[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po proprietary-surveillance.de....
From: |
GNUN |
Subject: |
www/proprietary/po proprietary-surveillance.de.... |
Date: |
Wed, 24 Oct 2018 15:28:45 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 18/10/24 15:28:45
Modified files:
proprietary/po : proprietary-surveillance.de.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.235&r2=1.236
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.325&r2=1.326
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.248&r2=1.249
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.87&r2=1.88
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.221&r2=1.222
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.170&r2=1.171
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.412&r2=1.413
Patches:
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.235
retrieving revision 1.236
diff -u -b -r1.235 -r1.236
--- proprietary-surveillance.de.po 7 Oct 2018 22:29:13 -0000 1.235
+++ proprietary-surveillance.de.po 24 Oct 2018 19:28:44 -0000 1.236
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-07 22:26+0000\n"
+"POT-Creation-Date: 2018-10-24 19:25+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -35,12 +35,27 @@
"<a href=\"/proprietary/\">Weitere Beispiele proprietärer Schadsoftware</a>"
#. type: Content of: <div><p>
+# | Nonfree (proprietary) software is very often malware (designed to mistreat
+# | the user). Nonfree software is controlled by its developers, which puts
+# | them in a position of power over the users; <a
+# | href=\"/philosophy/free-software-even-more-important.html\">that is the
+# | basic injustice</a>. The developers {+and manufacturers+} often exercise
+# | that power to the detriment of the users they ought to serve.
+#, fuzzy
+#| msgid ""
+#| "Nonfree (proprietary) software is very often malware (designed to "
+#| "mistreat the user). Nonfree software is controlled by its developers, "
+#| "which puts them in a position of power over the users; <a href=\"/"
+#| "philosophy/free-software-even-more-important.html\">that is the basic "
+#| "injustice</a>. The developers often exercise that power to the detriment "
+#| "of the users they ought to serve."
msgid ""
"Nonfree (proprietary) software is very often malware (designed to mistreat "
"the user). Nonfree software is controlled by its developers, which puts them "
"in a position of power over the users; <a href=\"/philosophy/free-software-"
"even-more-important.html\">that is the basic injustice</a>. The developers "
-"often exercise that power to the detriment of the users they ought to serve."
+"and manufacturers often exercise that power to the detriment of the users "
+"they ought to serve."
msgstr ""
"Unfreie (proprietäre) Software entspricht sehr häufig einem Schadprogramm "
"(entworfen, um <ins>unerwünschte und gegebenenfalls schädliche Funktionen "
@@ -53,26 +68,38 @@
#. type: Content of: <div><p>
msgid ""
-"This document attempts to track <strong>clearly established cases of "
-"proprietary software that spies on or tracks users</strong>."
+"One common form of mistreatment is to snoop on the user. This page records "
+"<strong>clearly established cases of proprietary software that spies on or "
+"tracks users</strong>. Manufacturers even refuse to <a href=\"https://"
+"techcrunch.com/2018/10/19/smart-home-devices-hoard-data-government-demands/"
+"\">say whether they snoop on users for the state</a>."
msgstr ""
-"Dieses Dokument versucht die Spuren <strong>eindeutig nachgewiesener Fälle "
-"proprietärer Software, die Nutzer ausspioniert oder verfolgt</strong>, zu "
-"verfolgen:"
#. type: Content of: <div><p>
msgid ""
-"The tethered appliances and applications are by nature doing surveillance. "
-"We are not listing them here because they have their own page: <a href=\"/"
-"proprietary/proprietary-tethers.html\">Proprietary Tethers</a>."
+"All appliances and applications that are tethered to a specific server are "
+"snoopers by nature. We do not list them in this page because they have "
+"their own page: <a href=\"/proprietary/proprietary-tethers.html"
+"\">Proprietary Tethers</a>."
msgstr ""
#. type: Content of: <div><div><p>
+# | If you know of an example that ought to be in this page but isn't here,
+# | please write to <a
+# | href=\"mailto:address@hidden"><address@hidden></a> to
+# | inform us. Please include the URL of a trustworthy reference or two to
+# | [-present the specifics.-] {+serve as specific substantiation.+}
+#, fuzzy
+#| msgid ""
+#| "If you know of an example that ought to be in this page but isn't here, "
+#| "please write to <a href=\"mailto:address@hidden"><address@hidden"
+#| "org></a> to inform us. Please include the URL of a trustworthy "
+#| "reference or two to present the specifics."
msgid ""
"If you know of an example that ought to be in this page but isn't here, "
"please write to <a href=\"mailto:address@hidden"><address@hidden"
"org></a> to inform us. Please include the URL of a trustworthy reference "
-"or two to present the specifics."
+"or two to serve as specific substantiation."
msgstr ""
"Sollten Sie von einem Beispiel wissen, dass hier genannt werden sollte aber "
"nicht aufgeführt wird, informieren Sie uns bitte unter <a href=\"mailto:"
@@ -4471,6 +4498,14 @@
msgstr "Letzte Ãnderung:"
#~ msgid ""
+#~ "This document attempts to track <strong>clearly established cases of "
+#~ "proprietary software that spies on or tracks users</strong>."
+#~ msgstr ""
+#~ "Dieses Dokument versucht die Spuren <strong>eindeutig nachgewiesener "
+#~ "Fälle proprietärer Software, die Nutzer ausspioniert oder verfolgt</"
+#~ "strong>, zu verfolgen:"
+
+#~ msgid ""
#~ "Every “home security” camera, if its manufacturer can "
#~ "communicate with it, is a surveillance device. <a href=\"https://www."
#~ "theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-"
Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.325
retrieving revision 1.326
diff -u -b -r1.325 -r1.326
--- proprietary-surveillance.fr.po 7 Oct 2018 22:29:14 -0000 1.325
+++ proprietary-surveillance.fr.po 24 Oct 2018 19:28:44 -0000 1.326
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-07 22:26+0000\n"
+"POT-Creation-Date: 2018-10-24 19:25+0000\n"
"PO-Revision-Date: 2018-10-05 18:44+0200\n"
"Last-Translator: Félicien Pillot <felicien AT gnu.org>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-24 19:25+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -35,12 +36,27 @@
"dans le logiciel privateur</a>"
#. type: Content of: <div><p>
+# | Nonfree (proprietary) software is very often malware (designed to mistreat
+# | the user). Nonfree software is controlled by its developers, which puts
+# | them in a position of power over the users; <a
+# | href=\"/philosophy/free-software-even-more-important.html\">that is the
+# | basic injustice</a>. The developers {+and manufacturers+} often exercise
+# | that power to the detriment of the users they ought to serve.
+#, fuzzy
+#| msgid ""
+#| "Nonfree (proprietary) software is very often malware (designed to "
+#| "mistreat the user). Nonfree software is controlled by its developers, "
+#| "which puts them in a position of power over the users; <a href=\"/"
+#| "philosophy/free-software-even-more-important.html\">that is the basic "
+#| "injustice</a>. The developers often exercise that power to the detriment "
+#| "of the users they ought to serve."
msgid ""
"Nonfree (proprietary) software is very often malware (designed to mistreat "
"the user). Nonfree software is controlled by its developers, which puts them "
"in a position of power over the users; <a href=\"/philosophy/free-software-"
"even-more-important.html\">that is the basic injustice</a>. The developers "
-"often exercise that power to the detriment of the users they ought to serve."
+"and manufacturers often exercise that power to the detriment of the users "
+"they ought to serve."
msgstr ""
"Le logiciel non libre (privateur) est très souvent malveillant (conçu pour "
"maltraiter les utilisateurs). Il est contrôlé par ses développeurs, ce qui
"
@@ -51,18 +67,30 @@
#. type: Content of: <div><p>
msgid ""
-"This document attempts to track <strong>clearly established cases of "
-"proprietary software that spies on or tracks users</strong>."
+"One common form of mistreatment is to snoop on the user. This page records "
+"<strong>clearly established cases of proprietary software that spies on or "
+"tracks users</strong>. Manufacturers even refuse to <a href=\"https://"
+"techcrunch.com/2018/10/19/smart-home-devices-hoard-data-government-demands/"
+"\">say whether they snoop on users for the state</a>."
msgstr ""
-"Ce document tente de recenser les <strong>cas clairement établis de "
-"logiciels privateurs espionnant l'utilisateur ou le suivant à la trace</"
-"strong>."
#. type: Content of: <div><p>
-msgid ""
-"The tethered appliances and applications are by nature doing surveillance. "
-"We are not listing them here because they have their own page: <a href=\"/"
-"proprietary/proprietary-tethers.html\">Proprietary Tethers</a>."
+# | [-The tethered-]{+All+} appliances and applications {+that are tethered to
+# | a specific server+} are {+snoopers+} by [-nature doing surveillance.-]
+# | {+nature.+} We [-are-] {+do+} not [-listing-] {+list+} them [-here-] {+in
+# | this page+} because they have their own page: <a
+# | href=\"/proprietary/proprietary-tethers.html\">Proprietary Tethers</a>.
+#, fuzzy
+#| msgid ""
+#| "The tethered appliances and applications are by nature doing "
+#| "surveillance. We are not listing them here because they have their own "
+#| "page: <a href=\"/proprietary/proprietary-tethers.html\">Proprietary "
+#| "Tethers</a>."
+msgid ""
+"All appliances and applications that are tethered to a specific server are "
+"snoopers by nature. We do not list them in this page because they have "
+"their own page: <a href=\"/proprietary/proprietary-tethers.html"
+"\">Proprietary Tethers</a>."
msgstr ""
"Les appareils et applications dépendant d'un serveur font par nature de la "
"surveillance. Nous ne les citons pas ici parce qu'ils ont une page dédiéeÂ
: "
@@ -70,11 +98,22 @@
"serveur</a>."
#. type: Content of: <div><div><p>
+# | If you know of an example that ought to be in this page but isn't here,
+# | please write to <a
+# | href=\"mailto:address@hidden"><address@hidden></a> to
+# | inform us. Please include the URL of a trustworthy reference or two to
+# | [-present the specifics.-] {+serve as specific substantiation.+}
+#, fuzzy
+#| msgid ""
+#| "If you know of an example that ought to be in this page but isn't here, "
+#| "please write to <a href=\"mailto:address@hidden"><address@hidden"
+#| "org></a> to inform us. Please include the URL of a trustworthy "
+#| "reference or two to present the specifics."
msgid ""
"If you know of an example that ought to be in this page but isn't here, "
"please write to <a href=\"mailto:address@hidden"><address@hidden"
"org></a> to inform us. Please include the URL of a trustworthy reference "
-"or two to present the specifics."
+"or two to serve as specific substantiation."
msgstr ""
"Si vous avez connaissance d'un exemple qui devrait se trouver sur cette page "
"mais n'y figure pas, n'hésitez pas à écrire à <a href=\"mailto:"
@@ -3587,3 +3626,11 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "This document attempts to track <strong>clearly established cases of "
+#~ "proprietary software that spies on or tracks users</strong>."
+#~ msgstr ""
+#~ "Ce document tente de recenser les <strong>cas clairement établis de "
+#~ "logiciels privateurs espionnant l'utilisateur ou le suivant à la trace</"
+#~ "strong>."
Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- proprietary-surveillance.it-diff.html 17 Oct 2018 10:01:36 -0000
1.76
+++ proprietary-surveillance.it-diff.html 24 Oct 2018 19:28:44 -0000
1.77
@@ -48,20 +48,25 @@
mistreat the user). Nonfree software is controlled by its developers,
which puts them in a position of power over the users; <a
href="/philosophy/free-software-even-more-important.html">that is the
-basic injustice</a>. The developers often exercise that power to the
-detriment of the users they ought to serve.</p>
+basic injustice</a>. The developers <span class="inserted"><ins><em>and
manufacturers</em></ins></span> often exercise
+that power to the detriment of the users they ought to serve.</p>
-<span class="removed"><del><strong><div
class="announcement"></strong></del></span>
+<span class="removed"><del><strong><div class="announcement">
+<p>This document attempts</strong></del></span>
-<p>This document attempts to
-track <strong>clearly established cases of proprietary software that
-spies on or tracks users</strong>.</p>
-
-<span class="removed"><del><strong><p><a
href="/proprietary/proprietary.html">
- Other examples</strong></del></span>
-
-<span class="inserted"><ins><em><p>The tethered appliances and
applications are by nature doing
-surveillance. We are not listing them here because they have their own
+<span class="inserted"><ins><em><p>One common form of mistreatment
is</em></ins></span> to
+<span class="removed"><del><strong>track</strong></del></span> <span
class="inserted"><ins><em>snoop on the user. This page
+records</em></ins></span> <strong>clearly established cases of
proprietary software that
+spies on or tracks <span
class="removed"><del><strong>users</strong>.</p>
+
+<p><a href="/proprietary/proprietary.html">
+ Other examples</strong></del></span> <span
class="inserted"><ins><em>users</strong>. Manufacturers even refuse
+to <a
href="https://techcrunch.com/2018/10/19/smart-home-devices-hoard-data-government-demands/">say
+whether they snoop on users for the state</a>.</p>
+
+<p>All appliances and applications that are tethered to a specific
+server are snoopers by nature. We do not list them in this page
+because they have their own
page: <a href="/proprietary/proprietary-tethers.html">Proprietary
Tethers</a>.</p>
@@ -70,7 +75,7 @@
here, please write
to <a href="mailto:address@hidden"><address@hidden></a>
to inform us. Please include the URL of a trustworthy reference or two
-to present the specifics.</p>
+to serve as specific substantiation.</p>
</div></em></ins></span>
</div>
@@ -312,8 +317,7 @@
<p>To use proprietary software is to invite such treatment.</p>
</li>
- <span class="removed"><del><strong><li><p>
- Windows 10</strong></del></span>
+ <span class="removed"><del><strong><li><p></strong></del></span>
<span class="inserted"><ins><em><li id="M201508180">
<p><a
@@ -324,8 +328,8 @@
<li id="M201508130">
<p><a
-
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/">
- Windows 10 sends identifiable information to Microsoft</a>, even if
+
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/"></em></ins></span>
+ Windows 10 <span class="inserted"><ins><em>sends identifiable information
to Microsoft</a>, even if
a user turns off its Bing search and Cortana features, and activates
the privacy-protection settings.</p>
</li>
@@ -506,9 +510,8 @@
<p><a <span
class="removed"><del><strong>href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
Lenovo stealthily installed crapware and spyware via
- BIOS</a> on Windows installs. Note</em></ins></span> that <span
class="removed"><del><strong>90% of</strong></del></span> the <span
class="removed"><del><strong>top-ranked gratis
- proprietary Android apps contained recognizable tracking libraries. For
- the paid proprietary apps, it was only 60%.</p>
+ BIOS</a> on Windows installs. Note</em></ins></span> that <span
class="removed"><del><strong>90% of the top-ranked gratis
+ proprietary Android apps contained recognizable tracking libraries.
For</strong></del></span> the <span class="removed"><del><strong>paid
proprietary apps, it was only 60%.</p>
<p>The article confusingly describes gratis apps as “free”,
but most of them are</strong></del></span> <span
class="inserted"><ins><em>specific
@@ -577,7 +580,7 @@
<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>GPS, take photographs, read
text messages, read call, location and web browsing history, and
- read</em></ins></span> the <span
class="removed"><del><strong>“consent” of users is not
enough</strong></del></span> <span class="inserted"><ins><em>contact list. This
malware is designed</em></ins></span> to <span
class="removed"><del><strong>legitimize actions like this.
At</strong></del></span> <span class="inserted"><ins><em>disguise itself
+ read</em></ins></span> the <span
class="removed"><del><strong>“consent” of
users</strong></del></span> <span class="inserted"><ins><em>contact list. This
malware</em></ins></span> is <span class="removed"><del><strong>not
enough</strong></del></span> <span
class="inserted"><ins><em>designed</em></ins></span> to <span
class="removed"><del><strong>legitimize actions like this.
At</strong></del></span> <span class="inserted"><ins><em>disguise itself
from investigation.</p>
</li>
@@ -614,9 +617,15 @@
disable Google Play itself to completely</strong></del></span> <span
class="inserted"><ins><em>on remote command, and users cannot</em></ins></span>
stop <span class="removed"><del><strong>the tracking. This is
yet another example of nonfree software pretending</strong></del></span>
<span class="inserted"><ins><em>them</a>. (The US says it will
eventually require all new portable phones</em></ins></span>
- to <span class="removed"><del><strong>obey</strong></del></span> <span
class="inserted"><ins><em>have GPS.)</p>
+ to <span class="removed"><del><strong>obey the user,
+ when it's actually doing something else. Such a thing would be almost
+ unthinkable with free software.</p></strong></del></span> <span
class="inserted"><ins><em>have GPS.)</p></em></ins></span>
</li>
-</ul>
+
+ <span class="removed"><del><strong><li><p>More than 73% of the
most popular Android apps
+ <a href="http://jots.pub/a/2015103001/index.php">share personal,
+ behavioral</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
@@ -626,43 +635,33 @@
<ul class="blurbs">
<li id="M201711250">
- <p>The DMCA and</em></ins></span> the <span
class="removed"><del><strong>user,
- when it's actually doing something else. Such a
thing</strong></del></span> <span class="inserted"><ins><em>EU Copyright
Directive make it <a
- href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal to study how iOS cr…apps spy on users</a>, because
- this</em></ins></span> would <span class="removed"><del><strong>be almost
- unthinkable with free software.</p></strong></del></span> <span
class="inserted"><ins><em>require circumventing the iOS
DRM.</p></em></ins></span>
+ <p>The DMCA</em></ins></span> and <span
class="removed"><del><strong>location information</a> of their users with
third parties.</p>
</li>
- <span class="removed"><del><strong><li><p>More than 73%
of</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201709210">
- <p>In</em></ins></span> the <span class="removed"><del><strong>most
popular Android apps
- <a href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral</strong></del></span> <span class="inserted"><ins><em>latest
iThings system,
- “turning off” WiFi</em></ins></span> and <span
class="removed"><del><strong>location information</a> of their users with
third parties.</p>
- </li>
-
- <li><p>“Cryptic communication,” unrelated
to</strong></del></span> <span
class="inserted"><ins><em>Bluetooth</em></ins></span> the <span
class="removed"><del><strong>app's functionality,
- was</strong></del></span> <span class="inserted"><ins><em>obvious
way</em></ins></span> <a <span
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ <li><p>“Cryptic communication,” unrelated
to</strong></del></span> the <span class="removed"><del><strong>app's
functionality,
+ was</strong></del></span> <span class="inserted"><ins><em>EU Copyright
Directive make it</em></ins></span> <a <span
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
found in the 500 most popular gratis Android apps</a>.</p>
<p>The article should not have described these apps as
- “free”—they are not free software. The
clear</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
- doesn't really turn them off</a>. A more advanced</em></ins></span>
way <span class="removed"><del><strong>to say
+ “free”—they are not free software. The clear
way</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ illegal</em></ins></span> to <span class="removed"><del><strong>say
“zero price” is “gratis.”</p>
- <p>The article takes</strong></del></span> <span
class="inserted"><ins><em>really does turn
- them off—only until 5am. That's Apple</em></ins></span> for <span
class="removed"><del><strong>granted that the usual analytics tools are
+ <p>The article takes for granted that</strong></del></span> <span
class="inserted"><ins><em>study how iOS cr…apps spy on users</a>,
because
+ this would require circumventing</em></ins></span> the <span
class="removed"><del><strong>usual analytics tools are
legitimate, but is that valid? Software developers have no right to
analyze what users are doing or how. “Analytics” tools that
snoop are
- just as wrong as any other snooping.</p>
+ just as wrong as any other snooping.</p></strong></del></span> <span
class="inserted"><ins><em>iOS DRM.</p></em></ins></span>
</li>
- <li><p>Gratis Android apps (but not <a
href="/philosophy/free-sw.html">free software</a>)
+ <span class="removed"><del><strong><li><p>Gratis Android apps
(but not <a href="/philosophy/free-sw.html">free software</a>)
connect to 100
- <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
and advertising</a> URLs,
- on the average.</p>
+ <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201709210">
+ <p>In the latest iThings system,
+ “turning off” WiFi</em></ins></span> and <span
class="removed"><del><strong>advertising</a> URLs,
+ on</strong></del></span> <span
class="inserted"><ins><em>Bluetooth</em></ins></span> the <span
class="removed"><del><strong>average.</p>
</li>
<li><p>Spyware is present in some Android devices when they are
sold.
Some Motorola phones modify Android to
@@ -670,13 +669,15 @@
send personal data to Motorola</a>.</p>
</li>
- <li><p>Some manufacturers add a
- <a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ <li><p>Some manufacturers add a</strong></del></span> <span
class="inserted"><ins><em>obvious way</em></ins></span> <a <span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
hidden general surveillance package such as Carrier
IQ.</a></p>
</li>
<li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access</strong></del></span>
<span class="inserted"><ins><em>you—“We
+ Samsung's back door</a> provides access</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
+ doesn't really turn them off</a>. A more advanced way really does
turn
+ them off—only until 5am. That's Apple for you—“We
know you want</em></ins></span> to <span class="removed"><del><strong>any
file on the system.</p></strong></del></span> <span
class="inserted"><ins><em>be spied on”.</p></em></ins></span>
</li>
<span class="removed"><del><strong></ul>
@@ -725,7 +726,10 @@
days.</p>
</li>
- <li><p>Users cannot make an Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install even gratis apps)</a>
+ <li><p>Users cannot make an Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201509240">
+ <p>iThings automatically upload</em></ins></span> to <span
class="removed"><del><strong>install even gratis apps)</a>
without giving a valid email address and receiving the code Apple
sends to it.</p>
</li>
@@ -736,10 +740,7 @@
behavioral and location information</a> of their users with third
parties.</p>
</li>
- <li><p>iThings</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201509240">
- <p>iThings</em></ins></span> automatically upload to Apple's servers
all the photos
+ <li><p>iThings automatically upload to Apple's servers
all</strong></del></span> <span class="inserted"><ins><em>Apple's servers
all</em></ins></span> the photos
and videos they make.</p>
<blockquote><p> iCloud Photo Library stores every photo and
video you
@@ -763,8 +764,7 @@
security to get at them, but NSA can access any of them through <a
<span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
</p></li>
- <li><p>Spyware in iThings:
- the <a class="not-a-duplicate"</strong></del></span>
+ <li><p>Spyware in iThings:</strong></del></span>
<span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p>
</li>
@@ -784,13 +784,13 @@
<p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
Several “features” of iOS seem to exist
- for no possible purpose other than surveillance</a>. Here is the
<a
-
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ for no possible purpose other than surveillance</a>. Here
is</em></ins></span> the <a
+ <span
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
Technical presentation</a>.</p>
</li>
<li id="M201401100">
- <p>The <a class="not-a-duplicate"</em></ins></span>
+ <p>The <a</em></ins></span> class="not-a-duplicate"
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
iBeacon</a> lets stores determine exactly where the iThing is, and
get other info too.</p>
@@ -863,24 +863,24 @@
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201711210">
<p>Android tracks location for Google</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
- by sending hidden text messages which enable them to
turn</strong></del></span>
+ by sending hidden text messages which enable them to turn the phones
+ on and</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
- even when “location services” are turned off, even
when</em></ins></span>
- the <span class="inserted"><ins><em>phone has no SIM
card</a>.</p>
+ even when “location services” are turned</em></ins></span>
off, <span class="removed"><del><strong>listen to</strong></del></span> <span
class="inserted"><ins><em>even when</em></ins></span>
+ the <span class="removed"><del><strong>microphone, retrieve
geo-location</strong></del></span> <span class="inserted"><ins><em>phone has no
SIM card</a>.</p>
</li>
<li id="M201611150">
- <p>Some portable</em></ins></span> phones
- <span class="removed"><del><strong>on and off,
listen</strong></del></span> <span class="inserted"><ins><em><a
+ <p>Some portable phones <a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots of data</em></ins></span> to <span
class="inserted"><ins><em>China</a>.</p>
+ sold with spyware sending lots of</em></ins></span> data <span
class="removed"><del><strong>from</strong></del></span> <span
class="inserted"><ins><em>to China</a>.</p>
</li>
<li id="M201609140">
<p>Google Play (a component of Android) <a
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks</em></ins></span> the <span
class="removed"><del><strong>microphone, retrieve geo-location data from the
- GPS, take photographs, read text messages, read call, location and web
+ tracks</em></ins></span> the
+ <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call, location and web
browsing history,</strong></del></span> <span
class="inserted"><ins><em>users' movements without their
permission</a>.</p>
<p>Even if you disable Google Maps</em></ins></span> and <span
class="removed"><del><strong>read</strong></del></span> <span
class="inserted"><ins><em>location tracking, you must
@@ -966,23 +966,22 @@
<span class="removed"><del><strong><li>
<p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app that it will</a>
- pre-install on some of its phones. The</strong></del></span>
+ announced an opt-in proprietary search</strong></del></span>
<span class="inserted"><ins><em><li id="M201302150">
- <p>Google Play intentionally sends</em></ins></span> app <span
class="removed"><del><strong>will give Verizon</strong></del></span> <span
class="inserted"><ins><em>developers <a
-
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></em></ins></span>
- the <span class="removed"><del><strong>same
- information about the users' searches</strong></del></span> <span
class="inserted"><ins><em>personal details of users</em></ins></span> that
<span class="removed"><del><strong>Google normally gets when
- they use its search engine.</p>
-
- <p>Currently,</strong></del></span> <span
class="inserted"><ins><em>install</em></ins></span> the <span
class="removed"><del><strong>app</strong></del></span> <span
class="inserted"><ins><em>app</a>.</p>
+ <p>Google Play intentionally sends</em></ins></span> app <span
class="removed"><del><strong>that it will</a>
+ pre-install on some</strong></del></span> <span
class="inserted"><ins><em>developers <a
+
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
+ the personal details</em></ins></span> of <span
class="removed"><del><strong>its phones. The app will give
Verizon</strong></del></span> <span class="inserted"><ins><em>users that
install</em></ins></span> the <span class="removed"><del><strong>same
+ information about</strong></del></span> <span
class="inserted"><ins><em>app</a>.</p>
- <p>Merely asking the “consent” of
users</em></ins></span> is <span class="removed"><del><strong><a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed on only one phone</a>,</strong></del></span>
<span class="inserted"><ins><em>not enough to
+ <p>Merely asking</em></ins></span> the <span
class="removed"><del><strong>users' searches</strong></del></span> <span
class="inserted"><ins><em>“consent” of users is not enough to
legitimize actions like this. At this point, most users have stopped
- reading the “Terms and Conditions” that spell out what
- they are “consenting” to. Google should
clearly</em></ins></span> and
+ reading the “Terms and Conditions”</em></ins></span> that
<span class="removed"><del><strong>Google normally gets
when</strong></del></span> <span class="inserted"><ins><em>spell out
what</em></ins></span>
+ they <span class="removed"><del><strong>use its search engine.</p>
+
+ <p>Currently, the app is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed on only one phone</a>,</strong></del></span>
<span class="inserted"><ins><em>are “consenting” to. Google should
clearly</em></ins></span> and
<span class="inserted"><ins><em>honestly identify</em></ins></span> the
<span class="removed"><del><strong>user</strong></del></span> <span
class="inserted"><ins><em>information it collects on users, instead of
hiding it in an obscurely worded EULA.</p>
@@ -1039,21 +1038,21 @@
alter them too</a>.
</p></li>
- <li><p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before and after</strong></del></span> <span
class="inserted"><ins><em>many e-readers—not only</em></ins></span> the
<span class="removed"><del><strong>ride</a>.</p>
+ <li><p>The Uber app tracks</strong></del></span> <span
class="inserted"><ins><em>many e-readers—not only the
Kindle:</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before and after</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012">
they
+ report even which page</em></ins></span> the <span
class="removed"><del><strong>ride</a>.</p>
- <p>This example illustrates how
“getting</strong></del></span> <span class="inserted"><ins><em>Kindle:
<a
- href="https://www.eff.org/pages/reader-privacy-chart-2012"> they
- report even which page</em></ins></span> the <span
class="removed"><del><strong>user's consent”
+ <p>This example illustrates how “getting the user's
consent”
for surveillance is inadequate as a protection against massive
- surveillance.</p></strong></del></span> <span
class="inserted"><ins><em>user reads at what
time</a>.</p></em></ins></span>
+ surveillance.</p>
</li>
- <span class="removed"><del><strong><li><p>Google's new voice
messaging app <a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p>
+ <li><p>Google's new voice messaging app <a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p></strong></del></span> <span
class="inserted"><ins><em>user reads at what
time</a>.</p></em></ins></span>
</li>
- <li><p>Apps that include
+ <span class="removed"><del><strong><li><p>Apps that include
<a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
Symphony surveillance software snoop</strong></del></span>
<span class="inserted"><ins><em></ul>
@@ -1088,326 +1087,311 @@
<span class="inserted"><ins><em><li id="M201806110">
<p>The Spanish football streaming</em></ins></span> app <a
<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
-scans your mobile phone's photo collections for known
faces</a>,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
- the user's movements</em></ins></span> and <span
class="removed"><del><strong>suggests you</strong></del></span> <span
class="inserted"><ins><em>listens through the microphone</a>.</p>
-
- <p>This makes them act as spies for licensing enforcement.</p>
-
- <p>I expect it implements DRM, too—that there is no
way</em></ins></span> to <span
class="removed"><del><strong>share</strong></del></span> <span
class="inserted"><ins><em>save
- a recording. But I can't be sure from</em></ins></span> the <span
class="removed"><del><strong>picture</strong></del></span> <span
class="inserted"><ins><em>article.</p>
-
- <p>If</em></ins></span> you <span class="removed"><del><strong>take
according</strong></del></span> <span
class="inserted"><ins><em>learn</em></ins></span> to <span
class="removed"><del><strong>who
- is</strong></del></span> <span class="inserted"><ins><em>care much less
about sports, you will benefit</em></ins></span> in
- <span class="inserted"><ins><em>many ways. This is one more.</p>
+scans your mobile phone's photo collections for known faces</a>,
+ and suggests you to share</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks</em></ins></span>
+ the <span class="removed"><del><strong>picture you take according to who
+ is in</strong></del></span> <span class="inserted"><ins><em>user's
movements and listens through</em></ins></span> the <span
class="removed"><del><strong>frame.</p></strong></del></span> <span
class="inserted"><ins><em>microphone</a>.</p></em></ins></span>
+
+ <p>This <span class="removed"><del><strong>spyware feature seems to
require online access</strong></del></span> <span
class="inserted"><ins><em>makes them act as spies for licensing
enforcement.</p>
+
+ <p>I expect it implements DRM, too—that there is no
way</em></ins></span> to <span class="removed"><del><strong>some
+ known-faces database, which means</strong></del></span> <span
class="inserted"><ins><em>save
+ a recording. But I can't be sure from</em></ins></span> the <span
class="removed"><del><strong>pictures are likely</strong></del></span> <span
class="inserted"><ins><em>article.</p>
+
+ <p>If you learn</em></ins></span> to <span
class="removed"><del><strong>be
+ sent across</strong></del></span> <span class="inserted"><ins><em>care
much less about sports, you will benefit in
+ many ways. This is one more.</p>
</li>
<li id="M201804160">
<p>More than <a
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
- of</em></ins></span> the <span
class="removed"><del><strong>frame.</p>
-
- <p>This spyware feature seems to require online
access</strong></del></span> <span class="inserted"><ins><em>5,855 Android apps
studied by researchers were found</em></ins></span> to <span
class="removed"><del><strong>some
- known-faces database, which means</strong></del></span> <span
class="inserted"><ins><em>snoop
- and collect information about its users</a>. 40%
of</em></ins></span> the <span class="removed"><del><strong>pictures are
likely</strong></del></span> <span class="inserted"><ins><em>apps were
- found</em></ins></span> to <span class="inserted"><ins><em>insecurely
snitch on its users. Furthermore, they could
- detect only some methods of snooping, in these proprietary apps whose
- source code they cannot look at. The other apps might</em></ins></span> be
- <span class="removed"><del><strong>sent across the wire to Facebook's
servers</strong></del></span> <span class="inserted"><ins><em>snooping
- in other ways.</p>
-
- <p>This is evidence that proprietary apps generally work against
- their users. To protect their privacy</em></ins></span> and <span
class="removed"><del><strong>face-recognition
+ of</em></ins></span> the <span
class="removed"><del><strong>wire</strong></del></span> <span
class="inserted"><ins><em>5,855 Android apps studied by researchers were
found</em></ins></span> to <span class="removed"><del><strong>Facebook's
servers</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span>
+ and <span class="removed"><del><strong>face-recognition
algorithms.</p>
- <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>freedom, Android users
- need to get rid</em></ins></span> of <span
class="removed"><del><strong>Facebook users' pictures are private
- anymore, even if</strong></del></span> the <span
class="removed"><del><strong>user didn't “upload”
them</strong></del></span> <span class="inserted"><ins><em>proprietary
software—both proprietary
- Android by <a
href="https://replicant.us">switching</em></ins></span> to <span
class="inserted"><ins><em>Replicant</a>,
- and</em></ins></span> the <span
class="removed"><del><strong>service.</p>
+ <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>collect information about its users</a>.
40%</em></ins></span> of <span class="removed"><del><strong>Facebook users'
pictures are private
+ anymore, even if</strong></del></span> the <span
class="removed"><del><strong>user didn't “upload”
them</strong></del></span> <span class="inserted"><ins><em>apps were
+ found</em></ins></span> to <span class="removed"><del><strong>the
service.</p>
</li>
<li><p>Like most “music screaming” disservices,
Spotify
- is based on</strong></del></span> proprietary <span
class="removed"><del><strong>malware (DRM and snooping). In August
- 2015 it</strong></del></span> <span class="inserted"><ins><em>apps by
getting apps from the free software
- only</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded</strong></del></span> <span
class="inserted"><ins><em>href="https://f-droid.org/">F-Droid
store</a> that <a
- href="https://f-droid.org/wiki/page/Antifeatures"> prominently warns
- the user if an app contains anti-features</a>.</p>
+ is based</strong></del></span> <span
class="inserted"><ins><em>insecurely snitch</em></ins></span> on <span
class="inserted"><ins><em>its users. Furthermore, they could
+ detect only some methods of snooping, in these</em></ins></span>
proprietary <span class="removed"><del><strong>malware (DRM and snooping). In
August
+ 2015 it <a
+href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded users submit to increased snooping</a>, and some
+ are starting to realize that it is nasty.</p>
+
+ <p>This article shows the <a
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways that</strong></del></span> <span
class="inserted"><ins><em>apps whose
+ source code</em></ins></span> they <span
class="removed"><del><strong>present</strong></del></span> <span
class="inserted"><ins><em>cannot look at. The other apps might
be</em></ins></span> snooping <span class="removed"><del><strong>as a way
+ to “serve” users better</a>—never mind
+ whether they want that. This</strong></del></span>
+ <span class="inserted"><ins><em>in other ways.</p>
+
+ <p>This</em></ins></span> is <span class="removed"><del><strong>a
typical example of
+ the attitude</strong></del></span> <span
class="inserted"><ins><em>evidence that proprietary apps generally work against
+ their users. To protect their privacy and freedom, Android users
+ need to get rid</em></ins></span> of the proprietary <span
class="removed"><del><strong>software industry towards
+ those they have subjugated.</p>
+
+ <p>Out, out, damned Spotify!</p>
</li>
+ <li><p>Many</strong></del></span> <span
class="inserted"><ins><em>software—both proprietary
+ Android by <a href="https://replicant.us">switching to
Replicant</a>,
+ and the</em></ins></span> proprietary apps <span
class="removed"><del><strong>for mobile devices report which
other</strong></del></span> <span class="inserted"><ins><em>by
getting</em></ins></span> apps <span
class="inserted"><ins><em>from</em></ins></span> the <span
class="removed"><del><strong>user has
+ installed.</strong></del></span> <span class="inserted"><ins><em>free
software
+ only</em></ins></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing this in a way</strong></del></span> <span
class="inserted"><ins><em>href="https://f-droid.org/">F-Droid
store</a></em></ins></span> that <span class="removed"><del><strong>at
least is visible and
+ optional</a>. Not as bad as what the others do.</p>
+ </li>
+
+ <li><p>FTC says most mobile apps for children don't respect
privacy:</strong></del></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://f-droid.org/wiki/page/Antifeatures">
prominently warns
+ the user if an app contains
anti-features</a>.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201804020">
+ <p>Grindr collects information about</em></ins></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop on</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
+ which users are HIV-positive, then provides</em></ins></span> the <span
class="removed"><del><strong>user</a>. This is in
addition</strong></del></span> <span
class="inserted"><ins><em>information</em></ins></span> to
+ <span class="removed"><del><strong>the snooping done by the phone
company, and perhaps by the OS in the
+ phone.</p>
- <li id="M201804020">
- <p>Grindr collects information about <a
-
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
- which</em></ins></span> users <span class="removed"><del><strong>submit to
increased snooping</a>, and some</strong></del></span> are <span
class="removed"><del><strong>starting</strong></del></span> <span
class="inserted"><ins><em>HIV-positive, then provides the
information</em></ins></span> to <span
class="removed"><del><strong>realize</strong></del></span>
+ <p>Don't</strong></del></span>
<span class="inserted"><ins><em>companies</a>.</p>
<p>Grindr should not have so much information about its users.
- It could be designed so</em></ins></span> that <span
class="removed"><del><strong>it is nasty.</p>
+ It could</em></ins></span> be <span
class="removed"><del><strong>distracted by the question of whether the app
developers get</strong></del></span> <span class="inserted"><ins><em>designed
so that</em></ins></span> users <span class="inserted"><ins><em>communicate
such info</em></ins></span> to <span class="removed"><del><strong>say “I
agree”. That is no excuse for malware.</p></strong></del></span>
<span class="inserted"><ins><em>each
+ other but not to the server's database.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>The Brightest
Flashlight app
+ <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use by
companies.</a></p></strong></del></span>
- <p>This article shows</strong></del></span> <span
class="inserted"><ins><em>users communicate such info to each
- other but not to</em></ins></span> the <span
class="inserted"><ins><em>server's database.</p>
+ <span class="inserted"><ins><em><li id="M201803050"></em></ins></span>
+ <p>The <span class="removed"><del><strong>FTC criticized
this</strong></del></span> <span
class="inserted"><ins><em>moviepass</em></ins></span> app <span
class="removed"><del><strong>because it asked the user to
+ approve sending personal data to the app developer but did not
+ ask about sending it to other companies. This shows the
+ weakness of the reject-it-if-you-dislike-snooping
+ “solution” to surveillance: why should a flashlight
+ app send any information to anyone? A free software flashlight
+ app would not.</p>
</li>
+</ul>
- <li id="M201803050">
- <p>The moviepass app and dis-service
- spy on users even more than users expected. It</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that</strong></del></span>
- <span
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where</em></ins></span> they <span class="removed"><del><strong>present
snooping as a way</strong></del></span> <span class="inserted"><ins><em>travel
before and after going</em></ins></span> to <span
class="removed"><del><strong>“serve” users
better</a>—never mind
- whether they want that. This is</strong></del></span> a <span
class="removed"><del><strong>typical example of
- the attitude of the proprietary software industry towards
- those they have subjugated.</p>
- <p>Out, out, damned Spotify!</p></strong></del></span> <span
class="inserted"><ins><em>movie</a>.</p>
+<div class="big-subsection">
+ <h4 id="SpywareInGames">Spyware in Games</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
+</div>
+
+<ul>
+ <li><p>nVidia's proprietary GeForce Experience <a
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+ users identify themselves and then sends personal data about them to
+ nVidia servers</a>.</p>
+ </li>
- <p>Don't be tracked—pay cash!</p></em></ins></span>
+ <li><p>Angry Birds
+ <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies for companies,</strong></del></span> and <span
class="removed"><del><strong>the NSA takes advantage to</strong></del></span>
<span class="inserted"><ins><em>dis-service</em></ins></span>
+ spy <span class="removed"><del><strong>through it too</a>.
+ Here's information</strong></del></span> on
+ <span class="removed"><del><strong><a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"></strong></del></span>
<span class="inserted"><ins><em>users even</em></ins></span> more <span
class="removed"><del><strong>spyware apps</a>.</p>
+ <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
+ More about NSA app spying</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Many proprietary apps
for mobile devices report which other</strong></del></span>
+</ul>
+
- <span class="inserted"><ins><em><li id="M201711240">
- <p>Tracking software in popular Android</em></ins></span> apps <span
class="removed"><del><strong>the user has
- installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</strong></del></span>
- is <span class="removed"><del><strong>doing this in</strong></del></span>
<span class="inserted"><ins><em>pervasive and sometimes very clever. Some
trackers can <a
+<div class="big-subsection">
+ <h4 id="SpywareInToys">Spyware in Toys</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
+</div>
+
+<ul>
+ <li>
+ <p>The “smart” toys My Friend Cayla and i-Que
transmit</strong></del></span> <span class="inserted"><ins><em>than users
expected. It</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
+ where they travel before and after going</em></ins></span> to <span
class="removed"><del><strong>Nuance
Communications</a>,</strong></del></span> a <span
class="removed"><del><strong>speech recognition company
based</strong></del></span> <span
class="inserted"><ins><em>movie</a>.</p>
+
+ <p>Don't be tracked—pay cash!</p>
+ </li>
+
+ <li id="M201711240">
+ <p>Tracking software</em></ins></span> in <span
class="removed"><del><strong>the U.S.</p>
+
+ <p>Those toys also contain major security vulnerabilities;
crackers</strong></del></span> <span class="inserted"><ins><em>popular Android
apps
+ is pervasive and sometimes very clever. Some trackers</em></ins></span>
can <span class="removed"><del><strong>remotely control the toys
with</strong></del></span> <span class="inserted"><ins><em><a
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow</em></ins></span> a <span class="removed"><del><strong>way that at
least is visible</strong></del></span> <span class="inserted"><ins><em>user's
movements around a physical store by noticing WiFi
+ follow</em></ins></span> a <span class="removed"><del><strong>mobile
phone. This would
+ enable crackers to listen in on</strong></del></span> <span
class="inserted"><ins><em>user's movements around</em></ins></span> a <span
class="removed"><del><strong>child's speech,</strong></del></span> <span
class="inserted"><ins><em>physical store by noticing WiFi
networks</a>.</p>
</li>
<li id="M201708270">
<p>The Sarahah app <a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone numbers</em></ins></span> and
- <span class="removed"><del><strong>optional</a>. Not as bad as
what</strong></del></span> <span class="inserted"><ins><em>email
addresses</a> in user's address
- book to developer's server. Note that this article
misuses</em></ins></span> the <span class="removed"><del><strong>others
do.</p></strong></del></span> <span class="inserted"><ins><em>words
+ uploads all phone numbers</em></ins></span> and <span
class="removed"><del><strong>even speak
+ into</strong></del></span> <span class="inserted"><ins><em>email
addresses</a> in user's address
+ book to developer's server. Note that this article
misuses</em></ins></span> the <span class="removed"><del><strong>toys
themselves.</p></strong></del></span> <span
class="inserted"><ins><em>words
“<a href="/philosophy/free-sw.html">free
software</a>”
referring to zero price.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>FTC says most
mobile</strong></del></span>
+ <span class="removed"><del><strong><li>
+ <p>A computerized vibrator</strong></del></span>
<span class="inserted"><ins><em><li id="M201707270">
- <p>20 dishonest Android</em></ins></span> apps <span
class="removed"><del><strong>for children don't respect privacy:
- <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
- </li>
-
- <li><p>Widely used</strong></del></span> <span
class="inserted"><ins><em>recorded</em></ins></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner</strong></del></span>
+ <p>20 dishonest Android apps recorded</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping</strong></del></span>
<span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
calls and sent them and text messages and emails to
snoopers</a>.</p>
- <p>Google did not intend to make these</em></ins></span> apps <span
class="removed"><del><strong>snoop</strong></del></span> <span
class="inserted"><ins><em>spy;</em></ins></span> on the <span
class="removed"><del><strong>user</a>. This is</strong></del></span>
<span class="inserted"><ins><em>contrary, it
- worked</em></ins></span> in <span
class="removed"><del><strong>addition</strong></del></span> <span
class="inserted"><ins><em>various ways</em></ins></span> to <span
class="inserted"><ins><em>prevent that, and deleted these apps after
+ <p>Google did not intend to make these apps spy;</em></ins></span>
on <span class="removed"><del><strong>its users through</strong></del></span>
the <span class="removed"><del><strong>proprietary control
app</a>.</p>
+
+ <p>The app was reporting</strong></del></span> <span
class="inserted"><ins><em>contrary, it
+ worked in various ways to prevent that, and deleted these apps after
discovering what they did. So we cannot blame Google specifically
- for</em></ins></span> the snooping <span class="removed"><del><strong>done
by</strong></del></span> <span class="inserted"><ins><em>of these
apps.</p>
+ for</em></ins></span> the <span
class="removed"><del><strong>temperature</strong></del></span> <span
class="inserted"><ins><em>snooping</em></ins></span> of <span
class="inserted"><ins><em>these apps.</p>
+
+ <p>On</em></ins></span> the <span
class="removed"><del><strong>vibrator minute by
+ minute (thus, indirectly, whether it was surrounded by a person's
+ body), as well as</strong></del></span> <span
class="inserted"><ins><em>other hand, Google redistributes nonfree Android
apps, and
+ therefore shares in</em></ins></span> the <span
class="removed"><del><strong>vibration frequency.</p>
+
+ <p>Note</strong></del></span> <span
class="inserted"><ins><em>responsibility for</em></ins></span> the <span
class="removed"><del><strong>totally inadequate proposed response: a labeling
+ standard with which manufacturers would make statements
about</strong></del></span> <span class="inserted"><ins><em>injustice
of</em></ins></span> their <span class="removed"><del><strong>products, rather
than free software which users could have
+ checked and changed.</p>
- <p>On</em></ins></span> the <span class="removed"><del><strong>phone
company,</strong></del></span> <span class="inserted"><ins><em>other hand,
Google redistributes nonfree Android apps,</em></ins></span> and <span
class="removed"><del><strong>perhaps by the OS</strong></del></span>
- <span class="inserted"><ins><em>therefore shares</em></ins></span> in the
- <span class="removed"><del><strong>phone.</p>
-
- <p>Don't be distracted by</strong></del></span> <span
class="inserted"><ins><em>responsibility for</em></ins></span> the <span
class="removed"><del><strong>question</strong></del></span> <span
class="inserted"><ins><em>injustice</em></ins></span> of <span
class="removed"><del><strong>whether the app developers get
- users to say “I agree”. That</strong></del></span> <span
class="inserted"><ins><em>their being
- nonfree. It also distributes its own nonfree apps, such as Google Play,
- <a href="/philosophy/free-software-even-more-important.html">which
+ <p>The company that made the vibrator</strong></del></span> <span
class="inserted"><ins><em>being
+ nonfree. It also distributes its own nonfree apps, such as Google
Play,</em></ins></span>
+ <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued for collecting lots</strong></del></span> <span
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html">which
are malicious</a>.</p>
- <p>Could Google have done a better job of preventing apps from
- cheating? There</em></ins></span> is no <span
class="removed"><del><strong>excuse for malware.</p>
- </li>
+ <p>Could Google have done a better job</em></ins></span> of <span
class="removed"><del><strong>personal information about how
+ people used it</a>.</p>
- <li><p>The Brightest Flashlight app
- <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation,</strong></del></span> <span
class="inserted"><ins><em>systematic way</em></ins></span> for <span
class="removed"><del><strong>use by companies.</a></p>
+ <p>The company's statement that it was anonymizing the data may be
+ true, but it doesn't really matter. If it had sold the
data</strong></del></span> <span class="inserted"><ins><em>preventing apps from
+ cheating? There is no systematic way for Google, or Android
users,</em></ins></span>
+ to <span class="removed"><del><strong>a
+ data broker, the data broker would have been able</strong></del></span>
<span class="inserted"><ins><em>inspect executable proprietary
apps</em></ins></span> to <span class="removed"><del><strong>figure out
+ who</strong></del></span> <span class="inserted"><ins><em>see what they
do.</p>
+
+ <p>Google could demand</em></ins></span> the <span
class="removed"><del><strong>user was.</p>
+
+ <p>Following this lawsuit,
+ <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></strong></del></span>
<span class="inserted"><ins><em>source code for these apps, and
study</em></ins></span>
+ the <span class="removed"><del><strong>company has been
ordered</strong></del></span> <span class="inserted"><ins><em>source code
somehow</em></ins></span> to <span
class="removed"><del><strong>pay</strong></del></span> <span
class="inserted"><ins><em>determine whether they mistreat users in
+ various ways. If it did</em></ins></span> a <span
class="removed"><del><strong>total</strong></del></span> <span
class="inserted"><ins><em>good job</em></ins></span> of <span
class="removed"><del><strong>C$4m</a>
+ to its customers.</p>
+ </li>
- <p>The FTC criticized this app because it asked the
user</strong></del></span> <span class="inserted"><ins><em>Google, or Android
users,</em></ins></span>
- to
- <span class="removed"><del><strong>approve sending personal
data</strong></del></span> <span class="inserted"><ins><em>inspect executable
proprietary apps</em></ins></span> to <span class="inserted"><ins><em>see what
they do.</p>
-
- <p>Google could demand</em></ins></span> the <span
class="removed"><del><strong>app developer but</strong></del></span> <span
class="inserted"><ins><em>source code for these apps, and study
- the source code somehow to determine whether they mistreat users in
- various ways. If it</em></ins></span> did <span
class="removed"><del><strong>not
- ask about sending</strong></del></span> <span
class="inserted"><ins><em>a good job of this,</em></ins></span> it <span
class="removed"><del><strong>to other companies. This
shows</strong></del></span> <span class="inserted"><ins><em>could more or less
+ <li><p> “CloudPets” toys with microphones
+ <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to</strong></del></span> <span
class="inserted"><ins><em>this, it could more or less
prevent such snooping, except when</em></ins></span> the
- <span class="removed"><del><strong>weakness of</strong></del></span>
<span class="inserted"><ins><em>app developers are clever
- enough to outsmart</em></ins></span> the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
- “solution”</strong></del></span> <span
class="inserted"><ins><em>checking.</p>
+ <span class="removed"><del><strong>manufacturer</a>. Guess what?
+ <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a way</strong></del></span> <span class="inserted"><ins><em>app
developers are clever
+ enough</em></ins></span> to <span class="removed"><del><strong>access the
data</a>
+ collected by the manufacturer's snooping.</p>
+
+ <p>That the manufacturer and</strong></del></span> <span
class="inserted"><ins><em>outsmart</em></ins></span> the <span
class="removed"><del><strong>FBI could listen</strong></del></span> <span
class="inserted"><ins><em>checking.</p>
<p>But since Google itself develops malicious apps, we cannot trust
- Google</em></ins></span> to <span
class="removed"><del><strong>surveillance: why should a flashlight
- app send any information</strong></del></span> <span
class="inserted"><ins><em>protect us. We must demand release of source
code</em></ins></span> to <span class="removed"><del><strong>anyone? A free
software flashlight
- app would not.</p></strong></del></span> <span
class="inserted"><ins><em>the
- public, so we can depend on each other.</p></em></ins></span>
+ Google</em></ins></span> to <span class="removed"><del><strong>these
conversations
+ was unacceptable by itself.</p></li>
+
+ <li><p>Barbie
+ <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span> <span class="inserted"><ins><em>protect us. We
must demand release of source code</em></ins></span> to <span
class="removed"><del><strong>spy</strong></del></span> <span
class="inserted"><ins><em>the
+ public, so we can depend</em></ins></span> on <span
class="removed"><del><strong>children and
adults</a>.</p></strong></del></span> <span
class="inserted"><ins><em>each other.</p></em></ins></span>
</li>
<span class="removed"><del><strong></ul>
-<div class="big-subsection">
- <h4 id="SpywareInGames">Spyware in Games</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
-</div>
-
-<ul>
- <li><p>nVidia's proprietary GeForce
Experience</strong></del></span>
+<!-- #SpywareAtLowLevel -->
+<!-- WEBMASTERS:</strong></del></span>
<span class="inserted"><ins><em><li id="M201705230">
- <p>Apps for BART</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes</strong></del></span>
- <span
class="inserted"><ins><em>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
+ <p>Apps for BART <a
+
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
- <p>With free software apps,</em></ins></span> users <span
class="removed"><del><strong>identify themselves and then sends personal data
about them to
- nVidia servers</a>.</p></strong></del></span> <span
class="inserted"><ins><em>could <em>make sure</em> that they
+ <p>With free software apps, users could <em>make
sure</em> that they
don't snoop.</p>
- <p>With proprietary apps, one can only hope that they
don't.</p></em></ins></span>
+ <p>With proprietary apps, one can only hope that they
don't.</p>
</li>
- <span class="removed"><del><strong><li><p>Angry
Birds</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201705040">
- <p>A study found 234 Android apps that track users
by</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies, and the NSA takes advantage</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening</em></ins></span>
- to <span class="removed"><del><strong>spy through it too</a>.
- Here's information on
- <a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
- more spyware apps</a>.</p>
- <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA app spying</a>.</p>
- </li>
-</ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInToys">Spyware</strong></del></span> <span
class="inserted"><ins><em>ultrasound from beacons placed</em></ins></span> in
<span class="removed"><del><strong>Toys</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
-</div>
-
-<ul>
- <li>
- <p>The “smart” toys My Friend Cayla and i-Que transmit
- <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</strong></del></span> <span class="inserted"><ins><em>stores or
played by TV
+ <li id="M201705040">
+ <p>A study found 234 Android apps that track users by <a
+
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
+ to ultrasound from beacons placed in stores or played by TV
programs</a>.</p>
</li>
<li id="M201704260">
- <p>Faceapp appears</em></ins></span> to <span
class="removed"><del><strong>Nuance Communications</a>,
- a speech recognition company based in the U.S.</p>
-
- <p>Those toys also contain major security vulnerabilities; crackers
- can remotely control the toys with a mobile phone. This would
- enable crackers</strong></del></span> <span class="inserted"><ins><em>do
lots of surveillance, judging by <a
+ <p>Faceapp appears to do lots of surveillance, judging by <a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands</em></ins></span> to <span
class="removed"><del><strong>listen</strong></del></span> <span
class="inserted"><ins><em>personal data</em></ins></span> in <span
class="removed"><del><strong>on a child's speech, and even speak
- into</strong></del></span> the <span class="removed"><del><strong>toys
themselves.</p></strong></del></span> <span
class="inserted"><ins><em>device</a>.</p></em></ins></span>
+ how much access it demands to personal data in the
device</a>.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>A computerized vibrator</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201704190">
- <p>Users are suing Bose for</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
- distributing a spyware app for</em></ins></span> its <span
class="removed"><del><strong>users through</strong></del></span> <span
class="inserted"><ins><em>headphones</a>. Specifically,</em></ins></span>
- the <span class="removed"><del><strong>proprietary control
app</a>.</p>
-
- <p>The</strong></del></span> app <span
class="removed"><del><strong>was reporting</strong></del></span> <span
class="inserted"><ins><em>would record</em></ins></span> the <span
class="removed"><del><strong>temperature</strong></del></span> <span
class="inserted"><ins><em>names</em></ins></span> of the <span
class="removed"><del><strong>vibrator minute by
- minute (thus, indirectly, whether it was surrounded by a person's
- body), as well as the vibration frequency.</p>
-
- <p>Note the totally inadequate proposed response: a labeling
- standard with which manufacturers would make statements about
- their products, rather than free software which</strong></del></span>
<span class="inserted"><ins><em>audio files</em></ins></span> users <span
class="removed"><del><strong>could have
- checked and changed.</p>
-
- <p>The company that made</strong></del></span> <span
class="inserted"><ins><em>listen to
- along with</em></ins></span> the <span
class="removed"><del><strong>vibrator
- <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots of personal information about how
- people used it</a>.</p></strong></del></span> <span
class="inserted"><ins><em>headphone's unique serial
number.</p></em></ins></span>
-
- <p>The <span class="removed"><del><strong>company's
statement</strong></del></span> <span class="inserted"><ins><em>suit
accuses</em></ins></span> that <span
class="removed"><del><strong>it</strong></del></span> <span
class="inserted"><ins><em>this</em></ins></span> was <span
class="removed"><del><strong>anonymizing</strong></del></span> <span
class="inserted"><ins><em>done without</em></ins></span> the <span
class="removed"><del><strong>data may be
- true, but it doesn't really matter.</strong></del></span> <span
class="inserted"><ins><em>users' consent.</em></ins></span>
- If <span class="removed"><del><strong>it had sold</strong></del></span>
the <span class="removed"><del><strong>data to a
- data broker,</strong></del></span> <span class="inserted"><ins><em>fine
print of</em></ins></span> the <span class="removed"><del><strong>data broker
would have been able to figure</strong></del></span> <span
class="inserted"><ins><em>app said that users gave consent for this,
- would that make it acceptable? No way! It should be flat</em></ins></span>
out
- <span class="removed"><del><strong>who the user was.</p>
-
- <p>Following this lawsuit,</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html">
illegal to design</em></ins></span>
- the <span class="removed"><del><strong>company has been
ordered</strong></del></span> <span
class="inserted"><ins><em>app</em></ins></span> to <span
class="removed"><del><strong>pay a total</strong></del></span> <span
class="inserted"><ins><em>snoop at all</a>.</p>
+ <li id="M201704190">
+ <p>Users are suing Bose for <a
+
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
+ distributing a spyware app for its headphones</a>. Specifically,
+ the app would record the names of the audio files users listen to
+ along with the headphone's unique serial number.</p>
+
+ <p>The suit accuses that this was done without the users' consent.
+ If the fine print of the app said that users gave consent for this,
+ would that</em></ins></span> make <span
class="removed"><del><strong>sure</strong></del></span> <span
class="inserted"><ins><em>it acceptable? No way! It should be flat out <a
+ href="/philosophy/surveillance-vs-democracy.html">
illegal</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>design
+ the app to snoop at all</a>.</p>
</li>
<li id="M201704074">
- <p>Pairs</em></ins></span> of <span
class="removed"><del><strong>C$4m</a></strong></del></span> <span
class="inserted"><ins><em>Android apps can collude</em></ins></span>
- to <span class="removed"><del><strong>its customers.</p>
- </li>
-
- <li><p> “CloudPets” toys with microphones
- <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations</strong></del></span> <span
class="inserted"><ins><em>transmit users' personal data</em></ins></span> to
<span class="removed"><del><strong>the
- manufacturer</a>. Guess what?</strong></del></span> <span
class="inserted"><ins><em>servers.</em></ins></span> <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
- study</em></ins></span> found <span class="removed"><del><strong>a way to
access the data</a>
- collected by</strong></del></span> <span class="inserted"><ins><em>tens
of thousands of pairs that collude</a>.</p>
+ <p>Pairs of Android apps can collude
+ to transmit users' personal data to servers. <a
+
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
+ study found tens of thousands of pairs that collude</a>.</p>
</li>
<li id="M201703300">
<p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
announced an opt-in proprietary search app that it will</a>
pre-install
- on some of its phones. The app will give Verizon</em></ins></span> the
<span class="removed"><del><strong>manufacturer's snooping.</p>
-
- <p>That</strong></del></span> <span class="inserted"><ins><em>same
information
- about</em></ins></span> the <span
class="removed"><del><strong>manufacturer and</strong></del></span> <span
class="inserted"><ins><em>users' searches that Google normally gets when they
use
+ on some of its phones. The app will give Verizon the same information
+ about the users' searches that Google normally gets when they use
its search engine.</p>
- <p>Currently,</em></ins></span> the <span
class="removed"><del><strong>FBI could listen to these conversations
- was unacceptable by itself.</p></li>
-
- <li><p>Barbie</strong></del></span> <span
class="inserted"><ins><em>app is</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed</em></ins></span> on <span
class="removed"><del><strong>children</strong></del></span> <span
class="inserted"><ins><em>only one phone</a>,</em></ins></span> and <span
class="removed"><del><strong>adults</a>.</p></strong></del></span>
<span class="inserted"><ins><em>the user must
+ <p>Currently, the app is <a
+
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed on only one phone</a>, and the user must
explicitly opt-in before the app takes effect. However, the app
remains spyware—an “optional” piece of spyware is
- still spyware.</p></em></ins></span>
+ still spyware.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201701210">
+ <li id="M201701210">
<p>The Meitu photo-editing app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data</em></ins></span> to <span class="removed"><del><strong>place
new items on top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
-</div>
-
-<ul>
-<li><p></strong></del></span> <span class="inserted"><ins><em>a
Chinese company</a>.</p>
+ user data to a Chinese company</a>.</p>
</li>
<li id="M201611280">
- <p>The Uber app tracks</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware</strong></del></span>
- <span
class="inserted"><ins><em>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before</em></ins></span> and <span
class="removed"><del><strong>spyware via BIOS</a> on Windows installs.
-Note that</strong></del></span> <span
class="inserted"><ins><em>after</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also, a “clean” Windows</strong></del></span> <span
class="inserted"><ins><em>ride</a>.</p>
+ <p>The Uber app tracks <a
+
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before and after the ride</a>.</p>
<p>This example illustrates how “getting the user's
consent” for surveillance is inadequate as a protection against
@@ -1709,21 +1693,21 @@
<p>Blizzard Warden is a hidden
“cheating-prevention” program that <a
href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
- spies on every process running on a gamer's computer and sniffs a
+ spies</em></ins></span> on <span class="removed"><del><strong>top under
each subsection --></strong></del></span> <span
class="inserted"><ins><em>every process running on a gamer's computer and
sniffs a
good deal of personal data</a>, including lots of activities which
have nothing to do with cheating.</p>
</li>
-</ul>
+</ul></em></ins></span>
<div class="big-section">
- <h3 id="SpywareInEquipment">Spyware in Connected Equipment</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareInEquipment">#SpywareInEquipment</a>)</span>
+ <h3 <span class="removed"><del><strong>id="SpywareAtLowLevel">Spyware
at Low Level</h3></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInEquipment">Spyware in Connected
Equipment</h3></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInEquipment">#SpywareInEquipment</a>)</span></em></ins></span>
</div>
<div style="clear: left;"></div>
-<ul class="blurbs">
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201708280">
<p>The bad security in many Internet of Stings devices allows <a
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
@@ -1734,31 +1718,33 @@
<p>It is unfortunate that the article uses the term <a
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
</li>
-</ul>
+</ul></em></ins></span>
<div class="big-subsection">
- <h4 id="SpywareInTVSets">TV Sets</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInBIOS">Spyware in
BIOS</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInTVSets">TV
Sets</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInBIOS">#SpywareInBIOS</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></em></ins></span>
</div>
-<p>Emo Phillips made a joke: The other day a woman came up to me and
+<span class="removed"><del><strong><ul>
+<li><p></strong></del></span>
+
+<span class="inserted"><ins><em><p>Emo Phillips made a joke: The other
day a woman came up to me and
said, “Didn't I see you on television?” I said, “I
don't know. You can't see out the other way.” Evidently that was
before Amazon “smart” TVs.</p>
<ul class="blurbs">
<li id="M201804010">
- <p>Some “Smart” TVs automatically <a
-
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
- load downgrades that</em></ins></span> install <span
class="inserted"><ins><em>a surveillance app</a>.</p>
-
- <p>We link to the article for the facts it presents.
It</em></ins></span>
- is <span class="removed"><del><strong>not really
-clean since</strong></del></span> <span class="inserted"><ins><em>too bad that
the article finishes by advocating the
- moral weakness of surrendering to Netflix. The Netflix
app</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
-puts</strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
+ <p>Some “Smart” TVs automatically</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
+ load downgrades that install a surveillance app</a>.</p>
+
+ <p>We link to the article for the facts it presents. It
+ is too bad that the article finishes by advocating the
+ moral weakness of surrendering to Netflix. The Netflix app <a
+ href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
malware too</a>.</p>
</li>
@@ -1775,21 +1761,25 @@
<li id="M201511130">
<p>Some web and TV advertisements play inaudible
sounds to be picked up by proprietary malware running
- on other devices</em></ins></span> in <span
class="removed"><del><strong>its own malware</a>.
-</p></li>
-</ul>
-
-<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>range so as</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>determine that they
+ on other devices in range so as to determine that they
are nearby. Once your Internet devices are paired with
- your TV, advertisers can correlate ads with Web activity, and other <a
-
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
+ your TV, advertisers can correlate ads with Web
activity,</em></ins></span> and <span class="removed"><del><strong>spyware via
BIOS</a> on Windows installs.
+Note that the specific sabotage method Lenovo used did not affect
+GNU/Linux; also, a “clean” Windows install is not really
+clean since</strong></del></span> <span
class="inserted"><ins><em>other</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
+puts</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
cross-device tracking</a>.</p>
</li>
<li id="M201511060">
<p>Vizio goes a step further than other TV
- manufacturers in spying</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
+ manufacturers</em></ins></span> in <span class="removed"><del><strong>its
own malware</a>.
+</p></li>
+</ul>
+
+<!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure to place new items</strong></del></span> <span
class="inserted"><ins><em>spying</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
<div class="big-section">
<h3 id="SpywareAtWork">Spyware at Work</h3>
@@ -2780,7 +2770,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/17 10:01:36 $
+$Date: 2018/10/24 19:28:44 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.248
retrieving revision 1.249
diff -u -b -r1.248 -r1.249
--- proprietary-surveillance.it.po 7 Oct 2018 22:29:14 -0000 1.248
+++ proprietary-surveillance.it.po 24 Oct 2018 19:28:44 -0000 1.249
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-07 22:26+0000\n"
+"POT-Creation-Date: 2018-10-24 19:25+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -35,12 +35,27 @@
"malware proprietario</a>"
#. type: Content of: <div><p>
+# | Nonfree (proprietary) software is very often malware (designed to mistreat
+# | the user). Nonfree software is controlled by its developers, which puts
+# | them in a position of power over the users; <a
+# | href=\"/philosophy/free-software-even-more-important.html\">that is the
+# | basic injustice</a>. The developers {+and manufacturers+} often exercise
+# | that power to the detriment of the users they ought to serve.
+#, fuzzy
+#| msgid ""
+#| "Nonfree (proprietary) software is very often malware (designed to "
+#| "mistreat the user). Nonfree software is controlled by its developers, "
+#| "which puts them in a position of power over the users; <a href=\"/"
+#| "philosophy/free-software-even-more-important.html\">that is the basic "
+#| "injustice</a>. The developers often exercise that power to the detriment "
+#| "of the users they ought to serve."
msgid ""
"Nonfree (proprietary) software is very often malware (designed to mistreat "
"the user). Nonfree software is controlled by its developers, which puts them "
"in a position of power over the users; <a href=\"/philosophy/free-software-"
"even-more-important.html\">that is the basic injustice</a>. The developers "
-"often exercise that power to the detriment of the users they ought to serve."
+"and manufacturers often exercise that power to the detriment of the users "
+"they ought to serve."
msgstr ""
"Il software non libero (proprietario) è molto spesso malware, progettato per
"
"danneggiare gli utenti. Il software non libero è controllato dai suoi "
@@ -52,18 +67,19 @@
#. type: Content of: <div><p>
msgid ""
-"This document attempts to track <strong>clearly established cases of "
-"proprietary software that spies on or tracks users</strong>."
+"One common form of mistreatment is to snoop on the user. This page records "
+"<strong>clearly established cases of proprietary software that spies on or "
+"tracks users</strong>. Manufacturers even refuse to <a href=\"https://"
+"techcrunch.com/2018/10/19/smart-home-devices-hoard-data-government-demands/"
+"\">say whether they snoop on users for the state</a>."
msgstr ""
-"Questo documento prova a tenere traccia di <strong>casi chiaramente "
-"dimostrati di software proprietario che spia o traccia i propri utenti</"
-"strong>."
#. type: Content of: <div><p>
msgid ""
-"The tethered appliances and applications are by nature doing surveillance. "
-"We are not listing them here because they have their own page: <a href=\"/"
-"proprietary/proprietary-tethers.html\">Proprietary Tethers</a>."
+"All appliances and applications that are tethered to a specific server are "
+"snoopers by nature. We do not list them in this page because they have "
+"their own page: <a href=\"/proprietary/proprietary-tethers.html"
+"\">Proprietary Tethers</a>."
msgstr ""
#. type: Content of: <div><div><p>
@@ -71,7 +87,7 @@
"If you know of an example that ought to be in this page but isn't here, "
"please write to <a href=\"mailto:address@hidden"><address@hidden"
"org></a> to inform us. Please include the URL of a trustworthy reference "
-"or two to present the specifics."
+"or two to serve as specific substantiation."
msgstr ""
#. type: Content of: <div><div><a>
@@ -4064,6 +4080,14 @@
msgid "Updated:"
msgstr "Ultimo aggiornamento:"
+#~ msgid ""
+#~ "This document attempts to track <strong>clearly established cases of "
+#~ "proprietary software that spies on or tracks users</strong>."
+#~ msgstr ""
+#~ "Questo documento prova a tenere traccia di <strong>casi chiaramente "
+#~ "dimostrati di software proprietario che spia o traccia i propri utenti</"
+#~ "strong>."
+
#, fuzzy
#~| msgid ""
#~| "<a href=\"/proprietary/proprietary.html\">Other examples of proprietary "
Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.87
retrieving revision 1.88
diff -u -b -r1.87 -r1.88
--- proprietary-surveillance.ja-diff.html 17 Oct 2018 10:01:36 -0000
1.87
+++ proprietary-surveillance.ja-diff.html 24 Oct 2018 19:28:44 -0000
1.88
@@ -48,20 +48,25 @@
mistreat the user). Nonfree software is controlled by its developers,
which puts them in a position of power over the users; <a
href="/philosophy/free-software-even-more-important.html">that is the
-basic injustice</a>. The developers often exercise that power to the
-detriment of the users they ought to serve.</p>
+basic injustice</a>. The developers <span class="inserted"><ins><em>and
manufacturers</em></ins></span> often exercise
+that power to the detriment of the users they ought to serve.</p>
-<span class="removed"><del><strong><div
class="announcement"></strong></del></span>
+<span class="removed"><del><strong><div class="announcement">
+<p>This document attempts</strong></del></span>
-<p>This document attempts to
-track <strong>clearly established cases of proprietary software that
-spies on or tracks users</strong>.</p>
-
-<span class="removed"><del><strong><p><a
href="/proprietary/proprietary.html">
- Other examples</strong></del></span>
-
-<span class="inserted"><ins><em><p>The tethered appliances and
applications are by nature doing
-surveillance. We are not listing them here because they have their own
+<span class="inserted"><ins><em><p>One common form of mistreatment
is</em></ins></span> to
+<span class="removed"><del><strong>track</strong></del></span> <span
class="inserted"><ins><em>snoop on the user. This page
+records</em></ins></span> <strong>clearly established cases of
proprietary software that
+spies on or tracks <span
class="removed"><del><strong>users</strong>.</p>
+
+<p><a href="/proprietary/proprietary.html">
+ Other examples</strong></del></span> <span
class="inserted"><ins><em>users</strong>. Manufacturers even refuse
+to <a
href="https://techcrunch.com/2018/10/19/smart-home-devices-hoard-data-government-demands/">say
+whether they snoop on users for the state</a>.</p>
+
+<p>All appliances and applications that are tethered to a specific
+server are snoopers by nature. We do not list them in this page
+because they have their own
page: <a href="/proprietary/proprietary-tethers.html">Proprietary
Tethers</a>.</p>
@@ -70,7 +75,7 @@
here, please write
to <a href="mailto:address@hidden"><address@hidden></a>
to inform us. Please include the URL of a trustworthy reference or two
-to present the specifics.</p>
+to serve as specific substantiation.</p>
</div></em></ins></span>
</div>
@@ -308,8 +313,7 @@
<p>To use proprietary software is to invite such treatment.</p>
</li>
- <span class="removed"><del><strong><li><p>
- Windows 10</strong></del></span>
+ <span class="removed"><del><strong><li><p></strong></del></span>
<span class="inserted"><ins><em><li id="M201508180">
<p><a
@@ -320,8 +324,8 @@
<li id="M201508130">
<p><a
-
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/">
- Windows 10 sends identifiable information to Microsoft</a>, even if
+
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/"></em></ins></span>
+ Windows 10 <span class="inserted"><ins><em>sends identifiable information
to Microsoft</a>, even if
a user turns off its Bing search and Cortana features, and activates
the privacy-protection settings.</p>
</li>
@@ -572,22 +576,21 @@
<p>The natural extension</em></ins></span> of <span
class="removed"><del><strong>personal data</strong></del></span> <span
class="inserted"><ins><em>monitoring
people through “their” phones is <a
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
- proprietary software</em></ins></span> to <span
class="removed"><del><strong>Apple's servers</a>. Big
Brother</strong></del></span> <span class="inserted"><ins><em>make sure they
can't “fool”
- the monitoring</a>.</p>
+ proprietary software</em></ins></span> to <span
class="removed"><del><strong>Apple's servers</a>. Big Brother can
+ get them from there.</p></strong></del></span> <span
class="inserted"><ins><em>make sure they can't “fool”
+ the monitoring</a>.</p></em></ins></span>
</li>
- <li id="M201510050">
- <p>According to Edward Snowden, <a
- href="http://www.bbc.com/news/uk-34444233">agencies</em></ins></span>
can
- <span class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>take over
- smartphones</a> by sending hidden text messages which
enable</em></ins></span>
- them <span class="removed"><del><strong>from there.</p>
- </li>
-
- <li><p>The iMessage app</strong></del></span> <span
class="inserted"><ins><em>to turn the phones</em></ins></span> on <span
class="removed"><del><strong>iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every phone number that</strong></del></span> <span
class="inserted"><ins><em>and off, listen to</em></ins></span> the <span
class="removed"><del><strong>user types into
it</a>;</strong></del></span> <span class="inserted"><ins><em>microphone,
- retrieve geo-location data from</em></ins></span> the <span
class="removed"><del><strong>server records these numbers for at least 30
- days.</p></strong></del></span> <span
class="inserted"><ins><em>GPS, take photographs, read
+ <span class="removed"><del><strong><li><p>The iMessage app on
iThings</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201510050">
+ <p>According to Edward Snowden,</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every phone number that the user types into it</a>; the
server records these numbers for at least 30
+ days.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.bbc.com/news/uk-34444233">agencies
can take over
+ smartphones</a> by sending hidden text messages which enable
+ them to turn the phones on and off, listen to the microphone,
+ retrieve geo-location data from the GPS, take photographs, read
text messages, read call, location and web browsing history, and
read the contact list. This malware is designed to disguise itself
from investigation.</p>
@@ -687,43 +690,28 @@
</p></li>
<li><p>Spyware in iThings:
- the <a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly where the iThing is,
- and get other info too.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p></em></ins></span>
+ the</strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>There is also a
feature</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201409220">
- <p>Apple can, and regularly does, <a
-
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones</em></ins></span> for <span
class="removed"><del><strong>web sites to track users, which
is</strong></del></span> <span class="inserted"><ins><em>the
state</a>.</p>
+ <li id="M201409220">
+ <p>Apple can, and regularly does,</em></ins></span> <a <span
class="removed"><del><strong>href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ iBeacon</a> lets stores determine exactly
where</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones for the state</a>.</p>
- <p>This may have improved with</em></ins></span> <a <span
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled by default</a>. (That article talks
about</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"></em></ins></span>
- iOS <span class="removed"><del><strong>6,</strong></del></span> <span
class="inserted"><ins><em>8 security improvements</a>;</em></ins></span>
but <span class="removed"><del><strong>it
- is still true in iOS 7.)</p>
- </li>
-
- <li><p>The iThing also</strong></del></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells</strong></del></span>
- <span
class="inserted"><ins><em>href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
- not as much as</em></ins></span> Apple <span
class="removed"><del><strong>its geolocation</a> by default, though that
can be
- turned off.</p></strong></del></span> <span
class="inserted"><ins><em>claims</a>.</p></em></ins></span>
+ <p>This may have improved with <a
+
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
+ iOS 8 security improvements</a>; but <a
+ href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
+ not as much as Apple claims</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Apple can, and
regularly does,
- <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201407230">
+ <li id="M201407230">
<p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem to exist</em></ins></span>
- for <span class="inserted"><ins><em>no possible purpose other than
surveillance</a>. Here is</em></ins></span> the <span
class="removed"><del><strong>state</a>.</p></strong></del></span>
<span class="inserted"><ins><em><a
+ Several “features” of iOS seem to exist
+ for no possible purpose other than surveillance</a>. Here is the
<a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
Technical presentation</a>.</p>
</li>
@@ -731,23 +719,20 @@
<li id="M201401100">
<p>The <a class="not-a-duplicate"
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly where the iThing is, and
- get other info too.</p></em></ins></span>
+ iBeacon</a> lets stores determine exactly where</em></ins></span>
the iThing is, and
+ get other info too.</p>
</li>
- <span
class="removed"><del><strong><li><p><a</strong></del></span>
+ <span
class="removed"><del><strong><li><p>There</strong></del></span>
<span class="inserted"><ins><em><li id="M201312300">
- <p><a</em></ins></span>
+ <p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
Either Apple helps the NSA snoop on all the data in an iThing, or it
- is totally <span
class="removed"><del><strong>incompetent.</a></p></strong></del></span>
<span
class="inserted"><ins><em>incompetent</a>.</p></em></ins></span>
+ is totally incompetent</a>.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem to exist</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201308080">
+ <li id="M201308080">
<p>The iThing also <a
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
tells Apple its geolocation</a> by default, though that can be
@@ -755,20 +740,41 @@
</li>
<li id="M201210170">
- <p>There is also a feature</em></ins></span> for <span
class="removed"><del><strong>no
- possible purpose other than surveillance</a>.
Here</strong></del></span> <span class="inserted"><ins><em>web sites to track
users, which</em></ins></span> is <span
class="removed"><del><strong>the</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ <p>There</em></ins></span> is also a feature for web sites to track
users, which is <a
+
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
enabled by default</a>. (That article talks about iOS 6, but it is
still true in iOS 7.)</p>
</li>
- <li id="M201204280">
- <p>Users cannot make an Apple ID (<a
+ <span class="removed"><del><strong><li><p>The iThing also
+ <a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201204280">
+ <p>Users cannot make an</em></ins></span> Apple <span
class="removed"><del><strong>its geolocation</a> by default, though that
can be
+ turned off.</p>
+ </li>
+
+ <li><p>Apple can,</strong></del></span> <span
class="inserted"><ins><em>ID (<a
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">necessary
to install even gratis apps</a>) without giving a valid
- email address and receiving the verification code Apple sends
- to it.</p></em></ins></span>
+ email address</em></ins></span> and <span
class="removed"><del><strong>regularly does,
+ <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones for</strong></del></span> <span
class="inserted"><ins><em>receiving</em></ins></span> the <span
class="removed"><del><strong>state</a>.</p>
+ </li>
+
+ <li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
+ Either</strong></del></span> <span
class="inserted"><ins><em>verification code</em></ins></span> Apple <span
class="removed"><del><strong>helps the NSA snoop on all the data in an iThing,
+ or it is totally incompetent.</a></p>
+ </li>
+
+ <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features” of iOS seem</strong></del></span> <span
class="inserted"><ins><em>sends</em></ins></span>
+ to <span class="removed"><del><strong>exist for no
+ possible purpose other than surveillance</a>. Here is the
+ <a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p></strong></del></span> <span
class="inserted"><ins><em>it.</p></em></ins></span>
</li>
</ul>
@@ -978,31 +984,29 @@
the <span class="removed"><del><strong>picture you take according to who
is in</strong></del></span> <span class="inserted"><ins><em>user's
movements and listens through</em></ins></span> the <span
class="removed"><del><strong>frame.</p></strong></del></span> <span
class="inserted"><ins><em>microphone</a>.</p></em></ins></span>
- <p>This <span class="removed"><del><strong>spyware feature seems to
require online access</strong></del></span> <span
class="inserted"><ins><em>makes them act as spies for licensing
enforcement.</p>
+ <p>This <span class="removed"><del><strong>spyware feature seems to
require online access to some
+ known-faces database, which means the pictures are
likely</strong></del></span> <span class="inserted"><ins><em>makes them act as
spies for licensing enforcement.</p>
- <p>I expect it implements DRM, too—that there is no
way</em></ins></span> to <span class="removed"><del><strong>some
- known-faces database, which means</strong></del></span> <span
class="inserted"><ins><em>save
- a recording. But I can't be sure from</em></ins></span> the <span
class="removed"><del><strong>pictures are likely</strong></del></span> <span
class="inserted"><ins><em>article.</p>
+ <p>I expect it implements DRM, too—that there is no
way</em></ins></span> to <span class="inserted"><ins><em>save
+ a recording. But I can't</em></ins></span> be
+ <span class="removed"><del><strong>sent across</strong></del></span>
<span class="inserted"><ins><em>sure from</em></ins></span> the <span
class="removed"><del><strong>wire to Facebook's servers and face-recognition
+ algorithms.</p></strong></del></span> <span
class="inserted"><ins><em>article.</p></em></ins></span>
- <p>If you learn</em></ins></span> to <span
class="removed"><del><strong>be
- sent across</strong></del></span> <span class="inserted"><ins><em>care
much less about sports, you will benefit in
+ <p>If <span class="removed"><del><strong>so,
none</strong></del></span> <span class="inserted"><ins><em>you learn to care
much less about sports, you will benefit in
many ways. This is one more.</p>
</li>
<li id="M201804160">
<p>More than <a
-
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
- of</em></ins></span> the <span
class="removed"><del><strong>wire</strong></del></span> <span
class="inserted"><ins><em>5,855 Android apps studied by researchers were
found</em></ins></span> to <span class="removed"><del><strong>Facebook's
servers</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span>
- and <span class="removed"><del><strong>face-recognition
- algorithms.</p>
-
- <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>collect information about its users</a>.
40%</em></ins></span> of <span class="removed"><del><strong>Facebook users'
pictures are private
- anymore, even if</strong></del></span> the <span
class="removed"><del><strong>user didn't “upload”
them</strong></del></span> <span class="inserted"><ins><em>apps were
- found</em></ins></span> to <span class="removed"><del><strong>the
service.</p>
+
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%</em></ins></span>
+ of <span class="removed"><del><strong>Facebook users' pictures are private
+ anymore, even if</strong></del></span> the <span
class="removed"><del><strong>user didn't “upload”
them</strong></del></span> <span class="inserted"><ins><em>5,855 Android apps
studied by researchers were found</em></ins></span> to <span
class="inserted"><ins><em>snoop
+ and collect information about its users</a>. 40%
of</em></ins></span> the <span class="removed"><del><strong>service.</p>
</li>
<li><p>Like most “music screaming” disservices,
Spotify
- is based</strong></del></span> <span
class="inserted"><ins><em>insecurely snitch</em></ins></span> on <span
class="inserted"><ins><em>its users. Furthermore, they could
+ is based</strong></del></span> <span class="inserted"><ins><em>apps were
+ found to insecurely snitch</em></ins></span> on <span
class="inserted"><ins><em>its users. Furthermore, they could
detect only some methods of snooping, in these</em></ins></span>
proprietary <span class="removed"><del><strong>malware
(DRM</strong></del></span> <span class="inserted"><ins><em>apps whose
source code they cannot look at. The other apps might be snooping
in other ways.</p>
@@ -1060,10 +1064,11 @@
<span class="removed"><del><strong><li><p>The Brightest
Flashlight</strong></del></span>
<span class="inserted"><ins><em><li id="M201803050">
- <p>The moviepass</em></ins></span> app <span
class="inserted"><ins><em>and dis-service
- spy on users even more than users expected. It</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use</strong></del></span>
- <span
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
+ <p>The moviepass</em></ins></span> app
+ <span class="removed"><del><strong><a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use</strong></del></span>
<span class="inserted"><ins><em>and dis-service
+ spy on users even more than users expected. It <a
+
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
where they travel before and after going to a movie</a>.</p>
<p>Don't be tracked—pay cash!</p>
@@ -1149,8 +1154,7 @@
<ul>
- <li><p>A company that makes internet-controlled vibrators <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is
- being sued</strong></del></span> <span
class="inserted"><ins><em>developers are clever
+ <li><p>A company</strong></del></span> <span
class="inserted"><ins><em>developers are clever
enough to outsmart the checking.</p>
<p>But since Google itself develops malicious apps, we cannot trust
@@ -1159,19 +1163,20 @@
</li>
<li id="M201705230">
- <p>Apps</em></ins></span> for <span
class="removed"><del><strong>collecting</strong></del></span> <span
class="inserted"><ins><em>BART <a
+ <p>Apps for BART <a
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
- <p>With free software apps, users could <em>make
sure</em> that they
+ <p>With free software apps, users could <em>make
sure</em></em></ins></span> that <span class="removed"><del><strong>makes
internet-controlled vibrators</strong></del></span> <span
class="inserted"><ins><em>they
don't snoop.</p>
<p>With proprietary apps, one can only hope that they
don't.</p>
</li>
<li id="M201705040">
- <p>A study found 234 Android apps that track users by <a
-
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
+ <p>A study found 234 Android apps that track users
by</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is
+ being sued for collecting</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
to ultrasound from beacons placed in stores or played by TV
programs</a>.</p>
</li>
@@ -1370,19 +1375,9 @@
283 Android VPN apps concluded that “in spite of</em></ins></span>
the <span class="removed"><del><strong>e-reader used</strong></del></span>
<span class="inserted"><ins><em>promises
for privacy, security, and anonymity given</em></ins></span> by <span
class="removed"><del><strong>most US libraries,
<a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots</strong></del></span> <span class="inserted"><ins><em>the
majority</em></ins></span> of <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>VPN
- apps—millions of users may be unawarely subject</em></ins></span> to
<span class="removed"><del><strong>Adobe</a>. Adobe's
“excuse”: it's
- needed</strong></del></span> <span class="inserted"><ins><em>poor
security
- guarantees and abusive practices inflicted by VPN apps.”</p>
-
- <p>Following is a non-exhaustive list, taken from the research paper,
- of some proprietary VPN apps that track users and infringe their
- privacy:</p>
-
- <dl class="compact">
- <dt>SurfEasy</dt>
- <dd>Includes tracking libraries such as NativeX and Appflood,
- meant</em></ins></span> to <span class="removed"><del><strong>check
DRM!</p>
+ send lots</strong></del></span> <span class="inserted"><ins><em>the
majority</em></ins></span> of <span class="removed"><del><strong>data to
Adobe</a>. Adobe's “excuse”: it's
+ needed</strong></del></span> <span class="inserted"><ins><em>VPN
+ apps—millions of users may be unawarely subject</em></ins></span> to
<span class="removed"><del><strong>check DRM!</p>
</li>
</ul>
@@ -1397,71 +1392,83 @@
snooping devices</a>.</p>
</li>
- <li><p>The Nissan Leaf</strong></del></span> <span
class="inserted"><ins><em>track users and show them targeted ads.</dd>
+ <li><p>The Nissan Leaf has</strong></del></span> <span
class="inserted"><ins><em>poor security
+ guarantees and abusive practices inflicted by VPN apps.”</p>
- <dt>sFly Network Booster</dt>
- <dd>Requests the <code>READ_SMS</code> and
<code>SEND_SMS</code>
- permissions upon installation, meaning it</em></ins></span> has <span
class="removed"><del><strong>a built-in cell phone modem which allows
+ <p>Following is</em></ins></span> a <span
class="removed"><del><strong>built-in cell phone modem which allows
effectively
- anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to</strong></del></span>
<span class="inserted"><ins><em>full</em></ins></span> access <span
class="removed"><del><strong>its computers remotely and make changes in various
+ anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access its computers remotely</strong></del></span> <span
class="inserted"><ins><em>non-exhaustive list, taken from the research paper,
+ of some proprietary VPN apps that track users</em></ins></span> and <span
class="removed"><del><strong>make changes in various
settings</a>.</p>
- <p>That's easy</strong></del></span> to <span
class="removed"><del><strong>do because</strong></del></span> <span
class="inserted"><ins><em>users'
+ <p>That's easy</strong></del></span> <span
class="inserted"><ins><em>infringe their
+ privacy:</p>
+
+ <dl class="compact">
+ <dt>SurfEasy</dt>
+ <dd>Includes tracking libraries such as NativeX and Appflood,
+ meant</em></ins></span> to <span class="removed"><del><strong>do because
the system has no authentication when
+ accessed through the modem. However, even if</strong></del></span> <span
class="inserted"><ins><em>track users and show them targeted ads.</dd>
+
+ <dt>sFly Network Booster</dt>
+ <dd>Requests the <code>READ_SMS</code> and
<code>SEND_SMS</code>
+ permissions upon installation, meaning</em></ins></span> it <span
class="removed"><del><strong>asked for
+ authentication, you couldn't be confident that
Nissan</strong></del></span> has <span class="removed"><del><strong>no
+ access. The software in</strong></del></span> <span
class="inserted"><ins><em>full access to users'
text messages.</dd>
<dt>DroidVPN and TigerVPN</dt>
- <dd>Requests</em></ins></span> the <span
class="inserted"><ins><em><code>READ_LOGS</code> permission to read
logs
- for other apps and also core</em></ins></span> system <span
class="removed"><del><strong>has no authentication when
- accessed through</strong></del></span> <span
class="inserted"><ins><em>logs. TigerVPN developers have
+ <dd>Requests</em></ins></span> the <span
class="removed"><del><strong>car is
+ proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
+ means</strong></del></span> <span
class="inserted"><ins><em><code>READ_LOGS</code> permission to read
logs
+ for other apps and also core system logs. TigerVPN developers have
confirmed this.</dd>
<dt>HideMyAss</dt>
- <dd>Sends traffic to LinkedIn. Also, it stores detailed logs and
- may turn them over to</em></ins></span> the <span
class="removed"><del><strong>modem. However, even</strong></del></span> <span
class="inserted"><ins><em>UK government</em></ins></span> if <span
class="removed"><del><strong>it asked for
- authentication, you couldn't be confident that Nissan has no
- access.</strong></del></span> <span
class="inserted"><ins><em>requested.</dd>
+ <dd>Sends traffic to LinkedIn. Also,</em></ins></span> it <span
class="removed"><del><strong>demands blind faith from its
users</a>.</p>
+
+ <p>Even if no one connects</strong></del></span> <span
class="inserted"><ins><em>stores detailed logs and
+ may turn them over</em></ins></span> to the <span
class="removed"><del><strong>car remotely, the cell phone
+ modem enables</strong></del></span> <span class="inserted"><ins><em>UK
government if requested.</dd>
<dt>VPN Services HotspotShield</dt>
- <dd>Injects JavaScript code into the HTML pages returned to the
- users.</em></ins></span> The <span class="removed"><del><strong>software
in</strong></del></span> <span class="inserted"><ins><em>stated purpose
of</em></ins></span> the <span
class="removed"><del><strong>car</strong></del></span> <span
class="inserted"><ins><em>JS injection</em></ins></span> is
- <span class="removed"><del><strong>proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
- means it demands blind faith from its users</a>.</p>
+ <dd>Injects JavaScript code into</em></ins></span> the <span
class="removed"><del><strong>phone company</strong></del></span> <span
class="inserted"><ins><em>HTML pages returned</em></ins></span> to <span
class="removed"><del><strong>track</strong></del></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span>
+ <span class="inserted"><ins><em>users. The stated purpose
of</em></ins></span> the <span class="removed"><del><strong>time;
it</strong></del></span> <span class="inserted"><ins><em>JS
injection</em></ins></span> is <span
class="removed"><del><strong>possible</strong></del></span> to <span
class="removed"><del><strong>physically remove</strong></del></span> <span
class="inserted"><ins><em>display ads. Uses
+ roughly five tracking libraries. Also, it redirects</em></ins></span>
the <span class="removed"><del><strong>cell phone modem
+ though.</p>
+ </li>
- <p>Even if no one connects</strong></del></span> to <span
class="inserted"><ins><em>display ads. Uses
- roughly five tracking libraries. Also, it redirects</em></ins></span>
the <span class="removed"><del><strong>car remotely,</strong></del></span>
<span class="inserted"><ins><em>user's
+ <li><p>Proprietary software in cars
+ <a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
+ which is made available to car manufacturers, insurance
companies,</strong></del></span> <span class="inserted"><ins><em>user's
traffic through valueclick.com (an advertising website).</dd>
<dt>WiFi Protector VPN</dt>
- <dd>Injects JavaScript code into HTML pages, and also uses roughly
- five tracking libraries. Developers of this app have confirmed
that</em></ins></span>
- the <span class="removed"><del><strong>cell phone
- modem enables</strong></del></span> <span
class="inserted"><ins><em>non-premium version of</em></ins></span> the <span
class="removed"><del><strong>phone company to track</strong></del></span> <span
class="inserted"><ins><em>app does JavaScript injection for
- tracking</em></ins></span> the <span class="removed"><del><strong>car's
movements</strong></del></span> <span class="inserted"><ins><em>user and
displaying ads.</dd>
+ <dd>Injects JavaScript code into HTML pages,</em></ins></span> and
+ <span class="removed"><del><strong>others.</p>
+
+ <p>The case</strong></del></span> <span
class="inserted"><ins><em>also uses roughly
+ five tracking libraries. Developers</em></ins></span> of <span
class="removed"><del><strong>toll-collection systems, mentioned
in</strong></del></span> this <span class="removed"><del><strong>article, is not
+ really a matter of proprietary surveillance. These systems are an
+ intolerable invasion</strong></del></span> <span
class="inserted"><ins><em>app have confirmed that
+ the non-premium version</em></ins></span> of <span
class="removed"><del><strong>privacy,</strong></del></span> <span
class="inserted"><ins><em>the app does JavaScript injection for
+ tracking the user</em></ins></span> and <span
class="removed"><del><strong>should be replaced with anonymous
+ payment systems, but</strong></del></span> <span
class="inserted"><ins><em>displaying ads.</dd>
</dl>
</li>
<li id="M201609210">
<p>Google's new voice messaging app <a
-
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs</em></ins></span>
- all
- <span class="removed"><del><strong>the time; it is possible to physically
remove the cell phone modem
- though.</p></strong></del></span> <span
class="inserted"><ins><em>conversations</a>.</p></em></ins></span>
+
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Proprietary software
in cars</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201606050">
- <p>Facebook's new Magic Photo app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
- which is made available to car manufacturers, insurance companies, and
- others.</p>
-
- <p>The case of toll-collection systems, mentioned in this article,
is not
- really a matter of proprietary surveillance. These systems are an
- intolerable invasion of privacy,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
- scans your mobile phone's photo collections for known
faces</a>,</em></ins></span>
- and <span class="removed"><del><strong>should be replaced with anonymous
- payment systems, but</strong></del></span> <span
class="inserted"><ins><em>suggests you to share</em></ins></span> the <span
class="removed"><del><strong>invasion isn't done by malware. The other
+ <li id="M201606050">
+ <p>Facebook's new Magic Photo app <a
+
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+ scans your mobile phone's photo collections for known faces</a>,
+ and suggests you to share</em></ins></span> the <span
class="removed"><del><strong>invasion isn't done by malware. The other
cases mentioned are done by proprietary malware</strong></del></span>
<span class="inserted"><ins><em>picture you take according to who
is</em></ins></span>
in the <span class="removed"><del><strong>car.</p></li>
@@ -1477,8 +1484,22 @@
algorithms.</p>
<p>If so, none of Facebook users' pictures are private anymore,
- even</em></ins></span> if the <span class="removed"><del><strong>state
orders it</strong></del></span> <span class="inserted"><ins><em>user didn't
“upload” them</em></ins></span> to <span
class="removed"><del><strong>get the data
- and hand it over,</strong></del></span> the <span
class="removed"><del><strong>state can store
it.</p></strong></del></span> <span
class="inserted"><ins><em>service.</p></em></ins></span>
+ even</em></ins></span> if the <span class="removed"><del><strong>state
orders it</strong></del></span> <span class="inserted"><ins><em>user didn't
“upload” them</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> the <span
class="inserted"><ins><em>service.</p>
+ </li>
+
+ <li id="M201605310">
+ <p>Facebook's app listens all the time, <a
+
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
+ snoop on what people are listening to or watching</a>. In addition,
+ it may be analyzing people's conversations to serve them with targeted
+ advertisements.</p>
+ </li>
+
+ <li id="M201604250">
+ <p>A pregnancy test controller application not only can <a
+
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
+ spy on many sorts of</em></ins></span> data <span
class="inserted"><ins><em>in the phone,</em></ins></span> and <span
class="removed"><del><strong>hand</strong></del></span> <span
class="inserted"><ins><em>in server accounts,</em></ins></span>
+ it <span class="removed"><del><strong>over, the
state</strong></del></span> can <span class="removed"><del><strong>store
it.</p></strong></del></span> <span class="inserted"><ins><em>alter them
too</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong></ul>
@@ -1486,10 +1507,10 @@
<!-- #SpywareAtHome -->
<!-- WEBMASTERS: make sure to place new items</strong></del></span>
- <span class="inserted"><ins><em><li id="M201605310">
- <p>Facebook's app listens all the time, <a
-
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
- snoop</em></ins></span> on <span class="removed"><del><strong>top under
each subsection -->
+ <span class="inserted"><ins><em><li id="M201601130">
+ <p>Apps that include <a
+
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
<div class="big-section">
<h3 id="SpywareAtHome">Spyware at Home</h3>
@@ -1499,107 +1520,82 @@
<ul>
<li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed</strong></del></span> <span
class="inserted"><ins><em>what people are listening to or watching</a>.
In addition,
- it may be analyzing people's conversations</em></ins></span> to <span
class="inserted"><ins><em>serve them with targeted
- advertisements.</p>
- </li>
-
- <li id="M201604250">
- <p>A pregnancy test controller application not only can <a
-
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"></em></ins></span>
- spy on <span class="removed"><del><strong>their
renters</a>.</p>
+ Rent-to-own computers were programmed to spy</strong></del></span> <span
class="inserted"><ins><em>what radio and TV programs
+ are playing nearby</a>. Also</em></ins></span> on <span
class="removed"><del><strong>their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>what users post on various sites
+ such as Facebook, Google+ and Twitter.</p></em></ins></span>
</li>
-</ul>
+<span class="removed"><del><strong></ul>
<div class="big-subsection">
- <h4 id="SpywareInTVSets">Spyware</strong></del></span> <span
class="inserted"><ins><em>many sorts of data</em></ins></span> in <span
class="removed"><del><strong>TV Sets</h4>
+ <h4 id="SpywareInTVSets">Spyware in TV Sets</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
</div>
-<p>Emo Phillips made a joke: The other day a woman came up to me and
-said, “Didn't I see you on television?” I said, “I
-don't know. You can't see out</strong></del></span> the <span
class="removed"><del><strong>other way.” Evidently</strong></del></span>
<span class="inserted"><ins><em>phone, and in server accounts,
- it can alter them too</a>.</p>
- </li>
+<p>Emo Phillips made a joke: The other day a woman came
up</strong></del></span>
- <li id="M201601130">
- <p>Apps</em></ins></span> that <span class="removed"><del><strong>was
-before Amazon “smart” TVs.</p>
+ <span class="inserted"><ins><em><li id="M201511190">
+ <p>“Cryptic communication,”
+ unrelated</em></ins></span> to <span class="removed"><del><strong>me and
+said, “Didn't I see you on television?” I said, “I
+don't know. You can't see out</strong></del></span> the <span
class="removed"><del><strong>other way.” Evidently
that</strong></del></span> <span class="inserted"><ins><em>app's
functionality,</em></ins></span> was
+<span class="removed"><del><strong>before Amazon “smart”
TVs.</p>
<ul>
- <li><p>More or less all “smart”
TVs</strong></del></span> <span
class="inserted"><ins><em>include</em></ins></span> <a <span
class="removed"><del><strong>href="
-
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy</strong></del></span>
- <span
class="inserted"><ins><em>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop</em></ins></span> on <span
class="removed"><del><strong>their users</a>.</p>
+ <li><p>More or less all “smart”
TVs</strong></del></span> <a <span class="removed"><del><strong>href="
+
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on their users</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found in the 500 most popular gratis Android
apps</a>.</p></em></ins></span>
- <p>The report was as of 2014, but we don't expect this has got
better.</p>
+ <p>The <span class="removed"><del><strong>report
was</strong></del></span> <span class="inserted"><ins><em>article should not
have described these apps</em></ins></span> as <span
class="removed"><del><strong>of 2014, but we don't expect this has got
better.</p>
<p>This shows that laws requiring products to get users' formal
- consent before collecting personal data are totally inadequate.
- And</strong></del></span> what <span
class="removed"><del><strong>happens if a user declines consent? Probably
the</strong></del></span> <span class="inserted"><ins><em>radio
and</em></ins></span> TV
- <span class="removed"><del><strong>will say, “Without your
consent</strong></del></span> <span class="inserted"><ins><em>programs
- are playing nearby</a>. Also on what users post on various sites
- such as Facebook, Google+ and Twitter.</p>
- </li>
-
- <li id="M201511190">
- <p>“Cryptic communication,”
- unrelated</em></ins></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> the <span
class="removed"><del><strong>TV will</strong></del></span> <span
class="inserted"><ins><em>app's functionality, was <a
-
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in the 500 most popular gratis Android apps</a>.</p>
-
- <p>The article should</em></ins></span> not <span
class="removed"><del><strong>work.”</p>
-
- <p>Proper laws would say that TVs</strong></del></span> <span
class="inserted"><ins><em>have described these apps as
- “free”—they</em></ins></span> are not <span
class="removed"><del><strong>allowed</strong></del></span> <span
class="inserted"><ins><em>free software. The clear way</em></ins></span>
- to <span class="removed"><del><strong>report what</strong></del></span>
<span class="inserted"><ins><em>say “zero price” is
“gratis.”</p>
-
- <p>The article takes for granted that</em></ins></span> the <span
class="removed"><del><strong>user watches —</strong></del></span> <span
class="inserted"><ins><em>usual analytics tools are
- legitimate, but is that valid? Software developers have</em></ins></span>
no <span
class="removed"><del><strong>exceptions!</p></strong></del></span> <span
class="inserted"><ins><em>right to
- analyze what users are doing or how. “Analytics” tools
+ consent before collecting personal data</strong></del></span>
+ <span
class="inserted"><ins><em>“free”—they</em></ins></span> are
<span class="removed"><del><strong>totally inadequate.
+ And what happens if a user declines consent? Probably the TV
+ will say, “Without your consent to tracking, the TV
will</strong></del></span> not <span
class="removed"><del><strong>work.”</p>
+
+ <p>Proper laws would</strong></del></span> <span
class="inserted"><ins><em>free software. The clear way
+ to</em></ins></span> say <span class="inserted"><ins><em>“zero
price” is “gratis.”</p>
+
+ <p>The article takes for granted</em></ins></span> that <span
class="removed"><del><strong>TVs</strong></del></span> <span
class="inserted"><ins><em>the usual analytics tools</em></ins></span> are <span
class="removed"><del><strong>not allowed</strong></del></span>
+ <span class="inserted"><ins><em>legitimate, but is that valid? Software
developers have no right</em></ins></span> to <span
class="removed"><del><strong>report</strong></del></span>
+ <span class="inserted"><ins><em>analyze</em></ins></span> what
+ <span class="removed"><del><strong>the user watches — no
exceptions!</p></strong></del></span> <span
class="inserted"><ins><em>users are doing or how. “Analytics” tools
that snoop are just as wrong as any other
snooping.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li><p>Vizio goes a step
further</strong></del></span>
<span class="inserted"><ins><em><li id="M201510300">
<p>More</em></ins></span> than <span
class="removed"><del><strong>other TV manufacturers in spying on
- their users: their</strong></del></span> <span
class="inserted"><ins><em>73% and 47% of mobile applications, from Android and
iOS
- respectively</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in
detail</strong></del></span> <span
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/">share
- personal, behavioral</em></ins></span> and
+ their users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits in
detail</strong></del></span> <span
class="inserted"><ins><em>73%</em></ins></span> and
<span class="removed"><del><strong>link them your IP address</a>
so that advertisers can track you
across devices.</p>
- <p>It</strong></del></span> <span
class="inserted"><ins><em>location information</a> of their users with
+ <p>It</strong></del></span> <span class="inserted"><ins><em>47% of
mobile applications, from Android and iOS
+ respectively <a href="https://techscience.org/a/2015103001/">share
+ personal, behavioral and location information</a> of their users with
third parties.</p>
</li>
<li id="M201508210">
- <p>Like most “music screaming” disservices,
Spotify</em></ins></span> is <span class="removed"><del><strong>possible to
turn this off, but having</strong></del></span>
- <span class="inserted"><ins><em>based on proprietary malware (DRM and
snooping). In August 2015</em></ins></span> it <span
class="removed"><del><strong>enabled by default
- is an injustice already.</p>
+ <p>Like most “music screaming” disservices,
Spotify</em></ins></span> is <span
class="removed"><del><strong>possible</strong></del></span>
+ <span class="inserted"><ins><em>based on proprietary malware (DRM and
snooping). In August 2015 it <a
+
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded users submit</em></ins></span> to <span
class="removed"><del><strong>turn this off, but having</strong></del></span>
<span class="inserted"><ins><em>increased snooping</a>, and some are
starting
+ to realize that</em></ins></span> it <span
class="removed"><del><strong>enabled by default</strong></del></span> is <span
class="removed"><del><strong>an injustice already.</p>
</li>
- <li><p>Tivo's alliance with Viacom adds 2.3 million households to
- the 600 millions social media profiles the company already
- monitors. Tivo customers are unaware they're being watched by
- advertisers. By combining TV viewing information with online
- social media participation, Tivo can now</strong></del></span> <a
<span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
- advertisement with online purchases</a>, exposing
all</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded</em></ins></span> users <span
class="inserted"><ins><em>submit</em></ins></span> to
- <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
- <li><p>Some web</strong></del></span> <span
class="inserted"><ins><em>increased snooping</a>,</em></ins></span> and
<span class="removed"><del><strong>TV advertisements play inaudible
sounds</strong></del></span> <span class="inserted"><ins><em>some are
starting</em></ins></span>
- to <span class="removed"><del><strong>be
- picked up by proprietary malware running on other devices in
- range so</strong></del></span> <span class="inserted"><ins><em>realize
that it is nasty.</p>
+ <li><p>Tivo's alliance with Viacom adds 2.3 million
households</strong></del></span> <span
class="inserted"><ins><em>nasty.</p>
<p>This article shows the <a
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping</em></ins></span> as <span
class="inserted"><ins><em>a way</em></ins></span> to <span
class="removed"><del><strong>determine that</strong></del></span> <span
class="inserted"><ins><em>“serve”
- users better</a>—never mind whether</em></ins></span> they
<span class="inserted"><ins><em>want that. This is a
- typical example of the attitude of the proprietary software industry
+ twisted ways that they present snooping as a way</em></ins></span> to
<span class="inserted"><ins><em>“serve”
+ users better</a>—never mind whether they want that. This is a
+ typical example of</em></ins></span> the <span
class="removed"><del><strong>600 millions social media
profiles</strong></del></span> <span class="inserted"><ins><em>attitude
of</em></ins></span> the <span class="removed"><del><strong>company already
+ monitors. Tivo customers</strong></del></span> <span
class="inserted"><ins><em>proprietary software industry
towards those they have subjugated.</p>
<p>Out, out, damned Spotify!</p>
@@ -1613,28 +1609,31 @@
proprietary apps, it was only 60%.</p>
<p>The article confusingly describes gratis apps as
- “free”, but most of them</em></ins></span> are <span
class="removed"><del><strong>nearby. Once your
- Internet devices are paired with your TV, advertisers can
- correlate ads with Web activity, and
- other</strong></del></span> <span class="inserted"><ins><em>not in
fact</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span>
+ “free”, but most of them</em></ins></span> are <span
class="removed"><del><strong>unaware they're being watched by
+ advertisers. By combining TV viewing information with online
+ social media participation, Tivo can now</strong></del></span> <span
class="inserted"><ins><em>not in fact</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
+ advertisement with online purchases</a>, exposing all
users</strong></del></span>
<span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>. It also uses the
ugly word “monetize”. A good replacement for that word
- is “exploit”; nearly always that will fit
perfectly.</p></em></ins></span>
+ is “exploit”; nearly always that will fit perfectly.</p>
</li>
- <span class="removed"><del><strong><li><p>Vizio
“smart” TVs recognize</strong></del></span>
- <span class="inserted"><ins><em><li id="M201505060">
+ <li id="M201505060">
<p>Gratis Android apps (but not <a
- href="/philosophy/free-sw.html">free software</a>) connect to 100
<a
+ href="/philosophy/free-sw.html">free software</a>)
connect</em></ins></span> to
+ <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
+ <li><p>Some web</strong></del></span> <span
class="inserted"><ins><em>100 <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</em></ins></span>
- and <span class="inserted"><ins><em>advertising</a> URLs, on the
average.</p>
+ and <span class="removed"><del><strong>TV advertisements play inaudible
sounds to be
+ picked up by proprietary malware running</strong></del></span> <span
class="inserted"><ins><em>advertising</a> URLs,</em></ins></span> on
<span class="removed"><del><strong>other devices</strong></del></span> <span
class="inserted"><ins><em>the average.</p>
</li>
<li id="M201504060">
<p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop on the user</a>. This is in addition to
- the snooping done by the phone company, and perhaps by the OS in
+ QR-code scanner apps snoop on the user</a>. This
is</em></ins></span> in
+ <span class="removed"><del><strong>range so as</strong></del></span>
<span class="inserted"><ins><em>addition</em></ins></span> to <span
class="removed"><del><strong>determine that they are
nearby.</strong></del></span>
+ <span class="inserted"><ins><em>the snooping done by the phone company,
and perhaps by the OS in
the phone.</p>
<p>Don't be distracted by the question of whether the app developers
@@ -1838,7 +1837,8 @@
<p>Some web and TV advertisements play inaudible
sounds to be picked up by proprietary malware running
on other devices in range so as to determine that they
- are nearby. Once your Internet devices are paired with
+ are nearby.</em></ins></span> Once your
+ <span class="removed"><del><strong>Internet
devices</strong></del></span> <span class="inserted"><ins><em>Internet devices
are paired with
your TV, advertisers can correlate ads with Web activity, and other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
cross-device tracking</a>.</p>
@@ -1918,9 +1918,10 @@
better.</p>
<p>This shows that laws requiring products to get users' formal
- consent before collecting personal data are totally inadequate.
+ consent before collecting personal data</em></ins></span> are <span
class="removed"><del><strong>paired with</strong></del></span> <span
class="inserted"><ins><em>totally inadequate.
And what happens if a user declines consent? Probably the TV will
- say, “Without your consent to tracking, the TV will not
+ say, “Without</em></ins></span> your <span
class="removed"><del><strong>TV, advertisers can
+ correlate ads with Web activity,</strong></del></span> <span
class="inserted"><ins><em>consent to tracking, the TV will not
work.”</p>
<p>Proper laws would say that TVs are not allowed to report what the
@@ -1949,8 +1950,9 @@
<li id="M201212170">
<p id="break-security-smarttv"><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way to break security on a “smart”
TV</a>
- and use its camera to watch the people who are watching TV.</p>
+ Crackers found a way to break security on a “smart”
TV</a></em></ins></span>
+ and
+ <span class="removed"><del><strong>other</strong></del></span> <span
class="inserted"><ins><em>use its camera to watch the people who are watching
TV.</p>
</li>
</ul>
@@ -1962,13 +1964,14 @@
<ul class="blurbs">
<li id="M201603220">
- <p>Over 70 brands of network-connected surveillance cameras have
<a
-
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
- security bugs that allow anyone to watch through them</a>.</p>
+ <p>Over 70 brands of network-connected surveillance cameras
have</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
+ security bugs that allow anyone to watch through
them</a>.</p></em></ins></span>
</li>
+ <span
class="removed"><del><strong><li><p>Vizio</strong></del></span>
- <li id="M201511250">
- <p>The Nest Cam “smart” camera is <a
+ <span class="inserted"><ins><em><li id="M201511250">
+ <p>The Nest Cam</em></ins></span> “smart” <span
class="removed"><del><strong>TVs recognize</strong></del></span> <span
class="inserted"><ins><em>camera is <a
href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
even when the “owner” switches it “off.”</p>
@@ -2009,8 +2012,8 @@
<p>Note the totally inadequate proposed response: a labeling
standard with which manufacturers would make statements about their
- products, rather than free software which users could have checked
- and changed.</p>
+ products, rather than free software which users could have
checked</em></ins></span>
+ and <span class="inserted"><ins><em>changed.</p>
<p>The company that made the vibrator <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
@@ -2627,7 +2630,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/17 10:01:36 $
+$Date: 2018/10/24 19:28:44 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.221
retrieving revision 1.222
diff -u -b -r1.221 -r1.222
--- proprietary-surveillance.ja.po 7 Oct 2018 22:29:14 -0000 1.221
+++ proprietary-surveillance.ja.po 24 Oct 2018 19:28:44 -0000 1.222
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-07 22:26+0000\n"
+"POT-Creation-Date: 2018-10-24 19:25+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -35,12 +35,21 @@
"ã¦ã§ã¢ã®ä¾</a>"
#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Nonfree (proprietary) software is very often malware (designed to "
+#| "mistreat the user). Nonfree software is controlled by its developers, "
+#| "which puts them in a position of power over the users; <a href=\"/"
+#| "philosophy/free-software-even-more-important.html\">that is the basic "
+#| "injustice</a>. The developers often exercise that power to the detriment "
+#| "of the users they ought to serve."
msgid ""
"Nonfree (proprietary) software is very often malware (designed to mistreat "
"the user). Nonfree software is controlled by its developers, which puts them "
"in a position of power over the users; <a href=\"/philosophy/free-software-"
"even-more-important.html\">that is the basic injustice</a>. The developers "
-"often exercise that power to the detriment of the users they ought to serve."
+"and manufacturers often exercise that power to the detriment of the users "
+"they ought to serve."
msgstr ""
"ä¸èªç±ãª(ãããã©ã¤ã¨ã¿ãªãª)ã½ããã¦ã§ã¢ã¯å®ã«å¤ãã®å
´åãã«ã¦ã§ã¢ã§ã(ã¦ã¼ã¶"
"ãèå¾
ããããã«è¨è¨
ããã¾ã)ãä¸èªç±ãªã½ããã¦ã§ã¢ã¯ãã®éçºè
ã«ããã³ã³ã"
@@ -51,17 +60,19 @@
#. type: Content of: <div><p>
msgid ""
-"This document attempts to track <strong>clearly established cases of "
-"proprietary software that spies on or tracks users</strong>."
+"One common form of mistreatment is to snoop on the user. This page records "
+"<strong>clearly established cases of proprietary software that spies on or "
+"tracks users</strong>. Manufacturers even refuse to <a href=\"https://"
+"techcrunch.com/2018/10/19/smart-home-devices-hoard-data-government-demands/"
+"\">say whether they snoop on users for the state</a>."
msgstr ""
-"ãã®ææ¸ã¯ã<strong>æ確ã«ç¢ºèªããããããã©ã¤ã¨ã¿ãªãªã½ããã¦ã§ã¢ãã¦ã¼ã¶ã"
-"ã¹ãã¤ãããã追跡ãããããã±ã¼ã¹</strong>ãè¨é²ãã試ã¿ã§ãã"
#. type: Content of: <div><p>
msgid ""
-"The tethered appliances and applications are by nature doing surveillance. "
-"We are not listing them here because they have their own page: <a href=\"/"
-"proprietary/proprietary-tethers.html\">Proprietary Tethers</a>."
+"All appliances and applications that are tethered to a specific server are "
+"snoopers by nature. We do not list them in this page because they have "
+"their own page: <a href=\"/proprietary/proprietary-tethers.html"
+"\">Proprietary Tethers</a>."
msgstr ""
#. type: Content of: <div><div><p>
@@ -69,7 +80,7 @@
"If you know of an example that ought to be in this page but isn't here, "
"please write to <a href=\"mailto:address@hidden"><address@hidden"
"org></a> to inform us. Please include the URL of a trustworthy reference "
-"or two to present the specifics."
+"or two to serve as specific substantiation."
msgstr ""
#. type: Content of: <div><div><a>
@@ -3449,6 +3460,13 @@
msgid "Updated:"
msgstr "æçµæ´æ°:"
+#~ msgid ""
+#~ "This document attempts to track <strong>clearly established cases of "
+#~ "proprietary software that spies on or tracks users</strong>."
+#~ msgstr ""
+#~
"ãã®ææ¸ã¯ã<strong>æ確ã«ç¢ºèªããããããã©ã¤ã¨ã¿ãªãªã½ããã¦ã§ã¢ãã¦ã¼ã¶"
+#~
"ãã¹ãã¤ãããã追跡ãããããã±ã¼ã¹</strong>ãè¨é²ãã試ã¿ã§ãã"
+
#, fuzzy
#~| msgid ""
#~| "<a href=\"/proprietary/proprietary.html\">Other examples of proprietary "
Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.170
retrieving revision 1.171
diff -u -b -r1.170 -r1.171
--- proprietary-surveillance.pot 7 Oct 2018 22:29:14 -0000 1.170
+++ proprietary-surveillance.pot 24 Oct 2018 19:28:44 -0000 1.171
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-07 22:26+0000\n"
+"POT-Creation-Date: 2018-10-24 19:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -36,21 +36,25 @@
"the user). Nonfree software is controlled by its developers, which puts them "
"in a position of power over the users; <a "
"href=\"/philosophy/free-software-even-more-important.html\">that is the "
-"basic injustice</a>. The developers often exercise that power to the "
-"detriment of the users they ought to serve."
+"basic injustice</a>. The developers and manufacturers often exercise that "
+"power to the detriment of the users they ought to serve."
msgstr ""
#. type: Content of: <div><p>
msgid ""
-"This document attempts to track <strong>clearly established cases of "
-"proprietary software that spies on or tracks users</strong>."
+"One common form of mistreatment is to snoop on the user. This page records "
+"<strong>clearly established cases of proprietary software that spies on or "
+"tracks users</strong>. Manufacturers even refuse to <a "
+"href=\"https://techcrunch.com/2018/10/19/smart-home-devices-hoard-data-government-demands/\">say
"
+"whether they snoop on users for the state</a>."
msgstr ""
#. type: Content of: <div><p>
msgid ""
-"The tethered appliances and applications are by nature doing "
-"surveillance. We are not listing them here because they have their own page: "
-"<a href=\"/proprietary/proprietary-tethers.html\">Proprietary Tethers</a>."
+"All appliances and applications that are tethered to a specific server are "
+"snoopers by nature. We do not list them in this page because they have "
+"their own page: <a "
+"href=\"/proprietary/proprietary-tethers.html\">Proprietary Tethers</a>."
msgstr ""
#. type: Content of: <div><div><p>
@@ -58,8 +62,8 @@
"If you know of an example that ought to be in this page but isn't here, "
"please write to <a "
"href=\"mailto:address@hidden"><address@hidden></a> to inform "
-"us. Please include the URL of a trustworthy reference or two to present the "
-"specifics."
+"us. Please include the URL of a trustworthy reference or two to serve as "
+"specific substantiation."
msgstr ""
#. type: Content of: <div><div><a>
Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.412
retrieving revision 1.413
diff -u -b -r1.412 -r1.413
--- proprietary-surveillance.ru.po 7 Oct 2018 22:29:14 -0000 1.412
+++ proprietary-surveillance.ru.po 24 Oct 2018 19:28:44 -0000 1.413
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-07 22:26+0000\n"
+"POT-Creation-Date: 2018-10-24 19:25+0000\n"
"PO-Revision-Date: 2018-10-05 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-24 19:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -35,12 +36,27 @@
"неÑвободнÑÑ
пÑогÑамм</a>"
#. type: Content of: <div><p>
+# | Nonfree (proprietary) software is very often malware (designed to mistreat
+# | the user). Nonfree software is controlled by its developers, which puts
+# | them in a position of power over the users; <a
+# | href=\"/philosophy/free-software-even-more-important.html\">that is the
+# | basic injustice</a>. The developers {+and manufacturers+} often exercise
+# | that power to the detriment of the users they ought to serve.
+#, fuzzy
+#| msgid ""
+#| "Nonfree (proprietary) software is very often malware (designed to "
+#| "mistreat the user). Nonfree software is controlled by its developers, "
+#| "which puts them in a position of power over the users; <a href=\"/"
+#| "philosophy/free-software-even-more-important.html\">that is the basic "
+#| "injustice</a>. The developers often exercise that power to the detriment "
+#| "of the users they ought to serve."
msgid ""
"Nonfree (proprietary) software is very often malware (designed to mistreat "
"the user). Nonfree software is controlled by its developers, which puts them "
"in a position of power over the users; <a href=\"/philosophy/free-software-"
"even-more-important.html\">that is the basic injustice</a>. The developers "
-"often exercise that power to the detriment of the users they ought to serve."
+"and manufacturers often exercise that power to the detriment of the users "
+"they ought to serve."
msgstr ""
"ÐеÑвободнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð¾ÑÐµÐ½Ñ ÑаÑÑо
вÑедоноÑÐ½Ñ (ÑпÑоекÑиÑÐ¾Ð²Ð°Ð½Ñ Ð½ÐµÑпÑаведливо "
"по оÑноÑÐµÐ½Ð¸Ñ Ðº полÑзоваÑелÑ). ÐеÑвободнÑе
пÑогÑÐ°Ð¼Ð¼Ñ ÐºÐ¾Ð½ÑÑолиÑÑÑÑÑÑ Ñвоими "
@@ -51,17 +67,30 @@
#. type: Content of: <div><p>
msgid ""
-"This document attempts to track <strong>clearly established cases of "
-"proprietary software that spies on or tracks users</strong>."
+"One common form of mistreatment is to snoop on the user. This page records "
+"<strong>clearly established cases of proprietary software that spies on or "
+"tracks users</strong>. Manufacturers even refuse to <a href=\"https://"
+"techcrunch.com/2018/10/19/smart-home-devices-hoard-data-government-demands/"
+"\">say whether they snoop on users for the state</a>."
msgstr ""
-"Ð ÑÑом докÑменÑе Ð¼Ñ Ð¿ÑÑаемÑÑ Ð¾ÑÑледиÑÑ
<strong>Ñ
оÑоÑо ÑÑÑановленнÑе ÑлÑÑаи "
-"неÑвободнÑÑ
пÑогÑамм, коÑоÑÑе ÑпионÑÑ Ð¸Ð»Ð¸
ÑледÑÑ Ð·Ð° полÑзоваÑелÑми</strong>."
#. type: Content of: <div><p>
-msgid ""
-"The tethered appliances and applications are by nature doing surveillance. "
-"We are not listing them here because they have their own page: <a href=\"/"
-"proprietary/proprietary-tethers.html\">Proprietary Tethers</a>."
+# | [-The tethered-]{+All+} appliances and applications {+that are tethered to
+# | a specific server+} are {+snoopers+} by [-nature doing surveillance.-]
+# | {+nature.+} We [-are-] {+do+} not [-listing-] {+list+} them [-here-] {+in
+# | this page+} because they have their own page: <a
+# | href=\"/proprietary/proprietary-tethers.html\">Proprietary Tethers</a>.
+#, fuzzy
+#| msgid ""
+#| "The tethered appliances and applications are by nature doing "
+#| "surveillance. We are not listing them here because they have their own "
+#| "page: <a href=\"/proprietary/proprietary-tethers.html\">Proprietary "
+#| "Tethers</a>."
+msgid ""
+"All appliances and applications that are tethered to a specific server are "
+"snoopers by nature. We do not list them in this page because they have "
+"their own page: <a href=\"/proprietary/proprietary-tethers.html"
+"\">Proprietary Tethers</a>."
msgstr ""
"ÐÑивÑзаннÑе ÑÑÑÑойÑÑва и пÑогÑÐ°Ð¼Ð¼Ñ Ð¿Ð¾
пÑиÑоде Ñвоей ведÑÑ ÑлежкÑ. ÐÑ Ð½Ðµ "
"пеÑеÑиÑлÑем иÑ
здеÑÑ, поÑколÑÐºÑ Ñ Ð½Ð¸Ñ
еÑÑÑ
ÑÐ²Ð¾Ñ ÑÑÑаниÑа: We are not listing "
@@ -69,11 +98,22 @@
"proprietary-tethers.html\">ÐÑивÑзка в неÑвободнÑÑ
пÑогÑаммаÑ
</a>."
#. type: Content of: <div><div><p>
+# | If you know of an example that ought to be in this page but isn't here,
+# | please write to <a
+# | href=\"mailto:address@hidden"><address@hidden></a> to
+# | inform us. Please include the URL of a trustworthy reference or two to
+# | [-present the specifics.-] {+serve as specific substantiation.+}
+#, fuzzy
+#| msgid ""
+#| "If you know of an example that ought to be in this page but isn't here, "
+#| "please write to <a href=\"mailto:address@hidden"><address@hidden"
+#| "org></a> to inform us. Please include the URL of a trustworthy "
+#| "reference or two to present the specifics."
msgid ""
"If you know of an example that ought to be in this page but isn't here, "
"please write to <a href=\"mailto:address@hidden"><address@hidden"
"org></a> to inform us. Please include the URL of a trustworthy reference "
-"or two to present the specifics."
+"or two to serve as specific substantiation."
msgstr ""
"ÐÑли вам извеÑÑен пÑимеÑ, коÑоÑÑй должен
бÑÑÑ Ð½Ð° ÑÑой ÑÑÑаниÑе, но его здеÑÑ "
"неÑ, ÑообÑиÑе нам по адÑеÑÑ <a
href=\"mailto:address@hidden"><"
@@ -3541,6 +3581,14 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "This document attempts to track <strong>clearly established cases of "
+#~ "proprietary software that spies on or tracks users</strong>."
+#~ msgstr ""
+#~ "Ð ÑÑом докÑменÑе Ð¼Ñ Ð¿ÑÑаемÑÑ Ð¾ÑÑледиÑÑ
<strong>Ñ
оÑоÑо ÑÑÑановленнÑе "
+#~ "ÑлÑÑаи неÑвободнÑÑ
пÑогÑамм, коÑоÑÑе
ÑпионÑÑ Ð¸Ð»Ð¸ ÑледÑÑ Ð·Ð° "
+#~ "полÑзоваÑелÑми</strong>."
+
+#~ msgid ""
#~ "Every “home security” camera, if its manufacturer can "
#~ "communicate with it, is a surveillance device. <a href=\"https://www."
#~ "theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-"
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary/po proprietary-surveillance.de....,
GNUN <=