[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www planetfeeds.ru.html po/planetfeeds.ru.po pr...
From: |
GNUN |
Subject: |
www planetfeeds.ru.html po/planetfeeds.ru.po pr... |
Date: |
Mon, 8 Oct 2018 03:58:04 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 18/10/08 03:58:03
Modified files:
. : planetfeeds.ru.html
po : planetfeeds.ru.po
proprietary : malware-amazon.ru.html malware-apple.ru.html
malware-appliances.ru.html malware-cars.ru.html
malware-games.ru.html malware-microsoft.ru.html
malware-mobiles.ru.html
proprietary-back-doors.ru.html
proprietary-drm.ru.html
proprietary-jails.ru.html
proprietary-sabotage.ru.html
proprietary/po : malware-amazon.ru-en.html malware-amazon.ru.po
malware-apple.ru-en.html malware-apple.ru.po
malware-appliances.ru-en.html
malware-appliances.ru.po
malware-cars.ru-en.html malware-cars.ru.po
malware-games.ru-en.html malware-games.ru.po
malware-microsoft.ru-en.html
malware-microsoft.ru.po
malware-mobiles.ru-en.html
malware-mobiles.ru.po
proprietary-back-doors.ru-en.html
proprietary-back-doors.ru.po
proprietary-drm.ru-en.html
proprietary-drm.ru.po
proprietary-jails.ru-en.html
proprietary-jails.ru.po
proprietary-sabotage.ru-en.html
proprietary-sabotage.ru.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/planetfeeds.ru.html?cvsroot=www&r1=1.803&r2=1.804
http://web.cvs.savannah.gnu.org/viewcvs/www/po/planetfeeds.ru.po?cvsroot=www&r1=1.1190&r2=1.1191
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-amazon.ru.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.ru.html?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.ru.html?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-cars.ru.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-games.ru.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.ru.html?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.ru.html?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.ru.html?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-drm.ru.html?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-jails.ru.html?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.ru.html?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.ru-en.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.ru.po?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ru-en.html?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ru.po?cvsroot=www&r1=1.173&r2=1.174
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.ru-en.html?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.ru.po?cvsroot=www&r1=1.118&r2=1.119
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.ru-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.ru.po?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.ru-en.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.ru.po?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ru-en.html?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ru.po?cvsroot=www&r1=1.176&r2=1.177
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru-en.html?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.117&r2=1.118
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ru-en.html?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ru.po?cvsroot=www&r1=1.149&r2=1.150
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.ru-en.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.ru.po?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.ru-en.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.ru.po?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ru-en.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ru.po?cvsroot=www&r1=1.141&r2=1.142
Patches:
Index: planetfeeds.ru.html
===================================================================
RCS file: /web/www/www/planetfeeds.ru.html,v
retrieving revision 1.803
retrieving revision 1.804
diff -u -b -r1.803 -r1.804
--- planetfeeds.ru.html 8 Oct 2018 04:58:27 -0000 1.803
+++ planetfeeds.ru.html 8 Oct 2018 07:58:02 -0000 1.804
@@ -6,13 +6,12 @@
value="<a
href='https://gnu.org/software/guix/blog/2018/join-gnu-guix-through-outreachy/'>"
-->
<!--#echo
encoding="none" var="link" -->
-Join GNU Guix through Outreachy<!--#echo encoding="none"
+УÑаÑÑвÑй в GNU Guix по пÑогÑамме
ÑÑажиÑовки<!--#echo encoding="none"
var="a_close" -->
<!-- TRANSLATORS:
https://gnu.org/software/guix/blog/2018/join-gnu-guix-through-outreachy/ -->
-: We are happy to announce that for the second time this year, GNU Guix
-offers a three-month internship through Outreachy, the inclusion program for
-groups trad...
+: ÐÑ ÑÑаÑÑÐ»Ð¸Ð²Ñ Ð¾Ð±ÑÑвиÑÑ, ÑÑо в ÑÑÐ¾Ñ Ð³Ð¾Ð´ GNU Guix
вÑоÑой Ñаз пÑедлагаеÑ
+ÑпеÑиалÑнÑÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ ÑÑеÑ
меÑÑÑной
ÑÑажиÑовки...
</p>
<p>
<!--#set var="link"
Index: po/planetfeeds.ru.po
===================================================================
RCS file: /web/www/www/po/planetfeeds.ru.po,v
retrieving revision 1.1190
retrieving revision 1.1191
diff -u -b -r1.1190 -r1.1191
--- po/planetfeeds.ru.po 8 Oct 2018 07:48:24 -0000 1.1190
+++ po/planetfeeds.ru.po 8 Oct 2018 07:58:02 -0000 1.1191
@@ -14,7 +14,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-10-08 04:57+0000\n"
#. type: Content of: <p>
msgid "Join GNU Guix through Outreachy"
Index: proprietary/malware-amazon.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-amazon.ru.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary/malware-amazon.ru.html 6 Oct 2018 18:28:23 -0000 1.10
+++ proprietary/malware-amazon.ru.html 8 Oct 2018 07:58:02 -0000 1.11
@@ -13,26 +13,13 @@
пÑогÑаммного обеÑпеÑениÑ</title>
<!--#include virtual="/proprietary/po/malware-amazon.translist" -->
-<style type="text/css" media="print,screen"><!--
-div.toc { width: 100%; padding: 1.3em 3%; }
-div.toc h3 { display: inline; margin: 0 1.5%; }
-div.toc ul { display: inline; margin: 0; }
-div.toc li {
- display: inline;
- list-style: none;
- font-size: 1.3em;
- margin: 0 1.5%;
-}
--->
-</style>
-
<!--#include virtual="/server/banner.ru.html" -->
<h2>ÐÑогÑÐ°Ð¼Ð¼Ñ Amazon вÑедоноÑнÑ</h2>
<p><a href="/proprietary/proprietary.html">ÐÑÑгие пÑимеÑÑ
вÑедоноÑнÑÑ
неÑвободнÑÑ
пÑогÑамм</a></p>
-<div class="highlight-para">
+<div class="comment">
<p>
ÐÑедоноÑнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð¸ неÑвободнÑе
пÑогÑÐ°Ð¼Ð¼Ñ — две ÑазнÑÑ
пÑоблемÑ. ÐÑедоноÑнÑе пÑогÑаммÑ
пÑоекÑиÑÑÑÑÑÑ, ÑÑÐ¾Ð±Ñ ÑÑемлÑÑÑ
полÑзоваÑелей
@@ -45,20 +32,21 @@
ÑÑо понимание ÑазÑабоÑÑиком Ñого, ÑÑо
полÑзоваÑели бÑдÑÑ Ð±ÐµÑÑилÑÐ½Ñ Ð¸ÑпÑавиÑÑ
лÑбÑе вÑедоноÑнÑе ÑÑнкÑии, ÑоблазнÑеÑ
ÑазÑабоÑÑика вноÑиÑÑ Ñакие ÑÑнкÑии.
</p>
+
+<div class="important">
<p>ÐÑли вам извеÑÑен пÑимеÑ, коÑоÑÑй должен
бÑÑÑ Ð½Ð° ÑÑой ÑÑÑаниÑе, но его здеÑÑ
неÑ, ÑообÑиÑе нам по адÑеÑÑ <a
href="mailto:address@hidden"><address@hidden></a>. УпомÑниÑе
один-два заÑлÑживаÑÑиÑ
довеÑÐ¸Ñ URL, ÑÑобÑ
пÑоиллÑÑÑÑиÑоваÑÑ Ð¿Ð¾Ð´ÑобноÑÑи.</p>
</div>
-
-<div class="toc c">
- <h3>ÐÑодÑкÑ</h3>
- <ul>
- <li><a href="#swindle">ÐадÑваÑелÑÑÑво-Kindle</a></li>
- <li><a href="#echo">Echo</a></li>
- </ul>
</div>
+<p class="c" style="font-size: 1.2em">
+ <a href="#swindle">ÐадÑваÑелÑÑÑво Kindle</a>
<a
+href="#echo">Echo</a> <a
+href="#misc">ÐÑÑгие пÑодÑкÑÑ</a>
+</p>
+
<h3 id="swindle">ÐÑедоноÑнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð²
надÑваÑелÑÑÑве-Kindle</h3>
<p>ÐÑ Ð½Ð°Ð·Ñваем ÑÑÐ¾Ñ Ð¿ÑодÑÐºÑ <a
@@ -68,11 +56,11 @@
(DRM)</a> и <a href="/philosophy/ebooks.html"> дÑÑгие
вÑедоноÑнÑе
ÑÑнкÑии</a>.</p>
-<h4 id="back-doors">Ðазейки в надÑваÑелÑÑÑве-Kindle</h4>
+<h4 id="back-doors">Ðазейки</h4>
<ul class="blurbs">
- <!-- INSERT swindle-backdoor -->
+ <!-- INSERT swindle-back-door -->
<li id="M201503210">
<p>Amazon <a
href="https://www.techdirt.com/articles/20150321/13350230396/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices.shtml">
@@ -119,8 +107,8 @@
<ul class="blurbs">
- <!-- INSERT swindle-drm -->
-<li id="M201704130">
+ <!-- INSERT swindle-dr -->
+<li id="M201704131">
<p><a href="http://techin.oureverydaylife.com/kindle-drm-17841.html"> Ð
Amazon
Kindle еÑÑÑ ÑиÑÑовое ÑпÑавление
огÑаниÑениÑми</a>. ÐедоÑÑаÑок ÑÑой
ÑÑаÑÑи — в Ñом, ÑÑо ÑиÑÑовое
ÑпÑавление огÑаниÑениÑми не
@@ -130,22 +118,18 @@
ÑпÑавлением “пÑавами”, ÑÑо
вÑвеÑнÑÑое вÑÑажение, пÑименÑемое длÑ
поддеÑжки ÑиÑÑового ÑпÑавлениÑ
огÑаниÑениÑми. Ðак Ð±Ñ Ñо ни бÑло, ÑÑаÑÑÑ
ÑлÑÐ¶Ð¸Ñ Ð¸ÑÑоÑником ÑакÑиÑеÑкиÑ
Ñведений.</p>
-
- <p>ÐÑ Ð½Ð°Ð·Ñваем ÑÑÐ¾Ñ Ð¿ÑодÑÐºÑ <a
-href="/philosophy/why-call-it-the-swindle.html"><span lang="en"
-xml:lang="en">Amazon Swindle</span> (надÑваÑелÑÑÑво Amazon)</a>
из-за ÑÑой и
-<a href="/philosophy/ebooks.html"> дÑÑгиÑ
вÑедоноÑнÑÑ
ÑÑнкÑий</a>.</p>
</li>
</ul>
+
<h3 id="echo">ÐÑедоноÑнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð² Echo</h3>
-<h4>Ðазейки в Amazon Echo</h4>
+<h4>Ðазейки</h4>
<ul class="blurbs">
- <!-- INSERT echo-backdoor -->
+ <!-- INSERT echo-back-door -->
<li id="M201606060">
<p>ÐказÑваеÑÑÑ, ÑÑо в Amazon Echo еÑÑÑ
ÑнивеÑÑалÑÐ½Ð°Ñ Ð»Ð°Ð·ÐµÐ¹ÐºÐ°, поÑколÑÐºÑ <a
href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates">
@@ -158,7 +142,7 @@
</ul>
-<h4>Слежка в Amazon Echo</h4>
+<h4>Слежка</h4>
<ul class="blurbs">
@@ -180,6 +164,27 @@
</ul>
+
+<h3 id="misc"> ÐÑедоноÑнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð² пÑодÑкÑаÑ
</h3>
+
+<ul class="blurbs">
+
+ <!-- INSERT amazon-misc -->
+<li id="M201711200">
+ <p>ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Amazon недавно пÑиглаÑила
поÑÑебиÑелей бÑÑÑ Ð¿ÑоÑÑоÑилÑми и <a
+href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
+позволиÑÑ ÑоÑÑÑдникам ÑлÑжб доÑÑавки
оÑкÑÑваÑÑ Ð¸Ñ
вÑ
однÑе двеÑи</a>. ÐÐ¾Ñ Ð²Ð°Ð¼
+ÑеÑÑÐµÐ·Ð½Ð°Ñ Ð¿ÑоÑеÑ
а в заÑиÑе ÑиÑÑемÑ.</p>
+ </li>
+
+ <li id="M201411090">
+ <p>“УмнÑй” ÑÐµÐ»ÐµÐ²Ð¸Ð·Ð¾Ñ Amazon <a
+href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
+ÑÐ¿Ð¸Ð¾Ð½Ð¸Ñ Ð²Ñе вÑемÑ</a>.</p>
+ </li>
+</ul>
+
+
<div class="translators-notes">
<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
@@ -256,7 +261,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/10/06 18:28:23 $
+$Date: 2018/10/08 07:58:02 $
<!-- timestamp end -->
</p>
Index: proprietary/malware-apple.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.ru.html,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- proprietary/malware-apple.ru.html 5 Oct 2018 21:01:53 -0000 1.57
+++ proprietary/malware-apple.ru.html 8 Oct 2018 07:58:02 -0000 1.58
@@ -19,7 +19,7 @@
<p><a href="/proprietary/proprietary.html">ÐÑÑгие пÑимеÑÑ
вÑедоноÑнÑÑ
неÑвободнÑÑ
пÑогÑамм</a></p>
-<div class="highlight-para">
+<div class="comment">
<p>
<em>ÐÑедоноÑнÑе пÑогÑаммÑ</em> — ÑÑо
пÑогÑаммÑ, пÑоекÑиÑÑемÑе,
ÑÑÐ¾Ð±Ñ ÑабоÑаÑÑ Ñак, ÑÑо ÑÑо ÑÑемлÑеÑ
полÑзоваÑÐµÐ»Ñ Ð¸Ð»Ð¸ вÑÐµÐ´Ð¸Ñ ÐµÐ¼Ñ (здеÑÑ Ð½Ðµ
@@ -38,13 +38,16 @@
Ñого, ÑÑо полÑзоваÑели бÑдÑÑ Ð±ÐµÑÑилÑнÑ
иÑпÑавиÑÑ Ð»ÑбÑе вÑедоноÑнÑе ÑÑнкÑии,
ÑоблазнÑÐµÑ ÑазÑабоÑÑика вноÑиÑÑ Ñакие
ÑÑнкÑии.
</p>
+
+<div class="important" style="margin-bottom: 2em">
<p>ÐÑли вам извеÑÑен пÑимеÑ, коÑоÑÑй должен
бÑÑÑ Ð½Ð° ÑÑой ÑÑÑаниÑе, но его здеÑÑ
неÑ, ÑообÑиÑе нам по адÑеÑÑ <a
href="mailto:address@hidden"><address@hidden></a>. УпомÑниÑе
один-два заÑлÑживаÑÑиÑ
довеÑÐ¸Ñ URL, ÑÑобÑ
пÑоиллÑÑÑÑиÑоваÑÑ Ð¿Ð¾Ð´ÑобноÑÑи.</p>
</div>
+</div>
-<div class="summary" style="margin-top: 2em">
+<div class="summary">
<h3>Ðид вÑеда</h3>
<ul>
<li><a href="#back-doors"> Ðазейки</a></li>
@@ -72,7 +75,7 @@
<ul class="blurbs">
- <!-- INSERT backdoor -->
+ <!-- INSERT apple-back-door -->
<li id="M201607284">
<p>ÐÑиложение Dropbox Ð´Ð»Ñ Macintosh <a
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/">
@@ -80,6 +83,13 @@
как полÑÑÐ¸Ñ Ð¾Ð±Ð¼Ð°Ð½Ð¾Ð¼ Ñ Ð¿Ð¾Ð»ÑзоваÑÐµÐ»Ñ Ð¿Ð°ÑолÑ
ÑиÑÑемного админиÑÑÑаÑоÑа</a>.</p>
</li>
+ <li id="M201504090">
+ <p>Ð Mac OS X <a
+href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
+в ÑеÑение 4 Ð»ÐµÑ Ð¿ÑеднамеÑенно ÑоÑ
ÑанÑлÑÑ ÑеÑнÑй Ñ
од</a>, коÑоÑÑм
+взломÑики могли воÑполÑзоваÑÑÑÑ, ÑÑобÑ
полÑÑиÑÑ Ð¿Ñава админиÑÑÑаÑоÑа.</p>
+ </li>
+
<li id="M201011220">
<p>Ð iPhone еÑÑÑ Ð»Ð°Ð·ÐµÐ¹ÐºÐ° Ð´Ð»Ñ <a
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
@@ -107,7 +117,7 @@
<ul class="blurbs">
- <!-- INSERT deception -->
+ <!-- INSERT apple-decept -->
<li id="M201308290">
<p>“ТемнÑе ÑакÑики” пÑедÑÑавлÑÑÑ <a
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you">ÑлеменÑÑ
@@ -125,7 +135,7 @@
<ul class="blurbs">
- <!-- INSERT DRM -->
+ <!-- INSERT apple-dr -->
<li id="M201704071">
<p>ЦиÑÑовое ÑпÑавление огÑаниÑение
Ð´ÐµÐ»Ð°ÐµÑ iPhone 7 поÑÑи <a
href="#iphone7-sabotage">неÑемонÑопÑигоднÑм</a> длÑ
вÑеÑ
, кÑоме Apple.</p>
@@ -172,7 +182,7 @@
<ul class="blurbs">
- <!-- INSERT incompatibility -->
+ <!-- INSERT apple-incompat -->
<li id="M201803300">
<p>Ð MacOS и iOS пÑоÑедÑÑа <a
href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac">
@@ -226,6 +236,18 @@
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/">
позволила вÑедоноÑÐ½Ð¾Ð¼Ñ ÑайÑÑ Ð¸Ð·Ð²Ð»ÐµÑÑ Ð²ÑÑ
иÑÑоÑÐ¸Ñ ÑообÑений полÑзоваÑелÑ</a>.</p>
</li>
+
+ <li id="M201311120">
+ <p><a
+href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
+ÐÐÐ Ð¼Ð¾Ð¶ÐµÑ Ð·Ð°Ð³Ð»ÑдÑваÑÑ Ð² даннÑе на
ÑмаÑÑÑонаÑ
, в Ñом ÑиÑле на iPhone, Android
+и BlackBerry</a>. ХоÑÑ Ð¿Ð¾Ð´ÑобноÑÑи здеÑÑ Ð½Ðµ
пÑиводÑÑÑÑ, поÑ
оже, ÑÑо ÑабоÑаеÑ
+не как ÑнивеÑÑалÑнÑй ÑеÑнÑй Ñ
од, коÑоÑÑй,
как Ð¼Ñ Ð·Ð½Ð°ÐµÐ¼, еÑÑÑ Ð¿Ð¾ÑÑи во вÑеÑ
+мобилÑнÑÑ
ÑелеÑонаÑ
. ÐÑо Ð¼Ð¾Ð¶ÐµÑ Ð±ÑÑÑ
ÑвÑзано Ñ ÑкÑплÑаÑаÑией ÑазлиÑнÑÑ
+оÑибок. <a
+href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
+РпÑогÑаммаÑ
ÑадиоаппаÑаÑÑÑÑ ÑелеÑонов
еÑÑÑ Ð¼Ð½Ð¾Ð¶ÐµÑÑво оÑибок</a>.</p>
+ </li>
</ul>
<!--
@@ -257,7 +279,7 @@
<ul class="blurbs">
- <!-- INSERT jails -->
+ <!-- INSERT apple-jail -->
<li id="M201710130">
<p>Apple Ñакже <a
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet">
@@ -376,7 +398,7 @@
<ul class="blurbs">
- <!-- INSERT pressuring -->
+ <!-- INSERT apple-press -->
<li id="M201510270">
<p>Apple Siri <a
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions">оÑказÑваеÑÑÑ
@@ -394,7 +416,7 @@
<ul class="blurbs">
- <!-- INSERT sabotage -->
+ <!-- INSERT apple-sab -->
<li id="M201805310">
<p>ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Apple <a
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia">заблокиÑовала
@@ -467,13 +489,6 @@
ÑÑо обновление пÑинÑдиÑелÑно, но Ñже Ñама
загÑÑзка вÑзвала маÑÑÑ Ð¿Ñоблем.</p>
</li>
- <li id="M201504090">
- <p>Ð Mac OS X <a
-href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
-в ÑеÑение 4 Ð»ÐµÑ Ð¿ÑеднамеÑенно ÑоÑ
ÑанÑлÑÑ ÑеÑнÑй Ñ
од</a>, коÑоÑÑм
-взломÑики могли воÑполÑзоваÑÑÑÑ, ÑÑобÑ
полÑÑиÑÑ Ð¿Ñава админиÑÑÑаÑоÑа.</p>
- </li>
-
<li id="M201412040">
<p>Apple <a
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs">Ñдалила
@@ -679,7 +694,7 @@
<ul class="blurbs">
- <!-- INSERT tyrants -->
+ <!-- INSERT apple-tyrant -->
<li id="M201412010">
<p>Apple по ÑÐ²Ð¾ÐµÐ¼Ñ Ð¿ÑÐ¾Ð¸Ð·Ð²Ð¾Ð»Ñ <a
href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/">блокиÑÑеÑ
@@ -772,7 +787,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/10/05 21:01:53 $
+$Date: 2018/10/08 07:58:02 $
<!-- timestamp end -->
</p>
Index: proprietary/malware-appliances.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-appliances.ru.html,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- proprietary/malware-appliances.ru.html 5 Oct 2018 21:01:53 -0000
1.41
+++ proprietary/malware-appliances.ru.html 8 Oct 2018 07:58:02 -0000
1.42
@@ -19,7 +19,7 @@
<p><a href="/proprietary/proprietary.html">ÐÑÑгие пÑимеÑÑ
вÑедоноÑнÑÑ
неÑвободнÑÑ
пÑогÑамм</a></p>
-<div class="highlight-para">
+<div class="comment">
<p>
<em>ÐÑедоноÑнÑе пÑогÑаммÑ</em> — ÑÑо
пÑогÑаммÑ, пÑоекÑиÑÑемÑе,
ÑÑÐ¾Ð±Ñ ÑабоÑаÑÑ Ñак, ÑÑо ÑÑо ÑÑемлÑеÑ
полÑзоваÑÐµÐ»Ñ Ð¸Ð»Ð¸ вÑÐµÐ´Ð¸Ñ ÐµÐ¼Ñ (здеÑÑ Ð½Ðµ
@@ -37,13 +37,17 @@
Ñого, ÑÑо полÑзоваÑели бÑдÑÑ Ð±ÐµÑÑилÑнÑ
иÑпÑавиÑÑ Ð»ÑбÑе вÑедоноÑнÑе ÑÑнкÑии,
ÑоблазнÑÐµÑ ÑазÑабоÑÑика вноÑиÑÑ Ñакие
ÑÑнкÑии.
</p>
+
+<p>ÐекоÑоÑÑе пÑимеÑÑ Ð²ÑедоноÑнÑÑ
пÑогÑамм
в бÑÑовой ÑеÑ
нике пеÑеÑиÑÐ»ÐµÐ½Ñ Ð½Ð¸Ð¶Ðµ.</p>
+
+<div class="important">
<p>ÐÑли вам извеÑÑен пÑимеÑ, коÑоÑÑй должен
бÑÑÑ Ð½Ð° ÑÑой ÑÑÑаниÑе, но его здеÑÑ
неÑ, ÑообÑиÑе нам по адÑеÑÑ <a
href="mailto:address@hidden"><address@hidden></a>. УпомÑниÑе
один-два заÑлÑживаÑÑиÑ
довеÑÐ¸Ñ URL, ÑÑобÑ
пÑоиллÑÑÑÑиÑоваÑÑ Ð¿Ð¾Ð´ÑобноÑÑи.</p>
</div>
-
-<p>ÐÐ¾Ñ Ð¿ÑимеÑÑ Ð²ÑедоноÑнÑÑ
пÑогÑамм в
бÑÑовой ÑеÑ
нике.</p>
+</div>
+<div class="column-limit"></div>
<ul class="blurbs">
@@ -349,6 +353,14 @@
пока не Ð²Ð¸Ð´Ð¸Ñ Ð¼Ð°Ð¼Ð°.</p>
</li>
+ <li id="M201609200">
+ <p>ÐÑогÑÐ°Ð¼Ð¼Ñ Ð´Ð»Ñ ÑÑÑÑойÑÑв HP <a
+href="https://www.theguardian.com/technology/2016/sep/20/hp-inkjet-printers-unofficial-cartridges-software-update">
+Ð½Ð°Ð»Ð°Ð³Ð°ÐµÑ ÑиÑÑовое ÑпÑавление
огÑаниÑениÑми на некоÑоÑÑе пÑинÑеÑÑ,
коÑоÑÑе
+оÑказÑваÑÑÑÑ ÑÑнкÑиониÑоваÑÑ Ñ
ÑеÑнилÑнÑми каÑÑеÑами ÑÑоÑонниÑ
+пÑоизводиÑелей</a>.</p>
+ </li>
+
<li id="M201608080">
<p><a
href="https://www.pentestpartners.com/security-blog/thermostat-ransomware-a-lesson-in-iot-security/">ÐлÑ
@@ -815,7 +827,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/10/05 21:01:53 $
+$Date: 2018/10/08 07:58:02 $
<!-- timestamp end -->
</p>
Index: proprietary/malware-cars.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-cars.ru.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary/malware-cars.ru.html 5 Oct 2018 21:01:53 -0000 1.6
+++ proprietary/malware-cars.ru.html 8 Oct 2018 07:58:03 -0000 1.7
@@ -19,14 +19,35 @@
<p><a href="/proprietary/proprietary.html">ÐÑÑгие пÑимеÑÑ
вÑедоноÑнÑÑ
неÑвободнÑÑ
пÑогÑамм</a></p>
-<div class="highlight-para">
+<div class="comment">
+<p>
+<em>ÐÑедоноÑнÑе пÑогÑаммÑ</em> — ÑÑо
пÑогÑаммÑ, пÑоекÑиÑÑемÑе,
+ÑÑÐ¾Ð±Ñ ÑабоÑаÑÑ Ñак, ÑÑо ÑÑо ÑÑемлÑеÑ
полÑзоваÑÐµÐ»Ñ Ð¸Ð»Ð¸ вÑÐµÐ´Ð¸Ñ ÐµÐ¼Ñ (здеÑÑ Ð½Ðµ
+подÑазÑмеваÑÑÑÑ ÑлÑÑайнÑе оÑибки).
+</p>
+
+<p>
+ÐÑедоноÑнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð¸ неÑвободнÑе
пÑогÑÐ°Ð¼Ð¼Ñ — две ÑазнÑÑ
+пÑоблемÑ. РазниÑа Ð¼ÐµÐ¶Ð´Ñ <a
href="/philosophy/free-sw.html">ÑвободнÑми</a> и
+неÑвободнÑми пÑогÑаммами ÑоÑÑÐ¾Ð¸Ñ Ð² Ñом, <a
+href="/philosophy/free-software-even-more-important.html">
полÑзоваÑели
+конÑÑолиÑÑÑÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ð¸Ð»Ð¸ наобоÑоÑ</a>.
ÐÑо не ÑвлÑеÑÑÑ Ð½Ð°Ð¿ÑÑмÑÑ Ð²Ð¾Ð¿ÑоÑом
+Ñого, ÑÑо пÑогÑамма <em>делаеÑ</em>, когда
ÑабоÑаеÑ. Ðднако на пÑакÑике
+неÑвободнÑе пÑогÑÐ°Ð¼Ð¼Ñ ÑаÑÑо вÑедоноÑнÑ,
поÑÐ¾Ð¼Ñ ÑÑо понимание ÑазÑабоÑÑиком
+Ñого, ÑÑо полÑзоваÑели бÑдÑÑ Ð±ÐµÑÑилÑнÑ
иÑпÑавиÑÑ Ð»ÑбÑе вÑедоноÑнÑе ÑÑнкÑии,
+ÑоблазнÑÐµÑ ÑазÑабоÑÑика вноÑиÑÑ Ñакие
ÑÑнкÑии.
+</p>
+
+<p>ÐекоÑоÑÑе пÑимеÑÑ Ð²ÑедоноÑнÑÑ
пÑогÑамм
в авÑомобилÑÑ
пеÑеÑиÑÐ»ÐµÐ½Ñ Ð½Ð¸Ð¶Ðµ.</p>
+
+<div class="important">
<p>ÐÑли вам извеÑÑен пÑимеÑ, коÑоÑÑй должен
бÑÑÑ Ð½Ð° ÑÑой ÑÑÑаниÑе, но его здеÑÑ
неÑ, ÑообÑиÑе нам по адÑеÑÑ <a
href="mailto:address@hidden"><address@hidden></a>. УпомÑниÑе
один-два заÑлÑживаÑÑиÑ
довеÑÐ¸Ñ URL, ÑÑобÑ
пÑоиллÑÑÑÑиÑоваÑÑ Ð¿Ð¾Ð´ÑобноÑÑи.</p>
</div>
-
-<p>ÐÐ¾Ñ Ð¿ÑимеÑÑ Ð²ÑедоноÑнÑÑ
пÑогÑамм в
авÑомобилÑÑ
.</p>
+</div>
+<div class="column-limit"></div>
<ul class="blurbs">
@@ -267,7 +288,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/10/05 21:01:53 $
+$Date: 2018/10/08 07:58:03 $
<!-- timestamp end -->
</p>
Index: proprietary/malware-games.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-games.ru.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- proprietary/malware-games.ru.html 6 Oct 2018 06:59:40 -0000 1.12
+++ proprietary/malware-games.ru.html 8 Oct 2018 07:58:03 -0000 1.13
@@ -19,7 +19,7 @@
<p><a href="/proprietary/proprietary.html">ÐÑÑгие пÑимеÑÑ
вÑедоноÑнÑÑ
неÑвободнÑÑ
пÑогÑамм</a></p>
-<div class="highlight-para">
+<div class="comment">
<p>
<em>ÐÑедоноÑнÑе пÑогÑаммÑ</em> — ÑÑо
пÑогÑаммÑ, пÑоекÑиÑÑемÑе,
ÑÑÐ¾Ð±Ñ ÑабоÑаÑÑ Ñак, ÑÑо ÑÑо ÑÑемлÑеÑ
полÑзоваÑÐµÐ»Ñ Ð¸Ð»Ð¸ вÑÐµÐ´Ð¸Ñ ÐµÐ¼Ñ (здеÑÑ Ð½Ðµ
@@ -37,13 +37,17 @@
Ñого, ÑÑо полÑзоваÑели бÑдÑÑ Ð±ÐµÑÑилÑнÑ
иÑпÑавиÑÑ Ð»ÑбÑе вÑедоноÑнÑе ÑÑнкÑии,
ÑоблазнÑÐµÑ ÑазÑабоÑÑика вноÑиÑÑ Ñакие
ÑÑнкÑии.
</p>
+
+<p>ÐекоÑоÑÑе пÑимеÑÑ Ð²ÑедоноÑнÑÑ
пÑогÑамм
в игÑаÑ
пеÑеÑиÑÐ»ÐµÐ½Ñ Ð½Ð¸Ð¶Ðµ.</p>
+
+<div class="important">
<p>ÐÑли вам извеÑÑен пÑимеÑ, коÑоÑÑй должен
бÑÑÑ Ð½Ð° ÑÑой ÑÑÑаниÑе, но его здеÑÑ
неÑ, ÑообÑиÑе нам по адÑеÑÑ <a
href="mailto:address@hidden"><address@hidden></a>. УпомÑниÑе
один-два заÑлÑживаÑÑиÑ
довеÑÐ¸Ñ URL, ÑÑобÑ
пÑоиллÑÑÑÑиÑоваÑÑ Ð¿Ð¾Ð´ÑобноÑÑи.</p>
</div>
-
-<p>ÐÐ¾Ñ Ð¿ÑимеÑÑ Ð²ÑедоноÑнÑÑ
пÑогÑамм в игÑаÑ
.</p>
+</div>
+<div class="column-limit"></div>
<ul class="blurbs">
@@ -280,7 +284,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/10/06 06:59:40 $
+$Date: 2018/10/08 07:58:03 $
<!-- timestamp end -->
</p>
Index: proprietary/malware-microsoft.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.ru.html,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- proprietary/malware-microsoft.ru.html 5 Oct 2018 17:59:47 -0000
1.56
+++ proprietary/malware-microsoft.ru.html 8 Oct 2018 07:58:03 -0000
1.57
@@ -19,7 +19,7 @@
<p><a href="/proprietary/proprietary.html">ÐÑÑгие пÑимеÑÑ
вÑедоноÑнÑÑ
неÑвободнÑÑ
пÑогÑамм</a></p>
-<div class="highlight-para">
+<div class="comment">
<p>
<em>ÐÑедоноÑнÑе пÑогÑаммÑ</em> — ÑÑо
пÑогÑаммÑ, пÑоекÑиÑÑемÑе,
ÑÑÐ¾Ð±Ñ ÑабоÑаÑÑ Ñак, ÑÑо ÑÑо ÑÑемлÑеÑ
полÑзоваÑÐµÐ»Ñ Ð¸Ð»Ð¸ вÑÐµÐ´Ð¸Ñ ÐµÐ¼Ñ (здеÑÑ Ð½Ðµ
@@ -39,13 +39,15 @@
ÑоблазнÑÐµÑ ÑазÑабоÑÑика вноÑиÑÑ Ñакие
ÑÑнкÑии.
</p>
+<div class="important" style="margin-bottom: 2em">
<p>ÐÑли вам извеÑÑен пÑимеÑ, коÑоÑÑй должен
бÑÑÑ Ð½Ð° ÑÑой ÑÑÑаниÑе, но его здеÑÑ
неÑ, ÑообÑиÑе нам по адÑеÑÑ <a
href="mailto:address@hidden"><address@hidden></a>. УпомÑниÑе
один-два заÑлÑживаÑÑиÑ
довеÑÐ¸Ñ URL, ÑÑобÑ
пÑоиллÑÑÑÑиÑоваÑÑ Ð¿Ð¾Ð´ÑобноÑÑи.</p>
</div>
+</div>
-<div class="summary" style="margin-top: 2em">
+<div class="summary">
<h3>Ðид вÑеда</h3>
<ul>
<li><a href="#back-doors"> Ðазейки</a></li>
@@ -71,7 +73,7 @@
<ul class="blurbs">
- <!-- INSERT backdoor -->
+ <!-- INSERT microsoft-back-door -->
<li id="M201608172">
<p id="windows-update">Ð Microsoft Windows еÑÑÑ
ÑнивеÑÑалÑнÑй ÑеÑнÑй Ñ
од, по коÑоÑÐ¾Ð¼Ñ <a
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183">
@@ -103,6 +105,15 @@
лазейки в микÑоÑÑ
еме TPM 2.0.</p>
</li>
+ <li id="M201307300">
+ <p>ÐÐ¾Ñ Ð¿Ð¾Ð´Ð¾Ð·Ñение, коÑоÑое Ð¼Ñ Ð½Ðµ можем
доказаÑÑ, однако над ÑÑим ÑÑоиÑ
+подÑмаÑÑ: <a
+href="http://web.archive.org/web/20150206003913/http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI">ÐикÑопÑогÑаммÑ
+Ð´Ð»Ñ Ð¼Ð¸ÐºÑопÑоÑеÑÑоÑов Intel и AMD</a> могÑÑ
ÑлÑжиÑÑ NSA меÑ
анизмом внедÑениÑ
+в компÑÑÑеÑÑ Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ Microsoft, как
ÑÑвеÑждаÑÑ Ð¿ÑизнаннÑе ÑкÑпеÑÑÑ Ð¿Ð¾
+безопаÑноÑÑи.</p>
+ </li>
+
<li id="M201112081">
<p>Ð Windows 8 еÑÑÑ Ñакже лазейка Ð´Ð»Ñ <a
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html">
@@ -121,7 +132,7 @@
<ul class="blurbs">
- <!-- INSERT DRM -->
+ <!-- INSERT microsoft-dr -->
<li id="M200708131">
<p><a
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">ЦиÑÑовое
ÑпÑавление огÑаниÑениÑми в Windows</a> введено
в ÑÐ³Ð¾Ð´Ñ Ð´Ð¸Ñкам <a
@@ -140,7 +151,7 @@
<ul class="blurbs">
- <!-- INSERT insecurity -->
+ <!-- INSERT microsoft-insec -->
<li id="M201705120">
<p>ÐÑиÑиÑеÑкие оÑибки в Windows, коÑоÑÑе
накапливалиÑÑ Ð² ÐÐРа заÑем бÑли
ÑазглаÑÐµÐ½Ñ Ð³ÑÑппой Shadowbrokers, ÑепеÑÑ
пÑименÑÑÑÑÑ, ÑÑÐ¾Ð±Ñ <a
@@ -175,7 +186,7 @@
<ul class="blurbs">
- <!-- INSERT interference -->
+ <!-- INSERT microsoft-interf -->
<li id="M201809120">
<p>Ðдна из веÑÑий Windows 10 <a
href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/">
@@ -248,33 +259,6 @@
</ul>
-<h3 id="jails">ТÑÑÑмÑ</h3>
-
-<ul class="blurbs">
-
- <!-- INSERT jails -->
-<li id="M201706130">
- <p>Windows 10 S бÑла ÑÑÑÑмой: <a
-href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison">
-можно бÑло ÑÑÑановиÑÑ Ð¸ вÑполнÑÑÑ ÑолÑко
пÑогÑÐ°Ð¼Ð¼Ñ Ð¸Ð· Windows
-Store</a>. Ðднако бÑла возможноÑÑÑ <a
-href="https://www.theverge.com/2017/6/13/15789998/microsoft-windows-10-s-upgrade-windows-10-pro-guide">
-обновиÑÑÑÑ Ð´Ð¾ Windows 10 Pro</a>. ÐоÑледоваÑелем
Windows 10 S ÑÑала оÑобаÑ
-конÑигÑÑаÑÐ¸Ñ Windows 10, назÑÐ²Ð°ÐµÐ¼Ð°Ñ <a
-href="https://support.microsoft.com/en-gb/help/4020089/windows-10-in-s-mode-faq">Ñежимом
-S</a>. Ðажное оÑлиÑие Ð¾Ñ Windows 10 S ÑоÑÑÐ¾Ð¸Ñ Ð² Ñом,
ÑÑо еÑÑÑ Ð¿ÑоÑÑой ÑпоÑоб
-вÑйÑи из Ñежима S.</p>
- </li>
-
- <li id="M201210080">
- <p><a
-href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown">
-Windows 8 на “мобилÑнÑÑ
ÑÑÑÑойÑÑваÑ
”
(нÑне покойнаÑ) бÑла
-ÑÑÑÑмой</a>.</p>
- </li>
-</ul>
-
-
<h3 id="sabotage">СабоÑаж</h3>
<p>ÐеÑпÑаведливоÑÑи из ÑÑого Ñаздела,
ÑÑÑого говоÑÑ, не вÑедоноÑнÑе пÑогÑаммÑ,
@@ -285,7 +269,7 @@
<ul class="blurbs">
- <!-- INSERT sabotage -->
+ <!-- INSERT microsoft-sab -->
<li id="M201704194">
<p>ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Microsoft Ñделала Ñак, ÑÑобÑ
Windows 7 и 8 пÑекÑаÑили ÑабоÑаÑÑ
на некоÑоÑÑÑ
новÑÑ
компÑÑÑеÑаÑ
, <a
@@ -374,7 +358,7 @@
<ul class="blurbs">
- <!-- INSERT subscriptions -->
+ <!-- INSERT microsoft-subscript -->
<li id="M201507150">
<p>Microsoft Office пÑинÑÐ¶Ð´Ð°ÐµÑ Ð¿Ð¾Ð»ÑзоваÑелей <a
href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html">подпиÑÑваÑÑÑÑ
@@ -536,11 +520,38 @@
</ul>
+<h3 id="jails">ТÑÑÑмÑ</h3>
+
+<ul class="blurbs">
+
+ <!-- INSERT microsoft-jail -->
+<li id="M201706130">
+ <p>Windows 10 S бÑла ÑÑÑÑмой: <a
+href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison">
+можно бÑло ÑÑÑановиÑÑ Ð¸ вÑполнÑÑÑ ÑолÑко
пÑогÑÐ°Ð¼Ð¼Ñ Ð¸Ð· Windows
+Store</a>. Ðднако бÑла возможноÑÑÑ <a
+href="https://www.theverge.com/2017/6/13/15789998/microsoft-windows-10-s-upgrade-windows-10-pro-guide">
+обновиÑÑÑÑ Ð´Ð¾ Windows 10 Pro</a>. ÐоÑледоваÑелем
Windows 10 S ÑÑала оÑобаÑ
+конÑигÑÑаÑÐ¸Ñ Windows 10, назÑÐ²Ð°ÐµÐ¼Ð°Ñ <a
+href="https://support.microsoft.com/en-gb/help/4020089/windows-10-in-s-mode-faq">Ñежимом
+S</a>. Ðажное оÑлиÑие Ð¾Ñ Windows 10 S ÑоÑÑÐ¾Ð¸Ñ Ð² Ñом,
ÑÑо еÑÑÑ Ð¿ÑоÑÑой ÑпоÑоб
+вÑйÑи из Ñежима S.</p>
+ </li>
+
+ <li id="M201210080">
+ <p><a
+href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown">
+Windows 8 на “мобилÑнÑÑ
ÑÑÑÑойÑÑваÑ
”
(нÑне покойнаÑ) бÑла
+ÑÑÑÑмой</a>.</p>
+ </li>
+</ul>
+
+
<h3 id="tyrants">ТиÑанÑ</h3>
<ul class="blurbs">
- <!-- INSERT tyrants -->
+ <!-- INSERT microsoft-tyrant -->
<li id="M201607150">
<p>Microsoft ÑлÑÑайно оÑÑавила полÑзоваÑелÑм
ÑпоÑоб ÑÑÑановиÑÑ GNU/Linux на
планÑеÑаÑ
RT Ñ Windows, но ÑепеÑÑ Ð¾Ð½Ð¸ <a
@@ -637,7 +648,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/10/05 17:59:47 $
+$Date: 2018/10/08 07:58:03 $
<!-- timestamp end -->
</p>
Index: proprietary/malware-mobiles.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.ru.html,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- proprietary/malware-mobiles.ru.html 25 Jul 2018 16:30:35 -0000 1.40
+++ proprietary/malware-mobiles.ru.html 8 Oct 2018 07:58:03 -0000 1.41
@@ -2,6 +2,11 @@
<!--#include virtual="/server/header.ru.html" -->
<!-- Parent-Version: 1.85 -->
+<!--
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ Generated from propr-blurbs.rec. Please do not edit this file manually !
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
<!-- This file is automatically generated by GNUnited Nations! -->
<title>ÐÑедоноÑнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð² мобилÑнÑÑ
ÑÑÑÑойÑÑваÑ
- ÐÑÐ¾ÐµÐºÑ GNU - Фонд Ñвободного
@@ -20,7 +25,7 @@
<p><a href="/proprietary/proprietary.html">ÐÑÑгие пÑимеÑÑ
вÑедоноÑнÑÑ
неÑвободнÑÑ
пÑогÑамм</a></p>
-<div class="highlight-para">
+<div class="comment">
<p>
<em>ÐÑедоноÑнÑе пÑогÑаммÑ</em> — ÑÑо
пÑогÑаммÑ, пÑоекÑиÑÑемÑе,
ÑÑÐ¾Ð±Ñ ÑабоÑаÑÑ Ñак, ÑÑо ÑÑо ÑÑемлÑеÑ
полÑзоваÑÐµÐ»Ñ Ð¸Ð»Ð¸ вÑÐµÐ´Ð¸Ñ ÐµÐ¼Ñ (здеÑÑ Ð½Ðµ
@@ -43,13 +48,24 @@
полÑзоваÑелÑм: оÑÑлеживаÑÑ Ð¸Ñ
пеÑемеÑениÑ
и пÑоÑлÑÑиваÑÑ Ð¸Ñ
пеÑеговоÑÑ. ÐоÑ
поÑÐµÐ¼Ñ Ð¼Ñ Ð½Ð°Ð·Ñваем иÑ
“меÑÑой
СÑалина”.</p>
+<p>ÐÑедоноÑнÑе пÑогÑаммÑ, коÑоÑÑе Ð¼Ñ Ð·Ð´ÐµÑÑ
пеÑеÑиÑлÑем, пÑиÑÑÑÑÑвÑÑÑ Ð² каждом
+ÑелеÑоне или в пÑогÑаммаÑ
, ÑделаннÑÑ
не Apple
или Google (вклÑÑÐ°Ñ Ð¸Ñ
+подÑазделениÑ). ÐÑедоноÑнÑе ÑÑкнÑии в
мобилÑнÑÑ
пÑогÑаммаÑ
, вÑпÑÑеннÑÑ
+компаниÑми Apple или Google, пеÑеÑиÑÐ»ÐµÐ½Ñ Ð½Ð°
оÑделÑнÑÑ
ÑÑÑаниÑаÑ
, <a
+href="/proprietary/malware-apple.html">ÐпеÑаÑионнÑе ÑиÑÑемÑ
Apple
+вÑедоноÑнÑ</a> и <a
href="/proprietary/malware-google.html">ÐÑогÑÐ°Ð¼Ð¼Ñ Google
+вÑедоноÑнÑ</a>, ÑооÑвеÑÑÑвенно.</p>
+
+<div class="important">
<p>ÐÑли вам извеÑÑен пÑимеÑ, коÑоÑÑй должен
бÑÑÑ Ð½Ð° ÑÑой ÑÑÑаниÑе, но его здеÑÑ
неÑ, ÑообÑиÑе нам по адÑеÑÑ <a
href="mailto:address@hidden"><address@hidden></a>. УпомÑниÑе
один-два заÑлÑживаÑÑиÑ
довеÑÐ¸Ñ URL, ÑÑобÑ
пÑоиллÑÑÑÑиÑоваÑÑ Ð¿Ð¾Ð´ÑобноÑÑи.</p>
</div>
+</div>
+<div class="column-limit"></div>
-<ul>
+<ul class="blurbs">
<li><p>ТелеÑÐ¾Ð½Ð½Ð°Ñ ÑеÑÑ <a
href="https://ssd.eff.org/en/module/problem-mobile-phones">
оÑÑлеживаеÑ
пеÑемеÑÐµÐ½Ð¸Ñ ÐºÐ°Ð¶Ð´Ð¾Ð³Ð¾ ÑелеÑона</a>.</p>
@@ -84,133 +100,311 @@
</li>
</ul>
-<p>ÐдеÑÑ Ð¿ÑиводÑÑÑÑ Ð¿ÑимеÑÑ Ð²ÑедоноÑнÑÑ
пÑогÑамм на мобилÑнÑÑ
-ÑÑÑÑойÑÑваÑ
. См. Ñакже опиÑание
вÑедоноÑнÑÑ
ÑÑнкÑий, Ñ
аÑакÑеÑнÑÑ
длÑ
-ай-ÑÑÑÑек, на <a
href="/proprietary/malware-apple.html">ÑÑÑаниÑе о
-вÑедоноÑнÑÑ
пÑогÑаммаÑ
Apple</a>.</p>
-
<div class="summary" style="margin-top: 1em">
<h3>Ðид вÑеда</h3>
<ul>
<li><a href="#back-doors"> Ðазейки</a></li>
-<!--<li>
+ <!--<li>
<a href="#censorship">Censorship</a></li>-->
-<li><a href="#insecurity">УÑзвимоÑÑÑ</a></li>
+<li><a href="#drm">ЦиÑÑовое ÑпÑавление
огÑаниÑениÑми</a>, или “DRM”
+ознаÑÐ°ÐµÑ ÑÑнкÑии, ÑпÑоекÑиÑованнÑе длÑ
огÑаниÑÐµÐ½Ð¸Ñ Ñого, ÑÑо полÑзоваÑели
+могÑÑ Ð´ÐµÐ»Ð°ÑÑ Ñ Ð´Ð°Ð½Ð½Ñми на ÑвоиÑ
компÑÑÑеÑаÑ
.</li>
+ <li><a href="#insecurity">УÑзвимоÑÑÑ</a></li>
<!--<li>
-<a href="#sabotage">Sabotage</a></li>-->
-<!--<li>
<a href="#interference">Interference</a></li>-->
+<!--<li>
+<a href="#sabotage">Sabotage</a></li>-->
<li><a href="#surveillance">Слежка</a></li>
-<li><a href="#drm">ЦиÑÑовое ÑпÑавление
огÑаниÑениÑми</a> — ÑÑо
-ÑÑнкÑии, ÑпÑоекÑиÑованнÑе Ð´Ð»Ñ Ð¾Ð³ÑаниÑениÑ
Ñого, ÑÑо полÑзоваÑели могÑÑ
-делаÑÑ Ñ Ð´Ð°Ð½Ð½Ñми на ÑвоиÑ
компÑÑÑеÑаÑ
.</li>
-<li><a href="#jails">ТÑÑÑмÑ</a> — ÑиÑÑемÑ,
коÑоÑÑе налагаÑÑ ÑензÑÑÑ
+ <li><a href="#jails">ТÑÑÑмÑ</a> — ÑиÑÑемÑ,
коÑоÑÑе налагаÑÑ ÑензÑÑÑ
на пÑикладнÑе пÑогÑаммÑ.</li>
-<li><a href="#tyrants">ТиÑанÑ</a> — ÑиÑÑемÑ,
коÑоÑÑе оÑвеÑгаÑÑ Ð»ÑбÑÑ
+ <li><a href="#tyrants">ТиÑанÑ</a> — ÑиÑÑемÑ,
коÑоÑÑе оÑвеÑгаÑÑ Ð»ÑбÑÑ
опеÑаÑионнÑÑ ÑиÑÑемÑ, кÑоме
“ÑанкÑиониÑованнÑÑ
”
пÑоизводиÑелем.</li>
</ul>
</div>
<h3 id="back-doors">Ðазейки</h3>
+
<ul>
<li>
<p>ÐÑÑе опиÑана <a
href="#universal-back-door">ÑнивеÑÑалÑÐ½Ð°Ñ Ð»Ð°Ð·ÐµÐ¹ÐºÐ°</a>,
коÑоÑÐ°Ñ ÐµÑÑÑ Ð¿Ð¾ ÑÑÑи во вÑеÑ
мобилÑнÑÑ
ÑелеÑонаÑ
и коÑоÑÐ°Ñ Ð¿Ð¾Ð·Ð²Ð¾Ð»ÑеÑ
пÑевÑаÑаÑÑ Ð¸Ñ
в ÑÑаÑнÑе подÑлÑÑиваÑÑие
ÑÑÑÑойÑÑва.</p>
</li>
+</ul>
- <li><p><a
+<ul class="blurbs">
+
+ <!-- INSERT mobiles-back-door -->
+<li id="M201609130">
+ <p>ТелеÑÐ¾Ð½Ñ Xiaomi поÑÑавлÑÑÑÑÑ Ñ <a
+href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered">ÑнивеÑÑалÑнÑм
+ÑеÑнÑм Ñ
одом Ð´Ð»Ñ Ð¿Ð¾Ð»ÑÐ·Ð¾Ð²Ð°Ð½Ð¸Ñ Xiaomi в
пÑоÑеÑÑоÑе Ð´Ð»Ñ Ð¿Ñиложений</a>.</p>
+
+ <p>ÐÑо дополниÑелÑно к <a
href="#universal-back-door-phone-modem">
+ÑнивеÑÑалÑной лазейке в пÑоÑеÑÑоÑе
модема, коÑоÑой Ð¼Ð¾Ð¶ÐµÑ Ð²Ð¾ÑполÑзоваÑÑÑÑ
+меÑÑÐ½Ð°Ñ ÑелеÑÐ¾Ð½Ð½Ð°Ñ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ</a>.</p>
+ </li>
+
+ <li id="M201511090">
+ <p>РнеÑвободной библиоÑеке Baidu, Moplus, еÑÑÑ
лазейка, Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ ÐºÐ¾ÑоÑой <a
+href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">можно
+“вÑÑÑлаÑÑ ÑÐ°Ð¹Ð»Ñ Ð½Ð° ÑеÑвеє, а Ñакже
пÑинÑдиÑелÑно ÑÑÑанавливаÑÑ
+пÑиложениÑ</a>.</p>
+
+ <p>Ðна пÑименÑеÑÑÑ Ð² 14000 пÑиложениÑÑ
Android.</p>
+ </li>
+
+ <li id="M201412180">
+ <p><a
+href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
+РкиÑайÑкой веÑÑии Android еÑÑÑ ÑнивеÑÑалÑнÑй
ÑеÑнÑй Ñ
од</a>. ÐоÑÑи во вÑеÑ
+моделÑÑ
мобилÑнÑÑ
ÑелеÑонов еÑÑÑ <a
+href="#universal-back-door">ÑнивеÑÑалÑнÑй ÑеÑнÑй Ñ
од в
модеме</a>. ÐÐ»Ñ Ñего
+же компании Coolpad понадобилоÑÑ Ð²Ð²Ð¾Ð´Ð¸ÑÑ ÐµÑе
один? ÐоÑÐ¾Ð¼Ñ ÑÑо ÑÑÐ¾Ñ ÑеÑнÑй
+Ñ
од конÑÑолиÑÑеÑÑÑ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸ÐµÐ¹ Coolpad.</p>
+ </li>
+
+ <li id="M201403121">
+ <p id="samsung"><a
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">
УÑÑÑойÑÑва Samsung Galaxy под ÑпÑавлением
неÑвободнÑÑ
веÑÑий Android
поÑÑавлÑÑÑÑÑ Ñ Ð»Ð°Ð·ÐµÐ¹ÐºÐ¾Ð¹</a>, коÑоÑаÑ
пÑедоÑÑавлÑÐµÑ ÑдаленнÑй доÑÑÑп к
-даннÑм, Ñ
ÑанÑÑимÑÑ Ð½Ð° ÑÑÑÑойÑÑве.</p>
+Ñайлам, Ñ
ÑанÑÑимÑÑ Ð½Ð° ÑÑÑÑойÑÑве.</p>
</li>
+</ul>
- <li><p><a href="/proprietary/proprietary-back-doors.html#samsung">
ЧеÑнÑй Ñ
од
-Samsung</a> пÑедоÑÑавлÑÐµÑ Ð´Ð¾ÑÑÑп к лÑÐ±Ð¾Ð¼Ñ ÑайлÑ
в ÑиÑÑеме.</p>
- </li>
- <li>
- <p>Ð Android <a
-href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">
-Ñ Google еÑÑÑ ÑеÑнÑй Ñ
од Ð´Ð»Ñ ÑдалениÑ
пÑогÑамм по ÑеÑи</a>. (ÐÑогÑамма
-назÑвалаÑÑ GTalkService, но кажеÑÑÑ, ее
обÑединили Ñ Google Play.)
- </p>
-
- <p>
- Google Ð¼Ð¾Ð¶ÐµÑ Ñакже <a
-href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
-пÑинÑдиÑелÑно ÑÑÑанавливаÑÑ Ð¿ÑиложениÑ
по ÑеÑи</a> ÑеÑез Google Play. ÐÑо не
-ÑквиваленÑно ÑнивеÑÑалÑной лазейке, но
позволÑÐµÑ Ð¿ÑоделÑваÑÑ ÑазлиÑнÑе
-гÑÑзнÑе ÑÑÑки.
- </p>
-
- <p>
- ХоÑÑ <em>оÑÑÑеÑÑвление</em> ÑÑой влаÑÑи
компанией Google до ÑиÑ
Ð¿Ð¾Ñ Ð½Ðµ бÑло
-вÑедиÑелÑÑким, дело в Ñом, ÑÑо ни Ñ ÐºÐ¾Ð³Ð¾ не
должно бÑÑÑ Ñакой влаÑÑи,
-коÑоÑой можно бÑло Ð±Ñ Ð²ÑедиÑелÑÑки
воÑполÑзоваÑÑÑÑ. ÐÑ, конеÑно, могли бÑ
-ÑеÑиÑÑ Ð¿Ð¾Ð·Ð²Ð¾Ð»Ð¸ÑÑ ÑлÑжбе безопаÑноÑÑи
<em>дезакÑивиÑоваÑÑ</em> по ÑеÑи
-пÑогÑаммÑ, коÑоÑÑе она ÑÑиÑаеÑ
вÑедоноÑнÑми. Ðо возможноÑÑÑ
-<em>ÑдалениÑ</em> пÑогÑамм опÑавдаÑÑ Ð½ÐµÐ»ÑзÑ, и
Ñ Ð²Ð°Ñ Ð´Ð¾Ð»Ð¶Ð½Ð¾ бÑÑÑ Ð¿Ñаво
-ÑеÑаÑÑ, ÐºÐ¾Ð¼Ñ Ð´Ð¾Ð²ÐµÑÑÑÑ Ñаким обÑазом (и
довеÑÑÑÑ Ð»Ð¸ комÑ-нибÑÐ´Ñ Ð²Ð¾Ð¾Ð±Ñе).
- </p>
+<h3 id="drm">ЦиÑÑовое ÑпÑавление
огÑаниÑениÑми</h3>
+
+<ul class="blurbs">
+
+ <!-- INSERT mobiles-dr -->
+<li id="M201501030">
+ <p id="netflix-app-geolocation-drm">ÐÑиложение Android Netflix <a
+href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/">
+пÑинÑдиÑелÑно иÑполÑзÑÐµÑ Google DNS</a>. ÐÑо
один из меÑодов, пÑименÑемÑÑ
+Netflix, ÑÑÐ¾Ð±Ñ Ð¾ÑÑÑеÑÑвлÑÑÑ Ð¾Ð³ÑаниÑÐµÐ½Ð¸Ñ Ð¿Ð¾
меÑÑонаÑ
Ð¾Ð¶Ð´ÐµÐ½Ð¸Ñ Ð¿Ð¾Ð»ÑзоваÑелÑ,
+коÑоÑÑе дикÑÑÑÑÑÑ ÐºÐ¸Ð½Ð¾ÑÑÑдиÑми.</p>
</li>
</ul>
+
<h3 id="insecurity">УÑзвимоÑÑÑ</h3>
<p>ÐÑи оÑибки непÑеднамеÑеннÑ, Ñак ÑÑо они,
в оÑлиÑие Ð¾Ñ Ð¾ÑÑалÑнÑÑ
пÑимеÑов, не
ÑÑиÑаÑÑÑÑ Ð²ÑедоноÑнÑми оÑобенноÑÑÑми. ÐÑ
Ñпоминаем иÑ
, ÑÑÐ¾Ð±Ñ Ð¾Ð¿ÑовеÑгнÑÑÑ
пÑедположение, ÑÑо в пÑеÑÑижнÑÑ
неÑвободнÑÑ
пÑогÑаммаÑ
Ð½ÐµÑ ÑеÑÑезнÑÑ
оÑибок.</p>
-<ul>
+<ul class="blurbs">
-<li>
+ <!-- INSERT mobiles-insec -->
+<li id="M201807100">
<p>Siri, Alexa и вÑе дÑÑгие ÑиÑÑÐµÐ¼Ñ Ð³Ð¾Ð»Ð¾Ñового
ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð¼Ð¾Ð³ÑÑ Ð±ÑÑÑ <a
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">взÑÑÑ
под конÑÑÐ¾Ð»Ñ Ð¿ÑогÑаммами, коÑоÑÑе
воÑпÑоизводÑÑ ÐºÐ¾Ð¼Ð°Ð½Ð´Ñ Ð² неÑлÑÑимом лÑдÑми
-ÑлÑÑÑазвÑковом диапазоне</a>.
- </p>
-</li>
+ÑлÑÑÑазвÑковом диапазоне</a>.</p>
+ </li>
-<li>
+ <li id="M201807020">
+ <p>ÐекоÑоÑÑе ÑелеÑÐ¾Ð½Ñ Samsung ÑлÑÑайнÑм
обÑазом <a
+href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages">оÑÑÑлаÑÑ
+ÑоÑогÑаÑии лÑдÑм, запиÑаннÑм в адÑеÑной
книжке владелÑÑа</a>.</p>
+ </li>
+
+ <li id="M201704050">
<p>Ðногие ÑÑÑÑойÑÑва Ñ Android <a
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/">
можно взÑÑÑ Ð¿Ð¾Ð´ конÑÑÐ¾Ð»Ñ ÑеÑез иÑ
подÑиÑÑÐµÐ¼Ñ Wi-Fi</a> из-за оÑибки в
неÑвободнÑÑ
пÑогÑаммаÑ
Broadcom, под
ÑпÑавлением коÑоÑÑÑ
она ÑабоÑаеÑ.</p>
-</li>
+ </li>
+
+ <li id="M201702170">
+ <p>ÐобилÑнÑе пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð´Ð»Ñ ÑвÑзи <a
+href="https://www.bleepingcomputer.com/news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/">ÑмнÑми,
+но дÑÑаÑкими авÑомобилÑми оÑлиÑаÑÑÑÑ
оÑÐµÐ½Ñ Ñлабой безопаÑноÑÑÑÑ</a>.</p>
+
+ <p>ÐÑо дополнÑÐµÑ ÑÐ¾Ñ ÑакÑ, ÑÑо авÑомобилÑ
ÑодеÑÐ¶Ð¸Ñ Ð¼Ð¾Ð´ÐµÐ¼ ÑоÑовой ÑвÑзи, коÑоÑÑй
+вÑе вÑÐµÐ¼Ñ ÑаÑÑказÑваеÑ, где он наÑ
одиÑÑÑ,
СÑаÑÑÐµÐ¼Ñ ÐÑаÑÑ. ÐÑли Ð²Ñ Ð²Ð»Ð°Ð´ÐµÐµÑе
+Ñаким авÑомобилем, бÑло Ð±Ñ Ð¼ÑдÑÑм
оÑÑоединиÑÑ Ð¼Ð¾Ð´ÐµÐ¼, ÑÑÐ¾Ð±Ñ Ð²ÑклÑÑиÑÑ
ÑлежкÑ.</p>
+ </li>
-<li>
-<p>Ð ÑелеÑонаÑ
Samsung еÑÑÑ <a
+ <li id="M201701270">
+ <p>Ð ÑелеÑонаÑ
Samsung еÑÑÑ <a
href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/">пÑокол
в заÑиÑе, позволÑÑÑий ÑÑÑанавливаÑÑ Ð¿Ð¾ SMS
пÑогÑаммÑ, ÑÑебÑÑÑие вÑкÑпа</a>.</p>
-</li>
+ </li>
+
+ <li id="M201701130">
+ <p>Ð WhatsApp еÑÑÑ Ð¾ÑобенноÑÑÑ, коÑоÑÑÑ <a
+href="https://techcrunch.com/2017/01/13/encrypted-messaging-platform-whatsapp-denies-backdoor-claim/">
+опиÑÑвали как “ÑеÑнÑй Ñ
од”</a>, поÑомÑ
ÑÑо она Ð¼Ð¾Ð¶ÐµÑ Ð¿Ð¾Ð·Ð²Ð¾Ð»Ð¸ÑÑ
+гоÑÑдаÑÑÑÐ²Ñ Ð°Ð½Ð½ÑлиÑоваÑÑ ÑиÑÑование в
ÑÑом пÑиложении.</p>
+
+ <p>РазÑабоÑÑики завеÑÑÑÑ, ÑÑо ÑÑо не
задÑмÑвалоÑÑ ÐºÐ°Ðº ÑеÑнÑй Ñ
од, и вполне
+возможно, ÑÑо пÑавда. Ðо оÑÑаеÑÑÑ Ð³Ð»Ð°Ð²Ð½Ñй
вопÑоÑ: ÑÑнкÑиониÑÑÐµÑ Ð»Ð¸ ÑÑо как
+ÑеÑнÑй Ñ
од? Раз пÑогÑамма неÑвободна, Ð¼Ñ Ð½Ðµ
можем пÑовеÑиÑÑ ÑÑо, изÑÑив ее.</p>
+ </li>
+
+ <li id="M201607290">
+ <p><a
+href="https://techcrunch.com/2016/07/29/research-shows-deleted-whatsapp-messages-arent-actually-deleted/">“УдаленнÑе”
+ÑообÑÐµÐ½Ð¸Ñ WhatsApp ÑдалÑÑÑÑÑ Ð½Ðµ полноÑÑÑÑ</a>.
ÐÑ
можно воÑÑÑановиÑÑ
+ÑазлиÑнÑми ÑпоÑобами.</p>
+ </li>
-<li>
-<p>Ðногие неÑвободнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð¿Ð»Ð°Ñежей <a
+ <li id="M201607280">
+ <p>ÐедалÑÐ½Ð¾Ð²Ð¸Ð´Ð½Ð°Ñ ÐºÑиÑика ÑледÑÑего
пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð¾Ð±Ð½Ð°ÑÑжила, ÑÑо <a
+href="http://www.consumerreports.org/mobile-security-software/glow-pregnancy-app-exposed-women-to-privacy-threats/">
+вопиÑÑие пÑоÑÑеÑÑ Ð² безопаÑноÑÑи
позволÑли лÑÐ±Ð¾Ð¼Ñ Ð¿Ð¾Ð´ÑмаÑÑиваÑÑ Ð²
+пеÑÑоналÑнÑе даннÑе полÑзоваÑелÑ</a>.
ÐÑиÑика не говоÑÐ¸Ñ Ð½Ð¸ Ñлова о Ñом, ÑÑо
+пÑиложение оÑпÑавлÑÐµÑ Ð¿ÐµÑÑоналÑнÑе
даннÑе на ÑеÑвеÑ, где иÑ
полноÑÑÑÑ
+полÑÑÐ°ÐµÑ <em>ÑазÑабоÑÑик</em>. ÐÑа
“ÑлÑжба” — длÑ
+пÑоÑÑоÑилÑ!</p>
+
+ <p>У ÑеÑвеÑа, ÑазÑмееÑÑÑ, еÑÑÑ
“полиÑика конÑиденÑиалÑноÑÑи”, и
+ÑазÑмееÑÑÑ, она ниÑего не ÑÑоиÑ, как поÑÑи
вÑе Ñакие “полиÑики”.</p>
+ </li>
+
+ <li id="M201607190">
+ <p>ÐÑибка в неÑвободной библиоÑеке ASN.1,
пÑименÑемой на ÑоÑовÑÑ
вÑÑкаÑ
, а
+Ñакже в ÑелеÑонаÑ
и маÑÑÑÑÑизаÑоÑаÑ
, <a
+href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover">позволÑеÑ
+полÑÑиÑÑ ÐºÐ¾Ð½ÑÑÐ¾Ð»Ñ Ð½Ð°Ð´ ÑÑими ÑиÑÑемами</a>.</p>
+ </li>
+
+ <li id="M201603100">
+ <p>Ðногие неÑвободнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð¿Ð»Ð°Ñежей
<a
href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data">
пеÑедаÑÑ Ð´Ð°Ð½Ð½Ñе незаÑиÑеннÑм обÑазом</a>.
Ðднако еÑе Ñ
Ñже Ñо, ÑÑо в ÑÑиÑ
пÑиложениÑÑ
<a
href="/philosophy/surveillance-vs-democracy.html">плаÑежи не
-анонимнÑ</a>.
-</p>
-</li>
+анонимнÑ</a>.</p>
+ </li>
- <li><p><a
-href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
+ <li id="M201505294">
+ <p><a
+href="http://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html">
+Ðногие пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð´Ð»Ñ ÑмаÑÑÑонов
пÑименÑÑÑ Ð½ÐµÐ±ÐµÐ·Ð¾Ð¿Ð°ÑнÑе меÑодÑ
+аÑÑенÑиÑикаÑии пÑи Ñ
Ñанении ваÑиÑ
лиÑнÑÑ
даннÑÑ
на ÑдаленнÑÑ
+ÑеÑвеÑаÑ
</a>. ÐÑо подвеÑÐ³Ð°ÐµÑ Ð¾Ð¿Ð°ÑноÑÑи
ÑакÑÑ Ð»Ð¸ÑнÑÑ Ð¸Ð½ÑоÑмаÑиÑ, как адÑеÑа
+ÑлекÑÑонной поÑÑÑ, паÑоли, а Ñакже
медиÑинÑкие даннÑе. ÐоÑколÑÐºÑ Ð¼Ð½Ð¾Ð³Ð¸Ðµ из
+ÑÑиÑ
пÑиложений неÑвободнÑ, ÑÑÑдно, еÑли
вообÑе возможно, ÑзнаÑÑ, какие
+пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð¿Ð¾Ð´Ð²ÐµÑÐ¶ÐµÐ½Ñ ÑÑомÑ.</p>
+ </li>
+
+ <li id="M201405190">
+ <p>ÐÑиложение Ð´Ð»Ñ Ð¿ÑедоÑвÑаÑениÑ
“кÑажи лиÑноÑÑи” (доÑÑÑпа к лиÑнÑм
+даннÑм), Ñ
ÑанивÑее даннÑе полÑзоваÑÐµÐ»Ñ Ð½Ð°
оÑобом ÑеÑвеÑе, <a
+href="http://arstechnica.com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-concerns-that-app-isnt-safe/">бÑло
+вÑклÑÑено ÑазÑабоÑÑиком ÑÑого
пÑиложениÑ</a>, коÑоÑÑй обнаÑÑжил бÑеÑÑ Ð²
+заÑиÑе.</p>
+
+ <p>ÐажеÑÑÑ, ÑÑÐ¾Ñ ÑазÑабоÑÑик
добÑоÑовеÑÑно заÑиÑÐ°ÐµÑ Ð»Ð¸ÑнÑе даннÑе оÑ
ÑÑеÑÑиÑ
+ÑÑоÑон вообÑе, но он не Ð¼Ð¾Ð¶ÐµÑ Ð·Ð°ÑиÑиÑÑ ÑÑи
даннÑе Ð¾Ñ Ð³Ð¾ÑÑдаÑÑÑва. СовÑем
+наобоÑоÑ: пеÑедаÑа ваÑиÑ
даннÑÑ
ÑÑжомÑ
ÑеÑвеÑÑ, еÑли Ð²Ñ Ð½Ðµ ÑиÑÑÑеÑе иÑ
+пÑедваÑиÑелÑно Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ ÑвободнÑÑ
пÑогÑамм, подÑÑÐ²Ð°ÐµÑ Ð²Ð°Ñи пÑава.</p>
+ </li>
+
+ <li id="M201402210">
+ <p><a
+href="http://arstechnica.com/security/2014/02/crypto-weaknesses-in-whatsapp-the-kind-of-stuff-the-nsa-would-love/">ÑÑзвимоÑÑÑ
+WhatsApp</a> Ð´ÐµÐ»Ð°ÐµÑ Ð¿Ð¾Ð´ÑлÑÑивание пÑоÑе
пÑоÑÑого.</p>
+ </li>
+
+ <li id="M201311120">
+ <p><a
+href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
ÐÐÐ Ð¼Ð¾Ð¶ÐµÑ Ð·Ð°Ð³Ð»ÑдÑваÑÑ Ð² даннÑе на
ÑмаÑÑÑонаÑ
, в Ñом ÑиÑле на iPhone, Android
и BlackBerry</a>. ХоÑÑ Ð¿Ð¾Ð´ÑобноÑÑи здеÑÑ Ð½Ðµ
пÑиводÑÑÑÑ, поÑ
оже, ÑÑо ÑабоÑаеÑ
не как ÑнивеÑÑалÑнÑй ÑеÑнÑй Ñ
од, коÑоÑÑй,
как Ð¼Ñ Ð·Ð½Ð°ÐµÐ¼, еÑÑÑ Ð¿Ð¾ÑÑи во вÑеÑ
мобилÑнÑÑ
ÑелеÑонаÑ
. ÐÑо Ð¼Ð¾Ð¶ÐµÑ Ð±ÑÑÑ
ÑвÑзано Ñ ÑкÑплÑаÑаÑией ÑазлиÑнÑÑ
-оÑибок. <a href="#universal-back-door"> РпÑогÑаммаÑ
ÑадиоаппаÑаÑÑÑÑ
-ÑелеÑонов еÑÑÑ Ð¼Ð½Ð¾Ð¶ÐµÑÑво оÑибок</a>.</p>
+оÑибок. <a
+href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
+РпÑогÑаммаÑ
ÑадиоаппаÑаÑÑÑÑ ÑелеÑонов
еÑÑÑ Ð¼Ð½Ð¾Ð¶ÐµÑÑво оÑибок</a>.</p>
</li>
</ul>
+
<h3 id="surveillance">Слежка</h3>
-<ul>
- <li><p>ÐÑиложение Sarahah <a
+
+<ul class="blurbs">
+
+ <!-- INSERT mobiles-surv -->
+<li id="M201806110">
+ <p>ÐÑпанÑкое пÑиложение ÑÑанÑлÑÑий
ÑÑÑбола <a
+href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">
+оÑÑÐ»ÐµÐ¶Ð¸Ð²Ð°ÐµÑ Ð¿ÐµÑемеÑÐµÐ½Ð¸Ñ Ð¿Ð¾Ð»ÑзоваÑÐµÐ»Ñ Ð¸
подÑлÑÑÐ¸Ð²Ð°ÐµÑ ÑеÑез микÑоÑон</a>.</p>
+
+ <p>Таким обÑазом, они ÑпионÑÑ Ð²
лиÑензионнÑÑ
ÑелÑÑ
.</p>
+
+ <p>Я не ÑдивлÑÑÑ, еÑли в нем Ñеализовано и
ÑиÑÑовое ÑпÑавление
+огÑаниÑениÑми — Ñ.е. ÑоÑ
ÑаниÑÑ Ð·Ð°Ð¿Ð¸ÑÑ
невозможно. Ðо из ÑÑаÑÑи
+ÑÑо не ÑледÑеÑ.</p>
+
+ <p>ÐÑли Ð²Ñ Ð¿ÑиÑÑиÑе ÑÐµÐ±Ñ Ð½Ðµ ÑлиÑком-Ñо
инÑеÑеÑоваÑÑÑÑ ÑпоÑÑом, Ð²Ñ Ð²Ð¾ многом
+вÑигÑаеÑе. Ð ÑаÑÑноÑÑи, в ÑÑом.</p>
+ </li>
+
+ <li id="M201804160">
+ <p>ÐÑÑледоваÑели обнаÑÑжили, ÑÑо <a
+href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
+из 5855 пÑовеÑеннÑÑ
пÑиложений Android
подглÑдÑваÑÑ Ð¸ ÑобиÑаÑÑ Ð¸Ð½ÑоÑмаÑÐ¸Ñ Ð¾
+ÑвоиÑ
полÑзоваÑелÑÑ
</a>. ÐбнаÑÑжилоÑÑ, ÑÑо
40% из ÑÑиÑ
пÑиложений
+ÑплеÑниÑаÑÑ Ð¾ ÑвоиÑ
полÑзоваÑелÑÑ
по
незаÑиÑеннÑм каналам. ÐбÑаÑиÑе
+внимание, ÑÑо иÑÑледоваÑели могли
ÑаÑкÑÑÑÑ ÑолÑко некоÑоÑÑе меÑÐ¾Ð´Ñ Ñлежки в
+ÑÑиÑ
неÑвободнÑÑ
пÑиложениÑÑ
, на иÑÑ
однÑй
ÑекÑÑ ÐºÐ¾ÑоÑÑÑ
они не имели
+возможноÑÑи взглÑнÑÑÑ. ÐÑÑалÑнÑе
пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð¼Ð¾Ð³Ð»Ð¸ Ð±Ñ Ð¿Ð¾Ð´Ð³Ð»ÑдÑваÑÑ Ð´ÑÑгими
+ÑпоÑобами.</p>
+
+ <p>ÐÑо ÑвидеÑелÑÑÑвÑÐµÑ Ð¾ Ñом, ÑÑо
неÑвободнÑе пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð² обÑем ÑабоÑаÑÑ
+пÑоÑив ÑвоиÑ
полÑзоваÑелей. ÐÐ»Ñ Ð·Ð°ÑиÑÑ
Ñвоей лиÑной жизни и ÑвободÑ
+полÑзоваÑелÑм Android нÑжно избавиÑÑÑÑ Ð¾Ñ
неÑвободнÑÑ
пÑогÑамм —
+как Ð¾Ñ Ð½ÐµÑвободной ÑиÑÑÐµÐ¼Ñ Aydroid, пеÑÐµÐ¹Ð´Ñ Ð½Ð°
<a
+href="https://replicant.us">Replicant</a>, Ñак и оÑ
неÑвободнÑÑ
пÑиложений,
+полÑÑÐ°Ñ Ð¸Ñ
из <a href="https://f-droid.org/">магазина
F-Droid</a>, в коÑоÑом
+ÑазмеÑаÑÑÑÑ ÑолÑко ÑвободнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð¸
коÑоÑÑй <a
+href="https://f-droid.org/wiki/page/Antifeatures"> ÑвÑÑвенно
пÑедÑпÑеждаеÑ
+полÑзоваÑелÑ, еÑли в пÑиложении еÑÑÑ
анÑиÑÑнкÑии</a>.</p>
+ </li>
+
+ <li id="M201804020">
+ <p>Grindr ÑобиÑÐ°ÐµÑ ÑÐ²ÐµÐ´ÐµÐ½Ð¸Ñ Ð¾ Ñом, <a
+href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
+Ñ ÐºÐ°ÐºÐ¸Ñ
полÑзоваÑелей ÑезÑлÑÑаÑÑ ÑеÑÑа на
СÐÐРположиÑелÑнÑ, и пеÑÐµÐ´Ð°ÐµÑ ÑÑи
+даннÑе компаниÑм</a>.</p>
+
+ <p>У Grindr не должно бÑÑÑ ÑÑолÑко Ñведений о
его полÑзоваÑелÑÑ
. Ðн мог Ð±Ñ Ð±ÑÑÑ
+ÑпÑоекÑиÑован Ñак, ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð»ÑзоваÑели
пеÑедавали Ñакие ÑÐ²ÐµÐ´ÐµÐ½Ð¸Ñ Ð´ÑÑг дÑÑгÑ,
+но не в Ð±Ð°Ð·Ñ Ð´Ð°Ð½Ð½ÑÑ
ÑеÑвеÑа.</p>
+ </li>
+
+ <li id="M201803050">
+ <p>ÐÑиложение и медвежÑÑ ÑÑлÑга moviepass
ÑÐ¿Ð¸Ð¾Ð½Ð¸Ñ Ð·Ð° полÑзоваÑелÑми даже
+болÑÑе, Ñем они ожидали. Ðно <a
+href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">
+запиÑÑваеÑ, где они пÑÑеÑеÑÑвÑÑÑ Ð´Ð¾ и
поÑле Ñого, как пойдÑÑ Ð² кино</a>.</p>
+
+ <p>Ðе подвеÑгайÑеÑÑ Ñлежке —
плаÑиÑе налиÑнÑми!</p>
+ </li>
+
+ <li id="M201711240">
+ <p>СледÑÑие пÑогÑÐ°Ð¼Ð¼Ñ Ð² попÑлÑÑнÑÑ
пÑиложениÑÑ
Android ÑиÑоко ÑаÑпÑоÑÑÑÐ°Ð½ÐµÐ½Ñ Ð¸
+поÑой оÑÐµÐ½Ñ Ñ
иÑÑоÑмнÑ. ÐекоÑоÑÑе
пÑогÑÐ°Ð¼Ð¼Ñ Ñлежки могÑÑ <a
+href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
+наблÑдаÑÑ Ð·Ð° ÑизиÑеÑкими пеÑемеÑениÑми
полÑзоваÑÐµÐ»Ñ Ð¿Ð¾ магазинÑ, оÑмеÑаÑ
+ÑеÑи WiFi</a>.</p>
+ </li>
+
+ <li id="M201711230">
+ <p>ÐÑогÑÐ°Ð¼Ð¼Ñ Ñ Ð¸ÑкÑÑÑÑвеннÑм
инÑеллекÑом, огÑаниÑиваÑÑие полÑзование
ÑелеÑоном
+во вÑÐµÐ¼Ñ Ð²Ð¾Ð¶Ð´ÐµÐ½Ð¸Ñ, могÑÑ <a
+href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
+оÑÑлеживаÑÑ ÐºÐ°Ð¶Ð´Ð¾Ðµ ваÑе движение</a>.</p>
+ </li>
+
+ <li id="M201708270">
+ <p>ÐÑиложение Sarahah <a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
вÑгÑÑÐ¶Ð°ÐµÑ Ð²Ñе номеÑа ÑелеÑонов и адÑеÑа
ÑлекÑÑонной поÑÑÑ</a> в запиÑной
книжке полÑзоваÑÐµÐ»Ñ Ð½Ð° ÑеÑвеÑ
ÑазÑабоÑÑика. ÐбÑаÑаем ваÑе внимание, ÑÑо в
@@ -219,20 +413,118 @@
Ð´Ð»Ñ Ð¾Ð±Ð¾Ð·Ð½Ð°ÑÐµÐ½Ð¸Ñ Ð±ÐµÑплаÑнÑÑ
пÑогÑамм.</p>
</li>
- <li><p>ÐекоÑоÑÑе поÑÑаÑивнÑе ÑелеÑоÑÑ <a
-href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">пÑодаÑÑÑÑ
-Ñ Ð¿ÑогÑаммами-Ñпионами, оÑпÑавлÑÑÑими
маÑÑÑ Ð´Ð°Ð½Ð½ÑÑ
в ÐиÑай</a>.</p></li>
+ <li id="M201707270">
+ <p>20 неÑеÑÑнÑÑ
пÑиложений Android <a
+href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">запиÑÑвали
+ÑелеÑоннÑе звонки и оÑпÑавлÑли иÑ
в виде
ÑекÑÑовÑÑ
ÑообÑений и ÑлекÑÑонной
+поÑÑÑ Ñем, кÑо ÑÐ»ÐµÐ´Ð¸Ñ Ð·Ð°
полÑзоваÑелÑми</a>.</p>
+
+ <p>ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Google не наÑоÑно Ñделала, ÑÑобÑ
ÑÑи пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ñпионили; напÑоÑив,
+она пÑинимала ÑазлиÑнÑе меÑÑ, ÑÑобÑ
пÑедоÑвÑаÑиÑÑ ÑÑо, и Ñдалила ÑÑи
+пÑиложениÑ, когда вÑÑÑнилоÑÑ, ÑÑо они
делаÑÑ. Так ÑÑо Ð¼Ñ Ð½Ðµ можем обвинÑÑÑ
+Google в Ñом, ÑÑо ÑÑи пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ñпионили.</p>
+
+ <p>С дÑÑгой ÑÑоÑонÑ, Google
пеÑеÑаÑпÑоÑÑÑанÑÐµÑ Ð½ÐµÑвободнÑе
пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Android,
+а ÑÑало бÑÑÑ, ÑазделÑÐµÑ Ð¾ÑвеÑÑÑвенноÑÑÑ Ð·Ð°
неÑпÑаведливоÑÑÑ, ÑоÑÑоÑÑÑÑ Ð²
+Ñом, ÑÑо они неÑвободнÑ. ÐомпаниÑ
ÑаÑпÑоÑÑÑанÑÐµÑ Ñакже Ñвои ÑобÑÑвеннÑе
+неÑвободнÑе пÑиложениÑ, Ñакие как Google Play, <a
+href="/philosophy/free-software-even-more-important.html">коÑоÑÑе
+злонамеÑеннÑ</a>.</p>
+
+ <p>Ðогла ли ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Google пÑедоÑвÑаÑаÑÑ
жÑлÑниÑеÑÑво Ñо ÑÑоÑÐ¾Ð½Ñ Ð¿Ñиложений
+более ÑÑаÑелÑно? Ðи Ð´Ð»Ñ Google, ни длÑ
полÑзоваÑелей Android не ÑÑÑеÑÑвÑеÑ
+ÑиÑÑемаÑиÑеÑкого ÑпоÑоба инÑпекÑиÑоваÑÑ
иÑполнÑемÑе ÑÐ°Ð¹Ð»Ñ Ð½ÐµÑвободнÑÑ
+пÑиложений, ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð½ÑÑÑ, ÑÑо они делаÑÑ.</p>
+
+ <p>Ð Google могли Ð±Ñ ÑÑебоваÑÑ Ð¸ÑÑ
однÑй
ÑекÑÑ ÑÑиÑ
пÑиложений и изÑÑаÑÑ
+каким-Ñо обÑазом иÑÑ
однÑй ÑекÑÑ, ÑÑобÑ
опÑеделÑÑÑ, не делаÑÑ Ð»Ð¸ они
+полÑзоваÑелÑм ÑÑо-Ñо плоÑ
ое. ÐÑли бÑ
ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Ð´ÐµÐ»Ð°Ð»Ð° ÑÑо Ñ
оÑоÑо, она могла
+Ð±Ñ Ð±Ð¾Ð»ÐµÐµ или менее пÑедоÑвÑаÑаÑÑ Ñакое
подглÑдÑвание, кÑоме ÑлÑÑаев, когда
+ÑазÑабоÑÑики пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð´Ð¾ÑÑаÑоÑно ÑмнÑ,
ÑÑÐ¾Ð±Ñ Ð¿ÐµÑеÑ
иÑÑиÑÑ Ð¿ÑовеÑкÑ.</p>
+
+ <p>Ðо поÑколÑÐºÑ Google Ñама ÑазÑабаÑÑваеÑ
злонамеÑеннÑе пÑиложениÑ, Ð¼Ñ Ð½Ðµ можем
+довеÑÑÑÑ Google наÑÑ Ð·Ð°ÑиÑÑ. ÐÑ Ð´Ð¾Ð»Ð¶Ð½Ñ
ÑÑебоваÑÑ Ð²ÑпÑÑка иÑÑ
одного ÑекÑÑа
+Ð´Ð»Ñ Ð¿Ñблики, ÑÑÐ¾Ð±Ñ Ð¼Ñ Ð¼Ð¾Ð³Ð»Ð¸ заÑиÑаÑÑ Ð´ÑÑг
дÑÑга.</p>
+ </li>
-<li>
- <p>ÐÑиложение Facebook поÑÑоÑнно
подÑлÑÑиваеÑ, <a
-href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">ÑледиÑ
-за Ñем, ÑÑо лÑди ÑлÑÑаÑÑ Ð¸Ð»Ð¸ ÑмоÑÑÑÑ</a>.
ÐÑоме Ñого, оно, возможно,
-анализиÑÑÐµÑ Ð¿ÐµÑеговоÑÑ Ð¿Ð¾Ð»ÑзоваÑелей,
ÑÑÐ¾Ð±Ñ Ð´Ð¾ÑÑавлÑÑÑ Ð¸Ð¼ наÑеленнÑÑ
-ÑекламÑ.</p>
-</li>
+ <li id="M201705230">
+ <p><a
+href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">ÐÑиложениÑ
+Ð´Ð»Ñ BART ÑледÑÑ Ð·Ð° полÑзоваÑелÑми</a>.</p>
+
+ <p>ÐÑли пÑогÑаммнÑе пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ ÑвободнÑ,
полÑзоваÑели могÑÑ
+<em>гаÑанÑиÑоваÑÑ</em>, ÑÑо они не ÑледÑÑ.</p>
+ <p>Ðогда пÑиложение неÑвободно, можно
ÑолÑко надеÑÑÑÑÑ, ÑÑо оно не ÑледиÑ.</p>
+ </li>
+
+ <li id="M201705040">
+ <p>Ðо ÑезÑлÑÑаÑам одного иÑÑледованиÑ, 234
пÑиложений Android оÑÑлеживаÑÑ
+полÑзоваÑелей, <a
+href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">пÑоÑлÑÑиваÑ
+ÑлÑÑÑазвÑк Ð¾Ñ Ð¼Ð°ÑÑков, ÑазмеÑеннÑÑ
в
магазинаÑ
, или из ÑелевизионнÑÑ
+пеÑедаÑ</a>.</p>
+ </li>
+
+ <li id="M201704260">
+ <p>ÐказÑваеÑÑÑ, Faceapp Ð²ÐµÐ´ÐµÑ Ð¼Ð°ÑÑÑ Ñлежки,
ÑÑÐ´Ñ Ð¿Ð¾ ÑомÑ, <a
+href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+как много доÑÑÑпа к пеÑÑоналÑнÑм даннÑм
ÑÑебÑÐµÑ ÑÑа пÑогÑамма</a>.</p>
+ </li>
+
+ <li id="M201704190">
+ <p>ÐолÑзоваÑели ÑÑдÑÑÑÑ Ñ Bose за <a
+href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
+ÑаÑпÑоÑÑÑанение ÑпионÑкой пÑогÑÐ°Ð¼Ð¼Ñ Ð²
наÑÑникаÑ
</a>. ÐонкÑеÑно, пÑиложение
+запиÑÑÐ²Ð°ÐµÑ Ð¸Ð¼ÐµÐ½Ð° звÑковÑÑ
Ñайлов, коÑоÑÑе
пÑоÑлÑÑиваÑÑ Ð¿Ð¾Ð»ÑзоваÑели, а Ñакже
+ÑникалÑнÑй ÑеÑийнÑй Ð½Ð¾Ð¼ÐµÑ Ð½Ð°ÑÑников.</p>
+
+ <p>Ð ÑÑде пÑедÑÑвлено обвинение, ÑÑо ÑÑо
делаеÑÑÑ Ð±ÐµÐ· ÑоглаÑиÑ
+полÑзоваÑелÑ. ÐÑли Ð±Ñ Ð¿Ñиложение пиÑало
мелким ÑÑиÑÑом, ÑÑо полÑзоваÑели на
+ÑÑо ÑоглаÑаÑÑÑÑ, бÑло ли Ð±Ñ ÑÑо пÑиемлемо?
Ðи в коем ÑлÑÑае! Ðакон должен
+однознаÑно <a href="/philosophy/surveillance-vs-democracy.html">
запÑеÑаÑÑ
+закладÑваÑÑ Ð² пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð»ÑбÑÑ ÑлежкÑ</a>.</p>
+ </li>
+
+ <li id="M201704074">
+ <p>ÐаÑÑ Ð¿Ñиложений Android могÑÑ <a
+href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">ÑговоÑиÑÑÑÑ,
+ÑÑÐ¾Ð±Ñ Ð¿ÐµÑедаваÑÑ Ð»Ð¸ÑнÑе даннÑе
полÑзоваÑÐµÐ»Ñ Ð½Ð° ÑеÑвеÑÑ</a>. ÐÑÑледоваÑели
+обнаÑÑжили деÑÑÑки ÑÑÑÑÑ Ð¿Ð°Ñ ÑакиÑ
пÑиложений.</p>
+ </li>
+
+ <li id="M201703300">
+ <p>ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Verizon <a
+href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+обÑÑвила об ÑÑÑановке по вÑбоÑÑ
неÑвободной пÑогÑÐ°Ð¼Ð¼Ñ Ð¿Ð¾Ð¸Ñка</a>,
+пÑедÑÑÑановленной на некоÑоÑÑÑ
ÑелеÑонаÑ
компании. ÐÑогÑамма бÑдеÑ
+пеÑедаваÑÑ Verizon Ñе же ÑÐ²ÐµÐ´ÐµÐ½Ð¸Ñ Ð¾ запÑоÑаÑ
,
введеннÑÑ
полÑзоваÑелÑми,
+какие обÑÑно полÑÑÐ°ÐµÑ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Google, когда
полÑзÑÑÑÑÑ ÐµÐµ поиÑковиком.</p>
+
+ <p>РнаÑÑоÑÑее вÑÐµÐ¼Ñ Ð¿ÑогÑамма <a
+href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+пÑедÑÑÑанавливаеÑÑÑ ÑолÑко на один
ÑелеÑон</a> и полÑзоваÑÐµÐ»Ñ Ð´Ð¾Ð»Ð¶ÐµÐ½ Ñвно
+даÑÑ ÑоглаÑие пеÑед Ñем, как пÑогÑамма
заÑабоÑаеÑ. Ðднако пÑогÑамма оÑÑаеÑÑÑ
+Ñпионом — пÑогÑамма-Ñпион оÑÑаеÑÑÑ
пÑогÑаммой-Ñпионом, даже еÑли
+она “необÑзаÑелÑна”.</p>
+ </li>
-<li>
+ <li id="M201701210">
+ <p>ÐÑогÑамма ÑедакÑиÑÐ¾Ð²Ð°Ð½Ð¸Ñ ÑоÑогÑаÑий
Meitu <a
+href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">оÑÑÑлаеÑ
+даннÑе полÑзоваÑÐµÐ»Ñ Ð² киÑайÑкÑÑ
компаниÑ</a>.</p>
+ </li>
+
+ <li id="M201611280">
+ <p>ÐÑиложение Uber <a
+href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">оÑÑлеживаеÑ
+пеÑемеÑÐµÐ½Ð¸Ñ ÐºÐ»Ð¸ÐµÐ½Ñа до и поÑле
поездки</a>.</p>
+
+ <p>ÐÑÐ¾Ñ Ð¿ÑÐ¸Ð¼ÐµÑ Ð¸Ð»Ð»ÑÑÑÑиÑÑеÑ, поÑемÑ
“полÑÑение ÑоглаÑиÑ
+полÑзоваÑелє на ÑÐ»ÐµÐ¶ÐºÑ Ð½Ðµ даеÑ
адекваÑной заÑиÑÑ Ð¾Ñ Ð¼Ð°ÑÑовой Ñлежки.</p>
+ </li>
+
+ <li id="M201611160">
<p>Ð ÑÑаÑÑе Ñ Ð¸ÑÑледованием пÑиваÑноÑÑи и
заÑиÑенноÑÑи 283 пÑиложений Android
Ð´Ð»Ñ VPN Ñделан вÑвод, ÑÑо “неÑмоÑÑÑ Ð½Ð°
обеÑÐ°Ð½Ð¸Ñ Ð¿ÑиваÑноÑÑи,
заÑиÑенноÑÑи и анонимноÑÑи, коÑоÑое даÑÑ
болÑÑинÑÑво пÑиложений Ð´Ð»Ñ VPN, <a
@@ -241,10 +533,11 @@
безопаÑноÑÑи, а Ñакже злоÑпоÑÑеблений Ñо
ÑÑоÑÐ¾Ð½Ñ Ð¿Ñиложений длÑ
VPN</a>”.</p>
- <p>Ðалее ÑледÑÐµÑ Ð½ÐµÐ¸ÑÑеÑпÑваÑÑий ÑпиÑок
неÑвободнÑÑ
пÑиложений Ð´Ð»Ñ VPN, коÑоÑÑе
-ÑледÑÑ Ð·Ð° полÑзоваÑелÑми и вÑоÑгаÑÑÑÑ Ð² иÑ
лиÑнÑÑ Ð¶Ð¸Ð·Ð½Ñ:</p>
+ <p>Ðалее ÑледÑÐµÑ Ð²Ð·ÑÑÑй из
иÑÑледоваÑелÑÑкой ÑÑаÑÑи неиÑÑеÑпÑваÑÑий
ÑпиÑок
+неÑвободнÑÑ
пÑиложений Ð´Ð»Ñ VPN, коÑоÑÑе
ÑледÑÑ Ð·Ð° полÑзоваÑелÑми и
+вÑоÑгаÑÑÑÑ Ð² иÑ
лиÑнÑÑ Ð¶Ð¸Ð·Ð½Ñ:</p>
- <dl>
+ <dl class="compact">
<dt>SurfEasy</dt>
<dd>ÐÑполÑзÑÐµÑ Ð±Ð¸Ð±Ð»Ð¸Ð¾Ñеки Ñлежки, Ñакие
как NativeX и Appflood, пÑедназнаÑеннÑе
Ð´Ð»Ñ Ð¾ÑÑÐ»ÐµÐ¶Ð¸Ð²Ð°Ð½Ð¸Ñ Ð¿Ð¾Ð»ÑзоваÑелей и показа
им напÑавленной ÑекламÑ.</dd>
@@ -264,131 +557,72 @@
<dt>VPN Services HotspotShield</dt>
<dd>ÐÑÑавлÑÐµÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð° JavaScript в
ÑÑÑаниÑÑ HTML, пеÑедаваемÑе
полÑзоваÑелÑм. ÐаÑвленное назнаÑение ÑÑой
вÑÑавки — показ
-ÑекламÑ. ÐÑполÑзÑÐµÑ Ð¾ÐºÐ¾Ð»Ð¾ 5 библиоÑек
Ñлежки. ÐÑоме Ñого, пÑопÑÑÐºÐ°ÐµÑ Ð¿Ð¾Ñок
-даннÑÑ
полÑзоваÑÐµÐ»Ñ ÑеÑез valueclick.com (ÑайÑ
ÑекламÑ).</dd>
+ÑекламÑ. ÐÑполÑзÑÐµÑ Ð¾ÐºÐ¾Ð»Ð¾ пÑÑÑ Ð±Ð¸Ð±Ð»Ð¸Ð¾Ñек
Ñлежки. ÐÑоме Ñого, пÑопÑÑкаеÑ
+поÑок даннÑÑ
полÑзоваÑÐµÐ»Ñ ÑеÑез valueclick.com
(ÑÐ°Ð¹Ñ ÑекламÑ).</dd>
<dt>WiFi Protector VPN</dt>
<dd>ÐÑÑавлÑÐµÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð° JavaScript в
ÑÑÑаниÑÑ HTML, а Ñакже иÑполÑзÑÐµÑ Ð¾ÐºÐ¾Ð»Ð¾
-5 библиоÑек Ñлежки. РазÑабоÑÑики
пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð¿Ð¾Ð´ÑвеÑдили, ÑÑо деÑевÑе веÑÑии
-пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð´ÐµÐ¹ÑÑвиÑелÑно вÑÑавлÑÑÑ JavaScript
Ð´Ð»Ñ Ñлежки и показа ÑекламÑ.</dd>
+пÑÑи библиоÑек Ñлежки. РазÑабоÑÑики
пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð¿Ð¾Ð´ÑвеÑдили, ÑÑо деÑевÑе
+веÑÑии пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð´ÐµÐ¹ÑÑвиÑелÑно
вÑÑавлÑÑÑ JavaScript Ð´Ð»Ñ Ñлежки за
+полÑзоваÑелем и показа ÑекламÑ.</dd>
</dl>
-</li>
-
-<li>
- <p><a
-href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">ÐÑÑледование
-2015 года</a> показало, ÑÑо 90% ÑамÑÑ
попÑлÑÑнÑÑ
беÑплаÑнÑÑ
неÑвободнÑÑ
-пÑиложений под Android ÑодеÑжало библиоÑеки,
коÑоÑÑе можно ÑÑиÑаÑÑ
-библиоÑеками Ñлежки. ÐÐ»Ñ Ð¿Ð»Ð°ÑнÑÑ
неÑовбоднÑÑ
пÑиложений ÑÑа велиÑина
-ÑоÑÑавлÑла ÑолÑко 60%.</p>
-
- <p>СÑаÑÑÑ Ð²Ð½Ð¾ÑÐ¸Ñ Ð¿ÑÑаниÑÑ, опиÑÑваÑ
беÑплаÑнÑе пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ ÐºÐ°Ðº
-“ÑвободнÑе”, но болÑÑинÑÑво из ниÑ
на
Ñамом-Ñо деле не ÑвлÑÑÑÑÑ
-<a href="/philosophy/free-sw.html">ÑвободнÑми
пÑогÑаммами</a>. Ð ÑÑаÑÑе
-Ñакже ÑпоÑÑеблÑеÑÑÑ Ð±ÐµÐ·Ð¾Ð±Ñазное Ñлово
“монеÑизиÑоваÑÑ”. ÐÐ»Ñ ÑÑой
-ÑиÑÑаÑии Ñ
оÑоÑо подÑ
Ð¾Ð´Ð¸Ñ Ñлово
“ÑкÑплÑаÑиÑоваÑÑ”; поÑÑи вÑегда
-оно в ÑоÑноÑÑи оÑÑÐ°Ð¶Ð°ÐµÑ ÑмÑÑл.</p>
-</li>
-
-<li>
- <p>Ðо ÑезÑлÑÑаÑам одного иÑÑледованиÑ, 234
пÑиложений Android оÑÑлеживаÑÑ
-полÑзоваÑелей, <a
-href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">пÑоÑлÑÑиваÑ
-ÑлÑÑÑазвÑк Ð¾Ñ Ð¼Ð°ÑÑков, ÑазмеÑеннÑÑ
в
магазинаÑ
, или из ÑелевизионнÑÑ
-пеÑедаÑ</a>.
- </p>
-</li>
-
-<li>
- <p>ÐказÑваеÑÑÑ, Faceapp Ð²ÐµÐ´ÐµÑ Ð¼Ð°ÑÑÑ
Ñлежки, ÑÑÐ´Ñ Ð¿Ð¾ ÑомÑ, <a
-href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
-как много доÑÑÑпа к пеÑÑоналÑнÑм даннÑм
ÑÑебÑÐµÑ ÑÑа пÑогÑамма</a>.
- </p>
</li>
-<li>
- <p>ÐаÑÑ Ð¿Ñиложений Android могÑÑ <a
-href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">ÑговоÑиÑÑÑÑ,
-ÑÑÐ¾Ð±Ñ Ð¿ÐµÑедаваÑÑ Ð»Ð¸ÑнÑе даннÑе
полÑзоваÑÐµÐ»Ñ Ð½Ð° ÑеÑвеÑÑ</a>. ÐÑÑледоваÑели
-обнаÑÑжили деÑÑÑки ÑÑÑÑÑ Ð¿Ð°Ñ ÑакиÑ
пÑиложений.</p>
-</li>
+ <li id="M201611150">
+ <p>ÐекоÑоÑÑе поÑÑаÑивнÑе ÑелеÑоÑÑ <a
+href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">пÑодаÑÑÑÑ
+Ñ Ð¿ÑогÑаммами-Ñпионами, оÑпÑавлÑÑÑими
маÑÑÑ Ð´Ð°Ð½Ð½ÑÑ
в ÐиÑай</a>.</p>
+ </li>
-<li>
-<p>Google Play пÑеднамеÑенно <a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
-вÑÑÐ»Ð°ÐµÑ ÑазÑабоÑÑикам пÑиложениÑ
пеÑÑоналÑнÑе даннÑе полÑзоваÑелей</a>,
-коÑоÑÑе ÑÑÑанавливаÑÑ Ð¿Ñиложение.</p>
-
-<p>ÐÑоÑÑо пÑоÑиÑÑ “ÑоглаÑиє
полÑзоваÑелей не доÑÑаÑоÑно Ð´Ð»Ñ Ñого,
-ÑÑÐ¾Ð±Ñ ÑзакониÑÑ Ñакие дейÑÑвиÑ.
ÐолÑÑинÑÑво полÑзоваÑелей не доÑиÑÑваеÑ
-“УÑÐ»Ð¾Ð²Ð¸Ñ Ð¸ÑполÑзованиє до Ñого
меÑÑа, где говоÑиÑÑÑ, на ÑÑо они
-“ÑоглаÑаÑÑÑÑ”. ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Google должна
ÑÑно и ÑеÑÑно
-иденÑиÑиÑиÑоваÑÑ Ð¸Ð½ÑоÑмаÑÐ¸Ñ Ð¾
полÑзоваÑелÑÑ
, коÑоÑÑÑ Ð¾Ð½Ð° ÑобиÑаеÑ, вмеÑÑо
-Ñого ÑÑÐ¾Ð±Ñ Ð¿ÑÑÑаÑÑ ÑÑо в головоломнÑÑ
ÑоÑмÑлиÑовкаÑ
ÑоглаÑÐµÐ½Ð¸Ñ Ñ
-полÑзоваÑелÑми.</p>
-
-<p>Ðднако ÑÑÐ¾Ð±Ñ Ð¿Ð¾-наÑÑоÑÑÐµÐ¼Ñ Ð·Ð°ÑиÑиÑÑ
ÑаÑÑнÑÑ Ð¶Ð¸Ð·Ð½Ñ Ð»Ñдей, Ð¼Ñ Ð²Ð¾Ð¾Ð±Ñе Ð´Ð¾Ð»Ð¶Ð½Ñ Ð½Ðµ
-даваÑÑ Google и дÑÑгим компаниÑм Ñвои
пеÑÑоналÑнÑе даннÑе!</p>
-</li>
-
-<li>
- <p>Google Play (ÐºÐ¾Ð¼Ð¿Ð¾Ð½ÐµÐ½Ñ ÑиÑÑÐµÐ¼Ñ Android) <a
-href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
-оÑÑÐ»ÐµÐ¶Ð¸Ð²Ð°ÐµÑ Ð¿ÐµÑемеÑÐµÐ½Ð¸Ñ Ð¿Ð¾Ð»ÑзоваÑелей
без иÑ
ÑазÑеÑениÑ</a>.</p>
-
- <p>Ðаже еÑли Ð²Ñ Ð¾ÑклÑÑиÑе Google Maps и
оÑÑлеживание меÑÑоположениÑ, Ð²Ñ Ð´Ð¾Ð»Ð¶Ð½Ñ
-оÑклÑÑиÑÑ Ñам Google Play, ÑÑÐ¾Ð±Ñ Ð¾ÑÑлеживание
полноÑÑÑÑ Ð¿ÑекÑаÑилоÑÑ. ÐÑо
-еÑе один пÑÐ¸Ð¼ÐµÑ Ñого, как неÑвободнÑе
пÑогÑÐ°Ð¼Ð¼Ñ Ð¿ÑиÑвоÑÑÑÑÑÑ, ÑÑо
-подÑинÑÑÑÑÑ Ð¿Ð¾Ð»ÑзоваÑелÑ, Ð´ÐµÐ»Ð°Ñ Ð²
дейÑÑвиÑелÑноÑÑи ÑÑо-Ñо дÑÑгое. Ð
-ÑвободнÑÑ
пÑогÑаммаÑ
Ñакое поÑÑи
немÑÑлимо.</p>
+ <li id="M201606050">
+ <p>Ðовое пÑиложение Facebook, Magic Photo, <a
+href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+ÑканиÑÑÐµÑ ÑоÑоколлекÑии знакомÑÑ
Ð»Ð¸Ñ Ð½Ð°
ваÑиÑ
ÑелеÑонаÑ
</a> и пÑÐµÐ´Ð»Ð°Ð³Ð°ÐµÑ Ð²Ð°Ð¼
+обмениваÑÑÑÑ ÑнÑÑÑм вами изобÑажением в
ÑооÑвеÑÑÑвии Ñ Ñем, кÑо наÑ
одиÑÑÑ Ð²
+кадÑе.</p>
-</li>
-<li>
- <p>ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Verizon <a
-href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
-обÑÑвила об ÑÑÑановке по вÑбоÑÑ
неÑвободной пÑогÑÐ°Ð¼Ð¼Ñ Ð¿Ð¾Ð¸Ñка</a>,
-пÑедÑÑÑановленной на некоÑоÑÑÑ
ÑелеÑонаÑ
компании. ÐÑогÑамма бÑдеÑ
-пеÑедаваÑÑ Verizon Ñе же ÑÐ²ÐµÐ´ÐµÐ½Ð¸Ñ Ð¾ запÑоÑаÑ
,
введеннÑÑ
полÑзоваÑелÑми,
-какие обÑÑно полÑÑÐ°ÐµÑ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Google, когда
полÑзÑÑÑÑÑ ÐµÐµ поиÑковиком.</p>
+ <p>ÐÑа ÑпионÑÐºÐ°Ñ ÑÑнкÑиÑ, видимо, ÑÑебÑеÑ
доÑÑÑпа по ÑеÑи к какой-Ñо базе
+даннÑÑ
знакомÑÑ
лиÑ, а ÑÑо знаÑиÑ, ÑÑо
изобÑажениÑ, веÑоÑÑно, вÑÑлаÑÑÑÑ Ð½Ð°
+ÑеÑвеÑÑ Facebook и обÑабаÑÑваÑÑÑÑ Ñам по
алгоÑиÑмам ÑаÑÐ¿Ð¾Ð·Ð½Ð°Ð²Ð°Ð½Ð¸Ñ Ð»Ð¸Ñ.</p>
- <p>РнаÑÑоÑÑее вÑÐµÐ¼Ñ Ð¿ÑогÑамма <a
-href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
-пÑедÑÑÑанавливаеÑÑÑ ÑолÑко на один
ÑелеÑон</a> и полÑзоваÑÐµÐ»Ñ Ð´Ð¾Ð»Ð¶ÐµÐ½ Ñвно
-даÑÑ ÑоглаÑие пеÑед Ñем, как пÑогÑамма
заÑабоÑаеÑ. Ðднако пÑогÑамма оÑÑаеÑÑÑ
-Ñпионом — пÑогÑамма-Ñпион оÑÑаеÑÑÑ
пÑогÑаммой-Ñпионом, даже еÑли
-она “необÑзаÑелÑна”.</p>
-</li>
-<li><p>ÐÑогÑамма ÑедакÑиÑÐ¾Ð²Ð°Ð½Ð¸Ñ ÑоÑогÑаÑий
Meitu <a
-href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">оÑÑÑлаеÑ
-даннÑе полÑзоваÑÐµÐ»Ñ Ð² киÑайÑкÑÑ
компаниÑ</a>.</p></li>
+ <p>ÐÑли ÑÑо Ñак, никакие из изобÑажений
полÑзоваÑелей Facebook болÑÑе не
+конÑиденÑиалÑнÑ, даже еÑли полÑзоваÑелÑ
не “вÑÑÑлал” иÑ
в ÑÑÑ
+ÑлÑжбÑ.</p>
+ </li>
-<li>
-<p>ÐедалÑÐ½Ð¾Ð²Ð¸Ð´Ð½Ð°Ñ ÐºÑиÑика ÑледÑÑего
пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð¾Ð±Ð½Ð°ÑÑжила, ÑÑо <a
-href="http://www.consumerreports.org/mobile-security-software/glow-pregnancy-app-exposed-women-to-privacy-threats/">
-вопиÑÑие пÑоÑÑеÑÑ Ð² безопаÑноÑÑи
позволÑли лÑÐ±Ð¾Ð¼Ñ Ð¿Ð¾Ð´ÑмаÑÑиваÑÑ Ð²
-пеÑÑоналÑнÑе даннÑе полÑзоваÑелÑ</a>.
ÐÑиÑика не говоÑÐ¸Ñ Ð½Ð¸ Ñлова о Ñом, ÑÑо
-пÑиложение оÑпÑавлÑÐµÑ Ð¿ÐµÑÑоналÑнÑе
даннÑе на ÑеÑвеÑ, где иÑ
полноÑÑÑÑ
-полÑÑÐ°ÐµÑ <em>ÑазÑабоÑÑик</em>. ÐÑа
“ÑлÑжба” — длÑ
-пÑоÑÑоÑилÑ!</p>
+ <li id="M201605310">
+ <p>ÐÑиложение Facebook поÑÑоÑнно
подÑлÑÑиваеÑ, <a
+href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">ÑледиÑ
+за Ñем, ÑÑо лÑди ÑлÑÑаÑÑ Ð¸Ð»Ð¸ ÑмоÑÑÑÑ</a>.
ÐÑоме Ñого, оно, возможно,
+анализиÑÑÐµÑ Ð¿ÐµÑеговоÑÑ Ð¿Ð¾Ð»ÑзоваÑелей,
ÑÑÐ¾Ð±Ñ Ð´Ð¾ÑÑавлÑÑÑ Ð¸Ð¼ наÑеленнÑÑ
+ÑекламÑ.</p>
+ </li>
-<p>У ÑеÑвеÑа, ÑазÑмееÑÑÑ, еÑÑÑ “полиÑика
конÑиденÑиалÑноÑÑи”, и
-ÑазÑмееÑÑÑ, она ниÑего не ÑÑоиÑ, как поÑÑи
вÑе Ñакие “полиÑики”.</p>
-</li>
+ <li id="M201604250">
+ <p>ÐÑиложение конÑÑоллеÑа ÑеÑÑа на
беÑеменноÑÑÑ Ð¼Ð¾Ð¶ÐµÑ Ð½Ðµ ÑолÑко <a
+href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">ÑпиониÑÑ
+за вÑевозможнÑми даннÑми в ÑелеÑоне и в
ÑÑеÑнÑÑ
запиÑÑÑ
ÑеÑвеÑа, оно Ð¼Ð¾Ð¶ÐµÑ Ð¸
+подменÑÑÑ Ð¸Ñ
</a>.</p>
+ </li>
- <li><p>Такие пÑиложениÑ, как <a
+ <li id="M201601130">
+ <p>Такие пÑиложениÑ, как <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
пÑогÑамма Ñлежки Symphony, подÑлÑÑиваÑÑ, какие
Ñадио- и ÑелепеÑедаÑи
пÑоигÑÑваÑÑÑÑ Ð¿Ð¾Ð±Ð»Ð¸Ð·Ð¾ÑÑи</a>. Ð Ñакже
подÑмаÑÑиваÑÑ, ÑÑо полÑзоваÑели пиÑÑÑ
на ÑакиÑ
ÑайÑаÑ
как Facebook, Google+ и Twitter.</p>
</li>
- <li><p>Ðолее 73% пÑиложений Android и 47%
пÑиложений iOS <a
-href="http://jots.pub/a/2015103001/index.php"> пÑедоÑÑавлÑÑÑ
лиÑнÑÑ,
-поведенÑеÑкÑÑ Ð¸ меÑÑоопÑеделиÑелÑнÑÑ
инÑоÑмаÑиÑ</a> ÑвоиÑ
полÑзоваÑелей
-ÑÑеÑÑим ÑÑоÑонам.</p>
+ <li id="M201601110">
+ <p>ÐÑÑеÑÑвенное пÑодолжение надзоÑа за
лÑдÑми пÑи поÑÑедÑÑве “иÑ
”
+ÑелеÑонов — <a
+href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
+неÑÐ²Ð¾Ð±Ð¾Ð´Ð½Ð°Ñ Ð¿ÑогÑамма Ð´Ð»Ñ Ð¿ÑовеÑки Ñого,
ÑÑо они не “обведÑÑ”
+надзиÑаÑелей “вокÑÑг палÑÑа”</a>.</p>
</li>
- <li><p>“СкÑÑÑнÑе ÑообÑениє, не
ÑвÑзаннÑе Ñ ÑÑнкÑионалÑноÑÑÑÑ
+ <li id="M201511190">
+ <p>“СкÑÑÑнÑе ÑообÑениє, не
ÑвÑзаннÑе Ñ ÑÑнкÑионалÑноÑÑÑÑ
пÑиложениÑ, <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
Ð½Ð°Ð¹Ð´ÐµÐ½Ñ Ð² 500 ÑамÑÑ
попÑлÑÑнÑÑ
беÑплаÑнÑÑ
пÑиложениÑÑ
Android</a>.</p>
@@ -404,46 +638,78 @@
ниÑем не лÑÑÑе лÑбого дÑÑгого
подглÑдÑваниÑ.</p>
</li>
- <li><p>Ðногие неÑвободнÑе пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð´Ð»Ñ
мобилÑнÑÑ
ÑÑÑÑойÑÑв оÑÑÑлаÑÑ Ð¾ÑÑеÑÑ Ð¾ Ñом,
-какие пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ ÑÑÑановил полÑзоваÑелÑ. <a
-href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter Ñ
оÑÑ
бÑ
-Ð´ÐµÐ»Ð°ÐµÑ ÑÑо Ñак, ÑÑо ÑÑо видно и ÑÑо можно
оÑклÑÑиÑÑ</a>. Ðе Ñак плоÑ
о, как
-Ñо, ÑÑо делаÑÑ Ð´ÑÑгие.</p>
+ <li id="M201510300">
+ <p>Ðолее 73% и 47% ÑамÑÑ
попÑлÑÑнÑÑ
пÑиложений Android и iOS ÑооÑвеÑÑÑвенно <a
+href="https://techscience.org/a/2015103001/"> пÑедоÑÑавлÑÑÑ
лиÑнÑÑ,
+поведенÑеÑкÑÑ Ð¸ меÑÑоопÑеделиÑелÑнÑÑ
инÑоÑмаÑиÑ</a> ÑвоиÑ
полÑзоваÑелей
+ÑÑеÑÑим ÑÑоÑонам.</p>
</li>
- <li><p>СоÑовÑе ÑелеÑÐ¾Ð½Ñ Ñ GPS вÑÑÑлаÑÑ Ñвои
ÑпÑÑниковÑе меÑÑоопÑÐµÐ´ÐµÐ»ÐµÐ½Ð¸Ñ Ð¿Ð¾
-Ñдаленной команде, и полÑзоваÑели не могÑÑ
оÑÑановиÑÑ ÑÑо: <a
-href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
-http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>
-(СШРпланиÑÑÑÑ Ð²Ð²ÐµÑÑи когда-нибÑдÑ
ÑÑебование, по коÑоÑÐ¾Ð¼Ñ Ð²Ð¾ вÑеÑ
новÑÑ
-мобилÑнÑÑ
ÑелеÑонаÑ
должен бÑÑÑ Ð¼Ð¾Ð´ÑлÑ
GPS).</p>
- </li>
-
- <li><p>ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð² ÑеÑевÑÑ
ÑелеÑонаÑ
TNP Cisco: <a
-href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a>.</p></li>
-
- <li><p>ШпионÑкие пÑогÑÐ°Ð¼Ð¼Ñ Ð² ÑелеÑонаÑ
Android
(и поÑÑаÑивнÑÑ
компÑÑÑеÑаÑ
[Ñ
-Windows?]): “Уолл-ÑÑÑÐ¸Ñ Ð´Ð¶Ð¾Ñнел” (в ÑÑаÑÑе,
закÑÑÑой Ð¾Ñ Ð½Ð°Ñ
-баÑÑеÑом плаÑежа) ÑообÑаеÑ, ÑÑо <a
-href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">ФÐÐ
-Ð¼Ð¾Ð¶ÐµÑ Ñдаленной командой вклÑÑаÑÑ
пÑиемник GPS и микÑоÑон в ÑелеÑонаÑ
Ñ
-Android и поÑÑаÑивнÑÑ
компÑÑÑеÑаÑ
</a>. (Я
подозÑеваÑ, ÑÑо ÑеÑÑ Ð¸Ð´ÐµÑ Ð¾
-компÑÑÑеÑаÑ
Ñ Windows.) <a
-href="http://cryptome.org/2013/08/fbi-hackers.htm">ÐÑÑгие
подÑобноÑÑи</a>.</p>
- </li>
-
- <li><p>РнекоÑоÑÑÑ
ÑелеÑонаÑ
Motorola ÑиÑÑема
Android изменена Ð´Ð»Ñ <a
-href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
-оÑпÑавки лиÑнÑÑ
даннÑÑ
в Motorola</a>.</p>
+ <li id="M201510050">
+ <p>СоглаÑно ÐдваÑÐ´Ñ Ð¡Ð½Ð¾ÑденÑ, <a
+href="http://www.bbc.com/news/uk-34444233">агенÑÑÑва могÑÑ
бÑаÑÑ Ð¿Ð¾Ð´
+конÑÑÐ¾Ð»Ñ ÑмаÑÑÑонÑ</a>, поÑÑÐ»Ð°Ñ ÑкÑÑÑÑе
ÑекÑÑовÑе ÑообÑениÑ, коÑоÑÑе
+позволÑÑÑ Ð²ÐºÐ»ÑÑаÑÑ Ð¸ вÑклÑÑаÑÑ ÑелеÑонÑ,
пÑоÑлÑÑиваÑÑ Ð¿Ð¾ микÑоÑонÑ,
+извлекаÑÑ Ð´Ð°Ð½Ð½Ñе о меÑÑоположении из GPS,
ÑоÑогÑаÑиÑоваÑÑ, ÑиÑаÑÑ ÑекÑÑовÑе
+ÑообÑениÑ, иÑÑоÑÐ¸Ñ Ð·Ð²Ð¾Ð½ÐºÐ¾Ð², пеÑедвижений,
а Ñакже пÑоÑмоÑÑа ÐÑемиÑной
+паÑÑинÑ, и ÑиÑаÑÑ ÑпиÑок конÑакÑов. ÐÑи
вÑедоноÑнÑе пÑогÑÐ°Ð¼Ð¼Ñ ÑпÑоекÑиÑованÑ
+Ñак, ÑÑÐ¾Ð±Ñ Ð½Ðµ позволÑÑÑ ÑебÑ
обнаÑÑживаÑÑ.</p>
+ </li>
+
+ <li id="M201508210">
+ <p>Ðак болÑÑинÑÑво медвежÑиÑ
ÑÑлÑг по
“мÑзÑкалÑÐ½Ð¾Ð¼Ñ Ð¿Ð¾ÑоковомÑ
+веÑаниє, Spotify оÑнован на неÑвободнÑÑ
вÑедоноÑнÑÑ
пÑогÑаммаÑ
(Ñ
+ÑиÑÑовÑм ÑпÑавлением огÑаниÑениÑми и
подглÑдванием). РавгÑÑÑе
+2015 года он <a
+href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+поÑÑебовал Ð¾Ñ Ð¿Ð¾Ð»ÑзоваÑелей ÑоглаÑиÑÑÑÑ
на повÑÑеннÑÑ ÑлежкÑ</a>, и
+некоÑоÑÑе наÑинаÑÑ Ð¾ÑознаваÑÑ, ÑÑо ÑÑо
ÑквеÑно.</p>
+
+ <p>СледÑÑÑÐ°Ñ ÑÑаÑÑÑ Ð´Ð°ÐµÑ Ð¾Ð±ÑазÑик <a
+href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+извÑаÑÐµÐ½Ð¸Ñ ÑакÑов, коÑоÑÑми они
пÑедÑÑавлÑÑÑ ÑÐ»ÐµÐ¶ÐºÑ ÐºÐ°Ðº ÑпоÑоб лÑÑÑе
+“обÑлÑживаÑÑ”
полÑзоваÑелей</a> — незавиÑимо Ð¾Ñ Ñого,
+Ñ
оÑÑÑ Ð»Ð¸ Ñе ÑÑого. ÐÑо ÑипиÑнÑй пÑимеÑ
оÑноÑÐµÐ½Ð¸Ñ Ð¸Ð½Ð´ÑÑÑÑии неÑвободнÑÑ
+пÑогÑамм к Ñем, кого они подÑинили.</p>
+
+ <p>ÐÑоÑÑ, пÑоÑÑ, пÑоклÑÑÑй Spotify!</p>
+ </li>
+
+ <li id="M201507030">
+ <p>ТелеÑÐ¾Ð½Ñ Samsung пÑодаÑÑ <a
+href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">
+Ñ Ð¿ÑиложениÑми, коÑоÑÑе не могÑÑ Ð±ÑÑÑ
ÑÐ´Ð°Ð»ÐµÐ½Ñ Ð¿Ð¾Ð»ÑзоваÑелÑми</a> и коÑоÑÑе
+оÑпÑавлÑÑÑ ÑÑолÑко даннÑÑ
, ÑÑо пеÑедаÑа
обÑ
одиÑÑÑ Ð¿Ð¾Ð»ÑзоваÑелÑм доволÑно
+доÑого. Ð£ÐºÐ°Ð·Ð°Ð½Ð½Ð°Ñ Ð¿ÐµÑедаÑа, нежелаÑелÑнаÑ
Ð´Ð»Ñ Ð¿Ð¾Ð»ÑзоваÑелей и не
+воÑÑÑÐµÐ±Ð¾Ð²Ð°Ð½Ð½Ð°Ñ Ð¸Ð¼Ð¸, опÑеделенно должна
пÑедÑÑавлÑÑÑ Ñого или иного Ñода
+ÑлежкÑ.</p>
</li>
- <li><p>ÐекоÑоÑÑе пÑоизводиÑели добавлÑÑÑ <a
-href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
-ÑкÑÑÑÑй Ð¿Ð°ÐºÐµÑ Ñлежки, Ñакой как Carrier IQ</a>.</p>
+ <li id="M201506264">
+ <p><a
+href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">ÐÑÑледование
+2015 года</a> показало, ÑÑо 90% ÑамÑÑ
попÑлÑÑнÑÑ
беÑплаÑнÑÑ
неÑвободнÑÑ
+пÑиложений под Android ÑодеÑжало библиоÑеки,
коÑоÑÑе можно ÑÑиÑаÑÑ
+библиоÑеками Ñлежки. ÐÐ»Ñ Ð¿Ð»Ð°ÑнÑÑ
неÑовбоднÑÑ
пÑиложений ÑÑа велиÑина
+ÑоÑÑавлÑла ÑолÑко 60%.</p>
+
+ <p>СÑаÑÑÑ Ð²Ð½Ð¾ÑÐ¸Ñ Ð¿ÑÑаниÑÑ, опиÑÑваÑ
беÑплаÑнÑе пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ ÐºÐ°Ðº
+“ÑвободнÑе”, но болÑÑинÑÑво из ниÑ
на
Ñамом-Ñо деле не ÑвлÑÑÑÑÑ
+<a href="/philosophy/free-sw.html">ÑвободнÑми
пÑогÑаммами</a>. Ð ÑÑаÑÑе
+Ñакже ÑпоÑÑеблÑеÑÑÑ Ð±ÐµÐ·Ð¾Ð±Ñазное Ñлово
“монеÑизиÑоваÑÑ”. ÐÐ»Ñ ÑÑой
+ÑиÑÑаÑии Ñ
оÑоÑо подÑ
Ð¾Ð´Ð¸Ñ Ñлово
“ÑкÑплÑаÑиÑоваÑÑ”; поÑÑи вÑегда
+оно в ÑоÑноÑÑи оÑÑÐ°Ð¶Ð°ÐµÑ ÑмÑÑл.</p>
</li>
- <li><p>ÐопÑлÑÑнÑй <a
+ <li id="M201505060">
+ <p>ÐеÑплаÑнÑе (но не <a
+href="/philosophy/free-sw.html">ÑвободнÑе</a>)пÑиложениÑ
Android <a
+href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">подклÑÑаÑÑÑÑ
+к 100 URL Ñлежки и ÑекламÑ</a> (в ÑÑеднем).</p>
+ </li>
+
+ <li id="M201504060">
+ <p>ÐопÑлÑÑнÑй <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">
неÑвободнÑй ÑÐºÐ°Ð½ÐµÑ Ð¼Ð°ÑÑиÑного кода
подÑмаÑÑÐ¸Ð²Ð°ÐµÑ Ð·Ð° полÑзоваÑелем</a>. ÐÑо в
дополнение к Ñлежке, коÑоÑÑÑ Ð²ÐµÐ´ÐµÑ
ÑелеÑÐ¾Ð½Ð½Ð°Ñ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ, а Ð¼Ð¾Ð¶ÐµÑ Ð±ÑÑÑ, и
@@ -452,62 +718,98 @@
<p>Ðе дайÑе ÑÐµÐ±Ñ Ð¾ÑвлеÑÑ Ð²Ð¾Ð¿ÑоÑом о Ñом,
полÑÑаÑÑ Ð»Ð¸ ÑазÑабоÑÑики ÑоглаÑие
полÑзоваÑелÑ. ÐÑо не извинÑÐµÑ Ð²ÑедоноÑнÑÑ
пÑогÑаммÑ.</p>
</li>
-</ul>
-<h3 id="drm">ЦиÑÑовое ÑпÑавление
огÑаниÑениÑми</h3>
-<ul>
+ <li id="M201411260">
+ <p>Ðногие неÑвободнÑе пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð´Ð»Ñ
мобилÑнÑÑ
ÑÑÑÑойÑÑв оÑÑÑлаÑÑ Ð¾ÑÑеÑÑ Ð¾ Ñом,
+какие пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ ÑÑÑановил полÑзоваÑелÑ. <a
+href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter Ñ
оÑÑ
бÑ
+Ð´ÐµÐ»Ð°ÐµÑ ÑÑо Ñак, ÑÑо ÑÑо видно и ÑÑо можно
оÑклÑÑиÑÑ</a>. Ðе Ñак плоÑ
о, как
+Ñо, ÑÑо делаÑÑ Ð´ÑÑгие.</p>
+ </li>
-<li id="android-apps-detect-rooting">
-<p>ТепеÑÑ Google позволÑÐµÑ Ð¿ÑиложениÑм Android
обнаÑÑживаÑÑ, ÑÑо полÑзоваÑелÑ
-полÑÑил пÑава админиÑÑÑаÑоÑа, и <a
-href="http://www.androidpolice.com/2017/05/13/netflix-confirms-blocking-rootedunlocked-devices-app-still-working-now/">оÑказÑваÑÑÑÑ
-ÑÑÑанавливаÑÑÑÑ Ð² ÑÑом ÑлÑÑае</a>.</p>
-
-<p>Ðбновление: Google <i>пÑеднамеÑенно</i>
изменил Android, ÑÑÐ¾Ð±Ñ Ð¿ÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ <a
-href="https://torrentfreak.com/netflix-use-of-google-drm-means-rooted-android-devices-are-banned-170515/">могли
-обнаÑÑживаÑÑ ÑÑÑÑойÑÑва, Ñ ÐºÐ¾ÑоÑÑÑ
полÑзоваÑÐµÐ»Ñ Ð¿Ð¾Ð»ÑÑил пÑава
-админиÑÑÑаÑоÑа, и оÑказÑваÑÑÑÑ Ð½Ð° ниÑ
ÑабоÑаÑÑ.</a>.</p>
-</li>
+ <li id="M201403120">
+ <p><a href="/proprietary/proprietary-back-doors.html#samsung">
ЧеÑнÑй Ñ
од
+Samsung</a> пÑедоÑÑавлÑÐµÑ Ð´Ð¾ÑÑÑп к лÑÐ±Ð¾Ð¼Ñ ÑайлÑ
в ÑиÑÑеме.</p>
+ </li>
- <li>
- <p>iPhone 7 ÑодеÑÐ¶Ð¸Ñ ÑиÑÑовое ÑпÑавление
огÑаниÑениÑми, ÑпÑоекÑиÑованное
-ÑпеÑиалÑно Ð´Ð»Ñ Ñого, ÑÑÐ¾Ð±Ñ <a
-href="https://motherboard.vice.com/en_us/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock">
-вÑводиÑÑ ÐµÐ³Ð¾ из ÑÑÑоÑ, еÑли его
ÑемонÑиÑÑÑÑ Ð² “неавÑоÑизованной”
-маÑÑеÑÑкой</a>. “ÐеавÑоÑизованнає по
ÑÑÑи ознаÑÐ°ÐµÑ Ð²ÑеÑ
, кÑоме
-Apple.</p>
-
- <p>Ð ÑÑаÑÑе Ð´Ð»Ñ Ð¾Ð¿Ð¸ÑÐ°Ð½Ð¸Ñ ÑиÑÑового
ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð¾Ð³ÑаниÑениÑми ÑпоÑÑеблÑеÑÑÑ
Ñлово
-“замок”, но Ð¼Ñ Ð¿ÑедпоÑиÑаем
вÑÑажение <a
-href="https://gnu.org/philosophy/words-to-avoid.html#DigitalLocks">
ÑиÑÑовÑе
-наÑÑÑники</a>.</p>
- </li>
-
- <li><p><a
-href="https://developer.android.com/reference/android/drm/package-summary.html">Android
-пÑедÑÑмаÑÑÐ¸Ð²Ð°ÐµÑ ÑÑнкÑии, пÑедназнаÑеннÑе
Ð´Ð»Ñ Ð¿Ð¾Ð´Ð´ÐµÑжки ÑиÑÑового ÑпÑавлениÑ
-огÑаниÑениÑми</a>.</p>
+ <li id="M201401151">
+ <p>ÐлавиаÑÑÑа Simeji — ÑмаÑÑÑоннаÑ
веÑÑÐ¸Ñ <a
+href="/proprietary/proprietary-surveillance.html#baidu-ime">ÑпионÑÑего
+меÑода ввода</a> Baidu.</p>
+ </li>
+
+ <li id="M201312270">
+ <p>ÐÑновное назнаÑение неÑвободной
пÑогÑÐ°Ð¼Ð¼Ñ Snapchat — огÑаниÑиваÑÑ
+иÑполÑзование даннÑÑ
на компÑÑÑеÑе
полÑзоваÑелÑ, но она пÑÐ¾Ð²Ð¾Ð´Ð¸Ñ Ð¸ ÑлежкÑ:
+<a
+href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+она пÑÑаеÑÑÑ Ð¿Ð¾Ð»ÑÑиÑÑ ÑпиÑок номеÑов
ÑелеÑонов лÑдей из адÑеÑной книжки
+полÑзоваÑелÑ</a>.</p>
+ </li>
+
+ <li id="M201312060">
+ <p>Brightest Flashlight, пÑогÑамма Ð´Ð»Ñ Android, <a
+href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+вÑÑÑÐ»Ð°ÐµÑ Ð´Ð°Ð½Ð½Ñе полÑзоваÑелÑ, в Ñом ÑиÑле
меÑÑоположение, Ð´Ð»Ñ Ð¸ÑполÑзованиÑ
+компаниÑми</a>.</p>
+
+ <p>ФедеÑалÑÐ½Ð°Ñ ÑоÑÐ³Ð¾Ð²Ð°Ñ ÐºÐ¾Ð¼Ð¸ÑÑиÑ
вÑÑÑÑпила Ñ ÐºÑиÑикой ÑÑой пÑогÑÐ°Ð¼Ð¼Ñ Ð·Ð° Ñо,
ÑÑо
+она пÑоÑÐ¸Ñ ÑазÑеÑÐµÐ½Ð¸Ñ Ð¿Ð¾Ð»ÑзоваÑÐµÐ»Ñ Ð½Ð°
оÑÑÑÐ»ÐºÑ Ð»Ð¸ÑнÑÑ
даннÑÑ
ÑазÑабоÑÑикÑ
+пÑогÑаммÑ, но не ÑпÑаÑÐ¸Ð²Ð°ÐµÑ Ð¾Ð± оÑÑÑлке
даннÑÑ
дÑÑгим компаниÑм. ÐÑо
+показÑÐ²Ð°ÐµÑ ÑлабоÑÑÑ Ð²Ð°ÑианÑа <em>оÑкажиÑÑ,
еÑли Ñебе не нÑавиÑÑÑ Ñлежка</em>
+как “ÑеÑениє пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ñлежки: заÑем
пÑогÑамме-ÑонаÑÐ¸ÐºÑ Ð¾ÑÑÑлаÑÑ
+комÑ-Ñо какие-Ñо ÑведениÑ? СвободнаÑ
пÑогÑамма-ÑонаÑик ÑÑого Ð±Ñ Ð½Ðµ делала.</p>
+ </li>
+
+ <li id="M201307000">
+ <p>СоÑовÑе ÑелеÑÐ¾Ð½Ñ Ñ GPS <a
+href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">вÑÑÑлаÑÑ
+Ñвои ÑпÑÑниковÑе меÑÑоопÑÐµÐ´ÐµÐ»ÐµÐ½Ð¸Ñ Ð¿Ð¾
Ñдаленной команде, и полÑзоваÑели не
+могÑÑ Ð¾ÑÑановиÑÑ ÑÑо</a>. (СШРпланиÑÑÑÑ
ввеÑÑи когда-нибÑÐ´Ñ ÑÑебование, по
+коÑоÑÐ¾Ð¼Ñ Ð²Ð¾ вÑеÑ
новÑÑ
мобилÑнÑÑ
ÑелеÑонаÑ
должен бÑÑÑ Ð¼Ð¾Ð´ÑÐ»Ñ GPS).</p>
+ </li>
+
+ <li id="M201212100">
+ <p>Ðо Ñловам ФедеÑалÑной комиÑÑии по
ÑоÑговле, болÑÑинÑÑво мобилÑнÑÑ
пÑиложений
+Ð´Ð»Ñ Ð´ÐµÑей не ÑоблÑдаеÑ
конÑиденÑиалÑноÑÑи: <a
+href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
+ </li>
+
+ <li id="M201111170">
+ <p>ÐекоÑоÑÑе пÑоизводиÑели добавлÑÑÑ <a
+href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ÑкÑÑÑÑй Ð¿Ð°ÐºÐµÑ Ñлежки, Ñакой как Carrier IQ</a>.</p>
</li>
</ul>
+
<h3 id="jails">ТÑÑÑмÑ</h3>
-<ul>
- <li><p><a href="//www.fsf.org/campaigns/secure-boot-vs-restricted-boot/">
ÐобилÑнÑе
-ÑÑÑÑойÑÑва Ñ Ð¿ÑедÑÑÑановленной Windows
8 — Ñоже ÑиÑанÑ</a>. <a
+
+<ul class="blurbs">
+
+ <!-- INSERT mobiles-jail -->
+<li id="M201210080">
+ <p><a
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html">
-Windows 8 на “мобилÑнÑÑ
ÑÑÑÑойÑÑваÑ
” — ÑÑÑÑма.</a></p>
+Windows 8 на “мобилÑнÑÑ
ÑÑÑÑойÑÑваÑ
”
(более не дейÑÑвÑÑÑаÑ) бÑла
+ÑÑÑÑмой.</a></p>
</li>
</ul>
+
<h3 id="tyrants">ТиÑанÑ</h3>
-<ul>
- <li><p><a
-href="http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html">
-ÐекоÑоÑÑе ÑелеÑÐ¾Ð½Ñ Ñ Android — ÑиÑанÑ</a>
(Ñ
оÑÑ ÐºÑо-Ñо наÑел
-ÑпоÑоб взломаÑÑ Ð¾Ð³ÑаниÑение). Ð ÑÑаÑÑÑÑ,
болÑÑинÑÑво ÑÑÑÑойÑÑв Ñ
-Android — не ÑиÑанÑ.</p>
+
+<ul class="blurbs">
+
+ <!-- INSERT mobiles-tyrant -->
+<li id="M201110110">
+ <p><a href="https://fsf.org/campaigns/secure-boot-vs-restricted-boot/">
+ÐобилÑнÑе ÑÑÑÑойÑÑва Ñ Ð¿ÑедÑÑÑановленной
Windows 8 — ÑиÑанÑ</a>.</p>
</li>
</ul>
+
+
<div class="translators-notes">
<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
@@ -584,7 +886,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/07/25 16:30:35 $
+$Date: 2018/10/08 07:58:03 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-back-doors.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.ru.html,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- proprietary/proprietary-back-doors.ru.html 6 Oct 2018 06:59:40 -0000
1.48
+++ proprietary/proprietary-back-doors.ru.html 8 Oct 2018 07:58:03 -0000
1.49
@@ -19,6 +19,7 @@
<p><a href="/proprietary/proprietary.html">ÐÑÑгие пÑимеÑÑ
вÑедоноÑнÑÑ
неÑвободнÑÑ
пÑогÑамм</a></p>
+<div class="comment">
<p>ÐеÑвободнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð¾ÑÐµÐ½Ñ ÑаÑÑо
вÑедоноÑÐ½Ñ (ÑпÑоекÑиÑÐ¾Ð²Ð°Ð½Ñ Ð½ÐµÑпÑаведливо
по оÑноÑÐµÐ½Ð¸Ñ Ðº полÑзоваÑелÑ). ÐеÑвободнÑе
пÑогÑÐ°Ð¼Ð¼Ñ ÐºÐ¾Ð½ÑÑолиÑÑÑÑÑÑ Ñвоими
ÑазÑабоÑÑиками, ÑÑо Ð´Ð°ÐµÑ Ð¸Ð¼ влаÑÑÑ Ð½Ð°Ð´
полÑзоваÑелÑми; <a
@@ -31,17 +32,20 @@
нам извеÑÑно) позволÑÑÑ. Ðазейки, коÑоÑÑе
допÑÑкаÑÑ Ð¿Ð¾Ð»Ð½Ñй конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´
опеÑаÑионной ÑиÑÑемой, обознаÑÐµÐ½Ñ ÐºÐ°Ðº
“ÑнивеÑÑалÑнÑе”.</p>
+<div class="important">
<p>ÐÑли вам извеÑÑен пÑимеÑ, коÑоÑÑй должен
бÑÑÑ Ð½Ð° ÑÑой ÑÑÑаниÑе, но его здеÑÑ
неÑ, ÑообÑиÑе нам по адÑеÑÑ <a
href="mailto:address@hidden"><address@hidden></a>. УпомÑниÑе
один-два заÑлÑживаÑÑиÑ
довеÑÐ¸Ñ URL, ÑÑобÑ
пÑоиллÑÑÑÑиÑоваÑÑ Ð¿Ð¾Ð´ÑобноÑÑи.</p>
+</div>
+</div>
-<p class="c">
- <a href="#spy">Шпионаж</a> | <a
-href="#alter-data">Ðзменение даннÑÑ
/наÑÑÑоек</a> |
<a
-href="#install-delete">УÑÑановка/Ñдаление пÑогÑамм</a>
| <a
-href="#universal">ÐолнÑй конÑÑолÑ</a> | <a
-href="#other">ÐÑоÑее/неопÑеделенное</a>
+<p class="c" style="font-size: 1.1em">
+ <a href="#spy">Шпионаж</a> <a
+href="#alter-data">Ðзменение даннÑÑ
/наÑÑÑоек</a> <a
+href="#install-delete">УÑÑановка/Ñдаление пÑогÑамм</a>
<a
+href="#universal">ÐолнÑй конÑÑолÑ</a> <a
+href="#other">ÐÑоÑее/неопÑеделенное</a>
</p>
@@ -542,7 +546,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/10/06 06:59:40 $
+$Date: 2018/10/08 07:58:03 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-drm.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-drm.ru.html,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- proprietary/proprietary-drm.ru.html 6 Oct 2018 12:58:46 -0000 1.23
+++ proprietary/proprietary-drm.ru.html 8 Oct 2018 07:58:03 -0000 1.24
@@ -19,6 +19,7 @@
<a href="/proprietary/proprietary.html">ÐÑÑгие пÑимеÑÑ
вÑедоноÑнÑÑ
неÑвободнÑÑ
пÑогÑамм</a>
+<div class="comment">
<p>ÐеÑвободнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð¾ÑÐµÐ½Ñ ÑаÑÑо
вÑедоноÑÐ½Ñ (ÑпÑоекÑиÑÐ¾Ð²Ð°Ð½Ñ Ð½ÐµÑпÑаведливо
по оÑноÑÐµÐ½Ð¸Ñ Ðº полÑзоваÑелÑ). ÐеÑвободнÑе
пÑогÑÐ°Ð¼Ð¼Ñ ÐºÐ¾Ð½ÑÑолиÑÑÑÑÑÑ Ñвоими
ÑазÑабоÑÑиками, ÑÑо Ð´Ð°ÐµÑ Ð¸Ð¼ влаÑÑÑ Ð½Ð°Ð´
полÑзоваÑелÑми; <a
@@ -42,6 +43,15 @@
огÑаниÑениÑми</a>.
</p>
+<div class="important">
+<p>ÐÑли вам извеÑÑен пÑимеÑ, коÑоÑÑй должен
бÑÑÑ Ð½Ð° ÑÑой ÑÑÑаниÑе, но его здеÑÑ
+неÑ, ÑообÑиÑе нам по адÑеÑÑ <a
+href="mailto:address@hidden"><address@hidden></a>. УпомÑниÑе
+один-два заÑлÑживаÑÑиÑ
довеÑÐ¸Ñ URL, ÑÑобÑ
пÑоиллÑÑÑÑиÑоваÑÑ Ð¿Ð¾Ð´ÑобноÑÑи.</p>
+</div>
+</div>
+<div class="column-limit"></div>
+
<ul class="blurbs">
<!-- INSERT drm -->
@@ -365,7 +375,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/10/06 12:58:46 $
+$Date: 2018/10/08 07:58:03 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-jails.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-jails.ru.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- proprietary/proprietary-jails.ru.html 5 Oct 2018 21:01:53 -0000
1.22
+++ proprietary/proprietary-jails.ru.html 8 Oct 2018 07:58:03 -0000
1.23
@@ -19,6 +19,7 @@
<p><a href="/proprietary/proprietary.html">ÐÑÑгие пÑимеÑÑ
вÑедоноÑнÑÑ
неÑвободнÑÑ
пÑогÑамм</a></p>
+<div class="comment">
<p>ÐеÑвободнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð¾ÑÐµÐ½Ñ ÑаÑÑо
вÑедоноÑÐ½Ñ (ÑпÑоекÑиÑÐ¾Ð²Ð°Ð½Ñ Ð½ÐµÑпÑаведливо
по оÑноÑÐµÐ½Ð¸Ñ Ðº полÑзоваÑелÑ). ÐеÑвободнÑе
пÑогÑÐ°Ð¼Ð¼Ñ ÐºÐ¾Ð½ÑÑолиÑÑÑÑÑÑ Ñвоими
ÑазÑабоÑÑиками, ÑÑо Ð´Ð°ÐµÑ Ð¸Ð¼ влаÑÑÑ Ð½Ð°Ð´
полÑзоваÑелÑми; <a
@@ -34,18 +35,21 @@
<!-- embed http://i.imgur.com/ZRViDum.jpg here -->
<!-- Linking to it. Not possible to embed due to licensing. See RT #887471 -->
-<p>ÐÑ Ñакже пÑиводим конкÑеÑнÑе пÑимеÑÑ
пÑиложений, коÑоÑÑе бÑли заблокиÑованÑ
-Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ ÑÑой ÑензоÑÑкой влаÑÑи. ÐÑли вÑ
знаеÑе дÑÑгие пÑимеÑÑ, пÑиÑлиÑе,
-пожалÑйÑÑа, подÑобноÑÑи на webmasters@ наÑ
домен.</p>
-
<p>ÐÑи ÑиÑÑÐµÐ¼Ñ Ð¿ÑедÑÑавлÑÑÑ Ð¿Ð»Ð°ÑÑоÑÐ¼Ñ Ð´Ð»Ñ
ÑензÑÑÑ, налагаемой компанией,
владеÑÑей ÑиÑÑемой. ÐÑодажа пÑодÑкÑов,
ÑпÑоекÑиÑованнÑÑ
как плаÑÑоÑÐ¼Ñ Ð´Ð»Ñ
Ð½Ð°Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸ÐµÐ¹ ÑензÑÑÑ, должна бÑÑÑ
запÑеÑена законом.</p>
+<div class="important">
+<p>ÐÑ Ñакже пÑиводим конкÑеÑнÑе пÑимеÑÑ
пÑиложений, коÑоÑÑе бÑли заблокиÑованÑ
+Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ ÑÑой ÑензоÑÑкой влаÑÑи. ÐÑли вÑ
знаеÑе дÑÑгие пÑимеÑÑ, пÑиÑлиÑе,
+пожалÑйÑÑа, подÑобноÑÑи на webmasters@ наÑ
домен.</p>
+</div>
+</div>
+
<p class="c">
- <a href="#apple">ТÑÑÑÐ¼Ñ Apple</a> | <a
-href="#microsoft">ТÑÑÑÐ¼Ñ Microsoft</a> | <a
href="#consoles">ÐгÑовÑе
-пÑиÑÑавки</a>
+ <a href="#apple">ТÑÑÑÐ¼Ñ Apple</a> <a
+href="#microsoft">ТÑÑÑÐ¼Ñ Microsoft</a> <a
+href="#consoles">ÐгÑовÑе пÑиÑÑавки</a>
</p>
<h3 id="apple">ТÑÑÑÐ¼Ñ Apple</h3>
@@ -286,7 +290,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/10/05 21:01:53 $
+$Date: 2018/10/08 07:58:03 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-sabotage.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-sabotage.ru.html,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- proprietary/proprietary-sabotage.ru.html 5 Oct 2018 17:59:47 -0000
1.44
+++ proprietary/proprietary-sabotage.ru.html 8 Oct 2018 07:58:03 -0000
1.45
@@ -19,6 +19,7 @@
<a href="/proprietary/proprietary.html">ÐÑÑгие пÑимеÑÑ
вÑедоноÑнÑÑ
неÑвободнÑÑ
пÑогÑамм</a>
+<div class="comment">
<p>ÐеÑвободнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð¾ÑÐµÐ½Ñ ÑаÑÑо
вÑедоноÑÐ½Ñ (ÑпÑоекÑиÑÐ¾Ð²Ð°Ð½Ñ Ð½ÐµÑпÑаведливо
по оÑноÑÐµÐ½Ð¸Ñ Ðº полÑзоваÑелÑ). ÐеÑвободнÑе
пÑогÑÐ°Ð¼Ð¼Ñ ÐºÐ¾Ð½ÑÑолиÑÑÑÑÑÑ Ñвоими
ÑазÑабоÑÑиками, ÑÑо Ð´Ð°ÐµÑ Ð¸Ð¼ влаÑÑÑ Ð½Ð°Ð´
полÑзоваÑелÑми; <a
@@ -26,13 +27,17 @@
неÑпÑаведливо</a>. РазÑабоÑÑики ÑаÑÑо
полÑзÑÑÑÑÑ ÑÑой влаÑÑÑÑ Ð² ÑÑеÑб
полÑзоваÑелÑм, коÑоÑÑÑ
они должнÑ
обÑлÑживаÑÑ.</p>
+<p>ÐÐ¾Ñ Ð¿ÑимеÑÑ Ð½ÐµÑвободнÑÑ
пÑогÑамм, в
коÑоÑÑÑ
еÑÑÑ ÐºÐ¾Ðµ-ÑÑо поÑ
Ñже, Ñем
+лазейки.</p>
+
+<div class="important">
<p>ÐÑли вам извеÑÑен пÑимеÑ, коÑоÑÑй должен
бÑÑÑ Ð½Ð° ÑÑой ÑÑÑаниÑе, но его здеÑÑ
неÑ, ÑообÑиÑе нам по адÑеÑÑ <a
href="mailto:address@hidden"><address@hidden></a>. УпомÑниÑе
один-два заÑлÑживаÑÑиÑ
довеÑÐ¸Ñ URL, ÑÑобÑ
пÑоиллÑÑÑÑиÑоваÑÑ Ð¿Ð¾Ð´ÑобноÑÑи.</p>
-
-<p>ÐÐ¾Ñ Ð¿ÑимеÑÑ Ð½ÐµÑвободнÑÑ
пÑогÑамм, в
коÑоÑÑÑ
еÑÑÑ ÐºÐ¾Ðµ-ÑÑо поÑ
Ñже, Ñем
-лазейки.</p>
+</div>
+</div>
+<div class="column-limit"></div>
<ul class="blurbs">
@@ -52,6 +57,12 @@
полÑзоваÑелей.</p>
</li>
+ <li id="M201806250">
+ <p>ÐгÑа Metal Gear Rising Ð´Ð»Ñ MacOS пÑивÑзана к
ÑеÑвеÑÑ. ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ <a
+href="http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm">
+вÑклÑÑила ÑеÑвеÑ, и вÑе копии пеÑеÑÑали
ÑабоÑаÑÑ</a>.</p>
+ </li>
+
<li id="M201805310">
<p>ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Apple <a
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia">заблокиÑовала
@@ -537,7 +548,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/10/05 17:59:47 $
+$Date: 2018/10/08 07:58:03 $
<!-- timestamp end -->
</p>
Index: proprietary/po/malware-amazon.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.ru-en.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary/po/malware-amazon.ru-en.html 6 Oct 2018 18:28:23 -0000
1.10
+++ proprietary/po/malware-amazon.ru-en.html 8 Oct 2018 07:58:03 -0000
1.11
@@ -8,23 +8,12 @@
<title>Amazon's Software Is Malware
- GNU Project - Free Software Foundation</title>
<!--#include virtual="/proprietary/po/malware-amazon.translist" -->
-<style type="text/css" media="print,screen"><!--
-div.toc { width: 100%; padding: 1.3em 3%; }
-div.toc h3 { display: inline; margin: 0 1.5%; }
-div.toc ul { display: inline; margin: 0; }
-div.toc li {
- display: inline;
- list-style: none;
- font-size: 1.3em;
- margin: 0 1.5%;
-}
---></style>
<!--#include virtual="/server/banner.html" -->
<h2>Amazon's Software Is Malware</h2>
<p><a href="/proprietary/proprietary.html">Other examples of proprietary
malware</a></p>
-<div class="highlight-para">
+<div class="comment">
<p>
Malware and nonfree software are two different issues. Malware means
the program is designed to mistreat or harm users when it runs. The
@@ -37,21 +26,22 @@
the developer's awareness that the users would be powerless to fix any
malicious functionalities tempts the developer to impose some.
</p>
+
+<div class="important">
<p>If you know of an example that ought to be in this page but isn't
here, please write
to <a href="mailto:address@hidden"><address@hidden></a>
to inform us. Please include the URL of a trustworthy reference or two
to present the specifics.</p>
</div>
-
-<div class="toc c">
- <h3>Type of product:</h3>
- <ul>
- <li><a href="#swindle">Kindle Swindle</a></li>
- <li><a href="#echo">Echo</a></li>
- </ul>
</div>
+<p class="c" style="font-size: 1.2em">
+ <a href="#swindle">Kindle Swindle</a>
+ <a href="#echo">Echo</a>
+ <a href="#misc">Other products</a>
+</p>
+
<h3 id="swindle">Malware in the Kindle Swindle</h3>
<p>We refer to this product as the
@@ -60,10 +50,10 @@
management (DRM)</a> and <a href="/philosophy/ebooks.html">
other malicious functionalities</a>.</p>
-<h4 id="back-doors">Amazon Kindle Swindle Back Doors</h4>
+<h4 id="back-doors">Back Doors</h4>
<ul class="blurbs">
-<!-- INSERT swindle-backdoor -->
+<!-- INSERT swindle-back-door -->
<li id="M201503210">
<p>Amazon <a
href="https://www.techdirt.com/articles/20150321/13350230396/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices.shtml">
@@ -93,7 +83,7 @@
</ul>
-<h4 id="surveillance">Amazon Kindle Swindle Surveillance</h4>
+<h4 id="surveillance">Surveillance</h4>
<ul class="blurbs">
<!-- INSERT swindle-surv -->
@@ -105,11 +95,11 @@
</ul>
-<h4 id="drm">Amazon Kindle Swindle DRM</h4>
+<h4 id="drm">DRM</h4>
<ul class="blurbs">
-<!-- INSERT swindle-drm -->
- <li id="M201704130">
+<!-- INSERT swindle-dr -->
+ <li id="M201704131">
<p><a href="http://techin.oureverydaylife.com/kindle-drm-17841.html">
The Amazon Kindle has DRM</a>. That article is flawed in that it
fails to treat DRM as an ethical question; it takes for granted that
@@ -117,21 +107,17 @@
DRM as digital “rights” management, which is the spin
term used to promote DRM. Nonetheless it serves as a reference for
the facts.</p>
-
- <p>We refer to that product as the <a
- href="/philosophy/why-call-it-the-swindle.html"> Amazon Swindle</a>
- because of this and <a href="/philosophy/ebooks.html"> other malicious
- functionalities</a>.</p>
</li>
</ul>
+
<h3 id="echo">Malware in the Echo</h3>
-<h4>Amazon Echo Back Doors</h4>
+<h4>Back Doors</h4>
<ul class="blurbs">
-<!-- INSERT echo-backdoor -->
+<!-- INSERT echo-back-door -->
<li id="M201606060">
<p>The Amazon Echo appears to have a universal back door, since <a
href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates">
@@ -144,7 +130,7 @@
</ul>
-<h4>Amazon Echo Surveillance</h4>
+<h4>Surveillance</h4>
<ul class="blurbs">
<!-- INSERT echo-surv -->
@@ -165,6 +151,26 @@
</ul>
+
+<h3 id="misc"> Malware in other products</h3>
+
+<ul class="blurbs">
+<!-- INSERT amazon-misc -->
+ <li id="M201711200">
+ <p>Amazon recently invited consumers to be suckers and <a
+
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
+ allow delivery staff to open their front doors</a>. Wouldn't you know
+ it, the system has a grave security flaw.</p>
+ </li>
+
+ <li id="M201411090">
+ <p>The Amazon “Smart” TV is <a
+
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
+ snooping all the time</a>.</p>
+ </li>
+</ul>
+
+
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
<div id="footer">
@@ -222,7 +228,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/06 18:28:23 $
+$Date: 2018/10/08 07:58:03 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-amazon.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.ru.po,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- proprietary/po/malware-amazon.ru.po 8 Oct 2018 07:45:13 -0000 1.26
+++ proprietary/po/malware-amazon.ru.po 8 Oct 2018 07:58:03 -0000 1.27
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-10-07 20:25+0000\n"
#. type: Content of: <title>
msgid "Amazon's Software Is Malware - GNU Project - Free Software Foundation"
@@ -76,8 +75,8 @@
"\"#echo\">Echo</a> <a href=\"#misc\">Other products</"
"a> "
msgstr ""
-" <a href=\"#swindle\">ÐадÑваÑелÑÑÑво Kindle</a>
<a href="
-"\"#echo\">Echo</a> <a
href=\"#misc\">ÐÑÑгие пÑодÑкÑÑ</"
+" <a href=\"#swindle\">ÐадÑваÑелÑÑÑво Kindle</a>
<a "
+"href=\"#echo\">Echo</a> <a
href=\"#misc\">ÐÑÑгие пÑодÑкÑÑ</"
"a> "
#. type: Content of: <h3>
@@ -93,13 +92,10 @@
msgstr ""
"ÐÑ Ð½Ð°Ð·Ñваем ÑÑÐ¾Ñ Ð¿ÑодÑÐºÑ <a
href=\"/philosophy/why-call-it-the-swindle.html"
"\">Amazon Swindle (надÑваÑелÑÑÑво Amazon)</a>, поÑомÑ
ÑÑо в нем еÑÑÑ <a href="
-"\"/proprietary/proprietary-drm.html\">ÑиÑÑовое ÑпÑавление
огÑаниÑениÑми "
-"(DRM)</a> и <a href=\"/philosophy/ebooks.html\"> дÑÑгие
вÑедоноÑнÑе ÑÑнкÑии</"
-"a>."
+"\"/proprietary/proprietary-drm.html\">ÑиÑÑовое ÑпÑавление
огÑаниÑениÑми (DRM)"
+"</a> и <a href=\"/philosophy/ebooks.html\"> дÑÑгие
вÑедоноÑнÑе ÑÑнкÑии</a>."
-# | [-Amazon Echo-]Back Doors
#. type: Content of: <h4>
-#| msgid "Amazon Echo Back Doors"
msgid "Back Doors"
msgstr "Ðазейки"
@@ -150,9 +146,7 @@
"Ð Kindle еÑÑÑ Ñакже <a
href=\"http://www.amazon.com/gp/help/customer/display."
"html?nodeId=200774090\"> ÑнивеÑÑалÑнÑй ÑеÑнÑй Ñ
од</a>."
-# | [-Amazon Echo-]Surveillance
#. type: Content of: <h4>
-#| msgid "Amazon Echo Surveillance"
msgid "Surveillance"
msgstr "Слежка"
@@ -245,9 +239,7 @@
"href=\"https://stallman.org/articles/on-hacking.html\"> не
ÑпоÑÑеблÑйÑе "
"Ñлово “Ñ
акеÑÑÑво” в знаÑении
“взлом заÑиÑÑ”</a>."
-# | Malware in [-the Echo-] {+other products+}
#. type: Content of: <h3>
-#| msgid "Malware in the Echo"
msgid "Malware in other products"
msgstr "ÐÑедоноÑнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð² пÑодÑкÑаÑ
"
Index: proprietary/po/malware-apple.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ru-en.html,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- proprietary/po/malware-apple.ru-en.html 5 Oct 2018 21:01:56 -0000
1.57
+++ proprietary/po/malware-apple.ru-en.html 8 Oct 2018 07:58:03 -0000
1.58
@@ -13,7 +13,7 @@
<p><a href="/proprietary/proprietary.html">Other examples of proprietary
malware</a></p>
-<div class="highlight-para">
+<div class="comment">
<p>
<em>Malware</em> means software designed to function in ways that
mistreat or harm the user. (This does not include accidental errors.)
@@ -32,14 +32,17 @@
because the developer's awareness that the users would be powerless to fix
any malicious functionalities tempts the developer to impose some.
</p>
+
+<div class="important" style="margin-bottom: 2em">
<p>If you know of an example that ought to be in this page but isn't
here, please write
to <a href="mailto:address@hidden"><address@hidden></a>
to inform us. Please include the URL of a trustworthy reference or two
to present the specifics.</p>
</div>
+</div>
-<div class="summary" style="margin-top: 2em">
+<div class="summary">
<h3>Type of malware</h3>
<ul>
<li><a href="#back-doors">Back doors</a></li>
@@ -65,7 +68,7 @@
<h3 id="back-doors">Apple Back Doors</h3>
<ul class="blurbs">
-<!-- INSERT backdoor -->
+<!-- INSERT apple-back-door -->
<li id="M201607284">
<p>The Dropbox app for Macintosh <a
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/">
@@ -73,6 +76,13 @@
entering an admin password</a>.</p>
</li>
+ <li id="M201504090">
+ <p>Mac OS X had an <a
+
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
+ intentional local back door for 4 years</a>, which could be exploited
+ by attackers to gain root privileges.</p>
+ </li>
+
<li id="M201011220">
<p>The iPhone has a back door for <a
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
@@ -99,7 +109,7 @@
<h3 id="deception">Apple Deception</h3>
<ul class="blurbs">
-<!-- INSERT deception -->
+<!-- INSERT apple-decept -->
<li id="M201308290">
<p>“Dark patterns” are <a
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you">user
@@ -116,7 +126,7 @@
<h3 id="drm">Apple DRM</h3>
<ul class="blurbs">
-<!-- INSERT DRM -->
+<!-- INSERT apple-dr -->
<li id="M201704071">
<p>DRM makes the iPhone 7 nearly <a
href="#iphone7-sabotage">unrepairable</a> by anyone else but Apple.</p>
@@ -161,7 +171,7 @@
the software runs on.</p>
<ul class="blurbs">
-<!-- INSERT incompatibility -->
+<!-- INSERT apple-incompat -->
<li id="M201803300">
<p>In MacOS and iOS, the procedure for <a
href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac">
@@ -217,6 +227,18 @@
a malicious web site to extract all the user's messaging
history</a>.</p>
</li>
+
+ <li id="M201311120">
+ <p><a
+
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
+ The NSA can tap data in smart phones, including iPhones,
+ Android, and BlackBerry</a>. While there is not much
+ detail here, it seems that this does not operate via
+ the universal back door that we know nearly all portable
+ phones have. It may involve exploiting various bugs. There are <a
+
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
+ lots of bugs in the phones' radio software</a>.</p>
+ </li>
</ul>
<!--
@@ -249,7 +271,7 @@
<h4>Examples of censorship by Apple jails</h4>
<ul class="blurbs">
-<!-- INSERT jails -->
+<!-- INSERT apple-jail -->
<li id="M201710130">
<p>Apple is <a
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet">
@@ -361,7 +383,7 @@
<p>Proprietary companies can take advantage of their customers by imposing
arbitrary limits to their use of the software. This section reports examples
of hard sell and other unjust commercial tactics by Apple.</p>
<ul class="blurbs">
-<!-- INSERT pressuring -->
+<!-- INSERT apple-press -->
<li id="M201510270">
<p>Apple Siri <a
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions">refuses
@@ -377,7 +399,7 @@
to directly intervene in ways that harm them or block their work.</p>
<ul class="blurbs">
-<!-- INSERT sabotage -->
+<!-- INSERT apple-sab -->
<li id="M201805310">
<p>Apple has <a
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia">blocked
@@ -451,13 +473,6 @@
of trouble.</p>
</li>
- <li id="M201504090">
- <p>Mac OS X had an <a
-
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
- intentional local back door for 4 years</a>, which could be exploited
- by attackers to gain root privileges.</p>
- </li>
-
<li id="M201412040">
<p>Apple <a
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs">
@@ -661,7 +676,7 @@
<h3 id="tyrants">Apple Tyrants</h3>
<ul class="blurbs">
-<!-- INSERT tyrants -->
+<!-- INSERT apple-tyrant -->
<li id="M201412010">
<p>Apple arbitrarily <a
href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/">blocks
@@ -735,7 +750,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/05 21:01:56 $
+$Date: 2018/10/08 07:58:03 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-apple.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ru.po,v
retrieving revision 1.173
retrieving revision 1.174
diff -u -b -r1.173 -r1.174
--- proprietary/po/malware-apple.ru.po 8 Oct 2018 07:45:13 -0000 1.173
+++ proprietary/po/malware-apple.ru.po 8 Oct 2018 07:58:03 -0000 1.174
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-10-07 19:25+0000\n"
#. type: Content of: <title>
msgid ""
@@ -971,8 +970,8 @@
"(Ðз <a href=\"https://www.apple.com/icloud/photos/\">ÐнÑоÑмаÑии
об Apple's "
"iCloud</a> на 24 ÑенÑÑбÑÑ 2015 года.) ФÑнкÑиÑ
iCloud <a href="
"\"https://support.apple.com/en-us/HT202033\">акÑивизиÑÑеÑÑÑ
пÑи загÑÑзке "
-"iOS</a>. Слово “<span lang=\"en\" xml:lang=\"en\">cloud</span> "
-"(облако)” ознаÑÐ°ÐµÑ “пожалÑйÑÑа, не
ÑпÑаÑивайÑе, где ÑÑо”."
+"iOS</a>. Слово “<span lang=\"en\" xml:lang=\"en\">cloud</span>
(облако)"
+"” ознаÑÐ°ÐµÑ “пожалÑйÑÑа, не
ÑпÑаÑивайÑе, где ÑÑо”."
#. type: Content of: <ul><li><p>
msgid ""
Index: proprietary/po/malware-appliances.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.ru-en.html,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- proprietary/po/malware-appliances.ru-en.html 5 Oct 2018 21:01:56
-0000 1.43
+++ proprietary/po/malware-appliances.ru-en.html 8 Oct 2018 07:58:03
-0000 1.44
@@ -14,7 +14,7 @@
<p><a href="/proprietary/proprietary.html">Other examples of proprietary
malware</a></p>
-<div class="highlight-para">
+<div class="comment">
<p>
<em>Malware</em> means software designed to function in ways that
mistreat or harm the user. (This does not include accidental errors.)
@@ -31,14 +31,18 @@
the developer's awareness that the users would be powerless to fix any
malicious functionalities tempts the developer to impose some.
</p>
+
+<p>Some examples of malware in appliances are listed below.</p>
+
+<div class="important">
<p>If you know of an example that ought to be in this page but isn't
here, please write
to <a href="mailto:address@hidden"><address@hidden></a>
to inform us. Please include the URL of a trustworthy reference or two
to present the specifics.</p>
</div>
-
-<p>Here are examples of malware in appliances.</p>
+</div>
+<div class="column-limit"></div>
<ul class="blurbs">
<!-- INSERT appliances -->
@@ -344,6 +348,13 @@
to unlock the front door while Mommy's not looking.</p>
</li>
+ <li id="M201609200">
+ <p>HP's firmware downgrade <a
+
href="https://www.theguardian.com/technology/2016/sep/20/hp-inkjet-printers-unofficial-cartridges-software-update">imposed
+ DRM on some printers, which now refuse to function with third-party
+ ink cartridges</a>.</p>
+ </li>
+
<li id="M201608080">
<p>Ransomware <a
href="https://www.pentestpartners.com/security-blog/thermostat-ransomware-a-lesson-in-iot-security/">
@@ -786,7 +797,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/05 21:01:56 $
+$Date: 2018/10/08 07:58:03 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-appliances.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.ru.po,v
retrieving revision 1.118
retrieving revision 1.119
diff -u -b -r1.118 -r1.119
--- proprietary/po/malware-appliances.ru.po 8 Oct 2018 07:45:13 -0000
1.118
+++ proprietary/po/malware-appliances.ru.po 8 Oct 2018 07:58:03 -0000
1.119
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-10-07 20:56+0000\n"
#. type: Content of: <title>
msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -65,12 +64,10 @@
"бÑдÑÑ Ð±ÐµÑÑилÑÐ½Ñ Ð¸ÑпÑавиÑÑ Ð»ÑбÑе
вÑедоноÑнÑе ÑÑнкÑии, ÑоблазнÑеÑ
ÑазÑабоÑÑика "
"вноÑиÑÑ Ñакие ÑÑнкÑии."
-# | [-Here are-]{+Some+} examples of malware in [-appliances.-] {+appliances
-# | are listed below.+}
#. type: Content of: <div><p>
-#| msgid "Here are examples of malware in appliances."
msgid "Some examples of malware in appliances are listed below."
-msgstr "ÐекоÑоÑÑе пÑимеÑÑ Ð²ÑедоноÑнÑÑ
пÑогÑамм в бÑÑовой ÑеÑ
нике пеÑеÑиÑленÑ
ниже."
+msgstr ""
+"ÐекоÑоÑÑе пÑимеÑÑ Ð²ÑедоноÑнÑÑ
пÑогÑамм в
бÑÑовой ÑеÑ
нике пеÑеÑиÑÐ»ÐµÐ½Ñ Ð½Ð¸Ð¶Ðµ."
#. type: Content of: <div><div><p>
msgid ""
Index: proprietary/po/malware-cars.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.ru-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary/po/malware-cars.ru-en.html 5 Oct 2018 21:01:57 -0000
1.6
+++ proprietary/po/malware-cars.ru-en.html 8 Oct 2018 07:58:03 -0000
1.7
@@ -11,17 +11,38 @@
<!--#include virtual="/server/banner.html" -->
<h2>Malware In Cars</h2>
-<p><a href="/proprietary/proprietary.html">Other examples of proprietary
malware</a></p>
+<p><a href="/proprietary/proprietary.html">Other examples of proprietary
+malware</a></p>
-<div class="highlight-para">
+<div class="comment">
+<p>
+<em>Malware</em> means software designed to function in ways that
+mistreat or harm the user. (This does not include accidental errors.)
+</p>
+
+<p>
+Malware and nonfree software are two different issues. The difference
+between <a href="/philosophy/free-sw.html">free software</a> and
+nonfree software is in <a
+href="/philosophy/free-software-even-more-important.html">
+whether the users have control of the program or vice versa</a>. It's
+not directly a question of what the program <em>does</em> when it
+runs. However, in practice nonfree software is often malware, because
+the developer's awareness that the users would be powerless to fix any
+malicious functionalities tempts the developer to impose some.
+</p>
+
+<p>Some examples of malware in cars are listed below.</p>
+
+<div class="important">
<p>If you know of an example that ought to be in this page but isn't
here, please write
to <a href="mailto:address@hidden"><address@hidden></a>
to inform us. Please include the URL of a trustworthy reference or two
to present the specifics.</p>
</div>
-
-<p>Here are examples of malware in cars.</p>
+</div>
+<div class="column-limit"></div>
<ul class="blurbs">
<!-- INSERT cars -->
@@ -240,7 +261,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/05 21:01:57 $
+$Date: 2018/10/08 07:58:03 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-cars.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.ru.po,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary/po/malware-cars.ru.po 8 Oct 2018 07:45:13 -0000 1.16
+++ proprietary/po/malware-cars.ru.po 8 Oct 2018 07:58:03 -0000 1.17
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-10-07 20:56+0000\n"
#. type: Content of: <title>
msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -65,10 +64,7 @@
"бÑдÑÑ Ð±ÐµÑÑилÑÐ½Ñ Ð¸ÑпÑавиÑÑ Ð»ÑбÑе
вÑедоноÑнÑе ÑÑнкÑии, ÑоблазнÑеÑ
ÑазÑабоÑÑика "
"вноÑиÑÑ Ñакие ÑÑнкÑии."
-# | [-Here are-]{+Some+} examples of malware in [-cars.-] {+cars are listed
-# | below.+}
#. type: Content of: <div><p>
-#| msgid "Here are examples of malware in cars."
msgid "Some examples of malware in cars are listed below."
msgstr "ÐекоÑоÑÑе пÑимеÑÑ Ð²ÑедоноÑнÑÑ
пÑогÑамм в авÑомобилÑÑ
пеÑеÑиÑÐ»ÐµÐ½Ñ Ð½Ð¸Ð¶Ðµ."
Index: proprietary/po/malware-games.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.ru-en.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- proprietary/po/malware-games.ru-en.html 6 Oct 2018 06:59:40 -0000
1.12
+++ proprietary/po/malware-games.ru-en.html 8 Oct 2018 07:58:03 -0000
1.13
@@ -14,7 +14,7 @@
<p><a href="/proprietary/proprietary.html">Other examples of proprietary
malware</a></p>
-<div class="highlight-para">
+<div class="comment">
<p>
<em>Malware</em> means software designed to function in ways that
mistreat or harm the user. (This does not include accidental errors.)
@@ -31,14 +31,18 @@
the developer's awareness that the users would be powerless to fix any
malicious functionalities tempts the developer to impose some.
</p>
+
+<p>Some examples of malware in games are listed below.</p>
+
+<div class="important">
<p>If you know of an example that ought to be in this page but isn't
here, please write
to <a href="mailto:address@hidden"><address@hidden></a>
to inform us. Please include the URL of a trustworthy reference or two
to present the specifics.</p>
</div>
-
-<p>Here are examples of malware in games.</p>
+</div>
+<div class="column-limit"></div>
<ul class="blurbs">
<!-- INSERT games -->
@@ -248,7 +252,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/06 06:59:40 $
+$Date: 2018/10/08 07:58:03 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-games.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.ru.po,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary/po/malware-games.ru.po 8 Oct 2018 07:45:13 -0000 1.32
+++ proprietary/po/malware-games.ru.po 8 Oct 2018 07:58:03 -0000 1.33
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-10-07 22:25+0000\n"
#. type: Content of: <title>
msgid "Malware in Games - GNU Project - Free Software Foundation"
@@ -66,9 +65,6 @@
"вноÑиÑÑ Ñакие ÑÑнкÑии."
#. type: Content of: <div><p>
-# | [-Here are-]{+Some+} examples of malware in [-games.-] {+games are listed
-# | below.+}
-#| msgid "Here are examples of malware in games."
msgid "Some examples of malware in games are listed below."
msgstr "ÐекоÑоÑÑе пÑимеÑÑ Ð²ÑедоноÑнÑÑ
пÑогÑамм в игÑаÑ
пеÑеÑиÑÐ»ÐµÐ½Ñ Ð½Ð¸Ð¶Ðµ."
Index: proprietary/po/malware-microsoft.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ru-en.html,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- proprietary/po/malware-microsoft.ru-en.html 5 Oct 2018 17:59:48 -0000
1.56
+++ proprietary/po/malware-microsoft.ru-en.html 8 Oct 2018 07:58:03 -0000
1.57
@@ -15,7 +15,7 @@
<p><a href="/proprietary/proprietary.html">Other examples of proprietary
malware</a></p>
-<div class="highlight-para">
+<div class="comment">
<p>
<em>Malware</em> means software designed to function in ways that
mistreat or harm the user. (This does not include accidental errors.)
@@ -34,14 +34,16 @@
any malicious functionalities tempts the developer to impose some.
</p>
+<div class="important" style="margin-bottom: 2em">
<p>If you know of an example that ought to be in this page but isn't
here, please write
to <a href="mailto:address@hidden"><address@hidden></a>
to inform us. Please include the URL of a trustworthy reference or two
to present the specifics.</p>
</div>
+</div>
-<div class="summary" style="margin-top: 2em">
+<div class="summary">
<h3>Type of malware</h3>
<ul>
<li><a href="#back-doors">Back doors</a></li>
@@ -65,7 +67,7 @@
<h3 id="back-doors">Microsoft Back Doors</h3>
<ul class="blurbs">
-<!-- INSERT backdoor -->
+<!-- INSERT microsoft-back-door -->
<li id="M201608172">
<p id="windows-update">Microsoft
Windows has a universal back door through which <a
@@ -98,6 +100,15 @@
door capabilities of the TPM 2.0 chip.</p>
</li>
+ <li id="M201307300">
+ <p>Here is a suspicion that
+ we can't prove, but is worth thinking about: <a
+
href="https://web.archive.org/web/20150206003913/http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI">
+ Writable microcode for Intel and AMD microprocessors</a> may be a
+ vehicle for the NSA to invade computers, with the help of Microsoft,
+ say respected security experts.</p>
+ </li>
+
<li id="M201112081">
<p>Windows 8 also has a back door for <a
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html">
@@ -115,7 +126,7 @@
<h3 id="drm">Microsoft DRM</h3>
<ul class="blurbs">
-<!-- INSERT DRM -->
+<!-- INSERT microsoft-dr -->
<li id="M200708131">
<p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">DRM
in Windows</a>, introduced to cater to <a
@@ -135,7 +146,7 @@
bugs.</p>
<ul class="blurbs">
-<!-- INSERT insecurity -->
+<!-- INSERT microsoft-insec -->
<li id="M201705120">
<p>Exploits of bugs in Windows, which were developed by the NSA
and then leaked by the Shadowbrokers group, are now being used to <a
@@ -169,7 +180,7 @@
section describes examples of Microsoft committing interference.</p>
<ul class="blurbs">
-<!-- INSERT interference -->
+<!-- INSERT microsoft-interf -->
<li id="M201809120">
<p>One version of Windows 10 <a
href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/">
@@ -242,32 +253,6 @@
</ul>
-<h3 id="jails">Microsoft Jails</h3>
-
-<ul class="blurbs">
-<!-- INSERT jails -->
- <li id="M201706130">
- <p>Windows 10 S was a jail: <a
-
href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison">
- only programs from the Windows Store could be
- installed and executed</a>. It was however possible to <a
-
href="https://www.theverge.com/2017/6/13/15789998/microsoft-windows-10-s-upgrade-windows-10-pro-guide">
- upgrade to Windows 10 Pro</a>. The successor of Windows
- 10 S is a special configuration of Windows 10 called <a
-
href="https://support.microsoft.com/en-gb/help/4020089/windows-10-in-s-mode-faq">
- S mode</a>. The major difference with Windows 10 S is that there is
- an easy way to switch out of S mode.</p>
- </li>
-
- <li id="M201210080">
- <p><a
-
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html">
- Windows 8 on “mobile devices” (now defunct) was a
- jail</a>.</p>
- </li>
-</ul>
-
-
<h3 id="sabotage">Microsoft Sabotage</h3>
<p>The wrongs in this section are not precisely malware, since they do
@@ -276,7 +261,7 @@
actions that harm the users of specific Microsoft software.</p>
<ul class="blurbs">
-<!-- INSERT sabotage -->
+<!-- INSERT microsoft-sab -->
<li id="M201704194">
<p>Microsoft has made Windows 7
and 8 cease to function on certain new computers, <a
@@ -367,7 +352,7 @@
<h3 id="subscriptions">Microsoft Subscriptions</h3>
<ul class="blurbs">
-<!-- INSERT subscriptions -->
+<!-- INSERT microsoft-subscript -->
<li id="M201507150">
<p>Microsoft Office forces users <a
href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html">to
@@ -524,10 +509,36 @@
</ul>
+<h3 id="jails">Microsoft Jails</h3>
+
+<ul class="blurbs">
+<!-- INSERT microsoft-jail -->
+ <li id="M201706130">
+ <p>Windows 10 S was a jail: <a
+
href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison">
+ only programs from the Windows Store could be
+ installed and executed</a>. It was however possible to <a
+
href="https://www.theverge.com/2017/6/13/15789998/microsoft-windows-10-s-upgrade-windows-10-pro-guide">
+ upgrade to Windows 10 Pro</a>. The successor of Windows
+ 10 S is a special configuration of Windows 10 called <a
+
href="https://support.microsoft.com/en-gb/help/4020089/windows-10-in-s-mode-faq">
+ S mode</a>. The major difference with Windows 10 S is that there is
+ an easy way to switch out of S mode.</p>
+ </li>
+
+ <li id="M201210080">
+ <p><a
+
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html">
+ Windows 8 on “mobile devices” (now defunct) was a
+ jail</a>.</p>
+ </li>
+</ul>
+
+
<h3 id="tyrants">Microsoft Tyrants</h3>
<ul class="blurbs">
-<!-- INSERT tyrants -->
+<!-- INSERT microsoft-tyrant -->
<li id="M201607150">
<p>Microsoft accidentally left a way for users
to install GNU/Linux on Windows RT tablets, but now it has <a
@@ -605,7 +616,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/05 17:59:48 $
+$Date: 2018/10/08 07:58:03 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-microsoft.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ru.po,v
retrieving revision 1.176
retrieving revision 1.177
diff -u -b -r1.176 -r1.177
--- proprietary/po/malware-microsoft.ru.po 8 Oct 2018 07:45:13 -0000
1.176
+++ proprietary/po/malware-microsoft.ru.po 8 Oct 2018 07:58:03 -0000
1.177
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-10-07 19:56+0000\n"
#. type: Content of: <title>
msgid ""
Index: proprietary/po/malware-mobiles.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru-en.html,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- proprietary/po/malware-mobiles.ru-en.html 25 Jul 2018 16:30:38 -0000
1.38
+++ proprietary/po/malware-mobiles.ru-en.html 8 Oct 2018 07:58:03 -0000
1.39
@@ -1,5 +1,10 @@
<!--#include virtual="/server/header.html" -->
<!-- Parent-Version: 1.85 -->
+<!--
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ Generated from propr-blurbs.rec. Please do not edit this file manually !
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
<title>Malware in Mobile Devices
- GNU Project - Free Software Foundation</title>
<style type="text/css" media="print,screen"><!--
@@ -14,7 +19,7 @@
<p><a href="/proprietary/proprietary.html">Other examples of proprietary
malware</a></p>
-<div class="highlight-para">
+<div class="comment">
<p>
<em>Malware</em> means software designed to function in ways that
mistreat or harm the user. (This does not include accidental errors.)
@@ -36,14 +41,25 @@
tracking their movements, and listening to their conversations. This
is why we call them “Stalin's dream”.</p>
+<p>The malware we list here is present in every phone, or in software
+that is not made by Apple or Google (including its subsidiaries).
+Malicious functionalities in mobile software released by Apple or
+Google are listed in dedicated pages, <a
+href="/proprietary/malware-apple.html">Apple's Operating Systems are
+Malware</a> and <a href="/proprietary/malware-google.html">Google's
+Software Is Malware</a> respectively.</p>
+
+<div class="important">
<p>If you know of an example that ought to be in this page but isn't
here, please write
to <a href="mailto:address@hidden"><address@hidden></a>
to inform us. Please include the URL of a trustworthy reference or two
to present the specifics.</p>
</div>
+</div>
+<div class="column-limit"></div>
-<ul>
+<ul class="blurbs">
<li><p>The phone network
<a href="https://ssd.eff.org/en/module/problem-mobile-phones">
tracks the movements of each phone</a>.</p>
@@ -80,76 +96,91 @@
</li>
</ul>
-<p>Here are examples of malware in mobile devices. See also
-the <a href="/proprietary/malware-apple.html">the Apple malware
-page</a> for malicious functionalities specific to the Apple iThings.</p>
-
<div class="summary" style="margin-top: 1em">
<h3>Type of malware</h3>
<ul>
<li><a href="#back-doors">Back doors</a></li>
<!--<li><a href="#censorship">Censorship</a></li>-->
-<li><a href="#insecurity">Insecurity</a></li>
-<!--<li><a href="#sabotage">Sabotage</a></li>-->
-<!--<li><a href="#interference">Interference</a></li>-->
-<li><a href="#surveillance">Surveillance</a></li>
-<li><a href="#drm">Digital restrictions
- management</a> or “DRM” means functionalities designed
+ <li><a href="#drm">Digital restrictions
+ management</a> or “DRM”—functionalities designed
to restrict what users can do with the data in their computers.</li>
-<li><a href="#jails">Jails</a>—systems
+ <li><a href="#insecurity">Insecurity</a></li>
+<!--<li><a href="#interference">Interference</a></li>-->
+<!--<li><a href="#sabotage">Sabotage</a></li>-->
+ <li><a href="#surveillance">Surveillance</a></li>
+ <li><a href="#jails">Jails</a>—systems
that impose censorship on application programs.</li>
-<li><a href="#tyrants">Tyrants</a>—systems
+ <li><a href="#tyrants">Tyrants</a>—systems
that reject any operating system not “authorized” by the
manufacturer.</li>
</ul>
</div>
<h3 id="back-doors">Mobile Back Doors</h3>
+
<ul>
<li>
<p>See above for the <a href="#universal-back-door">general universal back
door</a> in essentially all mobile phones, which permits converting
them into full-time listening devices.</p>
</li>
+</ul>
- <li><p><a
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">
- Samsung Galaxy devices running proprietary Android versions come with a
- back door</a> that provides remote access to the data stored on the
- device.</p>
+<ul class="blurbs">
+<!-- INSERT mobiles-back-door -->
+ <li id="M201609130">
+ <p>Xiaomi phones come with <a
+
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered">
+ a universal back door in the application processor, for Xiaomi's
+ use</a>.</p>
+
+ <p>This is separate from <a href="#universal-back-door-phone-modem">the
+ universal back door in the modem processor that the local phone
+ company can use</a>.</p>
+ </li>
+
+ <li id="M201511090">
+ <p>Baidu's proprietary Android library, Moplus, has a back door that <a
+
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">
+ can “upload files” as well as forcibly install
+ apps</a>.</p>
+
+ <p>It is used by 14,000 Android applications.</p>
+ </li>
+
+ <li id="M201412180">
+ <p><a
+
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
+ A Chinese version of Android has a universal back door</a>. Nearly
+ all models of mobile phones have a <a href="#universal-back-door">
+ universal back door in the modem chip</a>. So why did Coolpad bother
+ to introduce another? Because this one is controlled by Coolpad.</p>
+ </li>
+
+ <li id="M201403121">
+ <p id="samsung"><a
+
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">
+ Samsung Galaxy devices running proprietary Android versions come with
+ a back door</a> that provides remote access to the files stored on
+ the device.</p>
</li>
+</ul>
- <li><p><a href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access to any file on the system.</p>
- </li>
- <li>
- <p>In Android,
- <a
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">
- Google has a back door to remotely delete apps.</a> (It was in a
- program called GTalkService, which seems since then to have been
- merged into Google Play.)
- </p>
-
- <p>
- Google can also
- <a
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
- forcibly and remotely install apps</a> through Google Play.
- This is not equivalent to a universal back door, but permits various
- dirty tricks.
- </p>
-
- <p>
- Although Google's <em>exercise</em> of this power has not been
- malicious so far, the point is that nobody should have such power,
- which could also be used maliciously. You might well decide to let a
- security service remotely <em>deactivate</em> programs that it
- considers malicious. But there is no excuse for allowing it
- to <em>delete</em> the programs, and you should have the right to
- decide who (if anyone) to trust in this way.
- </p>
+<h3 id="drm">Mobile DRM</h3>
+
+<ul class="blurbs">
+<!-- INSERT mobiles-dr -->
+ <li id="M201501030">
+ <p id="netflix-app-geolocation-drm">The Netflix Android app <a
+
href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/">
+ forces the use of Google DNS</a>. This is one of the methods that
+ Netflix uses to enforce the geolocation restrictions dictated by the
+ movie studios.</p>
</li>
</ul>
+
<h3 id="insecurity">Mobile Insecurity</h3>
<p>These bugs are/were not intentional, so unlike the rest of the file
@@ -157,328 +188,604 @@
supposition that prestigious proprietary software doesn't have grave
bugs.</p>
-<ul>
-
-<li>
- <p>Siri, Alexa, and all the other voice-control systems can be
- <a
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">hijacked
by programs that play commands in ultrasound that humans can't hear</a>.
- </p>
-</li>
-
-<li>
- <p>Many Android devices <a
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/">
+<ul class="blurbs">
+<!-- INSERT mobiles-insec -->
+ <li id="M201807100">
+ <p>Siri, Alexa, and all the other voice-control systems can be <a
+
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">
+ hijacked by programs that play commands in ultrasound that humans
+ can't hear</a>.</p>
+ </li>
+
+ <li id="M201807020">
+ <p>Some Samsung phones randomly <a
+
href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages">send
+ photos to people in the owner's contact list</a>.</p>
+ </li>
+
+ <li id="M201704050">
+ <p>Many Android devices <a
+
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/">
can be hijacked through their Wi-Fi chips</a> because of a bug in
Broadcom's non-free firmware.</p>
-</li>
-
-<li>
-<p>Samsung
-phones <a
href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/">have
-a security hole that allows an SMS message to install
-ransomware</a>.</p>
-</li>
-
-<li>
-<p>Many proprietary payment apps <a
-href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data">
-transmit personal data in an insecure way</a>.
-However, the worse aspect of these apps is that
-<a href="/philosophy/surveillance-vs-democracy.html">payment is not
anonymous</a>.
-</p>
-</li>
+ </li>
- <li><p><a
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
- The NSA can tap data in smart phones, including iPhones, Android, and
- BlackBerry</a>. While there is not much detail here, it seems that this
- does not operate via the universal back door that we know nearly all
- portable phones have. It may involve exploiting various bugs. There are
- <a href="#universal-back-door">
+ <li id="M201702170">
+ <p>The mobile apps for communicating <a
+
href="https://www.bleepingcomputer.com/news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/">with
+ a smart but foolish car have very bad security</a>.</p>
+
+ <p>This is in addition to the fact that the car contains a cellular
+ modem that tells big brother all the time where it is. If you own
+ such a car, it would be wise to disconnect the modem so as to turn
+ off the tracking.</p>
+ </li>
+
+ <li id="M201701270">
+ <p>Samsung phones <a
+
href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/">have
+ a security hole that allows an SMS message to install
+ ransomware</a>.</p>
+ </li>
+
+ <li id="M201701130">
+ <p>WhatsApp has a feature that <a
+
href="https://techcrunch.com/2017/01/13/encrypted-messaging-platform-whatsapp-denies-backdoor-claim/">
+ has been described as a “back door”</a> because it would
+ enable governments to nullify its encryption.</p>
+
+ <p>The developers say that it wasn't intended as a back door, and that
+ may well be true. But that leaves the crucial question of whether it
+ functions as one. Because the program is nonfree, we cannot check by
+ studying it.</p>
+ </li>
+
+ <li id="M201607290">
+ <p><a
+
href="https://techcrunch.com/2016/07/29/research-shows-deleted-whatsapp-messages-arent-actually-deleted/">“Deleted”
+ WhatsApp messages are not entirely deleted</a>. They can be recovered
+ in various ways.</p>
+ </li>
+
+ <li id="M201607280">
+ <p>A half-blind security critique of a tracking app: it found that <a
+
href="http://www.consumerreports.org/mobile-security-software/glow-pregnancy-app-exposed-women-to-privacy-threats/">
+ blatant flaws allowed anyone to snoop on a user's personal data</a>.
+ The critique fails entirely to express concern that the app sends the
+ personal data to a server, where the <em>developer</em> gets it all.
+ This “service” is for suckers!</p>
+
+ <p>The server surely has a “privacy policy,” and surely
+ it is worthless since nearly all of them are.</p>
+ </li>
+
+ <li id="M201607190">
+ <p>A bug in a proprietary ASN.1 library, used
+ in cell phone towers as well as cell phones and routers, <a
+
href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover">allows
+ taking control of those systems</a>.</p>
+ </li>
+
+ <li id="M201603100">
+ <p>Many proprietary payment apps <a
+
href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data">transmit
+ personal data in an insecure way</a>. However,
+ the worse aspect of these apps is that <a
+ href="/philosophy/surveillance-vs-democracy.html">payment is not
+ anonymous</a>.</p>
+ </li>
+
+ <li id="M201505294">
+ <p><a
+
href="http://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html">
+ Many smartphone apps use insecure authentication methods when storing
+ your personal data on remote servers</a>. This leaves personal
+ information like email addresses, passwords, and health information
+ vulnerable. Because many of these apps are proprietary it makes it
+ hard to impossible to know which apps are at risk.</p>
+ </li>
+
+ <li id="M201405190">
+ <p>An app to prevent “identity theft”
+ (access to personal data) by storing users' data on a special server <a
+
href="http://arstechnica.com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-concerns-that-app-isnt-safe/">was
+ deactivated by its developer</a> which had discovered a security
+ flaw.</p>
+
+ <p>That developer seems to be conscientious about protecting personal
+ data from third parties in general, but it can't protect that data
+ from the state. Quite the contrary: confiding your data to someone
+ else's server, if not first encrypted by you with free software,
+ undermines your rights.</p>
+ </li>
+
+ <li id="M201402210">
+ <p>The <a
+
href="http://arstechnica.com/security/2014/02/crypto-weaknesses-in-whatsapp-the-kind-of-stuff-the-nsa-would-love/">insecurity
+ of WhatsApp</a> makes eavesdropping a snap.</p>
+ </li>
+
+ <li id="M201311120">
+ <p><a
+
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
+ The NSA can tap data in smart phones, including iPhones,
+ Android, and BlackBerry</a>. While there is not much
+ detail here, it seems that this does not operate via
+ the universal back door that we know nearly all portable
+ phones have. It may involve exploiting various bugs. There are <a
+
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
lots of bugs in the phones' radio software</a>.</p>
</li>
</ul>
+
<h3 id="surveillance">Mobile Surveillance</h3>
-<ul>
- <li><p>The Sarahah app
- <a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+
+<ul class="blurbs">
+<!-- INSERT mobiles-surv -->
+ <li id="M201806110">
+ <p>The Spanish football streaming app <a
+
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
+ the user's movements and listens through the microphone</a>.</p>
+
+ <p>This makes them act as spies for licensing enforcement.</p>
+
+ <p>I expect it implements DRM, too—that there is no way to save
+ a recording. But I can't be sure from the article.</p>
+
+ <p>If you learn to care much less about sports, you will benefit in
+ many ways. This is one more.</p>
+ </li>
+
+ <li id="M201804160">
+ <p>More than <a
+
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
+ of the 5,855 Android apps studied by researchers were found to snoop
+ and collect information about its users</a>. 40% of the apps were
+ found to insecurely snitch on its users. Furthermore, they could
+ detect only some methods of snooping, in these proprietary apps whose
+ source code they cannot look at. The other apps might be snooping
+ in other ways.</p>
+
+ <p>This is evidence that proprietary apps generally work against
+ their users. To protect their privacy and freedom, Android users
+ need to get rid of the proprietary software—both proprietary
+ Android by <a href="https://replicant.us">switching to Replicant</a>,
+ and the proprietary apps by getting apps from the free software
+ only <a href="https://f-droid.org/">F-Droid store</a> that <a
+ href="https://f-droid.org/wiki/page/Antifeatures"> prominently warns
+ the user if an app contains anti-features</a>.</p>
+ </li>
+
+ <li id="M201804020">
+ <p>Grindr collects information about <a
+
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
+ which users are HIV-positive, then provides the information to
+ companies</a>.</p>
+
+ <p>Grindr should not have so much information about its users.
+ It could be designed so that users communicate such info to each
+ other but not to the server's database.</p>
+ </li>
+
+ <li id="M201803050">
+ <p>The moviepass app and dis-service
+ spy on users even more than users expected. It <a
+
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
+ where they travel before and after going to a movie</a>.</p>
+
+ <p>Don't be tracked—pay cash!</p>
+ </li>
+
+ <li id="M201711240">
+ <p>Tracking software in popular Android apps
+ is pervasive and sometimes very clever. Some trackers can <a
+
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
+ follow a user's movements around a physical store by noticing WiFi
+ networks</a>.</p>
+ </li>
+
+ <li id="M201711230">
+ <p>AI-powered driving apps can <a
+
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
+ track your every move</a>.</p>
+ </li>
+
+ <li id="M201708270">
+ <p>The Sarahah app <a
+
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
uploads all phone numbers and email addresses</a> in user's address
book to developer's server. Note that this article misuses the words
“<a href="/philosophy/free-sw.html">free software</a>”
referring to zero price.</p>
</li>
- <li><p>Some portable phones <a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots of data to China</a>.</p></li>
-
-<li>
- <p>Facebook's app listens all the time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop
- on what people are listening to or watching</a>. In addition, it may
- be analyzing people's conversations to serve them with targeted
- advertisements.</p>
-</li>
-
+ <li id="M201707270">
+ <p>20 dishonest Android apps recorded <a
+
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
+ calls and sent them and text messages and emails to snoopers</a>.</p>
+
+ <p>Google did not intend to make these apps spy; on the contrary, it
+ worked in various ways to prevent that, and deleted these apps after
+ discovering what they did. So we cannot blame Google specifically
+ for the snooping of these apps.</p>
+
+ <p>On the other hand, Google redistributes nonfree Android apps, and
+ therefore shares in the responsibility for the injustice of their being
+ nonfree. It also distributes its own nonfree apps, such as Google Play,
+ <a href="/philosophy/free-software-even-more-important.html">which
+ are malicious</a>.</p>
+
+ <p>Could Google have done a better job of preventing apps from
+ cheating? There is no systematic way for Google, or Android users,
+ to inspect executable proprietary apps to see what they do.</p>
+
+ <p>Google could demand the source code for these apps, and study
+ the source code somehow to determine whether they mistreat users in
+ various ways. If it did a good job of this, it could more or less
+ prevent such snooping, except when the app developers are clever
+ enough to outsmart the checking.</p>
+
+ <p>But since Google itself develops malicious apps, we cannot trust
+ Google to protect us. We must demand release of source code to the
+ public, so we can depend on each other.</p>
+ </li>
+
+ <li id="M201705230">
+ <p>Apps for BART <a
+
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
+ on users</a>.</p>
+
+ <p>With free software apps, users could <em>make sure</em> that they
+ don't snoop.</p>
+
+ <p>With proprietary apps, one can only hope that they don't.</p>
+ </li>
+
+ <li id="M201705040">
+ <p>A study found 234 Android apps that track users by <a
+
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
+ to ultrasound from beacons placed in stores or played by TV
+ programs</a>.</p>
+ </li>
+
+ <li id="M201704260">
+ <p>Faceapp appears to do lots of surveillance, judging by <a
+
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much access it demands to personal data in the device</a>.</p>
+ </li>
+
+ <li id="M201704190">
+ <p>Users are suing Bose for <a
+
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
+ distributing a spyware app for its headphones</a>. Specifically,
+ the app would record the names of the audio files users listen to
+ along with the headphone's unique serial number.</p>
+
+ <p>The suit accuses that this was done without the users' consent.
+ If the fine print of the app said that users gave consent for this,
+ would that make it acceptable? No way! It should be flat out <a
+ href="/philosophy/surveillance-vs-democracy.html"> illegal to design
+ the app to snoop at all</a>.</p>
+ </li>
+
+ <li id="M201704074">
+ <p>Pairs of Android apps can collude
+ to transmit users' personal data to servers. <a
+
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
+ study found tens of thousands of pairs that collude</a>.</p>
+ </li>
+
+ <li id="M201703300">
+ <p>Verizon <a
+
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ announced an opt-in proprietary search app that it will</a> pre-install
+ on some of its phones. The app will give Verizon the same information
+ about the users' searches that Google normally gets when they use
+ its search engine.</p>
+
+ <p>Currently, the app is <a
+
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed on only one phone</a>, and the user must
+ explicitly opt-in before the app takes effect. However, the app
+ remains spyware—an “optional” piece of spyware is
+ still spyware.</p>
+ </li>
-<li>
- <p>A
- <a
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
- research paper</a> that investigated the privacy and security
- of 283 Android VPN apps concluded that “in spite of the
- promises for privacy, security, and anonymity given by the
- majority of VPN apps—millions of users may be unawarely subject
- to poor security guarantees and abusive practices inflicted by
- VPN apps.”</p>
-
- <p>Following is a non-exhaustive list of proprietary VPN apps from
- the research paper that tracks and infringes the privacy of
- users:</p>
+ <li id="M201701210">
+ <p>The Meitu photo-editing app <a
+
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ user data to a Chinese company</a>.</p>
+ </li>
+
+ <li id="M201611280">
+ <p>The Uber app tracks <a
+
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before and after the ride</a>.</p>
+
+ <p>This example illustrates how “getting the user's
+ consent” for surveillance is inadequate as a protection against
+ massive surveillance.</p>
+ </li>
+
+ <li id="M201611160">
+ <p>A <a
+
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
+ research paper</a> that investigated the privacy and security of
+ 283 Android VPN apps concluded that “in spite of the promises
+ for privacy, security, and anonymity given by the majority of VPN
+ apps—millions of users may be unawarely subject to poor security
+ guarantees and abusive practices inflicted by VPN apps.”</p>
+
+ <p>Following is a non-exhaustive list, taken from the research paper,
+ of some proprietary VPN apps that track users and infringe their
+ privacy:</p>
- <dl>
+ <dl class="compact">
<dt>SurfEasy</dt>
<dd>Includes tracking libraries such as NativeX and Appflood,
meant to track users and show them targeted ads.</dd>
<dt>sFly Network Booster</dt>
<dd>Requests the <code>READ_SMS</code> and <code>SEND_SMS</code>
- permissions upon installation, meaning it has full access to
- users' text messages.</dd>
+ permissions upon installation, meaning it has full access to users'
+ text messages.</dd>
<dt>DroidVPN and TigerVPN</dt>
<dd>Requests the <code>READ_LOGS</code> permission to read logs
- for other apps and also core system logs. TigerVPN developers
- have confirmed this.</dd>
+ for other apps and also core system logs. TigerVPN developers have
+ confirmed this.</dd>
<dt>HideMyAss</dt>
- <dd>Sends traffic to LinkedIn. Also, it stores detailed logs
- and may turn them over to the UK government if
- requested.</dd>
+ <dd>Sends traffic to LinkedIn. Also, it stores detailed logs and
+ may turn them over to the UK government if requested.</dd>
<dt>VPN Services HotspotShield</dt>
<dd>Injects JavaScript code into the HTML pages returned to the
- users. The stated purpose of the JS injection is to display
- ads. Uses roughly 5 tracking libraries. Also, it redirects the
- user's traffic through valueclick.com (an advertising
- website).</dd>
+ users. The stated purpose of the JS injection is to display ads. Uses
+ roughly five tracking libraries. Also, it redirects the user's
+ traffic through valueclick.com (an advertising website).</dd>
<dt>WiFi Protector VPN</dt>
- <dd>Injects JavaScript code into HTML pages, and also uses
- roughly 5 tracking libraries. Developers of this app have
- confirmed that the non-premium version of the app does
- JavaScript injection for tracking and display ads.</dd>
+ <dd>Injects JavaScript code into HTML pages, and also uses roughly
+ five tracking libraries. Developers of this app have confirmed that
+ the non-premium version of the app does JavaScript injection for
+ tracking the user and displaying ads.</dd>
</dl>
-</li>
+ </li>
-<li>
- <p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found that 90% of the top-ranked gratis
- proprietary Android apps contained recognizable tracking libraries. For
- the paid proprietary apps, it was only 60%.</p>
-
- <p>The article confusingly describes gratis apps as “free”,
- but most of them are not in fact
- <a href="/philosophy/free-sw.html">free software</a>.
- It also uses the ugly word “monetize”. A good replacement
- for that word is “exploit”; nearly always that will fit
- perfectly.</p>
-</li>
-
-<li>
- <p>A study found 234 Android apps that track users by
- <a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed in stores or played by TV
programs</a>.
- </p>
-</li>
-
-<li>
- <p>Faceapp appears to do lots of surveillance, judging by
- <a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands to personal data in the device</a>.
- </p>
- </li>
-
-<li>
- <p>Pairs of Android apps can collude to transmit users' personal data
- to servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
- tens of thousands of pairs that collude.</a></p>
-</li>
-
-<li>
-<p>Google Play intentionally sends app developers <a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
-the personal details of users that install the app</a>.</p>
-
-<p>Merely asking the “consent” of users is not enough
-to legitimize actions like this. At this point, most users have
-stopped reading the “Terms and Conditions” that spell out
-what they are “consenting” to. Google should clearly
-and honestly identify the information it collects on users, instead
-of hiding it in an obscurely worded EULA.</p>
-
-<p>However, to truly protect people's privacy, we must prevent Google
-and other companies from getting this personal information in the first
-place!</p>
-</li>
-
-<li>
- <p>Google Play (a component of Android) <a
-
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks the users' movements without their permission</a>.</p>
-
- <p>Even if you disable Google Maps and location tracking, you must
- disable Google Play itself to completely stop the tracking. This is
- yet another example of nonfree software pretending to obey the user,
- when it's actually doing something else. Such a thing would be almost
- unthinkable with free software.</p>
-
-</li>
-<li>
- <p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app that it will</a>
- pre-install on some of its phones. The app will give Verizon the same
- information about the users' searches that Google normally gets when
- they use its search engine.</p>
-
- <p>Currently, the app is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed on only one phone</a>, and the
- user must explicitly opt-in before the app takes effect. However, the
- app remains spyware—an “optional” piece of spyware is
- still spyware.</p>
-</li>
-<li><p>The Meitu photo-editing
-app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
-user data to a Chinese company</a>.</p></li>
-
-<li>
-<p>A half-blind security critique of a tracking app: it found that <a
-href="http://www.consumerreports.org/mobile-security-software/glow-pregnancy-app-exposed-women-to-privacy-threats/">
-blatant flaws allowed anyone to snoop on a user's personal data</a>.
-The critique fails entirely to express concern that the app sends the
-personal data to a server, where the <em>developer</em> gets it all.
-This “service” is for suckers!</p>
-
-<p>The server surely has a “privacy policy,” and surely it
-is worthless since nearly all of them are.</p>
-</li>
-
- <li><p>Apps that include
- <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop on what radio and TV programs are
- playing nearby</a>. Also on what users post on various sites such as
- Facebook, Google+ and Twitter.</p>
- </li>
-
- <li><p>More than 73% and 47% of mobile applications, both from Android and
iOS
- respectively <a href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral and location information</a> of their users with third
parties.</p>
+ <li id="M201611150">
+ <p>Some portable phones <a
+
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold with spyware sending lots of data to China</a>.</p>
+ </li>
+
+ <li id="M201606050">
+ <p>Facebook's new Magic Photo app <a
+
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+ scans your mobile phone's photo collections for known faces</a>,
+ and suggests you to share the picture you take according to who is
+ in the frame.</p>
+
+ <p>This spyware feature seems to require online access to some
+ known-faces database, which means the pictures are likely to be
+ sent across the wire to Facebook's servers and face-recognition
+ algorithms.</p>
+
+ <p>If so, none of Facebook users' pictures are private anymore,
+ even if the user didn't “upload” them to the service.</p>
+ </li>
+
+ <li id="M201605310">
+ <p>Facebook's app listens all the time, <a
+
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
+ snoop on what people are listening to or watching</a>. In addition,
+ it may be analyzing people's conversations to serve them with targeted
+ advertisements.</p>
</li>
- <li><p>“Cryptic communication,” unrelated to the app's
functionality,
- was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ <li id="M201604250">
+ <p>A pregnancy test controller application not only can <a
+
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
+ spy on many sorts of data in the phone, and in server accounts,
+ it can alter them too</a>.</p>
+ </li>
+
+ <li id="M201601130">
+ <p>Apps that include <a
+
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop on what radio and TV programs
+ are playing nearby</a>. Also on what users post on various sites
+ such as Facebook, Google+ and Twitter.</p>
+ </li>
+
+ <li id="M201601110">
+ <p>The natural extension of monitoring
+ people through “their” phones is <a
+
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
+ proprietary software to make sure they can't “fool”
+ the monitoring</a>.</p>
+ </li>
+
+ <li id="M201511190">
+ <p>“Cryptic communication,”
+ unrelated to the app's functionality, was <a
+ href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
found in the 500 most popular gratis Android apps</a>.</p>
<p>The article should not have described these apps as
- “free”—they are not free software. The clear way to say
- “zero price” is “gratis.”</p>
+ “free”—they are not free software. The clear way
+ to say “zero price” is “gratis.”</p>
<p>The article takes for granted that the usual analytics tools are
legitimate, but is that valid? Software developers have no right to
- analyze what users are doing or how. “Analytics” tools that
snoop are
- just as wrong as any other snooping.</p>
+ analyze what users are doing or how. “Analytics” tools
+ that snoop are just as wrong as any other snooping.</p>
</li>
- <li><p>Many proprietary apps for mobile devices report which other
- apps the user has
- installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this in a way that at least is visible and
- optional</a>. Not as bad as what the others do.</p>
+ <li id="M201510300">
+ <p>More than 73% and 47% of mobile applications, from Android and iOS
+ respectively <a href="https://techscience.org/a/2015103001/">share
+ personal, behavioral and location information</a> of their users with
+ third parties.</p>
+ </li>
+
+ <li id="M201510050">
+ <p>According to Edward Snowden, <a
+ href="http://www.bbc.com/news/uk-34444233">agencies can take over
+ smartphones</a> by sending hidden text messages which enable
+ them to turn the phones on and off, listen to the microphone,
+ retrieve geo-location data from the GPS, take photographs, read
+ text messages, read call, location and web browsing history, and
+ read the contact list. This malware is designed to disguise itself
+ from investigation.</p>
+ </li>
+
+ <li id="M201508210">
+ <p>Like most “music screaming” disservices, Spotify is
+ based on proprietary malware (DRM and snooping). In August 2015 it <a
+
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded users submit to increased snooping</a>, and some are starting
+ to realize that it is nasty.</p>
+
+ <p>This article shows the <a
+
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways that they present snooping as a way to “serve”
+ users better</a>—never mind whether they want that. This is a
+ typical example of the attitude of the proprietary software industry
+ towards those they have subjugated.</p>
+
+ <p>Out, out, damned Spotify!</p>
+ </li>
+
+ <li id="M201507030">
+ <p>Samsung phones come with <a
+
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
+ that users can't delete</a>, and they send so much data that their
+ transmission is a substantial expense for users. Said transmission,
+ not wanted or requested by the user, clearly must constitute spying
+ of some kind.</p>
+ </li>
+
+ <li id="M201506264">
+ <p><a
+
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
+ study in 2015</a> found that 90% of the top-ranked gratis proprietary
+ Android apps contained recognizable tracking libraries. For the paid
+ proprietary apps, it was only 60%.</p>
+
+ <p>The article confusingly describes gratis apps as
+ “free”, but most of them are not in fact <a
+ href="/philosophy/free-sw.html">free software</a>. It also uses the
+ ugly word “monetize”. A good replacement for that word
+ is “exploit”; nearly always that will fit perfectly.</p>
+ </li>
+
+ <li id="M201505060">
+ <p>Gratis Android apps (but not <a
+ href="/philosophy/free-sw.html">free software</a>) connect to 100 <a
+
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
+ and advertising</a> URLs, on the average.</p>
</li>
- <li><p>Portable phones with GPS will send their GPS location on remote
- command and users cannot stop them: <a
-
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
-
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
- (The US says it will eventually require all new portable phones to have
- GPS.)</p>
- </li>
-
- <li><p>Spyware in Cisco TNP IP phones: <a
- href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a>.</p></li>
+ <li id="M201504060">
+ <p>Widely used <a
+
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop on the user</a>. This is in addition to
+ the snooping done by the phone company, and perhaps by the OS in
+ the phone.</p>
- <li><p>Spyware in Android phones (and Windows? laptops): The Wall Street
- Journal (in an article blocked from us by a paywall) reports that <a
-
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
- the FBI can remotely activate the GPS and microphone in Android phones
- and in laptops</a>. (I suspect this means Windows laptops.) Here is <a
- href="http://cryptome.org/2013/08/fbi-hackers.htm">more info</a>.</p>
+ <p>Don't be distracted by the question of whether the app developers
+ get users to say “I agree”. That is no excuse for
+ malware.</p>
</li>
- <li><p>Some Motorola phones modify Android to <a
- href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- send personal data to Motorola.</a></p>
+ <li id="M201411260">
+ <p>Many proprietary apps for mobile devices
+ report which other apps the user has installed. <a
+ href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing this in a way that at least is visible and optional</a>. Not
+ as bad as what the others do.</p>
</li>
- <li><p>Some manufacturers add a <a
-
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier IQ.</a></p>
+ <li id="M201403120">
+ <p><a href="/proprietary/proprietary-back-doors.html#samsung">
+ Samsung's back door</a> provides access to any file on the system.</p>
</li>
- <li><p>Widely used <a
-
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop on the user</a>. This is in addition to
- the snooping done by the phone company, and perhaps by the OS in the
- phone.</p>
-
- <p>Don't be distracted by the question of whether the app developers get
- users to say “I agree”. That is no excuse for malware.</p>
+ <li id="M201401151">
+ <p>The Simeji keyboard is a smartphone version of Baidu's <a
+ href="/proprietary/proprietary-surveillance.html#baidu-ime">spying <abbr
+ title="Input Method Editor">IME</abbr></a>.</p>
+ </li>
+
+ <li id="M201312270">
+ <p>The nonfree Snapchat app's principal purpose is to restrict the
+ use of data on the user's computer, but it does surveillance too: <a
+
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries to get the user's list of other people's phone
+ numbers</a>.</p>
+ </li>
+
+ <li id="M201312060">
+ <p>The Brightest Flashlight app <a
+
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use by companies</a>.</p>
+
+ <p>The FTC criticized this app because it asked the user to
+ approve sending personal data to the app developer but did not ask
+ about sending it to other companies. This shows the weakness of
+ the reject-it-if-you-dislike-snooping “solution” to
+ surveillance: why should a flashlight app send any information to
+ anyone? A free software flashlight app would not.</p>
</li>
-</ul>
-<h3 id="drm">Mobile DRM</h3>
-<ul>
-
-<li id="android-apps-detect-rooting">
-<p>Google now allows Android apps to detect whether a device has been
-rooted, <a
href="http://www.androidpolice.com/2017/05/13/netflix-confirms-blocking-rootedunlocked-devices-app-still-working-now/">and
refuse to install
-if so</a>.</p>
-
-<p>Update: Google <i>intentionally</i> <a
href="https://torrentfreak.com/netflix-use-of-google-drm-means-rooted-android-devices-are-banned-170515/">
-changed Android so that apps can detect rooted devices and refuse to
-run on them</a>.</p>
-</li>
+ <li id="M201307000">
+ <p>Portable phones with GPS <a
+
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+ will send their GPS location on remote command, and users cannot stop
+ them</a>. (The US says it will eventually require all new portable phones
+ to have GPS.)</p>
+ </li>
- <li>
- <p>The iPhone 7 contains DRM specifically designed to <a
-
href="https://motherboard.vice.com/en_us/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock">
- brick it if an “unauthorized” repair shop fixes it</a>.
- “Unauthorized” essentially means anyone besides Apple.</p>
-
- <p>The article uses the term “lock” to describe the DRM,
- but we prefer to use the term <a
- href="https://gnu.org/philosophy/words-to-avoid.html#DigitalLocks">
- digital handcuffs</a>.</p>
+ <li id="M201212100">
+ <p>FTC says most mobile apps for children don't respect privacy: <a
+
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
</li>
- <li><p>Android <a
href="https://developer.android.com/reference/android/drm/package-summary.html">contains
- facilities specifically to support DRM</a>.</p>
+ <li id="M201111170">
+ <p>Some manufacturers add a <a
+
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general surveillance package such as Carrier IQ</a>.</p>
</li>
</ul>
+
<h3 id="jails">Mobile Jails</h3>
-<ul>
- <li><p><a
- href="https://fsf.org/campaigns/secure-boot-vs-restricted-boot/">Mobile
- devices that come with Windows 8 are tyrants</a>. <a
-
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html">Windows
- 8 on “mobile devices” is a jail.</a></p>
+
+<ul class="blurbs">
+<!-- INSERT mobiles-jail -->
+ <li id="M201210080">
+ <p><a
+
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html">
+ Windows 8 on “mobile devices” (now defunct) was a
+ jail</a>.</p>
</li>
</ul>
+
<h3 id="tyrants">Mobile Tyrants</h3>
-<ul>
- <li><p><a
href="http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html">
- Some Android phones are tyrants</a> (though someone found a way to crack
- the restriction). Fortunately, most Android devices are not tyrants.</p>
+
+<ul class="blurbs">
+<!-- INSERT mobiles-tyrant -->
+ <li id="M201110110">
+ <p><a href="https://fsf.org/campaigns/secure-boot-vs-restricted-boot/">
+ Mobile devices that come with Windows 8 are tyrants</a>.</p>
</li>
</ul>
+
+
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
<div id="footer">
@@ -536,7 +843,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/07/25 16:30:38 $
+$Date: 2018/10/08 07:58:03 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.117
retrieving revision 1.118
diff -u -b -r1.117 -r1.118
--- proprietary/po/malware-mobiles.ru.po 8 Oct 2018 07:45:13 -0000
1.117
+++ proprietary/po/malware-mobiles.ru.po 8 Oct 2018 07:58:03 -0000
1.118
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-10-07 19:25+0000\n"
#. type: Content of: <title>
msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -87,11 +86,10 @@
"ÐÑедоноÑнÑе пÑогÑаммÑ, коÑоÑÑе Ð¼Ñ Ð·Ð´ÐµÑÑ
пеÑеÑиÑлÑем, пÑиÑÑÑÑÑвÑÑÑ Ð² каждом "
"ÑелеÑоне или в пÑогÑаммаÑ
, ÑделаннÑÑ
не
Apple или Google (вклÑÑÐ°Ñ Ð¸Ñ
"
"подÑазделениÑ). ÐÑедоноÑнÑе ÑÑкнÑии в
мобилÑнÑÑ
пÑогÑаммаÑ
, вÑпÑÑеннÑÑ
"
-"компаниÑми Apple или Google, пеÑеÑиÑÐ»ÐµÐ½Ñ Ð½Ð°
оÑделÑнÑÑ
ÑÑÑаниÑаÑ
, "
-"<a href=\"/proprietary/malware-apple.html\">ÐпеÑаÑионнÑе
ÑиÑÑÐµÐ¼Ñ Apple вÑедоноÑнÑ"
-"</a> и <a href=\"/proprietary/malware-google."
-"html\">ÐÑогÑÐ°Ð¼Ð¼Ñ Google вÑедоноÑнÑ</a>,
ÑооÑвеÑÑÑвенно."
-
+"компаниÑми Apple или Google, пеÑеÑиÑÐ»ÐµÐ½Ñ Ð½Ð°
оÑделÑнÑÑ
ÑÑÑаниÑаÑ
, <a href=\"/"
+"proprietary/malware-apple.html\">ÐпеÑаÑионнÑе ÑиÑÑемÑ
Apple вÑедоноÑнÑ</a> и "
+"<a href=\"/proprietary/malware-google.html\">ÐÑогÑÐ°Ð¼Ð¼Ñ Google
вÑедоноÑнÑ</"
+"a>, ÑооÑвеÑÑÑвенно."
#. type: Content of: <div><div><p>
msgid ""
@@ -298,11 +296,6 @@
"Ñего же компании Coolpad понадобилоÑÑ
вводиÑÑ ÐµÑе один? ÐоÑÐ¾Ð¼Ñ ÑÑо ÑÑÐ¾Ñ "
"ÑеÑнÑй Ñ
од конÑÑолиÑÑеÑÑÑ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸ÐµÐ¹ Coolpad."
-# | <a
-# |
href=\"https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor\">
-# | Samsung Galaxy devices running proprietary Android versions come with a
-# | back door</a> that provides remote access to the [-data-] {+files+} stored
-# | on the device.
#. type: Content of: <ul><li><p>
msgid ""
"<a href=\"https://www.fsf.org/blogs/community/replicant-developers-find-and-"
@@ -345,10 +338,6 @@
"ÑÑиÑаÑÑÑÑ Ð²ÑедоноÑнÑми оÑобенноÑÑÑми. ÐÑ
Ñпоминаем иÑ
, ÑÑÐ¾Ð±Ñ Ð¾Ð¿ÑовеÑгнÑÑÑ "
"пÑедположение, ÑÑо в пÑеÑÑижнÑÑ
неÑвободнÑÑ
пÑогÑаммаÑ
Ð½ÐµÑ ÑеÑÑезнÑÑ
оÑибок."
-# | Siri, Alexa, and all the other voice-control systems can be <a
-# |
href=\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa\">{+
-# | +}hijacked by programs that play commands in ultrasound that humans can't
-# | hear</a>.
#. type: Content of: <ul><li><p>
msgid ""
"Siri, Alexa, and all the other voice-control systems can be <a href="
@@ -487,12 +476,6 @@
"security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-"
"complete-takeover\">позволÑÐµÑ Ð¿Ð¾Ð»ÑÑиÑÑ ÐºÐ¾Ð½ÑÑолÑ
над ÑÑими ÑиÑÑемами</a>."
-# | Many proprietary payment apps <a
-# |
href=\"http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data\">[-
-# | -]transmit personal data in an insecure way</a>. However, the worse aspect
-# | of these apps is that <a
-# | href=\"/philosophy/surveillance-vs-democracy.html\">payment is not
-# | anonymous</a>.
#. type: Content of: <ul><li><p>
msgid ""
"Many proprietary payment apps <a href=\"http://www.bloomberg.com/news/"
@@ -560,16 +543,6 @@
"whatsapp-the-kind-of-stuff-the-nsa-would-love/\">ÑÑзвимоÑÑÑ
WhatsApp</a> "
"Ð´ÐµÐ»Ð°ÐµÑ Ð¿Ð¾Ð´ÑлÑÑивание пÑоÑе пÑоÑÑого."
-# | <a
-# |
[-href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html\">-]
-# |
{+href=\"https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html\">+}
-# | The NSA can tap data in smart phones, including iPhones, Android, and
-# | BlackBerry</a>. While there is not much detail here, it seems that this
-# | does not operate via the universal back door that we know nearly all
-# | portable phones have. It may involve exploiting various bugs. There are
-# | <a [-href=\"#universal-back-door\">-]
-# |
{+href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\">+}
-# | lots of bugs in the phones' radio software</a>.
#. type: Content of: <ul><li><p>
msgid ""
"<a href=\"https://web.archive.org/web/20180816030205/http://www.spiegel.de/"
@@ -894,11 +867,6 @@
"однознаÑно <a href=\"/philosophy/surveillance-vs-democracy.html\">
запÑеÑаÑÑ "
"закладÑваÑÑ Ð² пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð»ÑбÑÑ ÑлежкÑ</a>."
-# | Pairs of Android apps can collude to transmit users' personal data to
-# | servers. <a
-# |
href=\"https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/\">A
-# | study found tens of thousands of pairs that [-collude.</a>-]
-# | {+collude</a>.+}
#. type: Content of: <ul><li><p>
msgid ""
"Pairs of Android apps can collude to transmit users' personal data to "
@@ -986,10 +954,6 @@
"гаÑанÑий безопаÑноÑÑи, а Ñакже
злоÑпоÑÑеблений Ñо ÑÑоÑÐ¾Ð½Ñ Ð¿Ñиложений Ð´Ð»Ñ "
"VPN</a>”."
-# | Following is a non-exhaustive [-list-] {+list, taken from the research
-# | paper,+} of {+some+} proprietary VPN apps [-from the research paper-] that
-# | [-tracks-] {+track users+} and [-infringes the privacy of users:-]
-# | {+infringe their privacy:+}
#. type: Content of: <ul><li><p>
msgid ""
"Following is a non-exhaustive list, taken from the research paper, of some "
@@ -1051,10 +1015,6 @@
msgid "VPN Services HotspotShield"
msgstr "VPN Services HotspotShield"
-# | Injects JavaScript code into the HTML pages returned to the users. The
-# | stated purpose of the JS injection is to display ads. Uses roughly [-5-]
-# | {+five+} tracking libraries. Also, it redirects the user's traffic through
-# | valueclick.com (an advertising website).
#. type: Content of: <ul><li><dl><dd>
msgid ""
"Injects JavaScript code into the HTML pages returned to the users. The "
@@ -1331,8 +1291,8 @@
"technology/2015/may/06/free-android-apps-connect-tracking-advertising-"
"websites\">tracking and advertising</a> URLs, on the average."
msgstr ""
-"ÐеÑплаÑнÑе (но не <a
href=\"/philosophy/free-sw.html\">ÑвободнÑе</"
-"a>)пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Android <a
href=\"http://www.theguardian.com/technology/2015/"
+"ÐеÑплаÑнÑе (но не <a
href=\"/philosophy/free-sw.html\">ÑвободнÑе</a>)"
+"пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Android <a
href=\"http://www.theguardian.com/technology/2015/"
"may/06/free-android-apps-connect-tracking-advertising-websites"
"\">подклÑÑаÑÑÑÑ Ðº 100 URL Ñлежки и ÑекламÑ</a> (в
ÑÑеднем)."
@@ -1453,9 +1413,6 @@
"technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-"
"its-getting-worse/</a>."
-# | Some manufacturers add a <a
-# |
href=\"http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/\">
-# | hidden general surveillance package such as Carrier [-IQ.</a>-] {+IQ</a>.+}
#. type: Content of: <ul><li><p>
msgid ""
"Some manufacturers add a <a href=\"http://androidsecuritytest.com/features/"
@@ -1470,28 +1427,14 @@
msgid "Mobile Jails"
msgstr "ТÑÑÑмÑ"
-# | <a
-# | [-href=\"https://fsf.org/campaigns/secure-boot-vs-restricted-boot/\">Mobile
-# | devices that come with-]
-# |
{+href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\">+}
-# | Windows 8 [-are tyrants</a>. <a
-# |
href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\">Windows
-# | 8-] on “mobile devices” [-is-] {+(now defunct) was+} a
-# | [-jail.</a>-] {+jail</a>.+}
-#. type: Content of: <ul><li><p>
-#| msgid ""
-#| "<a href=\"https://fsf.org/campaigns/secure-boot-vs-restricted-boot/"
-#| "\">Mobile devices that come with Windows 8 are tyrants</a>. <a href="
-#| "\"http://www.itworld.com/article/2832657/operating-systems/microsoft-"
-#| "metro-app-store-lock-down.html\">Windows 8 on “mobile "
-#| "devices” is a jail.</a>"
+#. type: Content of: <ul><li><p>
msgid ""
"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-"
"metro-app-store-lock-down.html\"> Windows 8 on “mobile devices” "
"(now defunct) was a jail</a>."
msgstr ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/"
-"microsoft-metro-app-store-lock-down.html\"> Windows 8 на
“мобилÑнÑÑ
"
+"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-"
+"metro-app-store-lock-down.html\"> Windows 8 на “мобилÑнÑÑ
"
"ÑÑÑÑойÑÑваÑ
” (более не дейÑÑвÑÑÑаÑ)
бÑла ÑÑÑÑмой.</a>"
#. type: Content of: <h3>
Index: proprietary/po/proprietary-back-doors.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ru-en.html,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- proprietary/po/proprietary-back-doors.ru-en.html 6 Oct 2018 06:59:40
-0000 1.49
+++ proprietary/po/proprietary-back-doors.ru-en.html 8 Oct 2018 07:58:03
-0000 1.50
@@ -12,6 +12,7 @@
<p><a href="/proprietary/proprietary.html">Other examples of proprietary
malware</a></p>
+<div class="comment">
<p>Nonfree (proprietary) software is very often malware (designed to
mistreat the user). Nonfree software is controlled by its developers,
which puts them in a position of power over the users; <a
@@ -24,18 +25,21 @@
that allow full control over the operating system are said to be
“universal”.</p>
+<div class="important">
<p>If you know of an example that ought to be in this page but isn't
here, please write
to <a href="mailto:address@hidden"><address@hidden></a>
to inform us. Please include the URL of a trustworthy reference or two
to present the specifics.</p>
+</div>
+</div>
-<p class="c">
- <a href="#spy">Spying</a> |
- <a href="#alter-data">Altering user's data/settings</a> |
- <a href="#install-delete">Installing/deleting programs</a> |
- <a href="#universal">Full control</a> |
- <a href="#other">Other/undefined</a>
+<p class="c" style="font-size: 1.1em">
+ <a href="#spy">Spying</a>
+ <a href="#alter-data">Altering user's data/settings</a>
+ <a href="#install-delete">Installing/deleting programs</a>
+ <a href="#universal">Full control</a>
+ <a href="#other">Other/undefined</a>
</p>
@@ -515,7 +519,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/06 06:59:40 $
+$Date: 2018/10/08 07:58:03 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-back-doors.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ru.po,v
retrieving revision 1.149
retrieving revision 1.150
diff -u -b -r1.149 -r1.150
--- proprietary/po/proprietary-back-doors.ru.po 8 Oct 2018 07:45:13 -0000
1.149
+++ proprietary/po/proprietary-back-doors.ru.po 8 Oct 2018 07:58:03 -0000
1.150
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-10-07 22:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Back Doors - GNU Project - Free Software Foundation"
@@ -75,22 +74,6 @@
"ÑÑÐ¾Ð±Ñ Ð¿ÑоиллÑÑÑÑиÑоваÑÑ Ð¿Ð¾Ð´ÑобноÑÑи."
#. type: Content of: <p>
-# | [-<a href=\"#spy\">Spying</a> | <a
-# | href=\"#alter-data\">Altering user's data/settings</a> | <a
-# | href=\"#install-delete\">Installing/deleting programs</a> | <a
-# | href=\"#universal\">Full control</a> | <a
-# | href=\"#other\">Other/undefined</a>-]{+ <a
-# | href=\"#spy\">Spying</a> <a
-# | href=\"#alter-data\">Altering user's data/settings</a>
-# | <a
-# | href=\"#install-delete\">Installing/deleting programs</a>
-# | <a href=\"#universal\">Full control</a> <a
-# | href=\"#other\">Other/undefined</a> +}
-#| msgid ""
-#| "<a href=\"#spy\">Spying</a> | <a href=\"#alter-data\">Altering "
-#| "user's data/settings</a> | <a href=\"#install-delete\">Installing/"
-#| "deleting programs</a> | <a href=\"#universal\">Full control</a> "
-#| "| <a href=\"#other\">Other/undefined</a>"
msgid ""
" <a href=\"#spy\">Spying</a> <a href=\"#alter-data"
"\">Altering user's data/settings</a> <a href="
@@ -98,10 +81,11 @@
"href=\"#universal\">Full control</a> <a href=\"#other"
"\">Other/undefined</a> "
msgstr ""
-" <a href=\"#spy\">Шпионаж</a> <a
href=\"#alter-data\">Ðзменение даннÑÑ
/"
-"наÑÑÑоек</a> <a
href=\"#install-delete\">УÑÑановка/Ñдаление пÑогÑамм</"
-"a> <a
href=\"#universal\">ÐолнÑй конÑÑолÑ</a> <a
href=\"#other"
-"\">ÐÑоÑее/неопÑеделенное</a> "
+" <a href=\"#spy\">Шпионаж</a> <a href=\"#alter-data"
+"\">Ðзменение даннÑÑ
/наÑÑÑоек</a> <a
href=\"#install-delete"
+"\">УÑÑановка/Ñдаление пÑогÑамм</a>
<a href=\"#universal"
+"\">ÐолнÑй конÑÑолÑ</a> <a
href=\"#other\">ÐÑоÑее/"
+"неопÑеделенное</a> "
#. type: Content of: <h3>
msgid "Spying"
Index: proprietary/po/proprietary-drm.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.ru-en.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- proprietary/po/proprietary-drm.ru-en.html 6 Oct 2018 12:58:47 -0000
1.24
+++ proprietary/po/proprietary-drm.ru-en.html 8 Oct 2018 07:58:03 -0000
1.25
@@ -12,6 +12,7 @@
<a href="/proprietary/proprietary.html">Other examples of proprietary
malware</a>
+<div class="comment">
<p>Nonfree (proprietary) software is very often malware (designed to
mistreat the user). Nonfree software is controlled by its developers,
which puts them in a position of power over the users; <a
@@ -33,6 +34,16 @@
to <a href="http://DefectiveByDesign.org/">abolish DRM</a>.
</p>
+<div class="important">
+<p>If you know of an example that ought to be in this page but isn't
+here, please write
+to <a href="mailto:address@hidden"><address@hidden></a>
+to inform us. Please include the URL of a trustworthy reference or two
+to present the specifics.</p>
+</div>
+</div>
+<div class="column-limit"></div>
+
<ul class="blurbs">
<!-- INSERT drm -->
<li id="M201806250">
@@ -327,7 +338,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/06 12:58:47 $
+$Date: 2018/10/08 07:58:03 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-drm.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.ru.po,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- proprietary/po/proprietary-drm.ru.po 8 Oct 2018 07:45:13 -0000
1.68
+++ proprietary/po/proprietary-drm.ru.po 8 Oct 2018 07:58:03 -0000
1.69
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-10-07 21:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary DRM - GNU Project - Free Software Foundation"
@@ -79,12 +78,6 @@
"DefectiveByDesign.org/\"> ÑпÑазднение ÑиÑÑового
ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð¾Ð³ÑаниÑениÑми</a>."
#. type: Content of: <div><div><p>
-# || No change detected. The change might only be in amounts of spaces.
-#| msgid ""
-#| "If you know of an example that ought to be in this page but isn't here, "
-#| "please write to <a href=\"mailto:address@hidden"><address@hidden"
-#| "org></a> to inform us. Please include the URL of a trustworthy "
-#| "reference or two to present the specifics."
msgid ""
"If you know of an example that ought to be in this page but isn't here, "
"please write to <a href=\"mailto:address@hidden"><address@hidden"
Index: proprietary/po/proprietary-jails.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.ru-en.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary/po/proprietary-jails.ru-en.html 5 Oct 2018 21:01:57 -0000
1.21
+++ proprietary/po/proprietary-jails.ru-en.html 8 Oct 2018 07:58:03 -0000
1.22
@@ -12,6 +12,7 @@
<p><a href="/proprietary/proprietary.html">Other examples of proprietary
malware</a></p>
+<div class="comment">
<p>Nonfree (proprietary) software is very often malware (designed to
mistreat the user). Nonfree software is controlled by its developers,
which puts them in a position of power over the users; <a
@@ -27,19 +28,22 @@
<!-- embed http://i.imgur.com/ZRViDum.jpg here -->
<!-- Linking to it. Not possible to embed due to licensing. See RT #887471 -->
-<p>We also include specific examples of apps that were blocked using
-that censorship power. If you know of additional examples, please
-email the specifics to webmasters@ our domain.</p>
-
<p>These systems are platforms for censorship imposed by the company
that owns the system. Selling products designed as platforms for a
company to impose censorship ought to be forbidden by law, but it
isn't.</p>
+<div class="important">
+<p>We also include specific examples of apps that were blocked using
+that censorship power. If you know of additional examples, please
+email the specifics to webmasters@ our domain.</p>
+</div>
+</div>
+
<p class="c">
- <a href="#apple">Apple jails</a> |
- <a href="#microsoft">Microsoft jails</a> |
- <a href="#consoles">Game consoles</a>
+ <a href="#apple">Apple jails</a>
+ <a href="#microsoft">Microsoft jails</a>
+ <a href="#consoles">Game consoles</a>
</p>
<h3 id="apple">Apple jails</h3>
@@ -262,7 +266,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/05 21:01:57 $
+$Date: 2018/10/08 07:58:03 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-jails.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.ru.po,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- proprietary/po/proprietary-jails.ru.po 8 Oct 2018 07:45:13 -0000
1.68
+++ proprietary/po/proprietary-jails.ru.po 8 Oct 2018 07:58:03 -0000
1.69
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-10-07 22:26+0000\n"
#. type: Content of: <title>
msgid "Proprietary Jails - GNU Project - Free Software Foundation"
@@ -83,21 +82,14 @@
"пожалÑйÑÑа, подÑобноÑÑи на webmasters@ наÑ
домен."
#. type: Content of: <p>
-# | [-<a href=\"#apple\">Apple jails</a> | <a
-# | href=\"#microsoft\">Microsoft jails</a> | <a-]{+ <a
-# | href=\"#apple\">Apple jails</a> <a
-# | href=\"#microsoft\">Microsoft jails</a> <a+}
-# | href=\"#consoles\">Game [-consoles</a>-] {+consoles</a> +}
-#| msgid ""
-#| "<a href=\"#apple\">Apple jails</a> | <a href=\"#microsoft"
-#| "\">Microsoft jails</a> | <a href=\"#consoles\">Game consoles</a>"
msgid ""
" <a href=\"#apple\">Apple jails</a> <a href="
"\"#microsoft\">Microsoft jails</a> <a href=\"#consoles"
"\">Game consoles</a> "
msgstr ""
-" <a href=\"#apple\">ТÑÑÑÐ¼Ñ Apple</a> <a
href=\"#microsoft"
-"\">ТÑÑÑÐ¼Ñ Microsoft</a> <a
href=\"#consoles\">ÐгÑовÑе пÑиÑÑавки</a>"
+" <a href=\"#apple\">ТÑÑÑÐ¼Ñ Apple</a> <a href="
+"\"#microsoft\">ТÑÑÑÐ¼Ñ Microsoft</a> <a
href=\"#consoles"
+"\">ÐгÑовÑе пÑиÑÑавки</a>"
#. type: Content of: <h3>
msgid "Apple jails"
Index: proprietary/po/proprietary-sabotage.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ru-en.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- proprietary/po/proprietary-sabotage.ru-en.html 5 Oct 2018 17:59:48
-0000 1.45
+++ proprietary/po/proprietary-sabotage.ru-en.html 8 Oct 2018 07:58:03
-0000 1.46
@@ -12,6 +12,7 @@
<a href="/proprietary/proprietary.html">Other examples of proprietary
malware</a>
+<div class="comment">
<p>Nonfree (proprietary) software is very often malware (designed to
mistreat the user). Nonfree software is controlled by its developers,
which puts them in a position of power over the users; <a
@@ -19,14 +20,18 @@
basic injustice</a>. The developers often exercise that power to the
detriment of the users they ought to serve.</p>
+<p>Here are examples of proprietary software that has something worse
+than a back door.</p>
+
+<div class="important">
<p>If you know of an example that ought to be in this page but isn't
here, please write
to <a href="mailto:address@hidden"><address@hidden></a>
to inform us. Please include the URL of a trustworthy reference or two
to present the specifics.</p>
-
-<p>Here are examples of proprietary software that has something
-worse than a back door.</p>
+</div>
+</div>
+<div class="column-limit"></div>
<ul class="blurbs">
<!-- INSERT sabotage -->
@@ -43,6 +48,13 @@
else that didn't respect users' freedom.</p>
</li>
+ <li id="M201806250">
+ <p>The game Metal Gear Rising for
+ MacOS was tethered to a server. The company <a
+
href="http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm">
+ shut down the server, and all copies stopped working</a>.</p>
+ </li>
+
<li id="M201805310">
<p>Apple has <a
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia">blocked
@@ -507,7 +519,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/05 17:59:48 $
+$Date: 2018/10/08 07:58:03 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-sabotage.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ru.po,v
retrieving revision 1.141
retrieving revision 1.142
diff -u -b -r1.141 -r1.142
--- proprietary/po/proprietary-sabotage.ru.po 8 Oct 2018 07:45:13 -0000
1.141
+++ proprietary/po/proprietary-sabotage.ru.po 8 Oct 2018 07:58:03 -0000
1.142
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-10-07 21:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Sabotage - GNU Project - Free Software Foundation"