts to track <strong>clearly established cases of "
"proprietary software that spies on or tracks users</strong>."
@@ -49,15 +57,14 @@
"ãã®ææ¸ã¯ã<strong>æ確ã«ç¢ºèªããããããã©ã¤ã¨ã¿ãªãªã½ããã¦ã§ã¢ãã¦ã¼ã¶ã"
"ã¹ãã¤ãããã追跡ãããããã±ã¼ã¹</strong>ãè¨é²ãã試ã¿ã§ãã"
-#. type: Content of: <div><p>
+#. type: Content of: <p>
msgid ""
-"<a href=\"/proprietary/proprietary.html\"> Other examples of proprietary "
-"malware</a>"
+"The tethered appliances and applications are by nature doing surveillance. "
+"We are not listing them here because they have their own page: <a href=\"/"
+"proprietary/proprietary-tethers.html\">Proprietary Tethers</a>."
msgstr ""
-"<a
href=\"/proprietary/proprietary.html\">ãã®ã»ãã®ãããã©ã¤ã¨ã¿ãªãªãã«"
-"ã¦ã§ã¢ã®ä¾</a>"
-#. type: Content of: <div><p>
+#. type: Content of: <p>
msgid ""
"If you know of an example that ought to be in this page but isn't here, "
"please write to <a href=\"mailto:address@hidden"><address@hidden"
@@ -962,18 +969,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The iMessage app on iThings <a href=\"https://theintercept.com/2016/09/28/"
-"apple-logs-your-imessage-contacts-and-may-share-them-with-police/\">tells a "
-"server every phone number that the user types into it</a>; the server "
-"records these numbers for at least 30 days."
-msgstr ""
-"iThingsã®iMessageã¢ããªã¯<a
href=\"https://theintercept.com/2016/09/28/apple-"
-"logs-your-imessage-contacts-and-may-share-them-with-police/\">ã¦ã¼ã¶ãå
¥åã"
-"ããã¹ã¦ã®é»è©±çªå·ããµã¼ãã«ä¼ãã¾ãã</a>ãµã¼ãã¯æä½30æ¥éãã®çªå·ãè¨é²ã"
-"ã¾ãã"
-
-#. type: Content of: <ul><li><p>
-msgid ""
"iThings automatically upload to Apple's servers all the photos and videos "
"they make."
msgstr ""
@@ -1139,7 +1134,7 @@
msgid ""
"Users cannot make an Apple ID (<a href=\"https://apple.stackexchange.com/"
"questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"
-"\"> necessary to install even gratis apps</a>) without giving a valid email "
+"\">necessary to install even gratis apps</a>) without giving a valid email "
"address and receiving the verification code Apple sends to it."
msgstr ""
"ã¦ã¼ã¶ã¯Apple IDãã<a
href=\"http://apple.stackexchange.com/questions/49951/"
@@ -1248,10 +1243,17 @@
"hackers.htm\">ãã£ã¨å¤ãã®æ
å ±(è±èª)</a>ãããã¾ãã"
#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Spyware is present in some Android devices when they are sold. Some "
+#| "Motorola phones modify Android to <a href=\"http://www.beneaththewaves."
+#| "net/Projects/Motorola_Is_Listening.html\"> send personal data to "
+#| "Motorola</a>."
msgid ""
"Spyware is present in some Android devices when they are sold. Some "
-"Motorola phones modify Android to <a href=\"http://www.beneaththewaves.net/"
-"Projects/Motorola_Is_Listening.html\"> send personal data to Motorola</a>."
+"Motorola phones, made when this company was owned by Google, use a modified "
+"version of Android that <a href=\"http://www.beneaththewaves.net/Projects/"
+"Motorola_Is_Listening.html\"> sends personal data to Motorola</a>."
msgstr ""
"ã¹ãã¤ã¦ã§ã¢ã¯è²©å£²ãããæã«ããã¤ãã®ã¢ã³ããã¤ãã®ããã¤ã¹ã«åå¨ãã¾ããã¢"
"ããã¼ã©ã®ããã¤ãã®æºå¸¯é»è©±ã¯ã¢ã³ããã¤ãã<a
href=\"http://www."
@@ -1959,8 +1961,8 @@
#. type: Content of: <ul><li><p>
msgid ""
"The Simeji keyboard is a smartphone version of Baidu's <a href=\"/"
-"proprietary/#baidu-ime\">spying <abbr title=\"Input Method Editor\">IME</"
-"abbr></a>."
+"proprietary/proprietary-surveillance.html#baidu-ime\">spying <abbr title="
+"\"Input Method Editor\">IME</abbr></a>."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -2098,18 +2100,6 @@
msgstr ""
#. type: Content of: <ul><li><p>
-msgid ""
-"nVidia's proprietary GeForce Experience <a href=\"http://www.gamersnexus.net/"
-"industry/2672-geforce-experience-data-transfer-analysis\">makes users "
-"identify themselves and then sends personal data about them to nVidia "
-"servers</a>."
-msgstr ""
-"nVidiaã®ãããã©ã¤ã¨ã¿ãªãªGeForce Experienceã¯<a
href=\"http://www."
-"gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis\">"
-"ã¦ã¼ã¶ã«èº«å証æãæ±ããããã¦ããããã¦ã¼ã¶ã®å人æ
å ±ãnVidiaã®ãµã¼ãã«éã"
-"ã¾ã</a>ã"
-
-#. type: Content of: <ul><li><p>
#, fuzzy
#| msgid ""
#| "Many <a href=\"http://www.thestar.com/news/canada/2015/12/29/how-much-"
@@ -2815,23 +2805,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Honeywell's “smart” thermostats communicate only through the "
-"company's server. They have all the nasty characteristics of such devices: "
-"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
-"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
-"user, or of all users at once), as well as the risk of an outage (which is "
-"what just happened)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In addition, setting the desired temperature requires running nonfree "
-"software. With an old-fashioned thermostat, you can do it using controls "
-"right on the thermostat."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Crackers found a way to break the security of an Amazon device, and <a href="
"\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it into a "
"listening device</a> for them."
@@ -3508,6 +3481,28 @@
msgid "Updated:"
msgstr "æçµæ´æ°:"
+#~ msgid ""
+#~ "The iMessage app on iThings <a href=\"https://theintercept.com/2016/09/28/"
+#~ "apple-logs-your-imessage-contacts-and-may-share-them-with-police/\">tells "
+#~ "a server every phone number that the user types into it</a>; the server "
+#~ "records these numbers for at least 30 days."
+#~ msgstr ""
+#~ "iThingsã®iMessageã¢ããªã¯<a
href=\"https://theintercept.com/2016/09/28/"
+#~
"apple-logs-your-imessage-contacts-and-may-share-them-with-police/\">ã¦ã¼ã¶"
+#~ "ãå
¥åãããã¹ã¦ã®é»è©±çªå·ããµã¼ãã«ä¼ãã¾ãã</a>ãµã¼ãã¯æä½30æ¥éãã®çª"
+#~ "å·ãè¨é²ãã¾ãã"
+
+#~ msgid ""
+#~ "nVidia's proprietary GeForce Experience <a href=\"http://www.gamersnexus."
+#~ "net/industry/2672-geforce-experience-data-transfer-analysis\">makes users "
+#~ "identify themselves and then sends personal data about them to nVidia "
+#~ "servers</a>."
+#~ msgstr ""
+#~ "nVidiaã®ãããã©ã¤ã¨ã¿ãªãªGeForce Experienceã¯<a
href=\"http://www."
+#~ "gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis\">"
+#~
"ã¦ã¼ã¶ã«èº«å証æãæ±ããããã¦ããããã¦ã¼ã¶ã®å人æ
å ±ãnVidiaã®ãµã¼ãã«é"
+#~ "ãã¾ã</a>ã"
+
#~ msgid "<a href=\"#SpywareAtWork\">Spyware at Work</a>"
#~ msgstr "<a href=\"#SpywareAtWork\">ä»äºå ´ã§ã®ã¹ãã¤ã¦ã§ã¢</a>"
Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.167
retrieving revision 1.168
diff -u -b -r1.167 -r1.168
--- proprietary-surveillance.pot 1 Oct 2018 19:58:10 -0000 1.167
+++ proprietary-surveillance.pot 5 Oct 2018 12:59:27 -0000 1.168
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-01 19:55+0000\n"
+"POT-Creation-Date: 2018-10-05 12:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -26,6 +26,12 @@
#. type: Content of: <p>
msgid ""
+"<a href=\"/proprietary/proprietary.html\"> Other examples of proprietary "
+"malware</a>"
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
"Nonfree (proprietary) software is very often malware (designed to mistreat "
"the user). Nonfree software is controlled by its developers, which puts them "
"in a position of power over the users; <a "
@@ -34,19 +40,20 @@
"detriment of the users they ought to serve."
msgstr ""
-#. type: Content of: <div><p>
+#. type: Content of: <p>
msgid ""
"This document attempts to track <strong>clearly established cases of "
"proprietary software that spies on or tracks users</strong>."
msgstr ""
-#. type: Content of: <div><p>
+#. type: Content of: <p>
msgid ""
-"<a href=\"/proprietary/proprietary.html\"> Other examples of proprietary "
-"malware</a>"
+"The tethered appliances and applications are by nature doing "
+"surveillance. We are not listing them here because they have their own page: "
+"<a href=\"/proprietary/proprietary-tethers.html\">Proprietary Tethers</a>."
msgstr ""
-#. type: Content of: <div><p>
+#. type: Content of: <p>
msgid ""
"If you know of an example that ought to be in this page but isn't here, "
"please write to <a "
@@ -673,14 +680,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The iMessage app on iThings <a "
-"href=\"https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/\">tells
"
-"a server every phone number that the user types into it</a>; the server "
-"records these numbers for at least 30 days."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"iThings automatically upload to Apple's servers all the photos and videos "
"they make."
msgstr ""
@@ -777,9 +776,9 @@
#. type: Content of: <ul><li><p>
msgid ""
"Users cannot make an Apple ID (<a "
-"href=\"https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id\">
"
-"necessary to install even gratis apps</a>) without giving a valid email "
-"address and receiving the verification code Apple sends to it."
+"href=\"https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id\">necessary
"
+"to install even gratis apps</a>) without giving a valid email address and "
+"receiving the verification code Apple sends to it."
msgstr ""
#. type: Content of: <div><h4>
@@ -852,9 +851,10 @@
#. type: Content of: <ul><li><p>
msgid ""
"Spyware is present in some Android devices when they are sold. Some "
-"Motorola phones modify Android to <a "
+"Motorola phones, made when this company was owned by Google, use a modified "
+"version of Android that <a "
"href=\"http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html\"> "
-"send personal data to Motorola</a>."
+"sends personal data to Motorola</a>."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -1442,8 +1442,8 @@
#. type: Content of: <ul><li><p>
msgid ""
"The Simeji keyboard is a smartphone version of Baidu's <a "
-"href=\"/proprietary/#baidu-ime\">spying <abbr title=\"Input Method "
-"Editor\">IME</abbr></a>."
+"href=\"/proprietary/proprietary-surveillance.html#baidu-ime\">spying <abbr "
+"title=\"Input Method Editor\">IME</abbr></a>."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -1530,14 +1530,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"nVidia's proprietary GeForce Experience <a "
-"href=\"http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis\">makes
"
-"users identify themselves and then sends personal data about them to nVidia "
-"servers</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Many <a "
"href=\"http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/\">
"
"video game consoles snoop on their users and report to the "
@@ -2020,24 +2012,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Honeywell's “smart” thermostats communicate only through the "
-"company's server. They have all the nasty characteristics of such devices: "
-"<a "
-"href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9\">
"
-"surveillance, and danger of sabotage</a> (of a specific user, or of all "
-"users at once), as well as the risk of an outage (which is what just "
-"happened)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In addition, setting the desired temperature requires running nonfree "
-"software. With an old-fashioned thermostat, you can do it using controls "
-"right on the thermostat."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Crackers found a way to break the security of an Amazon device, and <a "
"href=\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it "
"into a listening device</a> for them."
Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.408
retrieving revision 1.409
diff -u -b -r1.408 -r1.409
--- proprietary-surveillance.ru.po 2 Oct 2018 07:28:56 -0000 1.408
+++ proprietary-surveillance.ru.po 5 Oct 2018 12:59:27 -0000 1.409
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-01 19:55+0000\n"
+"POT-Creation-Date: 2018-10-05 12:56+0000\n"
"PO-Revision-Date: 2018-10-02 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-05 12:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -28,6 +29,14 @@
#. type: Content of: <p>
msgid ""
+"<a href=\"/proprietary/proprietary.html\"> Other examples of proprietary "
+"malware</a>"
+msgstr ""
+"<a href=\"/proprietary/proprietary.html\">ÐÑÑгие пÑимеÑÑ
вÑедоноÑнÑÑ
"
+"неÑвободнÑÑ
пÑогÑамм</a>"
+
+#. type: Content of: <div><p>
+msgid ""
"Nonfree (proprietary) software is very often malware (designed to mistreat "
"the user). Nonfree software is controlled by its developers, which puts them "
"in a position of power over the users; <a href=\"/philosophy/free-software-"
@@ -41,7 +50,7 @@
"РазÑабоÑÑики ÑаÑÑо полÑзÑÑÑÑÑ ÑÑой
влаÑÑÑÑ Ð² ÑÑеÑб полÑзоваÑелÑм, коÑоÑÑÑ
"
"они Ð´Ð¾Ð»Ð¶Ð½Ñ Ð¾Ð±ÑлÑживаÑÑ."
-#. type: Content of: <div><p>
+#. type: Content of: <p>
msgid ""
"This document attempts to track <strong>clearly established cases of "
"proprietary software that spies on or tracks users</strong>."
@@ -49,15 +58,14 @@
"Ð ÑÑом докÑменÑе Ð¼Ñ Ð¿ÑÑаемÑÑ Ð¾ÑÑледиÑÑ
<strong>Ñ
оÑоÑо ÑÑÑановленнÑе ÑлÑÑаи "
"неÑвободнÑÑ
пÑогÑамм, коÑоÑÑе ÑпионÑÑ Ð¸Ð»Ð¸
ÑледÑÑ Ð·Ð° полÑзоваÑелÑми</strong>."
-#. type: Content of: <div><p>
+#. type: Content of: <p>
msgid ""
-"<a href=\"/proprietary/proprietary.html\"> Other examples of proprietary "
-"malware</a>"
+"The tethered appliances and applications are by nature doing surveillance. "
+"We are not listing them here because they have their own page: <a href=\"/"
+"proprietary/proprietary-tethers.html\">Proprietary Tethers</a>."
msgstr ""
-"<a href=\"/proprietary/proprietary.html\">ÐÑÑгие пÑимеÑÑ
вÑедоноÑнÑÑ
"
-"неÑвободнÑÑ
пÑогÑамм</a>"
-#. type: Content of: <div><p>
+#. type: Content of: <p>
msgid ""
"If you know of an example that ought to be in this page but isn't here, "
"please write to <a href=\"mailto:address@hidden"><address@hidden"
@@ -911,19 +919,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The iMessage app on iThings <a href=\"https://theintercept.com/2016/09/28/"
-"apple-logs-your-imessage-contacts-and-may-share-them-with-police/\">tells a "
-"server every phone number that the user types into it</a>; the server "
-"records these numbers for at least 30 days."
-msgstr ""
-"ÐÑиложение iMessage Ð´Ð»Ñ iThings <a href=\"https://theintercept."
-"com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-"
-"police/\">докладÑÐ²Ð°ÐµÑ ÑеÑвеÑÑ Ð¾ каждом номеÑе
ÑелеÑона, коÑоÑÑй вводиÑÑÑ Ð² "
-"него полÑзоваÑелем</a>; ÑеÑÐ²ÐµÑ Ð·Ð°Ð¿Ð¾Ð¼Ð¸Ð½Ð°ÐµÑ
ÑÑи номеÑа по менÑÑей меÑе на 30 "
-"ÑÑÑок."
-
-#. type: Content of: <ul><li><p>
-msgid ""
"iThings automatically upload to Apple's servers all the photos and videos "
"they make."
msgstr ""
@@ -1064,10 +1059,20 @@
"6, но ÑÑо веÑно и Ð´Ð»Ñ iOS 7)."
#. type: Content of: <ul><li><p>
+# | Users cannot make an Apple ID (<a
+# |
href=\"https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id\">[-
+# | -]necessary to install even gratis apps</a>) without giving a valid email
+# | address and receiving the verification code Apple sends to it.
+#, fuzzy
+#| msgid ""
+#| "Users cannot make an Apple ID (<a href=\"https://apple.stackexchange.com/"
+#| "questions/49951/how-can-i-download-free-apps-without-registering-an-apple-"
+#| "id\"> necessary to install even gratis apps</a>) without giving a valid "
+#| "email address and receiving the verification code Apple sends to it."
msgid ""
"Users cannot make an Apple ID (<a href=\"https://apple.stackexchange.com/"
"questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"
-"\"> necessary to install even gratis apps</a>) without giving a valid email "
+"\">necessary to install even gratis apps</a>) without giving a valid email "
"address and receiving the verification code Apple sends to it."
msgstr ""
"ÐолÑзоваÑели не могÑÑ ÑоздаÑÑ <a
href=\"https://apple.stackexchange.com/"
@@ -1185,10 +1190,22 @@
"cryptome.org/2013/08/fbi-hackers.htm\">ÐÑÑгие
подÑобноÑÑи</a>."
#. type: Content of: <ul><li><p>
+# | Spyware is present in some Android devices when they are sold. Some
+# | Motorola [-phones modify-] {+phones, made when this company was owned by
+# | Google, use a modified version of+} Android [-to-] {+that+} <a
+# |
href=\"http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html\">
+# | send{+s+} personal data to Motorola</a>.
+#, fuzzy
+#| msgid ""
+#| "Spyware is present in some Android devices when they are sold. Some "
+#| "Motorola phones modify Android to <a href=\"http://www.beneaththewaves."
+#| "net/Projects/Motorola_Is_Listening.html\"> send personal data to "
+#| "Motorola</a>."
msgid ""
"Spyware is present in some Android devices when they are sold. Some "
-"Motorola phones modify Android to <a href=\"http://www.beneaththewaves.net/"
-"Projects/Motorola_Is_Listening.html\"> send personal data to Motorola</a>."
+"Motorola phones, made when this company was owned by Google, use a modified "
+"version of Android that <a href=\"http://www.beneaththewaves.net/Projects/"
+"Motorola_Is_Listening.html\"> sends personal data to Motorola</a>."
msgstr ""
"ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð¿ÑиÑÑÑÑÑвÑÑÑ Ð½Ð°
некоÑоÑÑÑ
ÑÑÑÑойÑÑваÑ
Android, когда они "
"пÑодаÑÑÑÑ. РнекоÑоÑÑÑ
ÑелеÑонаÑ
Motorola
ÑиÑÑема Android изменена Ð´Ð»Ñ <a "
@@ -2055,10 +2072,19 @@
"видно и ÑÑо можно оÑклÑÑиÑÑ</a>. Ðе Ñак плоÑ
о, как Ñо, ÑÑо делаÑÑ Ð´ÑÑгие."
#. type: Content of: <ul><li><p>
+# | The Simeji keyboard is a smartphone version of Baidu's <a
+# | [-href=\"/proprietary/#baidu-ime\">spying-]
+# | {+href=\"/proprietary/proprietary-surveillance.html#baidu-ime\">spying+}
+# | <abbr title=\"Input Method Editor\">IME</abbr></a>.
+#, fuzzy
+#| msgid ""
+#| "The Simeji keyboard is a smartphone version of Baidu's <a href=\"/"
+#| "proprietary/#baidu-ime\">spying <abbr title=\"Input Method Editor\">IME</"
+#| "abbr></a>."
msgid ""
"The Simeji keyboard is a smartphone version of Baidu's <a href=\"/"
-"proprietary/#baidu-ime\">spying <abbr title=\"Input Method Editor\">IME</"
-"abbr></a>."
+"proprietary/proprietary-surveillance.html#baidu-ime\">spying <abbr title="
+"\"Input Method Editor\">IME</abbr></a>."
msgstr ""
"ÐлавиаÑÑÑа Simeji — ÑмаÑÑÑÐ¾Ð½Ð½Ð°Ñ Ð²ÐµÑÑиÑ
<a href=\"/proprietary/"
"#baidu-ime\">ÑпионÑÑего меÑода ввода</a> Baidu."
@@ -2193,18 +2219,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"nVidia's proprietary GeForce Experience <a href=\"http://www.gamersnexus.net/"
-"industry/2672-geforce-experience-data-transfer-analysis\">makes users "
-"identify themselves and then sends personal data about them to nVidia "
-"servers</a>."
-msgstr ""
-"ÐеÑÐ²Ð¾Ð±Ð¾Ð´Ð½Ð°Ñ Ð¿ÑогÑамма nVidia GeForce Experience <a
href=\"http://www."
-"gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis\"> "
-"заÑÑавлÑÐµÑ Ð¿Ð¾Ð»ÑзоваÑелей ÑказÑваÑÑ ÑебÑ,
а заÑем вÑÑÑÐ»Ð°ÐµÑ Ð¸Ñ
пеÑÑоналÑнÑе "
-"даннÑе на ÑеÑвеÑÑ nVidia</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Many <a href=\"http://www.thestar.com/news/canada/2015/12/29/how-much-data-"
"are-video-games-collecting-about-you.html/\"> video game consoles snoop on "
"their users and report to the internet</a>—even what their users weigh."
@@ -2891,32 +2905,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Honeywell's “smart” thermostats communicate only through the "
-"company's server. They have all the nasty characteristics of such devices: "
-"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
-"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
-"user, or of all users at once), as well as the risk of an outage (which is "
-"what just happened)."
-msgstr ""
-"“ÐнÑеллекÑÑалÑнÑе” ÑеÑмоÑÑаÑÑ Honeywell
ÑвÑзÑваÑÑÑÑ ÑолÑко Ñ "
-"ÑеÑвеÑом компании. У ниÑ
еÑÑÑ Ð²Ñе ÑквеÑнÑе
ÑеÑÑÑ ÑакиÑ
ÑÑÑÑойÑÑв: <a href="
-"\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
-"outage-2018-9\"> Ñлежка и опаÑноÑÑÑ ÑабоÑажа</a>
(конкÑеÑного полÑзоваÑÐµÐ»Ñ Ð¸ "
-"вÑеÑ
полÑзоваÑелей ÑÑазÑ), а Ñакже ÑиÑк
пеÑеÑÑвов в ÑабоÑе (именно ÑÑо и "
-"пÑоизоÑло)."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In addition, setting the desired temperature requires running nonfree "
-"software. With an old-fashioned thermostat, you can do it using controls "
-"right on the thermostat."
-msgstr ""
-"ÐÑоме Ñого, ÑÑÑановка ÑÑебÑемой
ÑемпеÑаÑÑÑÑ ÑÑебÑÐµÑ Ð½ÐµÑвободнÑÑ
пÑогÑамм.
Ð "
-"ÑÑаÑомоднÑÑ
ÑеÑмоÑÑаÑаÑ
ÑÑо делаеÑÑÑ Ñ
помоÑÑÑ Ð¾Ñганов ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð¿ÑÑмо на "
-"ÑеÑмоÑÑаÑе."
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Crackers found a way to break the security of an Amazon device, and <a href="
"\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it into a "
"listening device</a> for them."
@@ -3613,6 +3601,53 @@
msgid "Updated:"
msgstr "Ðбновлено:"
+#~ msgid ""
+#~ "The iMessage app on iThings <a href=\"https://theintercept.com/2016/09/28/"
+#~ "apple-logs-your-imessage-contacts-and-may-share-them-with-police/\">tells "
+#~ "a server every phone number that the user types into it</a>; the server "
+#~ "records these numbers for at least 30 days."
+#~ msgstr ""
+#~ "ÐÑиложение iMessage Ð´Ð»Ñ iThings <a
href=\"https://theintercept."
+#~ "com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-"
+#~ "police/\">докладÑÐ²Ð°ÐµÑ ÑеÑвеÑÑ Ð¾ каждом
номеÑе ÑелеÑона, коÑоÑÑй вводиÑÑÑ "
+#~ "в него полÑзоваÑелем</a>; ÑеÑвеÑ
Ð·Ð°Ð¿Ð¾Ð¼Ð¸Ð½Ð°ÐµÑ ÑÑи номеÑа по менÑÑей меÑе "
+#~ "на 30 ÑÑÑок."
+
+#~ msgid ""
+#~ "nVidia's proprietary GeForce Experience <a href=\"http://www.gamersnexus."
+#~ "net/industry/2672-geforce-experience-data-transfer-analysis\">makes users "
+#~ "identify themselves and then sends personal data about them to nVidia "
+#~ "servers</a>."
+#~ msgstr ""
+#~ "ÐеÑÐ²Ð¾Ð±Ð¾Ð´Ð½Ð°Ñ Ð¿ÑогÑамма nVidia GeForce Experience <a
href=\"http://www."
+#~ "gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"
+#~ "\"> заÑÑавлÑÐµÑ Ð¿Ð¾Ð»ÑзоваÑелей ÑказÑваÑÑ
ÑебÑ, а заÑем вÑÑÑÐ»Ð°ÐµÑ Ð¸Ñ
"
+#~ "пеÑÑоналÑнÑе даннÑе на ÑеÑвеÑÑ nVidia</a>."
+
+#~ msgid ""
+#~ "Honeywell's “smart” thermostats communicate only through the "
+#~ "company's server. They have all the nasty characteristics of such "
+#~ "devices: <a href=\"https://www.businessinsider.com/honeywell-iot-"
+#~ "thermostats-server-outage-2018-9\"> surveillance, and danger of sabotage</"
+#~ "a> (of a specific user, or of all users at once), as well as the risk of "
+#~ "an outage (which is what just happened)."
+#~ msgstr ""
+#~ "“ÐнÑеллекÑÑалÑнÑе” ÑеÑмоÑÑаÑÑ
Honeywell ÑвÑзÑваÑÑÑÑ ÑолÑко Ñ "
+#~ "ÑеÑвеÑом компании. У ниÑ
еÑÑÑ Ð²Ñе
ÑквеÑнÑе ÑеÑÑÑ ÑакиÑ
ÑÑÑÑойÑÑв: <a href="
+#~ "\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
+#~ "outage-2018-9\"> Ñлежка и опаÑноÑÑÑ ÑабоÑажа</a>
(конкÑеÑного "
+#~ "полÑзоваÑÐµÐ»Ñ Ð¸ вÑеÑ
полÑзоваÑелей
ÑÑазÑ), а Ñакже ÑиÑк пеÑеÑÑвов в ÑабоÑе "
+#~ "(именно ÑÑо и пÑоизоÑло)."
+
+#~ msgid ""
+#~ "In addition, setting the desired temperature requires running nonfree "
+#~ "software. With an old-fashioned thermostat, you can do it using controls "
+#~ "right on the thermostat."
+#~ msgstr ""
+#~ "ÐÑоме Ñого, ÑÑÑановка ÑÑебÑемой
ÑемпеÑаÑÑÑÑ ÑÑебÑÐµÑ Ð½ÐµÑвободнÑÑ
пÑогÑамм. "
+#~ "Ð ÑÑаÑомоднÑÑ
ÑеÑмоÑÑаÑаÑ
ÑÑо делаеÑÑÑ
Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ Ð¾Ñганов ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð¿ÑÑмо "
+#~ "на ÑеÑмоÑÑаÑе."
+
#~ msgid "<a href=\"#SpywareAtWork\">Spyware at Work</a>"
#~ msgstr "<a href=\"#SpywareAtWork\">ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð½Ð°
ÑабоÑе</a>"
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary/po proprietary-insecurity.de.po...,
GNUN <=